ExamGecko
Home / MuleSoft / MCD - Level 2 / List of questions
Ask Question

MuleSoft MCD - Level 2 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Which statement is true about using mutual TLS to secure an application?

Mutual TLS requires a hardware security module to be used
Mutual TLS requires a hardware security module to be used
Mutual TLS authenticates the identity of the server before the identity of the client
Mutual TLS authenticates the identity of the server before the identity of the client
Mutual TLS ensures only authorized end users are allowed to access an endpoint
Mutual TLS ensures only authorized end users are allowed to access an endpoint
Mutual TLS increases the encryption strength versus server-side TLS alone
Mutual TLS increases the encryption strength versus server-side TLS alone
Suggested answer: B
Explanation:

Mutual TLS (mTLS) is an extension of TLS that requires both parties (client and server) to present their certificates to each other during the handshake process. This way, both parties can verify each other's identity and establish a secure connection. The authentication of the server happens before the authentication of the client, as the server sends its certificate first and then requests the client's certificate.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#mutual-authentication

asked 18/09/2024
Sanjay R Khiani
49 questions

Question 22

Report Export Collapse

Which statement is true when using XML SDK for creating custom message processors?

Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
An XML SDK provides both inbound and outbound operations
An XML SDK provides both inbound and outbound operations
Operations can be reused in recursive calls
Operations can be reused in recursive calls
All operations are public
All operations are public
Suggested answer: D
Explanation:

When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK.

Reference: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations

asked 18/09/2024
Ntombifuthi Shabangu
33 questions

Question 23

Report Export Collapse

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Write-through invalidation
Write-through invalidation
White-behind invalidation
White-behind invalidation
Time to live
Time to live
Notification-based invalidation
Notification-based invalidation
Suggested answer: C
Explanation:

The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write any additional code. TTL specifies how long the cached response is valid before it expires and needs to be refreshed. The Cache scope also supports custom invalidation strategies using MEL or DataWeave expressions.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/cache-scope#cache_invalidation

asked 18/09/2024
Abdulraheem alsaka
38 questions

Question 24

Report Export Collapse

What is the MuleSoft recommended method to encrypt sensitive property data?

The encryption key and sensitive data should be different for each environment
The encryption key and sensitive data should be different for each environment
The encryption key should be identical for all environments
The encryption key should be identical for all environments
The encryption key should be identical for all environments and the sensitive data should be different for each environment
The encryption key should be identical for all environments and the sensitive data should be different for each environment
The encryption key should be different for each environment and the sensitive data should be the same for all environments
The encryption key should be different for each environment and the sensitive data should be the same for all environments
Suggested answer: A
Explanation:

The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties

asked 18/09/2024
Youssef El Akhal
40 questions

Question 25

Report Export Collapse

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.

Which files does the developer need to create in order to package the custom policy?

Deployable ZIP file, YAML configuration file
Deployable ZIP file, YAML configuration file
JSON properties file, YAML configuration file
JSON properties file, YAML configuration file
JSON properties file, XML template file
JSON properties file, XML template file
XML template file, YAML configuration file
XML template file, YAML configuration file
Suggested answer: D
Explanation:

To package a custom policy using the HTTP Policy Transform Extension, the developer needs to create an XML template file and a YAML configuration file. The XML template file defines the policy logic using Mule components and placeholders for user-defined properties. The YAML configuration file defines the metadata of the policy, such as its name, description, category, parameters, and dependencies.

Reference: https://docs.mulesoft.com/api-manager/2.x/http-policy-transform#packaging-the-policy

asked 18/09/2024
Carlos Fonseca
36 questions

Question 26

Report Export Collapse

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

MuleSoft MCD - Level 2 image Question 26 52816 09182024213621000000

Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'I> inside the Logger tag
Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'I> inside the Logger tag
Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'/> inside the Appenders tag
Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'/> inside the Appenders tag
Configure <Logger level-'ERROR'/> inside the VM Connector configuration
Configure <Logger level-'ERROR'/> inside the VM Connector configuration
Nothing, as error-level events are automatically logged
Nothing, as error-level events are automatically logged
Suggested answer: B
Explanation:

To log all the errors raised by the VM Connector, the developer needs to add an async logger with the name 'org.mule.extension.vm' and the level 'ERROR' inside the appenders tag of the log4j2.xml file. This will enable logging all error-level events generated by the VM Connector to the console appender.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/logging-in-mule#configuring-custom-logging-settings

asked 18/09/2024
Hakan KâroΓ„ΕΈlu
41 questions

Question 27

Report Export Collapse

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
Suggested answer: B
Explanation:

When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached response exists, then only the HTTP Caching policy is evaluated and the cached response is returned to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss, meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth policy are evaluated before invoking the API implementation.

Reference: https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering

asked 18/09/2024
Isidre Piguillem
45 questions

Question 28

Report Export Collapse

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.

Which strategy should be used to implement this endpoint?

Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
Create a dedicated endpoint that responds with the API status and health of the server
Create a dedicated endpoint that responds with the API status and health of the server
Use an existing resource endpoint of the API
Use an existing resource endpoint of the API
Create a dedicated endpoint that responds with the API status only
Create a dedicated endpoint that responds with the API status only
Suggested answer: A
Explanation:

To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes

asked 18/09/2024
Mihail Galabov
36 questions

Question 29

Report Export Collapse

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

MuleSoft MCD - Level 2 image Question 29 52819 09182024213621000000

HTTP Status Code:200. Body 'Error in processing your request
HTTP Status Code:200. Body 'Error in processing your request
HTTP Status Code:500. Body 'The HTTP CONNECTIVITY Error description
HTTP Status Code:500. Body 'The HTTP CONNECTIVITY Error description
HTTP Status Code:500. Body 'Error in processing your request
HTTP Status Code:500. Body 'Error in processing your request
HTTP Status Code:500. Body 'Error in processing your request
HTTP Status Code:500. Body 'Error in processing your request
Suggested answer: C
Explanation:

When the HTTP Request operation raises an HTTP CONNECTIVITY error, it triggers an on-error-continue handler that sets a payload with 'Error in processing your request'. Since no status code is explicitly set in this handler, it defaults to 500 (INTERNAL SERVER ERROR). Therefore, the web client receives an HTTP response with status code 500 and body 'Error in processing your request'.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/error-handling#on-error-continue

asked 18/09/2024
Michael Serda
39 questions

Question 30

Report Export Collapse

A Mule application defines as SSL/TLS keystore properly 'tis,keystore.keyPassword'' as secure.

How can this property be referenced to access its value within the application?

#{secure::tiskeystore,keyPassowrd}
#{secure::tiskeystore,keyPassowrd}
${secure::tiskeystore,keyPassowrd}
${secure::tiskeystore,keyPassowrd}
${secure::tiskeystore,keyPassowrd}
${secure::tiskeystore,keyPassowrd}
p{secure::tiskeystore,keyPassowrd}
p{secure::tiskeystore,keyPassowrd}
Suggested answer: B
Explanation:

secure::tiskeystore,keyPassowrdShortExplanationofCorrectAnswerOnly:Toreferenceasecurepropertyvaluewithintheapplication,thedeveloperneedstousethesyntax{secure::}. In this case, the property name is tiskeystore,keyPassword, so the correct syntax is ${secure::tiskeystore,keyPassowrd}.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties#referencing-secure-properties

asked 18/09/2024
AHOPkos Varga
30 questions
Total 60 questions
Go to page: of 6
Search

Related questions