ExamGecko
Home Home / Salesforce / Certified MuleSoft Developer II

Salesforce Certified MuleSoft Developer II Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











What is the MuleSoft recommended method to encrypt sensitive property data?

A.
The encryption key and sensitive data should be different for each environment
A.
The encryption key and sensitive data should be different for each environment
Answers
B.
The encryption key should be identical for all environments
B.
The encryption key should be identical for all environments
Answers
C.
The encryption key should be identical for all environments and the sensitive data should be different for each environment
C.
The encryption key should be identical for all environments and the sensitive data should be different for each environment
Answers
D.
The encryption key should be different for each environment and the sensitive data should be the same for all environments
D.
The encryption key should be different for each environment and the sensitive data should be the same for all environments
Answers
Suggested answer: A

Explanation:

The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.

Which files does the developer need to create in order to package the custom policy?

A.
Deployable ZIP file, YAML configuration file
A.
Deployable ZIP file, YAML configuration file
Answers
B.
JSON properties file, YAML configuration file
B.
JSON properties file, YAML configuration file
Answers
C.
JSON properties file, XML template file
C.
JSON properties file, XML template file
Answers
D.
XML template file, YAML configuration file
D.
XML template file, YAML configuration file
Answers
Suggested answer: D

Explanation:

To package a custom policy using the HTTP Policy Transform Extension, the developer needs to create an XML template file and a YAML configuration file. The XML template file defines the policy logic using Mule components and placeholders for user-defined properties. The YAML configuration file defines the metadata of the policy, such as its name, description, category, parameters, and dependencies.

Reference: https://docs.mulesoft.com/api-manager/2.x/http-policy-transform#packaging-the-policy

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

A.
Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'I> inside the Logger tag
A.
Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'I> inside the Logger tag
Answers
B.
Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'/> inside the Appenders tag
B.
Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'/> inside the Appenders tag
Answers
C.
Configure <Logger level-'ERROR'/> inside the VM Connector configuration
C.
Configure <Logger level-'ERROR'/> inside the VM Connector configuration
Answers
D.
Nothing, as error-level events are automatically logged
D.
Nothing, as error-level events are automatically logged
Answers
Suggested answer: B

Explanation:

To log all the errors raised by the VM Connector, the developer needs to add an async logger with the name 'org.mule.extension.vm' and the level 'ERROR' inside the appenders tag of the log4j2.xml file. This will enable logging all error-level events generated by the VM Connector to the console appender.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/logging-in-mule#configuring-custom-logging-settings

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

A.
In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
A.
In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
Answers
B.
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
B.
In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
Answers
C.
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
C.
In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
Answers
D.
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
D.
In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
Answers
Suggested answer: B

Explanation:

When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached response exists, then only the HTTP Caching policy is evaluated and the cached response is returned to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss, meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth policy are evaluated before invoking the API implementation.

Reference: https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.

Which strategy should be used to implement this endpoint?

A.
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
A.
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
Answers
B.
Create a dedicated endpoint that responds with the API status and health of the server
B.
Create a dedicated endpoint that responds with the API status and health of the server
Answers
C.
Use an existing resource endpoint of the API
C.
Use an existing resource endpoint of the API
Answers
D.
Create a dedicated endpoint that responds with the API status only
D.
Create a dedicated endpoint that responds with the API status only
Answers
Suggested answer: A

Explanation:

To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

A.
HTTP Status Code:200. Body 'Error in processing your request
A.
HTTP Status Code:200. Body 'Error in processing your request
Answers
B.
HTTP Status Code:500. Body 'The HTTP CONNECTIVITY Error description
B.
HTTP Status Code:500. Body 'The HTTP CONNECTIVITY Error description
Answers
C.
HTTP Status Code:500. Body 'Error in processing your request
C.
HTTP Status Code:500. Body 'Error in processing your request
Answers
D.
HTTP Status Code:500. Body 'Error in processing your request
D.
HTTP Status Code:500. Body 'Error in processing your request
Answers
Suggested answer: C

Explanation:

When the HTTP Request operation raises an HTTP CONNECTIVITY error, it triggers an on-error-continue handler that sets a payload with 'Error in processing your request'. Since no status code is explicitly set in this handler, it defaults to 500 (INTERNAL SERVER ERROR). Therefore, the web client receives an HTTP response with status code 500 and body 'Error in processing your request'.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/error-handling#on-error-continue

A Mule application defines as SSL/TLS keystore properly 'tis,keystore.keyPassword'' as secure.

How can this property be referenced to access its value within the application?

A.
#{secure::tiskeystore,keyPassowrd}
A.
#{secure::tiskeystore,keyPassowrd}
Answers
B.
${secure::tiskeystore,keyPassowrd}
B.
${secure::tiskeystore,keyPassowrd}
Answers
C.
${secure::tiskeystore,keyPassowrd}
C.
${secure::tiskeystore,keyPassowrd}
Answers
D.
p{secure::tiskeystore,keyPassowrd}
D.
p{secure::tiskeystore,keyPassowrd}
Answers
Suggested answer: B

Explanation:

secure::tiskeystore,keyPassowrdShortExplanationofCorrectAnswerOnly:Toreferenceasecurepropertyvaluewithintheapplication,thedeveloperneedstousethesyntax{secure::}. In this case, the property name is tiskeystore,keyPassword, so the correct syntax is ${secure::tiskeystore,keyPassowrd}.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties#referencing-secure-properties

In a Mule project, Flow-1 contains a flow-ref to Flow-2 depends on data from Flow-1 to execute successfully.

Which action ensures the test suites and test cases written for Flow-1 and Flow-2 will execute successfully?

A.
Chain together the test suites and test cases for Flow-1 and Flow-2
A.
Chain together the test suites and test cases for Flow-1 and Flow-2
Answers
B.
Use ''Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 independent
B.
Use ''Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 independent
Answers
C.
Use ''Before Test Case'' To collect data from Flow-1 test cases before running Flow-2 test cases
C.
Use ''Before Test Case'' To collect data from Flow-1 test cases before running Flow-2 test cases
Answers
D.
Use 'After Test Case' to produce the data needed from Flow-1 test cases to pass to Flow-2 test cases
D.
Use 'After Test Case' to produce the data needed from Flow-1 test cases to pass to Flow-2 test cases
Answers
Suggested answer: B

Explanation:

To ensure the test suites and test cases written for Flow-1 and Flow-2 will execute successfully, the developer should use a Set Event processor to pass the input that is needed by Flow-2, and keep the test cases for Flow-1 and Flow-2 independent. This way, the developer can isolate the testing of each flow and avoid coupling them together.

Reference: https://docs.mulesoft.com/munit/2.3/munit-test-flow

A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process.

Which implementation should be used to get response data from the external API after it completes processing?

A.
Use an HTTP Connector to invoke the API and wait for a response
A.
Use an HTTP Connector to invoke the API and wait for a response
Answers
B.
Use a Scheduler to check for a response every minute
B.
Use a Scheduler to check for a response every minute
Answers
C.
Use an HTTP Connector inside Async scope to invoice the API and wait for a response
C.
Use an HTTP Connector inside Async scope to invoice the API and wait for a response
Answers
D.
Expose an HTTP callback API in Mule and register it with the external system
D.
Expose an HTTP callback API in Mule and register it with the external system
Answers
Suggested answer: D

Explanation:

To get response data from the external API after it completes processing, the developer should expose an HTTP callback API in Mule and register it with the external system. This way, the external API can invoke the callback API with the response data when it is ready, instead of making the Mule application wait for a long time or poll for a response repeatedly.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/http-listener-ref#callback

Refer to the exhibit.

A Mute Object Store is configured with an entry TTL of one second and an expiration interval of 30 seconds.

What is the result of the flow if processing between os'store and os:retrieve takes 10 seconds?

A.
nullPayload
A.
nullPayload
Answers
B.
originalPayload
B.
originalPayload
Answers
C.
OS:KEY_NOT_FOUND
C.
OS:KEY_NOT_FOUND
Answers
D.
testPayload
D.
testPayload
Answers
Suggested answer: A

Explanation:

The result of the flow is nullPayload if processing between os:store and os:retrieve takes 10 seconds. This is because the entry TTL of the object store is one second, which means that any stored value expires after one second and is removed from the object store. The expiration interval of 30 seconds only determines how often the object store checks for expired values, but it does not affect the TTL. Therefore, when os:retrieve tries to get the value after 10 seconds, it returns nullPayload because the value has already expired and been removed.

Reference: https://docs.mulesoft.com/object-store/osv2-faq#how-does-the-time-to-live-work

Total 60 questions
Go to page: of 6