Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MCD-Level-2 Exam Dumps - MuleSoft Certified Developer - Level 2 (Mule 4)

Question # 4

Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A’S Object Store?

A.

Object Store v2 REST API

B.

CloudHub Connector

C.

Object Store Connector

D.

CloudHub REST API

Full Access
Question # 5

A scatter-gather router is configured with four routes:Route A, B, C and D.

Route C false.

A.

Error,errorMesage.payload.results [‘2’]

B.

Payload failures[‘2’]

C.

Error,errorMessage,payload.failures[‘2’]

D.

Payload [‘2’]

Full Access
Question # 6

Which configurations are required for HTTP Listener to enable mTLS authentication?

A.

Set an appropriate reconnection strategy and use persistent connections for the listener

B.

Set an appropriate keystore configuration and use persistent connections for the listener

C.

Set an appropriate keystore and truststore configuration for the listener

D.

Set an appropriate truststore configuration and reconnection strategy for the listener

Full Access
Question # 7

A new Mule project has been created in Anypoint Studio with the default settings.

Which file inside the Mule project must be modified before using Maven to successfully deploy the application?

A.

Settings.xml

B.

Config.yaml

C.

Pom.xml

D.

Mule.artificact.json

Full Access
Question # 8

Two APIs are deployed to a two-node on-prem cluster. Due to a requirements change, the two APIs must communicate to exchange data asynchronously.

A.

If the two APIs use the same domain, the VM Connector can be leveraged

B.

The VM Connector is used to inter-application communication, so it is not possible to use the VM Connector

C.

Instead of using the VM Connector use directly

D.

It is not possible to use the VM Connector since the APIs are running in a cluster mode and each mode has it own set of VM Queues

Full Access
Question # 9

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default

Full Access
Question # 10

Which type of cache invalidation does the Cache scope support without having to write any additional code?

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Full Access
Question # 11

What is the MuleSoft recommended method to encrypt sensitive property data?

A.

The encryption key and sensitive data should be different for each environment

B.

The encryption key should be identical for all environments

C.

The encryption key should be identical for all environments and the sensitive data should be different for each environment

D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments

Full Access
Question # 12

A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure.

How can this property be referenced to access its value within the application?

A.

#{secure::tiskeystore,keyPassowrd}

B.

${secure::tiskeystore,keyPassowrd}

C.

${secure::tiskeystore,keyPassowrd}

D.

p{secure::tiskeystore,keyPassowrd}

Full Access
Question # 13

Which pattern can a web API use to notify its client of state changes as soon as they occur?

A.

HTTP Webhock

B.

Shared database trigger

C.

Schedule Event Publisher

D.

ETL data load

Full Access
Question # 14

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

A.

A protocol

B.

The TLS version

C.

An encryption algorithm

D.

The Public key format

Full Access
Question # 15

A company has been using CI/CD. Its developers use Maven to handle build and deployment activities.

What is the correct sequence of activities that takes place during the Maven build and deployment?

A.

Initialize, validate, compute, test, package, verify, install, deploy

B.

Validate, initialize, compile, package, test, install, verify, verify, deploy

C.

Validate, initialize, compile, test package, verify, install, deploy

D.

Validation, initialize, compile, test, package, install verify, deploy

Full Access
Question # 16

An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist.

What must the developer do in order to run this test locally without the policies applied?

A.

Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager

B.

Pass in the runtime parameter ‘’-Danpow.platform.gatekeeper=disabled’’

C.

Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio

D.

Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager

Full Access
Question # 17

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Full Access
Question # 18

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

A.

Add inside the Logger tag

B.

Add inside the Appenders tag

C.

Configure inside the VM Connector configuration

D.

Nothing, as error-level events are automatically logged

Full Access