Pre-Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Salesforce > Salesforce MuleSoft > Salesforce-MuleSoft-Developer-II

Salesforce-MuleSoft-Developer-II Salesforce Certified MuleSoft Developer 2 (SU24) Question and Answers

Question # 4

A Mule application includes a subflow containing a Scatter.Gather scope. Within each log of the Scatter.Gatter. an HTTP connector calls a PUT endpoint to modify records in different upstream system. The subflow is called inside an Unit successful scope to retry if a transitory exception is raised.

A technical spike is being performed to increase reliability of the Mule application.

Which steps should be performed within the Mule flow above the ensure idempontent behavior?

A.

Change the PUT requests inside the Scatter-Gather to POST requests

B.

Ensure an error-handling flow performs corrective actions to roll back all changes if any leg of the Scatter-Gather fails

C.

Remove the Put requests from the Scatter-Getter and perform them sequentially

D.

None, the flow already exhibits idempotent behavior

Full Access
Question # 5

Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A’S Object Store?

A.

Object Store v2 REST API

B.

CloudHub Connector

C.

Object Store Connector

D.

CloudHub REST API

Full Access
Question # 6

Which statement is true about using mutual TLS to secure an application?

A.

Mutual TLS requires a hardware security module to be used

B.

Mutual TLS authenticates the identity of the server before the identity of the client

C.

Mutual TLS ensures only authorized end users are allowed to access an endpoint

D.

Mutual TLS increases the encryption strength versus server-side TLS alone

Full Access
Question # 7

When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?

A.

To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permission

B.

To configure the SLA tier for the application and have the Exchange Administrator permission

C.

To configure the SLA tier for the application

D.

To only have Exchange Administrator permission

Full Access
Question # 8

Which statement is true when using XML SDK for creating custom message processors?

A.

Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used

B.

An XML SDK provides both inbound and outbound operations

C.

Operations can be reused in recursive calls

D.

All operations are public

Full Access
Question # 9

In a Mule project, Flow-1 contains a flow-ref to Flow-2 depends on data from Flow-1 to execute successfully.

Which action ensures the test suites and test cases written for Flow-1 and Flow-2 will execute successfully?

A.

Chain together the test suites and test cases for Flow-1 and Flow-2

B.

Use ‘’Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 independent

C.

Use ‘’Before Test Case’’ To collect data from Flow-1 test cases before running Flow-2 test cases

D.

Use ‘After Test Case’ to produce the data needed from Flow-1 test cases to pass to Flow-2 test cases

Full Access
Question # 10

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.

When a HTTP request arrives at the Mule application’s endpoint, what will be the execution order?

A.

A1, B1, F1, B2, A2

B.

B1, A1, F1, A2, B2

C.

F1, A1, B1, B2, A2

D.

F1, B1, A1, A2, B2

Full Access
Question # 11

Which command is used to convert a JKS keystore to PKCS12?

A.

Keytool-importkeystore –srckeystore keystore p12-srcstoretype PKCS12 –destkeystore keystore.jks –deststoretype JKS

B.

Keytool-importkeystore –srckeystore keystore p12-srcstoretype JKS –destkeystore keystore.p12 –deststoretype PKCS12

C.

Keytool-importkeystore –srckeystore keystore jks-srcstoretype JKS –destkeystore keystore.p13 –deststoretype PKCS12

D.

Keytool-importkeystore –srckeystore keystore jks-srcstoretype PKCS12 –destkeystore keystore.p12 –deststoretype JKS

Full Access
Question # 12

Which statement is true when working with correlation IDS?

A.

The HTTP Listener regenerates correlation IDs regardless of the HTTP request

B.

The Anypoint MQ Connector automatically propagates correlation IDS

C.

The HTTP Listener generates correlation IDS unless a correlation ID is received in the HTTP request

D.

The VM Connector does not automatically propagate correction IDs

Full Access
Question # 13

Which type of cache invalidation does the Cache scope support without having to write any additional code?

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Full Access
Question # 14

An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist.

What must the developer do in order to run this test locally without the policies applied?

A.

Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager

B.

Pass in the runtime parameter ‘’-Danpow.platform.gatekeeper=disabled’’

C.

Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio

D.

Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager

Full Access
Question # 15

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of property its,keystorePassoword in CloudHub 2.0?

A.

CloudHub encrypts the value

B.

The Mule server encrypts the value

C.

Anypoint Studio secures the value

D.

Runtime Manager masks the value

Full Access
Question # 16

Which pattern can a web API use to notify its client of state changes as soon as they occur?

A.

HTTP Webhock

B.

Shared database trigger

C.

Schedule Event Publisher

D.

ETL data load

Full Access
Question # 17

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Full Access
Question # 18

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

A.

HTTP Status Code:200.

Body ‘Error in processing your request

B.

HTTP Status Code:500.

Body ‘The HTTP CONNECTIVITY Error description

C.

HTTP Status Code:500.

Body ‘Error in processing your request

D.

HTTP Status Code:500.

Body ‘Error in processing your request

Full Access