Download Mulesoft.MCD-Level-2.ExamDumps.2024-06-17.29q.vcex

Download Exam

File Info

Exam MuleSoft Certified Developer - Level 2 (Mule 4)
Number MCD-Level-2
File Name Mulesoft.MCD-Level-2.ExamDumps.2024-06-17.29q.vcex
Size 2 MB
Posted Jun 17, 2024
Download Mulesoft.MCD-Level-2.ExamDumps.2024-06-17.29q.vcex


How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

The flow is invoicing a target API. The API's protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles.
 
If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?


  1. The HTTP Request operation will succeed if the CA'S certificate is present in the JRE's default keystore
  2. The HTTP Request operation will succeed if the CA's certificate is present in the JRE's default truststore.
  3. The HTTP Request operation will always succeed regardless of the CA
  4. The HTTP Request operation will always fail regardless of the CA
Correct answer: B
Explanation:
The HTTP Request operation will use the default truststore of the JRE to validate the certificate of the target API. If the CA's certificate is present in the truststore, the operation will succeed. Otherwise, it will fail with a handshake exception.Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#tls-default
The HTTP Request operation will use the default truststore of the JRE to validate the certificate of the target API. If the CA's certificate is present in the truststore, the operation will succeed. Otherwise, it will fail with a handshake exception.
Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#tls-default



Question 2

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?


  1. A protocol
  2. The TLS version
  3. An encryption algorithm
  4. The Public key format
Correct answer: C
Explanation:
A cipher suite is a set of cryptographic algorithms that are used to secure the communication between a client and a server. A cipher suite consists of four components: a key exchange algorithm, an authentication algorithm, an encryption algorithm, and a message authentication code (MAC) algorithm. During the cipher suite exchange, the client and the server agree on which encryption algorithm to use for encrypting and decrypting the data.Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#cipher-suites
A cipher suite is a set of cryptographic algorithms that are used to secure the communication between a client and a server. A cipher suite consists of four components: a key exchange algorithm, an authentication algorithm, an encryption algorithm, and a message authentication code (MAC) algorithm. During the cipher suite exchange, the client and the server agree on which encryption algorithm to use for encrypting and decrypting the data.
Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#cipher-suites



Question 3

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.
Which files does the developer need to create in order to package the custom policy?


  1. Deployable ZIP file, YAML configuration file
  2. JSON properties file, YAML configuration file
  3. JSON properties file, XML template file
  4. XML template file, YAML configuration file
Correct answer: D
Explanation:
To package a custom policy using the HTTP Policy Transform Extension, the developer needs to create an XML template file and a YAML configuration file. The XML template file defines the policy logic using Mule components and placeholders for user-defined properties. The YAML configuration file defines the metadata of the policy, such as its name, description, category, parameters, and dependencies.Reference: https://docs.mulesoft.com/api-manager/2.x/http-policy-transform#packaging-the-policy
To package a custom policy using the HTTP Policy Transform Extension, the developer needs to create an XML template file and a YAML configuration file. The XML template file defines the policy logic using Mule components and placeholders for user-defined properties. The YAML configuration file defines the metadata of the policy, such as its name, description, category, parameters, and dependencies.
Reference: https://docs.mulesoft.com/api-manager/2.x/http-policy-transform#packaging-the-policy



Question 4

Refer to the exhibit.
 
What action must be performed to log all the errors raised by the VM Connector?


  1. Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'I> inside the Logger tag
  2. Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'/> inside the Appenders tag
  3. Configure <Logger level-'ERROR'/> inside the VM Connector configuration
  4. Nothing, as error-level events are automatically logged
Correct answer: B
Explanation:
To log all the errors raised by the VM Connector, the developer needs to add an async logger with the name 'org.mule.extension.vm' and the level 'ERROR' inside the appenders tag of the log4j2.xml file. This will enable logging all error-level events generated by the VM Connector to the console appender.Reference: https://docs.mulesoft.com/mule-runtime/4.3/logging-in-mule#configuring-custom-logging-settings
To log all the errors raised by the VM Connector, the developer needs to add an async logger with the name 'org.mule.extension.vm' and the level 'ERROR' inside the appenders tag of the log4j2.xml file. This will enable logging all error-level events generated by the VM Connector to the console appender.
Reference: https://docs.mulesoft.com/mule-runtime/4.3/logging-in-mule#configuring-custom-logging-settings



Question 5

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.
What will happen when an HTTP request is received?


  1. In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
  2. In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
  3. In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
  4. In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store
Correct answer: B
Explanation:
When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached response exists, then only the HTTP Caching policy is evaluated and the cached response is returned to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss, meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth policy are evaluated before invoking the API implementation.Reference: https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering
When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached response exists, then only the HTTP Caching policy is evaluated and the cached response is returned to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss, meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth policy are evaluated before invoking the API implementation.
Reference: https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering



Question 6

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.
Which strategy should be used to implement this endpoint?


  1. Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
  2. Create a dedicated endpoint that responds with the API status and health of the server
  3. Use an existing resource endpoint of the API
  4. Create a dedicated endpoint that responds with the API status only
Correct answer: A
Explanation:
To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors.Reference: https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes
To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors.
Reference: https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes



Question 7

The HTTP Request operation raises an HTTP CONNECTIVITY error.
 
Which HTTP status code and body are returned to the web client?


  1. HTTP Status Code:200. Body 'Error in processing your request
  2. HTTP Status Code:500. Body 'The HTTP CONNECTIVITY Error description
  3. HTTP Status Code:500. Body 'Error in processing your request
  4. HTTP Status Code:500. Body 'Error in processing your request
Correct answer: C
Explanation:
When the HTTP Request operation raises an HTTP CONNECTIVITY error, it triggers an on-error-continue handler that sets a payload with 'Error in processing your request'. Since no status code is explicitly set in this handler, it defaults to 500 (INTERNAL SERVER ERROR). Therefore, the web client receives an HTTP response with status code 500 and body 'Error in processing your request'.Reference: https://docs.mulesoft.com/mule-runtime/4.3/error-handling#on-error-continue
When the HTTP Request operation raises an HTTP CONNECTIVITY error, it triggers an on-error-continue handler that sets a payload with 'Error in processing your request'. Since no status code is explicitly set in this handler, it defaults to 500 (INTERNAL SERVER ERROR). Therefore, the web client receives an HTTP response with status code 500 and body 'Error in processing your request'.
Reference: https://docs.mulesoft.com/mule-runtime/4.3/error-handling#on-error-continue



Question 8

A Mule application defines as SSL/TLS keystore properly 'tis,keystore.keyPassword'' as secure.
How can this property be referenced to access its value within the application?


  1. #{secure::tiskeystore,keyPassowrd}
  2. ${secure::tiskeystore,keyPassowrd}
  3. ${secure::tiskeystore,keyPassowrd}
  4. p{secure::tiskeystore,keyPassowrd}
Correct answer: B
Explanation:
secure::tiskeystore,keyPassowrdShortExplanationofCorrectAnswerOnly:Toreferenceasecurepropertyvaluewithintheapplication,thedeveloperneedstousethesyntax{secure::}. In this case, the property name is tiskeystore,keyPassword, so the correct syntax is ${secure::tiskeystore,keyPassowrd}.Reference: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties#referencing-secure-properties
secure::tiskeystore,keyPassowrdShortExplanationofCorrectAnswerOnly:Toreferenceasecurepropertyvaluewithintheapplication,thedeveloperneedstousethesyntax{secure::}. In this case, the property name is tiskeystore,keyPassword, so the correct syntax is ${secure::tiskeystore,keyPassowrd}.
Reference: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties#referencing-secure-properties



Question 9

In a Mule project, Flow-1 contains a flow-ref to Flow-2 depends on data from Flow-1 to execute successfully.
Which action ensures the test suites and test cases written for Flow-1 and Flow-2 will execute successfully?


  1. Chain together the test suites and test cases for Flow-1 and Flow-2
  2. Use ''Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 independent
  3. Use ''Before Test Case'' To collect data from Flow-1 test cases before running Flow-2 test cases
  4. Use 'After Test Case' to produce the data needed from Flow-1 test cases to pass to Flow-2 test cases
Correct answer: B
Explanation:
To ensure the test suites and test cases written for Flow-1 and Flow-2 will execute successfully, the developer should use a Set Event processor to pass the input that is needed by Flow-2, and keep the test cases for Flow-1 and Flow-2 independent. This way, the developer can isolate the testing of each flow and avoid coupling them together.Reference: https://docs.mulesoft.com/munit/2.3/munit-test-flow
To ensure the test suites and test cases written for Flow-1 and Flow-2 will execute successfully, the developer should use a Set Event processor to pass the input that is needed by Flow-2, and keep the test cases for Flow-1 and Flow-2 independent. This way, the developer can isolate the testing of each flow and avoid coupling them together.
Reference: https://docs.mulesoft.com/munit/2.3/munit-test-flow



Question 10

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.
Which XML element must be used to intercept outbound HTTP requests?


  1. It is not possible to intercept outgoing HTTP requests, only inbound requests
  2. http-policy:source
  3. htt-policy:operation
  4. http-policy:processor
Correct answer: B
Explanation:
The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API.Reference: https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file
The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API.
Reference: https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file









PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files