Certbus > Mulesoft > MuleSoft Certified Developer > MCD-LEVEL-2 > MCD-LEVEL-2 Online Practice Questions and Answers

MCD-LEVEL-2 Online Practice Questions and Answers

Questions 4

A Mule application uses API autodiscovery to access and enforce policies for a RESTful implementation.

A. Northing because flowRef is an optional attribute which can be passed runtime

B. The name of the flow that has APlkit Console to receive all incoming RESTful operation requests.

C. Anyof the APIkit generate implement flows

D. The name of the flow that has HTTP listener to receive all incoming RESTful operation requests

Browse 60 Q&As
Questions 5

A developer has created the first version of an API designed for business partners to work commodity prices.

What should developer do to allow more than one major version of the same API to be exposed by the implementation?

A. In Design Center, open the RAML and modify each operation to includethe major version number

B. In Anypoint Studio, generate scaffolding from the RAML, and the modify the in the generated flows to include a parameter to replace the version number

C. In Design Center, open the RAML and modify baseUn to include a variable that indicates the version number

D. In Anypoint Studio, generate scaffolding from the RAML, and then modify the flow names generated by APIKit to include a variable with the major version number

Browse 60 Q&As
Questions 6

Which statement is true when working with correlation IDS?

A. The HTTP Listener regenerates correlation IDs regardless of the HTTP request

B. The Anypoint MQ Connector automatically propagates correlation IDS

C. The HTTP Listener generates correlation IDS unless a correlation ID is received in the HTTP request

D. The VM Connector does not automatically propagate correction IDs

Browse 60 Q&As
Questions 7

Which pattern can a web API use to notify its client of state changes as soon as they occur?

A. HTTP Webhock

B. Shared database trigger

C. Schedule Event Publisher

D. ETL data load

Browse 60 Q&As
Questions 8

A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process.

Which implementation should be used to get response data from the external API after it completes processing?

A. Use an HTTP Connector to invoke the API and wait for a response

B. Use a Scheduler to check for a response every minute

C. Use an HTTP Connector inside Async scope to invoice the API and wait for a response D. Expose an HTTP callback API in Mule and register it with the external system

Browse 60 Q&As
Questions 9

Which configurations are required for HTTP Listener to enable mTLS authentication?

A. Set an appropriate reconnection strategy and use persistent connections for the listener

B. Set an appropriate keystore configuration and use persistent connections for the listener

C. Set an appropriate keystore and truststoreconfiguration for the listener

D. Set an appropriate truststore configuration and reconnection strategy for the listener

Browse 60 Q&As
Questions 10

A Mule application deployed to a standardalone Mule runtime uses VM queues to publish messages to be consumed asynchronously by another flow.

In the case of a system failure, what will happen to in-flight messages in the VM queues that have been consumed?

A. For nay type of queue, the message will be processed after the system comes online

B. For persistent queues, the message will be processed after the system comes online

C. For transient queues, the message will be processed after the system comes online

D. For any type of queue, the message will be lost

Browse 60 Q&As
Questions 11

Refer to the exhibit.

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A. Option A

B. Option B

C. Option C

D. Option D

Browse 60 Q&As
Questions 12

In a Mule project, Flow-1 contains a flow-ref to Flow-2 depends on data from Flow-1 to execute successfully.

Which action ensures the test suites and test cases written for Flow-1 and Flow-2 will executesuccessfully?

A. Chain together the test suites and test cases for Flow-1 and Flow-2

B. Use `'Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 independent

C. Use `'Before Test Case'' To collect data from Flow-1 test cases before running Flow-2 test cases

D. Use `After Test Case' to produce the data needed from Flow-1 test cases to pass to Flow-2 test cases

Browse 60 Q&As
Questions 13

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

A. A protocol

B. The TLS version

C. Anencryption algorithm

D. The Public key format

Browse 60 Q&As
Questions 14

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

A. In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller

B. In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller

C. In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store

D. In case of a cache miss, both the OAuth and HTTP Cachingpolicies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store

Browse 60 Q&As
Questions 15

A scatter-gather router is configured with four routes:Route A, B, C and D.

Route C false.

A. Error,errorMesage.payload.results [`2']

B. Payload failures[`2']

C. Error,errorMessage,payload.failures[`2']

D. Payload [`2']

Browse 60 Q&As
Questions 16

A Mule application defines as SSL/TLS keystore properly `tis,keystore.keyPassword'' as secure.

How canthis property be referenced to access its value within the application?

A. #{secure::tiskeystore,keyPassowrd}

B. ${secure::tiskeystore,keyPassowrd}

C. ${secure::tiskeystore,keyPassowrd}

D. p{secure::tiskeystore,keyPassowrd}

Browse 60 Q&As
Questions 17

What is the MuleSoft recommended method to encrypt sensitive property data?

A. The encryption key and sensitive data should be different for each environment

B. The encryption key should be identical for all environments

C. The encryption key should be identical for all environments and the sensitive data should be different for each environment

D. The encryption key should be different for each environment and the sensitive data should be the same for all environments

Browse 60 Q&As
Questions 18

Which statement is true when using XML SDK for creating custom message processors?

A. Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used

B. An XML SDK provides both inbound and outbound operations

C. Operations can be reused in recursive calls

D. All operations are public

Browse 60 Q&As
Exam Code: MCD-LEVEL-2
Exam Name: MuleSoft Certified Developer - Level 2 (Mule 4)
Last Update: Mar 18, 2025
Questions: 60 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99