Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

Hot Vendors

MCD-Level-2 MuleSoft Certified Developer - Level 2 (Mule 4) Questions and Answers

Questions 4

Refer to the exhibit.

MCD-Level-2 Question 4

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project’s src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

MCD-Level-2 Question 4

B)

MCD-Level-2 Question 4

C)

MCD-Level-2 Question 4

D)

MCD-Level-2 Question 4

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 5

Refer to the exhibit.

MCD-Level-2 Question 5

When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?

Options:

A.

Import a published API

B.

Generate a local RAML from anypoint Studio

C.

Download RAML from Design Center'

D.

Import RAML from local file

Buy Now
Questions 6

A scatter-gather router is configured with four routes:Route A, B, C and D.

Route C false.

Options:

A.

Error,errorMesage.payload.results [‘2’]

B.

Payload failures[‘2’]

C.

Error,errorMessage,payload.failures[‘2’]

D.

Payload [‘2’]

Buy Now
Questions 7

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.

MCD-Level-2 Question 7

When a HTTP request arrives at the Mule application’s endpoint, what will be the execution order?

Options:

A.

A1, B1, F1, B2, A2

B.

B1, A1, F1, A2, B2

C.

F1, A1, B1, B2, A2

D.

F1, B1, A1, A2, B2

Buy Now
Questions 8

Which pattern can a web API use to notify its client of state changes as soon as they occur?

Options:

A.

HTTP Webhock

B.

Shared database trigger

C.

Schedule Event Publisher

D.

ETL data load

Buy Now
Questions 9

An organization uses CloudHub to deploy all of its applications.

How can a common-global-handler flow be configured so that it can be reused across all of the organization’s deployed applications?

Options:

A.

Create a Mule plugin project

Create a common-global-error-handler flow inside the plugin project.

Use this plugin as a dependency in all Mute applications.

Import that configuration file in Mute applications.

B.

Create a common-global-error-handler flow in all Mule Applications Refer to it flow-ref wherever needed.

C.

Create a Mule Plugin project

Create a common-global-error-handler flow inside the plugin project.

Use this plugin as a dependency in all Mule applications

D.

Create a Mule daman project.

Create a common-global-error-handler flow inside the domain project.

Use this domain project as a dependency.

Buy Now
Questions 10

A mule application exposes and API for creating payments. An Operations team wants to ensure that the Payment API is up and running at all times in production.

Which approach should be used to test that the payment API is working in production?

Options:

A.

Create a health check endpoint that listens on a separate port and uses a separate HTTP Listener configuration from the API

B.

Configure the application to send health data to an external system

C.

Create a health check endpoint that reuses the same port number and HTTP Listener configuration as the API itself

D.

Monitor the Payment API directly sending real customer payment data

Buy Now
Questions 11

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Options:

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Buy Now
Questions 12

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

Options:

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default

Buy Now
Questions 13

Refer to the exhibits.

Bioinfo System API is implemented and published to Anypoint Exchange. A developer wants to invoke this API using its REST Connector.

What should be added to the POM?

A)

MCD-Level-2 Question 13

B)

MCD-Level-2 Question 13

C)

MCD-Level-2 Question 13

D)

MCD-Level-2 Question 13

E)

MCD-Level-2 Question 13

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Buy Now
Questions 14

What is the MuleSoft recommended method to encrypt sensitive property data?

Options:

A.

The encryption key and sensitive data should be different for each environment

B.

The encryption key should be identical for all environments

C.

The encryption key should be identical for all environments and the sensitive data should be different for each environment

D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments

Buy Now
Questions 15

A heathcare customer wants to use hospital system data, which includes code that was developed using legacy tools and methods. The customer has created reusable Java libraries in order to read the data from the system.

What is the most effective way to develop an API retrieve the data from the hospital system?

Options:

A.

Refer to JAR files in the code

B.

Include the libraries writes deploying the code into the runtime

C.

Create the Java code in your project and invoice the data from the code

D.

Install libraries in a local repository and refer to it in the pm.xml file

Buy Now
Questions 16

A Mule application includes a subflow containing a Scatter.Gather scope. Within each log of the Scatter.Gatter. an HTTP connector calls a PUT endpoint to modify records in different upstream system. The subflow is called inside an Unit successful scope to retry if a transitory exception is raised.

A technical spike is being performed to increase reliability of the Mule application.

Which steps should be performed within the Mule flow above the ensure idempontent behavior?

Options:

A.

Change the PUT requests inside the Scatter-Gather to POST requests

B.

Ensure an error-handling flow performs corrective actions to roll back all changes if any leg of the Scatter-Gather fails

C.

Remove the Put requests from the Scatter-Getter and perform them sequentially

D.

None, the flow already exhibits idempotent behavior

Buy Now
Questions 17

Which properties are mandatory on the HTTP Connector configuration in order to use the OAuth 2.0 Authorization Code grant type for authentication?

Options:

A.

External callback URL, access token URL, client ID response access token

B.

Token URL, authorization URL, client ID, client secret local callback URL

C.

External callback URL, access token URL, client ID, response refresh token

D.

External callback URL, access token URL, local authorization URL, authorization URL, client ID, client secret

Buy Now
Questions 18

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Options:

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Buy Now
Exam Code: MCD-Level-2
Exam Name: MuleSoft Certified Developer - Level 2 (Mule 4)
Last Update: Nov 21, 2024
Questions: 60

PDF + Testing Engine

$56  $159.99

Testing Engine

$42  $119.99
buy now MCD-Level-2 testing engine

PDF (Q&A)

$35  $99.99
buy now MCD-Level-2 pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 21 Nov 2024