New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Salesforce Salesforce MuleSoft Salesforce-MuleSoft-Developer-II Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A Mule application need to invoice an API hosted by an externalsystem to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process.

Which implementation should be used to get response data from the external API after it completes processing?

Options:

A.

Use an HTTP Connector toinvoke the API and wait for a response


B.

Use a Scheduler to check for a response every minute


C.

Use an HTTP Connector inside Async scope to invoice the API and wait for a response


D.

Expose an HTTP callback API in Mule and register it with the external system


Expert Solution
Questions # 2:

Which statement is true about using mutual TLS to secure an application?

Options:

A.

Mutual TLS requires a hardware security module to be used


B.

Mutual TLS authenticates the identity of the server before the identity of the client


C.

Mutual TLS ensures only authorized end users are allowed to access an endpoint


D.

Mutual TLS increases the encryption strength versus server-side TLS alone


Expert Solution
Questions # 3:

A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API.

How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?

Options:

A.

Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response.


B.

In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED.


C.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED.


D.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Propagate to catch permanent errors like HTTP UNAUTHORIZED.


Expert Solution
Questions # 4:

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.

Question # 4

When a HTTP request arrives at the Mule application’s endpoint, what will be the execution order?

Options:

A.

A1, B1, F1, B2, A2


B.

B1, A1, F1, A2, B2


C.

F1, A1, B1, B2, A2


D.

F1, B1, A1, A2, B2


Expert Solution
Questions # 5:

Which pattern can a web API use to notify its client of state changes as soon as they occur?

Options:

A.

HTTP Webhock


B.

Shared database trigger


C.

Schedule Event Publisher


D.

ETL data load


Expert Solution
Questions # 6:

A Flight Management System publishes gate change notification events whenever a flight’s arrival gate changes. Other systems, including Baggage Handler System. Inflight Catering System and Passenger Notifications System, must each asynchronously receive the same gate change notification to process the event according.

Which configuration is required in Anypoint MQ to achieve this publish/subscribe model?

Options:

A.

Publish each client subscribe directly to the exchange.

Have each client subscribe directly to the queue.


B.

Publish the gate change notification to an Anypoint MC queue

Have each client subscribe directly to the queue


C.

Publish the gate change notification to an Anypoint MQ queue.

Createdifferent anypoint MQ exchange meant for each of the other subscribing systems

Bind the queue with each of the exchanges


D.

Publish the gate change notification to an Anypoint MQ exchanhe.

Create different Anypoint MQ queues meant for each of the other subscribing systems.

Bind the exchange with each of the queues.


Expert Solution
Questions # 7:

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Options:

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests


B.

http-policy:source


C.

htt-policy:operation


D.

http-policy:processor


Expert Solution
Questions # 8:

Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub.

The plugin configuration should .. reused where necessary and anything project, specific should be property-based.

Where should the Mule Maven details be configured?

Options:

A.

A parent pom.xml


B.

Settings, xml


C.

Pom, xml


D.

A Bill of Materials (BOM) parent pm


Expert Solution
Questions # 9:

What is the MuleSoft recommended method to encrypt sensitive property data?

Options:

A.

The encryption key and sensitive data should be different for each environment


B.

The encryption key should be identical for all environments


C.

The encryption keyshould be identical for all environments and the sensitive data should be different for each environment


D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments


Expert Solution
Questions # 10:

A heathcare customer wants to use hospital system data, which includes code that was developed using legacy tools and methods. The customer has created reusableJava libraries in order to read the data from the system.

What is the most effective way to develop an API retrieve the data from the hospital system?

Options:

A.

Refer to JAR files in the code


B.

Include the libraries writes deploying the code into the runtime


C.

Create the Java code in your project and invoice the data from the code


D.

Install libraries in a local repository and refer to it in the pm.xml file


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions