Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Refer to the exhibit.

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project’s src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

A developer is working on a project that requires encrypting all data before sending it to a backend application. To accomplish this, the developer will use PGP encryption in the Mule 4 Cryptography module.

What is required to encrypt the data before sending it to the backend application?

A.

The application needs to configure HTTPS TLS context information to encrypt the data

B.

The application needs to both the private and public keys to encrypt the data

C.

The application needs the public key from the backend service to encrypt the data

D.

The application needs the private key from the backend service to encrypt the data

Full Access
Question # 6

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

A.

HTTP Status Code:200.

Body ‘Error in processing your request

B.

HTTP Status Code:500.

Body ‘The HTTP CONNECTIVITY Error description

C.

HTTP Status Code:500.

Body ‘Error in processing your request

D.

HTTP Status Code:500.

Body ‘Error in processing your request

Full Access
Question # 7

A company with MuleSoft Titanium develops a Salesforce System API using MuleSoft out-of-the-box Salesforce Connector and deploys the API to CloudHub.

Which steps provide the average number of requests and average response time of the Salesforce Connector?

A.

Access Anypoint Monitoring’s built-in dashboard. Select a resource.

Locate the information under the Connectors tab.

B.

Access Anypoint Monitoring’s built-in dashboard

Seclect a resource.

Create a custom dashboard to retrieve the information.

C.

Access Anypoint Monitoring built-in dashboard.

Select a resource.

Locate the information under Log Manager < Raw Data.

D.

Change the API Implementation to capture the information in the log.

Retrieve the information from the log file.

Full Access
Question # 8

A scatter-gather router is configured with four routes:Route A, B, C and D.

Route C false.

A.

Error,errorMesage.payload.results [‘2’]

B.

Payload failures[‘2’]

C.

Error,errorMessage,payload.failures[‘2’]

D.

Payload [‘2’]

Full Access
Question # 9

A new Mule project has been created in Anypoint Studio with the default settings.

Which file inside the Mule project must be modified before using Maven to successfully deploy the application?

A.

Settings.xml

B.

Config.yaml

C.

Pom.xml

D.

Mule.artificact.json

Full Access
Question # 10

Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub.

The plugin configuration should .. reused where necessary and anything project, specific should be property-based.

Where should the Mule Maven details be configured?

A.

A parent pom.xml

B.

Settings, xml

C.

Pom, xml

D.

A Bill of Materials (BOM) parent pm

Full Access
Question # 11

Which pattern should be used to invoke multiple HTTP APIs in parallel and roll back failed requests in sequence?

A.

A database as a transactional outbox and an Until Successful router to retry any requests

B.

A Parallel for Each scope with each HTTP request wrapped in a Try scope

C.

Scatter-Gather as central Saga orchestrator for all API request with compensating actions for failing routes

D.

VM queues as a reliability pattern with error handlers to roll back any requests

Full Access
Question # 12

The flow is invoicing a target API. The API’s protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles.

If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?

A.

The HTTP Request operation will succeed if the CA’S certificate is present in the JRE’s default keystore

B.

The HTTP Request operation will succeed if the CA’s certificate is present in the JRE’s default truststore.

C.

The HTTP Request operation will always succeed regardless of the CA

D.

The HTTP Request operation will always fail regardless of the CA

Full Access
Question # 13

A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process.

Which implementation should be used to get response data from the external API after it completes processing?

A.

Use an HTTP Connector to invoke the API and wait for a response

B.

Use a Scheduler to check for a response every minute

C.

Use an HTTP Connector inside Async scope to invoice the API and wait for a response

D.

Expose an HTTP callback API in Mule and register it with the external system

Full Access
Question # 14

Which statement is true about using mutual TLS to secure an application?

A.

Mutual TLS requires a hardware security module to be used

B.

Mutual TLS authenticates the identity of the server before the identity of the client

C.

Mutual TLS ensures only authorized end users are allowed to access an endpoint

D.

Mutual TLS increases the encryption strength versus server-side TLS alone

Full Access
Question # 15

A Mule application includes a subflow containing a Scatter.Gather scope. Within each log of the Scatter.Gatter. an HTTP connector calls a PUT endpoint to modify records in different upstream system. The subflow is called inside an Unit successful scope to retry if a transitory exception is raised.

A technical spike is being performed to increase reliability of the Mule application.

Which steps should be performed within the Mule flow above the ensure idempontent behavior?

A.

Change the PUT requests inside the Scatter-Gather to POST requests

B.

Ensure an error-handling flow performs corrective actions to roll back all changes if any leg of the Scatter-Gather fails

C.

Remove the Put requests from the Scatter-Getter and perform them sequentially

D.

None, the flow already exhibits idempotent behavior

Full Access
Question # 16

A company deploys 10 public APIs to CloudHub. Each API has its individual health endpoint defined. The platform operation team wants to configure API Functional Monitoring to monitor the health of the APIs periodically while minimizing operational overhead and cost.

How should API Functional Monitoring be configured?

A.

From one public location with each API in its own schedule

B.

From one private location with all 10 APIs in a single schedule

C.

From one public location with all 10 APIs in a single schedule

D.

From 10 public locations with each API in its own schedule

Full Access
Question # 17

A developer has created the first version of an API designed for business partners to work commodity prices.

What should developer do to allow more than one major version of the same API to be exposed by the implementation?

A.

In Design Center, open the RAML and modify each operation to include the major version number

B.

In Anypoint Studio, generate scaffolding from the RAML, and the modify the in the generated flows to include a parameter to replace the version number

C.

In Design Center, open the RAML and modify baseUn to include a variable that indicates the version number

D.

In Anypoint Studio, generate scaffolding from the RAML, and then modify the flow names generated by APIKit to include a variable with the major version number

Full Access
Question # 18

Refer to the exhibit.

A Mute Object Store is configured with an entry TTL of one second and an expiration interval of 30 seconds.

What is the result of the flow if processing between os’store and os:retrieve takes 10 seconds?

A.

nullPayload

B.

originalPayload

C.

OS:KEY_NOT_FOUND

D.

testPayload

Full Access