Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the MuleSoft Certified Developer MCD-Level-2 Questions and answers with ValidTests

Exam MCD-Level-2 All Questions
Exam MCD-Level-2 Premium Access

View all detail and faqs for the MCD-Level-2 exam

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid.

How can the data be validation before posting to the target system?

Options:

A.

Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add:

%dw 2.0

Import.json-moduls

B.

Using the DataWeave if Else condition test the values of the payload against the examples included in the schema

C.

Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration

D.

Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema

Expert Solution
Questions # 12:

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Options:

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Expert Solution
Questions # 13:

When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?

Options:

A.

To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permission

B.

To configure the SLA tier for the application and have the Exchange Administrator permission

C.

To configure the SLA tier for the application

D.

To only have Exchange Administrator permission

Expert Solution
Questions # 14:

Refer to the exhibit.

Question # 14

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project’s src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

Question # 14

B)

Question # 14

C)

Question # 14

D)

Question # 14

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Expert Solution
Questions # 15:

A Mule application for processing orders must log the order ID for every log message output.

What is a best practice to enrich every log message with the order ID?

Options:

A.

Use flow variables within every logger processor to log the order ID

B.

Set a flow variable and edit the log4/2.xml file to output the variable as part of the message pattern

C.

Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector

D.

Use the Tracing module to set logging variables with a Mapped Diagnostic Context

Expert Solution
Questions # 16:

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of property its,keystorePassoword in CloudHub 2.0?

Question # 16

Options:

A.

CloudHub encrypts the value

B.

The Mule server encrypts the value

C.

Anypoint Studio secures the value

D.

Runtime Manager masks the value

Expert Solution
Questions # 17:

A Mule application includes a subflow containing a Scatter.Gather scope. Within each log of the Scatter.Gatter. an HTTP connector calls a PUT endpoint to modify records in different upstream system. The subflow is called inside an Unit successful scope to retry if a transitory exception is raised.

A technical spike is being performed to increase reliability of the Mule application.

Which steps should be performed within the Mule flow above the ensure idempontent behavior?

Options:

A.

Change the PUT requests inside the Scatter-Gather to POST requests

B.

Ensure an error-handling flow performs corrective actions to roll back all changes if any leg of the Scatter-Gather fails

C.

Remove the Put requests from the Scatter-Getter and perform them sequentially

D.

None, the flow already exhibits idempotent behavior

Expert Solution
Questions # 18:

Refer to the exhibit.

A Mute Object Store is configured with an entry TTL of one second and an expiration interval of 30 seconds.

What is the result of the flow if processing between os’store and os:retrieve takes 10 seconds?

Question # 18

Options:

A.

nullPayload

B.

originalPayload

C.

OS:KEY_NOT_FOUND

D.

testPayload

Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions