Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the MuleSoft Certified Developer MCD-Level-2 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam MCD-Level-2 Premium Access

View all detail and faqs for the MCD-Level-2 exam


348 Students Passed

86% Average Score

98% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which pattern should be used to invoke multiple HTTP APIs in parallel and roll back failed requests in sequence?

Options:

A.

A database as a transactional outbox and an Until Successful router to retry any requests

B.

A Parallel for Each scope with each HTTP request wrapped in a Try scope

C.

Scatter-Gather as central Saga orchestrator for all API request with compensating actions for failing routes

D.

VM queues as a reliability pattern with error handlers to roll back any requests

Questions # 2:

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

Options:

A.

In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller

B.

In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller

C.

In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store

D.

In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store

Questions # 3:

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

Question # 3

Options:

A.

Add inside the Logger tag

B.

Add inside the Appenders tag

C.

Configure inside the VM Connector configuration

D.

Nothing, as error-level events are automatically logged

Questions # 4:

A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid.

How can the data be validation before posting to the target system?

Options:

A.

Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add:

%dw 2.0

Import.json-moduls

B.

Using the DataWeave if Else condition test the values of the payload against the examples included in the schema

C.

Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration

D.

Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema

Questions # 5:

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

Options:

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default

Questions # 6:

Refer to the exhibits.

Bioinfo System API is implemented and published to Anypoint Exchange. A developer wants to invoke this API using its REST Connector.

What should be added to the POM?

A)

Question # 6

B)

Question # 6

C)

Question # 6

D)

Question # 6

E)

Question # 6

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Questions # 7:

A mule application exposes and API for creating payments. An Operations team wants to ensure that the Payment API is up and running at all times in production.

Which approach should be used to test that the payment API is working in production?

Options:

A.

Create a health check endpoint that listens on a separate port and uses a separate HTTP Listener configuration from the API

B.

Configure the application to send health data to an external system

C.

Create a health check endpoint that reuses the same port number and HTTP Listener configuration as the API itself

D.

Monitor the Payment API directly sending real customer payment data

Questions # 8:

A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API.

How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?

Options:

A.

Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response.

B.

In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED.

C.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED.

D.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Propagate to catch permanent errors like HTTP UNAUTHORIZED.

Questions # 9:

Two APIs are deployed to a two-node on-prem cluster. Due to a requirements change, the two APIs must communicate to exchange data asynchronously.

Options:

A.

If the two APIs use the same domain, the VM Connector can be leveraged

B.

The VM Connector is used to inter-application communication, so it is not possible to use the VM Connector

C.

Instead of using the VM Connector use directly

D.

It is not possible to use the VM Connector since the APIs are running in a cluster mode and each mode has it own set of VM Queues

Questions # 10:

Which statement is true about using mutual TLS to secure an application?

Options:

A.

Mutual TLS requires a hardware security module to be used

B.

Mutual TLS authenticates the identity of the server before the identity of the client

C.

Mutual TLS ensures only authorized end users are allowed to access an endpoint

D.

Mutual TLS increases the encryption strength versus server-side TLS alone

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.