New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

MCD-Level-2 Exam Dumps - MuleSoft Certified Developer - Level 2 (Mule 4)

Go to page:
Question # 9

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default

Full Access
Question # 10

Which type of cache invalidation does the Cache scope support without having to write any additional code?

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Full Access
Question # 11

What is the MuleSoft recommended method to encrypt sensitive property data?

A.

The encryption key and sensitive data should be different for each environment

B.

The encryption key should be identical for all environments

C.

The encryption key should be identical for all environments and the sensitive data should be different for each environment

D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments

Full Access
Question # 12

A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure.

How can this property be referenced to access its value within the application?

A.

#{secure::tiskeystore,keyPassowrd}

B.

${secure::tiskeystore,keyPassowrd}

C.

${secure::tiskeystore,keyPassowrd}

D.

p{secure::tiskeystore,keyPassowrd}

Full Access
Question # 13

Which pattern can a web API use to notify its client of state changes as soon as they occur?

A.

HTTP Webhock

B.

Shared database trigger

C.

Schedule Event Publisher

D.

ETL data load

Full Access
Question # 14

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

A.

A protocol

B.

The TLS version

C.

An encryption algorithm

D.

The Public key format

Full Access
Question # 15

A company has been using CI/CD. Its developers use Maven to handle build and deployment activities.

What is the correct sequence of activities that takes place during the Maven build and deployment?

A.

Initialize, validate, compute, test, package, verify, install, deploy

B.

Validate, initialize, compile, package, test, install, verify, verify, deploy

C.

Validate, initialize, compile, test package, verify, install, deploy

D.

Validation, initialize, compile, test, package, install verify, deploy

Full Access
Question # 16

An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist.

What must the developer do in order to run this test locally without the policies applied?

A.

Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager

B.

Pass in the runtime parameter ‘’-Danpow.platform.gatekeeper=disabled’’

C.

Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio

D.

Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager

Full Access
Go to page: