Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Salesforce-MuleSoft-Developer-II Sample Questions Answers

Questions 4

Which command is used to convert a JKS keystore to PKCS12?

Options:

A.

Keytool-importkeystore –srckeystore keystore p12-srcstoretype PKCS12 –destkeystore keystore.jks –deststoretype JKS

B.

Keytool-importkeystore –srckeystore keystore p12-srcstoretype JKS –destkeystore keystore.p12 –deststoretype PKCS12

C.

Keytool-importkeystore –srckeystore keystore jks-srcstoretype JKS –destkeystore keystore.p13 –deststoretype PKCS12

D.

Keytool-importkeystore –srckeystore keystore jks-srcstoretype PKCS12 –destkeystore keystore.p12 –deststoretype JKS

Buy Now
Questions 5

An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist.

What must the developer do in order to run this test locally without the policies applied?

Options:

A.

Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager

B.

Pass in the runtime parameter ‘’-Danpow.platform.gatekeeper=disabled’’

C.

Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio

D.

Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager

Buy Now
Questions 6

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

Options:

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default

Buy Now
Questions 7

Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub.

The plugin configuration should .. reused where necessary and anything project, specific should be property-based.

Where should the Mule Maven details be configured?

Options:

A.

A parent pom.xml

B.

Settings, xml

C.

Pom, xml

D.

A Bill of Materials (BOM) parent pm

Buy Now
Questions 8

What is the MuleSoft recommended method to encrypt sensitive property data?

Options:

A.

The encryption key and sensitive data should be different for each environment

B.

The encryption key should be identical for all environments

C.

The encryption key should be identical for all environments and the sensitive data should be different for each environment

D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments

Buy Now
Questions 9

A heathcare customer wants to use hospital system data, which includes code that was developed using legacy tools and methods. The customer has created reusable Java libraries in order to read the data from the system.

What is the most effective way to develop an API retrieve the data from the hospital system?

Options:

A.

Refer to JAR files in the code

B.

Include the libraries writes deploying the code into the runtime

C.

Create the Java code in your project and invoice the data from the code

D.

Install libraries in a local repository and refer to it in the pm.xml file

Buy Now
Questions 10

Refer to the exhibit.

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project’s src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 11

Which pattern can a web API use to notify its client of state changes as soon as they occur?

Options:

A.

HTTP Webhock

B.

Shared database trigger

C.

Schedule Event Publisher

D.

ETL data load

Buy Now
Questions 12

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.

When a HTTP request arrives at the Mule application’s endpoint, what will be the execution order?

Options:

A.

A1, B1, F1, B2, A2

B.

B1, A1, F1, A2, B2

C.

F1, A1, B1, B2, A2

D.

F1, B1, A1, A2, B2

Buy Now
Questions 13

Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A’S Object Store?

Options:

A.

Object Store v2 REST API

B.

CloudHub Connector

C.

Object Store Connector

D.

CloudHub REST API

Buy Now
Questions 14

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Options:

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Buy Now
Questions 15

The flow is invoicing a target API. The API’s protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles.

If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?

Options:

A.

The HTTP Request operation will succeed if the CA’S certificate is present in the JRE’s default keystore

B.

The HTTP Request operation will succeed if the CA’s certificate is present in the JRE’s default truststore.

C.

The HTTP Request operation will always succeed regardless of the CA

D.

The HTTP Request operation will always fail regardless of the CA

Buy Now
Questions 16

The Center for Enablement team published a common application as a reusable module to the central Nexus repository.

How can the common application be included in all API implementations?

Options:

A.

Download the common application from Naxus and copy it to the src/main/resources folder in the API

B.

Copy the common application’s source XML file and out it in a new flow file in the src/main/mule folder

C.

Add a Maven dependency in the PCM file with multiple-plugin as

D.

Add a Maven dependency in the POM file with jar as

Buy Now
Questions 17

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

Options:

A.

HTTP Status Code:200.

Body ‘Error in processing your request

B.

HTTP Status Code:500.

Body ‘The HTTP CONNECTIVITY Error description

C.

HTTP Status Code:500.

Body ‘Error in processing your request

D.

HTTP Status Code:500.

Body ‘Error in processing your request

Buy Now
Questions 18

A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure.

How can this property be referenced to access its value within the application?

Options:

A.

#{secure::tiskeystore,keyPassowrd}

B.

${secure::tiskeystore,keyPassowrd}

C.

${secure::tiskeystore,keyPassowrd}

D.

p{secure::tiskeystore,keyPassowrd}

Buy Now
Exam Code: Salesforce-MuleSoft-Developer-II
Exam Name: Salesforce Certified MuleSoft Developer 2 (SU24)
Last Update: Sep 11, 2024
Questions: 60
$64  $159.99
$48  $119.99
$40  $99.99
buy now Salesforce-MuleSoft-Developer-II