لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process. Which implementation should be used to get response data from the external API after it completes processing?
A. Use an HTTP Connector to invoke the API and wait for a response
B. Use a Scheduler to check for a response every minute
C. Use an HTTP Connector inside Async scope to invoice the API and wait for a response
D. Expose an HTTP callback API in Mule and register it with the external systemcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure. How can this property be referenced to access its value within the application?
A. #{secure::tiskeystore,keyPassowrd}
B. ${secure::tiskeystore,keyPassowrd}correct
C. ${secure::tiskeystore,keyPassowrd}
D. p{secure::tiskeystore,keyPassowrd}
عرض الإجابة
اجابة صحيحة: B
السؤال #3
When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?
A. To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permissioncorrect
B. To configure the SLA tier for the application and have the Exchange Administrator permission
C. To configure the SLA tier for the application
D. To only have Exchange Administrator permission
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which statement is true about using mutual TLS to secure an application?
A. Mutual TLS requires a hardware security module to be used
B. Mutual TLS authenticates the identity of the server before the identity of the clientcorrect
C. Mutual TLS ensures only authorized end users are allowed to access an endpoint
D. Mutual TLS increases the encryption strength versus server-side TLS alone
عرض الإجابة
اجابة صحيحة: B
السؤال #5
An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist. What must the developer do in order to run this test locally without the policies applied?
A. Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager
B. Pass in the runtime parameter "-Danpow
C. Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio
D. Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager
عرض الإجابة
اجابة صحيحة: B
السؤال #6
An order processing system is composed of multiple Mule application responsible for warehouse, sales and shipping. Each application communication using Anypoint MQ. Each message must be correlated against the original order ID for observability and tracing. How should a developer propagate the order ID as the correlation ID across each message?
A. Use the underlying HTTP request of Anypoint MQ to set the "X-CORRELATION_ID' header to the order ID
B. Set a custom Anypoint MQ user property to propagate the order ID and set the correlation ID in the receiving applications
C. Use the default correlation ID, Anypoint MQ will sutomatically propagate it
D. Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory. Which configuration of this plugin achieves a successful build?
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: C
السؤال #8
A company deploys 10 public APIs to CloudHub. Each API has its individual health endpoint defined. The platform operation team wants to configure API Functional Monitoring to monitor the health of the APIs periodically while minimizing operational overhead and cost.How should API Functional Monitoring be configured?
A. From one public location with each API in its own schedule
B. From one private location with all 10 APIs in a single schedule
C. From one public location with all 10 APIs in a single schedule
D. From 10 public locations with each API in its own schedule
عرض الإجابة
اجابة صحيحة: C
السؤال #9
An API has been built to enable scheduling email provider. The front - end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate - customer’’ flow is added validate the data. What is he expected behavior of the ‘validate - customer’’ flow?
A. If only the email address Is invalid a VALIDATION
B. If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
C. If the appointment date and customer name are invalid, a SCHEDULEINVALID_APPOINTMENT_DATE error is raised
D. If all of the values are invalid the last validation error is raisedSCHEDULEINVALID_CUSTOMER_NAME
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which configurations are required for HTTP Listener to enable mTLS authentication?
A. Set an appropriate reconnection strategy and use persistent connections for the listener
B. Set an appropriate keystore configuration and use persistent connections for the listener
C. Set an appropriate keystore and truststore configuration for the listenercorrect
D. Set an appropriate truststore configuration and reconnection strategy for the listener
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A Flight Management System publishes gate change notification events whenever a flight's arrival gate changes. Other systems, including Baggage Handler System. Inflight Catering System and Passenger Notifications System, must each asynchronously receive the same gate change notification to process the event according.Which configuration is required in Anypoint MQ to achieve this publish/subscribe model?
A. Publish each client subscribe directly to the exchange
B. Publish the gate change notification to an Anypoint MC queue Have each client subscribe directly to the queue
C. Publish the gate change notification to an Anypoint MQ queue
D. Publish the gate change notification to an Anypoint MQ exchanhe
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A mule application exposes and API for creating payments. An Operations team wants to ensure that the Payment API is up and running at all times in production. Which approach should be used to test that the payment API is working in production?
A. Create a health check endpoint that listens on a separate port and uses a separate HTTP Listener configuration from the APIcorrect
B. Configure the application to send health data to an external system
C. Create a health check endpoint that reuses the same port number and HTTP Listener configuration as the API itself
D. Monitor the Payment API directly sending real customer payment data
عرض الإجابة
اجابة صحيحة: A
السؤال #13
A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs. Which strategy should be used to implement this endpoint?
A. Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
B. Create a dedicated endpoint that responds with the API status and health of the server
C. Use an existing resource endpoint of the API
D. Create a dedicated endpoint that responds with the API status only
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API. How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?
A. Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response
B. In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED
C. Put the HTTP Request inside a try scope in Unit Successful
D. Put the HTTP Request inside a try scope in Unit Successful
عرض الإجابة
اجابة صحيحة: C
السؤال #15
The HTTP Request operation raises an HTTP CONNECTIVITY error.Which HTTP status code and body are returned to the web client?
A. HTTP Status Code:200
B. HTTP Status Code:500
C. HTTP Status Code:500
D. HTTP Status Code:500
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub. The plugin configuration should .. reused where necessary and anything project, specific should be property-based. Where should the Mule Maven details be configured?
A. A parent pom
B. Settings, xml
C. Pom, xml
D. A Bill of Materials (BOM) parent pm
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Two APIs are deployed to a two-node on-prem cluster. Due to a requirements change, the two APIs must communicate to exchange data asynchronously.
A. If the two APIs use the same domain, the VM Connector can be leveraged
B. The VM Connector is used to inter-application communication, so it is not possible to use the VM Connector
C. Instead of using the VM Connector use directly
D. It is not possible to use the VM Connector since the APIs are running in a cluster mode and each mode has it own set of VM Queues
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Refer to the exhibit. What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?
A. The HTTP Listener will trust any certificate presented by the HTTP client
B. The HTTP Lister will accept any unauthenticated request
C. The HTTP listener will only accept HTTP requestscorrect
D. Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client
عرض الإجابة
اجابة صحيحة: C
السؤال #19
A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications. Which XML element must be used to intercept outbound HTTP requests?
A. It is not possible to intercept outgoing HTTP requests, only inbound requests
B. http - policysource
C. htt - policyoperation
D. http - policyprocessor
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Refer to the exhibit. What action must be performed to log all the errors raised by the VM Connector?
A. Add
B. Add
C. Configure inside the VM Connector configuration
D. Nothing, as error-level events are automatically logged
عرض الإجابة
اجابة صحيحة: B
السؤال #21
Which type of cache invalidation does the Cache scope support without having to write any additional code?
A. Write-through invalidation
B. White-behind invalidation
C. Time to livecorrect
D. Notification-based invalidation
عرض الإجابة
اجابة صحيحة: C
السؤال #22
When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?
A. A protocol
B. The TLS version
C. An encryption algorithm
D. The Public key format
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Which command is used to convert a JKS keystore to PKCS12?
A. Keytool-importkeystore Csrckeystore keystore p12-srcstoretype PKCS12 Cdestkeystore keystore
B. Keytool-importkeystore Csrckeystore keystore p12-srcstoretype JKS Cdestkeystore keystore
C. Keytool-importkeystore Csrckeystore keystore jks-srcstoretype JKS Cdestkeystore keystore
D. Keytool-importkeystore Csrckeystore keystore jks-srcstoretype PKCS12 Cdestkeystore keystore
عرض الإجابة
اجابة صحيحة: B
السؤال #24
A Mule application for processing orders must log the order ID for every log message output. What is a best practice to enrich every log message with the order ID?
A. Use flow variables within every logger processor to log the order ID
B. Set a flow variable and edit the log4
C. Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector
D. Use the Tracing module to set logging variables with a Mapped Diagnostic Context
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Refer to the exhibit. The flow name is ‘’implementation’’ with code for the MUnit test case. When the MUnit test case is executed, what is the expected result?
A. The test case fails with an assertion errorcorrect
B. The test throws an error and does not start
C. The test case fails with an unexpected error type
D. The test case passes
عرض الإجابة
اجابة صحيحة: A
السؤال #26
The flow is invoicing a target API. The API’s protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to httplocalhost8081/vehicles. If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?
A. The HTTP Request operation will succeed if the CA’S certificate is present in the JRE’s default keystore
B. The HTTP Request operation will succeed if the CA’s certificate is present in the JRE’s default truststore
C. The HTTP Request operation will always succeed regardless of the CA
D. The HTTP Request operation will always fail regardless of the CA
عرض الإجابة
اجابة صحيحة: B
السؤال #27
A Mule application includes a subflow containing a Scatter.Gather scope. Within each log of the Scatter.Gatter. an HTTP connector calls a PUT endpoint to modify records in different upstream system. The subflow is called inside an Unit successful scope to retry if a transitory exception is raised. A technical spike is being performed to increase reliability of the Mule application. Which steps should be performed within the Mule flow above the ensure idempontent behavior?
A. Change the PUT requests inside the Scatter-Gather to POST requests
B. Ensure an error-handling flow performs corrective actions to roll back all changes if any leg of the Scatter- Gather fails
C. Remove the Put requests from the Scatter-Getter and perform them sequentially
D. None, the flow already exhibits idempotent behavior
عرض الإجابة
اجابة صحيحة: B
السؤال #28
A Mule application for processing orders must log the order ID for every log message output. What is a best practice to enrich every log message with the order ID?
A. Use flow variables within every logger processor to log the order ID
B. Set a flow variable and edit the log4/2
C. Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector
D. Use the Tracing module to set logging variables with a Mapped Diagnostic Contextcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #29
Refer to the exhibit. When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?
A. Import a published APIcorrect
B. Generate a local RAML from anypoint Studio
C. Download RAML from Design Center'
D. Import RAML from local file
عرض الإجابة
اجابة صحيحة: A
السؤال #30
The flow is invoicing a target API. The API's protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles. If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?
A. The HTTP Request operation will succeed if the CA'S certificate is present in the JRE's default keystore
B. The HTTP Request operation will succeed if the CA's certificate is present in the JRE's default truststore
C. The HTTP Request operation will always succeed regardless of the CA
D. The HTTP Request operation will always fail regardless of the CA
عرض الإجابة
اجابة صحيحة: B

View The Updated Salesforce Exam Questions

SPOTO Provides 100% Real Salesforce Exam Questions for You to Pass Your Salesforce Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: