DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Salesforce MuleSoft Developer II Exam Questions and Answers, | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process. Which implementation should be used to get response data from the external API after it completes processing?
A. Use an HTTP Connector to invoke the API and wait for a response
B. Use a Scheduler to check for a response every minute
C. Use an HTTP Connector inside Async scope to invoice the API and wait for a response
D. Expose an HTTP callback API in Mule and register it with the external systemcorrect
View answer
Correct Answer: D
Question #2
A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure. How can this property be referenced to access its value within the application?
A. #{secure::tiskeystore,keyPassowrd}
B. ${secure::tiskeystore,keyPassowrd}correct
C. ${secure::tiskeystore,keyPassowrd}
D. p{secure::tiskeystore,keyPassowrd}
View answer
Correct Answer: B
Question #3
When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?
A. To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permissioncorrect
B. To configure the SLA tier for the application and have the Exchange Administrator permission
C. To configure the SLA tier for the application
D. To only have Exchange Administrator permission
View answer
Correct Answer: A
Question #4
Which statement is true about using mutual TLS to secure an application?
A. Mutual TLS requires a hardware security module to be used
B. Mutual TLS authenticates the identity of the server before the identity of the clientcorrect
C. Mutual TLS ensures only authorized end users are allowed to access an endpoint
D. Mutual TLS increases the encryption strength versus server-side TLS alone
View answer
Correct Answer: B
Question #5
An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist. What must the developer do in order to run this test locally without the policies applied?
A. Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager
B. Pass in the runtime parameter "-Danpow
C. Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio
D. Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager
View answer
Correct Answer: B
Question #6
An order processing system is composed of multiple Mule application responsible for warehouse, sales and shipping. Each application communication using Anypoint MQ. Each message must be correlated against the original order ID for observability and tracing. How should a developer propagate the order ID as the correlation ID across each message?
A. Use the underlying HTTP request of Anypoint MQ to set the "X-CORRELATION_ID' header to the order ID
B. Set a custom Anypoint MQ user property to propagate the order ID and set the correlation ID in the receiving applications
C. Use the default correlation ID, Anypoint MQ will sutomatically propagate it
D. Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID
View answer
Correct Answer: D
Question #7
A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory. Which configuration of this plugin achieves a successful build?
A. Option A
B. Option B
C. Option C
D. Option D
View answer
Correct Answer: C
Question #8
A company deploys 10 public APIs to CloudHub. Each API has its individual health endpoint defined. The platform operation team wants to configure API Functional Monitoring to monitor the health of the APIs periodically while minimizing operational overhead and cost.How should API Functional Monitoring be configured?
A. From one public location with each API in its own schedule
B. From one private location with all 10 APIs in a single schedule
C. From one public location with all 10 APIs in a single schedule
D. From 10 public locations with each API in its own schedule
View answer
Correct Answer: C
Question #9
An API has been built to enable scheduling email provider. The front - end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate - customer’’ flow is added validate the data. What is he expected behavior of the ‘validate - customer’’ flow?
A. If only the email address Is invalid a VALIDATION
B. If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
C. If the appointment date and customer name are invalid, a SCHEDULEINVALID_APPOINTMENT_DATE error is raised
D. If all of the values are invalid the last validation error is raisedSCHEDULEINVALID_CUSTOMER_NAME
View answer
Correct Answer: A
Question #10
Which configurations are required for HTTP Listener to enable mTLS authentication?
A. Set an appropriate reconnection strategy and use persistent connections for the listener
B. Set an appropriate keystore configuration and use persistent connections for the listener
C. Set an appropriate keystore and truststore configuration for the listenercorrect
D. Set an appropriate truststore configuration and reconnection strategy for the listener
View answer
Correct Answer: C
Question #11
A Flight Management System publishes gate change notification events whenever a flight's arrival gate changes. Other systems, including Baggage Handler System. Inflight Catering System and Passenger Notifications System, must each asynchronously receive the same gate change notification to process the event according.Which configuration is required in Anypoint MQ to achieve this publish/subscribe model?
A. Publish each client subscribe directly to the exchange
B. Publish the gate change notification to an Anypoint MC queue Have each client subscribe directly to the queue
C. Publish the gate change notification to an Anypoint MQ queue
D. Publish the gate change notification to an Anypoint MQ exchanhe
View answer
Correct Answer: D
Question #12
A mule application exposes and API for creating payments. An Operations team wants to ensure that the Payment API is up and running at all times in production. Which approach should be used to test that the payment API is working in production?
A. Create a health check endpoint that listens on a separate port and uses a separate HTTP Listener configuration from the APIcorrect
B. Configure the application to send health data to an external system
C. Create a health check endpoint that reuses the same port number and HTTP Listener configuration as the API itself
D. Monitor the Payment API directly sending real customer payment data
View answer
Correct Answer: A
Question #13
A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs. Which strategy should be used to implement this endpoint?
A. Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
B. Create a dedicated endpoint that responds with the API status and health of the server
C. Use an existing resource endpoint of the API
D. Create a dedicated endpoint that responds with the API status only
View answer
Correct Answer: A
Question #14
A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API. How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?
A. Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response
B. In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED
C. Put the HTTP Request inside a try scope in Unit Successful
D. Put the HTTP Request inside a try scope in Unit Successful
View answer
Correct Answer: C
Question #15
The HTTP Request operation raises an HTTP CONNECTIVITY error.Which HTTP status code and body are returned to the web client?
A. HTTP Status Code:200
B. HTTP Status Code:500
C. HTTP Status Code:500
D. HTTP Status Code:500
View answer
Correct Answer: C
Question #16
Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub. The plugin configuration should .. reused where necessary and anything project, specific should be property-based. Where should the Mule Maven details be configured?
A. A parent pom
B. Settings, xml
C. Pom, xml
D. A Bill of Materials (BOM) parent pm
View answer
Correct Answer: A
Question #17
Two APIs are deployed to a two-node on-prem cluster. Due to a requirements change, the two APIs must communicate to exchange data asynchronously.
A. If the two APIs use the same domain, the VM Connector can be leveraged
B. The VM Connector is used to inter-application communication, so it is not possible to use the VM Connector
C. Instead of using the VM Connector use directly
D. It is not possible to use the VM Connector since the APIs are running in a cluster mode and each mode has it own set of VM Queues
View answer
Correct Answer: A
Question #18
Refer to the exhibit. What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?
A. The HTTP Listener will trust any certificate presented by the HTTP client
B. The HTTP Lister will accept any unauthenticated request
C. The HTTP listener will only accept HTTP requestscorrect
D. Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client
View answer
Correct Answer: C
Question #19
A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications. Which XML element must be used to intercept outbound HTTP requests?
A. It is not possible to intercept outgoing HTTP requests, only inbound requests
B. http - policysource
C. htt - policyoperation
D. http - policyprocessor
View answer
Correct Answer: B
Question #20
Refer to the exhibit. What action must be performed to log all the errors raised by the VM Connector?
A. Add
B. Add
C. Configure inside the VM Connector configuration
D. Nothing, as error-level events are automatically logged
View answer
Correct Answer: B
Question #21
Which type of cache invalidation does the Cache scope support without having to write any additional code?
A. Write-through invalidation
B. White-behind invalidation
C. Time to livecorrect
D. Notification-based invalidation
View answer
Correct Answer: C
Question #22
When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?
A. A protocol
B. The TLS version
C. An encryption algorithm
D. The Public key format
View answer
Correct Answer: C
Question #23
Which command is used to convert a JKS keystore to PKCS12?
A. Keytool-importkeystore Csrckeystore keystore p12-srcstoretype PKCS12 Cdestkeystore keystore
B. Keytool-importkeystore Csrckeystore keystore p12-srcstoretype JKS Cdestkeystore keystore
C. Keytool-importkeystore Csrckeystore keystore jks-srcstoretype JKS Cdestkeystore keystore
D. Keytool-importkeystore Csrckeystore keystore jks-srcstoretype PKCS12 Cdestkeystore keystore
View answer
Correct Answer: B
Question #24
A Mule application for processing orders must log the order ID for every log message output. What is a best practice to enrich every log message with the order ID?
A. Use flow variables within every logger processor to log the order ID
B. Set a flow variable and edit the log4
C. Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector
D. Use the Tracing module to set logging variables with a Mapped Diagnostic Context
View answer
Correct Answer: D
Question #25
Refer to the exhibit. The flow name is ‘’implementation’’ with code for the MUnit test case. When the MUnit test case is executed, what is the expected result?
A. The test case fails with an assertion errorcorrect
B. The test throws an error and does not start
C. The test case fails with an unexpected error type
D. The test case passes
View answer
Correct Answer: A
Question #26
The flow is invoicing a target API. The API’s protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to httplocalhost8081/vehicles. If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?
A. The HTTP Request operation will succeed if the CA’S certificate is present in the JRE’s default keystore
B. The HTTP Request operation will succeed if the CA’s certificate is present in the JRE’s default truststore
C. The HTTP Request operation will always succeed regardless of the CA
D. The HTTP Request operation will always fail regardless of the CA
View answer
Correct Answer: B
Question #27
A Mule application includes a subflow containing a Scatter.Gather scope. Within each log of the Scatter.Gatter. an HTTP connector calls a PUT endpoint to modify records in different upstream system. The subflow is called inside an Unit successful scope to retry if a transitory exception is raised. A technical spike is being performed to increase reliability of the Mule application. Which steps should be performed within the Mule flow above the ensure idempontent behavior?
A. Change the PUT requests inside the Scatter-Gather to POST requests
B. Ensure an error-handling flow performs corrective actions to roll back all changes if any leg of the Scatter- Gather fails
C. Remove the Put requests from the Scatter-Getter and perform them sequentially
D. None, the flow already exhibits idempotent behavior
View answer
Correct Answer: B
Question #28
A Mule application for processing orders must log the order ID for every log message output. What is a best practice to enrich every log message with the order ID?
A. Use flow variables within every logger processor to log the order ID
B. Set a flow variable and edit the log4/2
C. Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector
D. Use the Tracing module to set logging variables with a Mapped Diagnostic Contextcorrect
View answer
Correct Answer: D
Question #29
Refer to the exhibit. When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?
A. Import a published APIcorrect
B. Generate a local RAML from anypoint Studio
C. Download RAML from Design Center'
D. Import RAML from local file
View answer
Correct Answer: A
Question #30
The flow is invoicing a target API. The API's protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles. If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?
A. The HTTP Request operation will succeed if the CA'S certificate is present in the JRE's default keystore
B. The HTTP Request operation will succeed if the CA's certificate is present in the JRE's default truststore
C. The HTTP Request operation will always succeed regardless of the CA
D. The HTTP Request operation will always fail regardless of the CA
View answer
Correct Answer: B

View The Updated Salesforce Exam Questions

SPOTO Provides 100% Real Salesforce Exam Questions for You to Pass Your Salesforce Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: