Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Salesforce Salesforce-MuleSoft-Developer-II Salesforce Certified MuleSoft Developer 2 (SU24) Exam Practice Test

Salesforce Certified MuleSoft Developer 2 (SU24) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which statement is true when working with correlation IDS?

Options:

A.

The HTTP Listener regenerates correlation IDs regardless of the HTTP request

B.

The Anypoint MQ Connector automatically propagates correlation IDS

C.

The HTTP Listener generates correlation IDS unless a correlation ID is received in the HTTP request

D.

The VM Connector does not automatically propagate correction IDs

Question 2

A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process.

Which implementation should be used to get response data from the external API after it completes processing?

Options:

A.

Use an HTTP Connector to invoke the API and wait for a response

B.

Use a Scheduler to check for a response every minute

C.

Use an HTTP Connector inside Async scope to invoice the API and wait for a response

D.

Expose an HTTP callback API in Mule and register it with the external system

Question 3

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of property its,keystorePassoword in CloudHub 2.0?

Options:

A.

CloudHub encrypts the value

B.

The Mule server encrypts the value

C.

Anypoint Studio secures the value

D.

Runtime Manager masks the value

Question 4

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Options:

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Question 5

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

Options:

A.

Add inside the Logger tag

B.

Add inside the Appenders tag

C.

Configure inside the VM Connector configuration

D.

Nothing, as error-level events are automatically logged

Question 6

Refer to the exhibit.

The flow name is ‘’implementation’’ with code for the MUnit test case.

When the MUnit test case is executed, what is the expected result?

Options:

A.

The test case fails with an assertion error

B.

The test throws an error and does not start

C.

The test case fails with an unexpected error type

D.

The test case passes

Question 7

In a Mule project, Flow-1 contains a flow-ref to Flow-2 depends on data from Flow-1 to execute successfully.

Which action ensures the test suites and test cases written for Flow-1 and Flow-2 will execute successfully?

Options:

A.

Chain together the test suites and test cases for Flow-1 and Flow-2

B.

Use ‘’Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 independent

C.

Use ‘’Before Test Case’’ To collect data from Flow-1 test cases before running Flow-2 test cases

D.

Use ‘After Test Case’ to produce the data needed from Flow-1 test cases to pass to Flow-2 test cases

Question 8

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.

Which strategy should be used to implement this endpoint?

Options:

A.

Create a dedicated endpoint that responds with the API status and reachability of the underlying systems

B.

Create a dedicated endpoint that responds with the API status and health of the server

C.

Use an existing resource endpoint of the API

D.

Create a dedicated endpoint that responds with the API status only

Question 9

A Mule application for processing orders must log the order ID for every log message output.

What is a best practice to enrich every log message with the order ID?

Options:

A.

Use flow variables within every logger processor to log the order ID

B.

Set a flow variable and edit the log4/2.xml file to output the variable as part of the message pattern

C.

Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector

D.

Use the Tracing module to set logging variables with a Mapped Diagnostic Context

Question 10

A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API.

How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?

Options:

A.

Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response.

B.

In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED.

C.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED.

D.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Propagate to catch permanent errors like HTTP UNAUTHORIZED.

Question 11

Refer to the exhibits.

Bioinfo System API is implemented and published to Anypoint Exchange. A developer wants to invoke this API using its REST Connector.

What should be added to the POM?

A)

B)

C)

D)

E)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Question 12

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer’’ flow is added validate the data.

What is he expected behavior of the ‘validate-customer’’ flow?

Options:

A.

If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised

B.

If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid

C.

If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised

D.

If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME

Question 13

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Options:

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Question 14

A heathcare customer wants to use hospital system data, which includes code that was developed using legacy tools and methods. The customer has created reusable Java libraries in order to read the data from the system.

What is the most effective way to develop an API retrieve the data from the hospital system?

Options:

A.

Refer to JAR files in the code

B.

Include the libraries writes deploying the code into the runtime

C.

Create the Java code in your project and invoice the data from the code

D.

Install libraries in a local repository and refer to it in the pm.xml file

Question 15

Which statement is true when using XML SDK for creating custom message processors?

Options:

A.

Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used

B.

An XML SDK provides both inbound and outbound operations

C.

Operations can be reused in recursive calls

D.

All operations are public

Question 16

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

Options:

A.

HTTP Status Code:200.

Body ‘Error in processing your request

B.

HTTP Status Code:500.

Body ‘The HTTP CONNECTIVITY Error description

C.

HTTP Status Code:500.

Body ‘Error in processing your request

D.

HTTP Status Code:500.

Body ‘Error in processing your request

Question 17

Which pattern should be used to invoke multiple HTTP APIs in parallel and roll back failed requests in sequence?

Options:

A.

A database as a transactional outbox and an Until Successful router to retry any requests

B.

A Parallel for Each scope with each HTTP request wrapped in a Try scope

C.

Scatter-Gather as central Saga orchestrator for all API request with compensating actions for failing routes

D.

VM queues as a reliability pattern with error handlers to roll back any requests

Question 18

A company has been using CI/CD. Its developers use Maven to handle build and deployment activities.

What is the correct sequence of activities that takes place during the Maven build and deployment?

Options:

A.

Initialize, validate, compute, test, package, verify, install, deploy

B.

Validate, initialize, compile, package, test, install, verify, verify, deploy

C.

Validate, initialize, compile, test package, verify, install, deploy

D.

Validation, initialize, compile, test, package, install verify, deploy