Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Mulesoft > MuleSoft Certified Developer > MCD-LEVEL-2 > MCD-LEVEL-2 Online Practice Questions and Answers

MCD-LEVEL-2 Online Practice Questions and Answers

Questions 4

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of property its,keystorePassoword in CloudHub 2.0?

A. CloudHub encrypts the value

B. The Mule server encrypts the value

C. Anypoint Studio secures the value

D. Runtime Manager masks the value

Buy Now

Correct Answer: D

The result of the Mule Maven Plugin configuration of the value of property its,keystorePassword in CloudHub 2.0 is that Runtime Manager masks the value. This means that Runtime Manager hides or obscures the value from anyone who views it in Runtime Manager or Anypoint Platform.

References:https://docs.mulesoft.com/runtime-manager/runtime-manager-agent-for-mule4#properties-tab

Questions 5

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

A. HTTP Status Code:200. Body `Error in processing your request

B. HTTP Status Code:500. Body `The HTTP CONNECTIVITY Error description

C. HTTP Status Code:500. Body `Error in processing your request

D. HTTP Status Code:500. Body `Error in processing your request

Buy Now

Correct Answer: C

When the HTTP Request operation raises an HTTP CONNECTIVITY error, it triggers an on-error-continue handler that sets a payload with `Error in processing your request'. Since no status code is explicitly set in this handler, it defaults to 500 (INTERNAL SERVER ERROR). Therefore, the web client receives an HTTP response with status code 500 and body `Error in processing your request'. References:https://docs.mulesoft.com/mule-runtime/4.3/error-handling#on-error-continue

Questions 6

A new Mule project has been created in Anypoint Studio with the default settings.

Which file inside the Mule project must be modified before using Maven to successfully deploy the application?

A. Settings.xml

B. Config.yaml

C. Pom.xml

D. Mule.artificact.json

Buy Now

Correct Answer: C

To use Maven to successfully deploy the application, the developer needs to modify the pom.xml file inside the Mule project. The pom.xml file contains the configuration and dependencies of the Mule application, as well as the deployment information such as theCloudHub region, environment, and worker size. The developer needs to specify these properties in the pom.xml file before using Maven to deploy the application. References:https://docs.mulesoft.com/mule-runtime/4.3/mmp-concept#application-deployment-descriptor

Questions 7

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.

When a HTTP request arrives at the Mule application's endpoint, what will be the execution order?

A. A1, B1, F1, B2, A2

B. B1, A1, F1, A2, B2

C. F1, A1, B1, B2, A2

D. F1, B1, A1, A2, B2

Buy Now

Correct Answer: A

Based on the configuration below, when a HTTP request arrives at the Mule application's endpoint, the execution order will be A1, B1, F1, B2, A2. This is because policies are executed before and after the API implementation flow according to their order attribute. Policy A has order 1, which means it is executed first before Policy B, which has order 2. The flow is executedafter both policies are executed before the flow. Then, Policy B is executed after the flow before Policy A is executed after the flow. References:https://docs.mulesoft.com/api-manager/2.x/policies-policy-order

Questions 8

A developer is working on a project that requires encrypting all data before sending it to a backend application. To accomplish this, the developer will use PGP encryption in the Mule 4 Cryptography module.

What is required to encrypt the data before sending it to the backend application?

A. The application needs to configure HTTPS TLS context information to encrypt the data

B. The application needs to both the private and public keys to encrypt the data

C. The application needs the public key from the backend service to encrypt the data

D. The application needs the private key from the backend service to encrypt the data

Buy Now

Correct Answer: C

To encrypt the data before sending it to the backend application using PGP encryption, the application needs the public key from the backend service. PGP encryption uses a public-key cryptography system, which means that each party has a pair of keys: a public key and a private key. The public key is used to encrypt data, and the private key is used to decrypt data. Therefore, to encrypt data for a specific recipient (the backend service), the application needs to use the recipient's public key. The recipient can then use its own private key to decrypt the data. References:https://docs.mulesoft.com/mule-runtime/4.3/cryptography-pgp

Questions 9

A Mule application defines as SSL/TLS keystore properly `tis,keystore.keyPassword'' as secure.

How canthis property be referenced to access its value within the application?

A. #{secure::tiskeystore,keyPassowrd}

B. ${secure::tiskeystore,keyPassowrd}

C. ${secure::tiskeystore,keyPassowrd}

D. p{secure::tiskeystore,keyPassowrd}

Buy Now

Correct Answer: B

secure::tiskeystore,keyPassowrdShortExplanationofCorrectAnswerOnly:Toreferenceasecur epropertyvaluewithintheapplication,thedeveloperneedstousethesyntax{secure::}. In this case, the property name is tiskeystore,keyPassword, so the correct syntax is ${secure::tiskeystore,keyPassowrd}. References: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties#referencing-secure-properties

Questions 10

What is the MuleSoft recommended method to encrypt sensitive property data?

A. The encryption key and sensitive data should be different for each environment

B. The encryption key should be identical for all environments

C. The encryption key should be identical for all environments and the sensitive data should be different for each environment

D. The encryption key should be different for each environment and the sensitive data should be the same for all environments

Buy Now

Correct Answer: A

The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data. References:https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties

Questions 11

Refer to the exhibit.

A developer generates the base scaffolding for an API in Anypoint Studio. Which HTTP status code is returned while testing using the API Kit console if no values are entered in client-secret?

A. HTTP status code:200

B. HTTP status code:403

C. HTTP status code:400

D. HTTP status code:500

Buy Now

Correct Answer: B

Based on the code snippet and schema.json file below, when testing using the API Kit console if no values are entered in client-secret, HTTP status code 403 (FORBIDDEN) is returned. This is because client-secret is defined as a required header parameter in schema.json file, which means that it must be present in every request. If no values are entered in client-secret, then it is equivalent to omitting this header parameter, which violates the schema and causes APIKit Router to return HTTP status code 403. References:https://docs.mulesoft.com/apikit/4.x/apikit-4-headers

Questions 12

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

A. It is not possible to intercept outgoing HTTP requests, only inbound requests

B. http-policy:source

C. htt-policy:operation

D. http-policy:processor

Buy Now

Correct Answer: D

The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API. References:https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file

Questions 13

Which statement is true when using XML SDK for creating custom message processors?

A. Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used

B. An XML SDK provides both inbound and outbound operations

C. Operations can be reused in recursive calls

D. All operations are public

Buy Now

Correct Answer: D

When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK. References:https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations

Exam Code: MCD-LEVEL-2
Exam Name: MuleSoft Certified Developer - Level 2 (Mule 4)
Last Update: Jun 09, 2025
Questions: 60

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.