MuleSoft Certified Developer - Level 2 (Mule 4) MCD-Level-2 Exam Questions in PDF

Free MuleSoft MCD-Level-2 Dumps Questions (page: 2)

Which statement is true about using mutual TLS to secure an application?

  1. Mutual TLS requires a hardware security module to be used
  2. Mutual TLS authenticates the identity of the server before the identity of the client
  3. Mutual TLS ensures only authorized end users are allowed to access an endpoint
  4. Mutual TLS increases the encryption strength versus server-side TLS alone

Answer(s): B

Explanation:

Mutual TLS (mTLS) is an extension of TLS that requires both parties (client and server) to present their certificates to each other during the handshake process. This way, both parties can verify each other's identity and establish a secure connection. The authentication of the server happens before the authentication of the client, as the server sends its certificate first and then requests the client's certificate.


Reference:

https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#mutual- authentication



Which statement is true when using XML SDK for creating custom message processors?

  1. Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
  2. An XML SDK provides both inbound and outbound operations
  3. Operations can be reused in recursive calls
  4. All operations are public

Answer(s): D

Explanation:

When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK.


Reference:

https://docs.mulesoft.com/mule-sdk/1.1/xml- sdk#operations



Which type of cache invalidation does the Cache scope support without having to write any additional code?

  1. Write-through invalidation
  2. White-behind invalidation
  3. Time to live
  4. Notification-based invalidation

Answer(s): C

Explanation:

The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write any additional code. TTL specifies how long the cached response is valid before it expires and needs to be refreshed. The Cache scope also supports custom invalidation strategies using MEL or DataWeave expressions.


Reference:

https://docs.mulesoft.com/mule-runtime/4.3/cache- scope#cache_invalidation



What is the MuleSoft recommended method to encrypt sensitive property data?

  1. The encryption key and sensitive data should be different for each environment
  2. The encryption key should be identical for all environments
  3. The encryption key should be identical for all environments and the sensitive data should be different for each environment
  4. The encryption key should be different for each environment and the sensitive data should be the same for all environments

Answer(s): A

Explanation:

The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data.


Reference:

https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration- properties



A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.
Which files does the developer need to create in order to package the custom policy?

  1. Deployable ZIP file, YAML configuration file
  2. JSON properties file, YAML configuration file
  3. JSON properties file, XML template file
  4. XML template file, YAML configuration file

Answer(s): D

Explanation:

To package a custom policy using the HTTP Policy Transform Extension, the developer needs to create an XML template file and a YAML configuration file. The XML template file defines the policy logic using Mule components and placeholders for user-defined properties. The YAML configuration file defines the metadata of the policy, such as its name, description, category, parameters, and dependencies.


Reference:

https://docs.mulesoft.com/api-manager/2.x/http-policy- transform#packaging-the-policy



Share your comments for MuleSoft MCD-Level-2 exam with other users:

D
Deepak
12/27/2023 2:37:00 AM

good questions

D
dba
9/23/2023 3:10:00 AM

can we please have the latest exam questions?

P
Prasad
9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps

G
GTI9982
7/31/2023 10:15:00 PM

please i need this dump. thanks

E
Elton Riva
12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.

B
Berihun Desalegn Wonde
7/13/2023 11:00:00 AM

all questions are more important

G
gr
7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure

R
RS
7/27/2023 7:17:00 AM

very very useful page

B
Blessious Phiri
8/12/2023 11:47:00 AM

the exams are giving me an eye opener

A
AD
10/22/2023 9:08:00 AM

3rd so far, need to cover more

M
Matt
11/18/2023 2:32:00 AM

aligns with the pecd notes

S
Sri
10/15/2023 4:38:00 PM

question 4: b securityadmin is the correct answer. https://docs.snowflake.com/en/user-guide/security-access-control-overview#access-control-framework

H
H.T.M. D
6/25/2023 2:55:00 PM

kindly please share dumps

S
Satish
11/6/2023 4:27:00 AM

it is very useful, thank you

C
Chinna
7/30/2023 8:37:00 AM

need safe rte dumps

1
1234
6/30/2023 3:40:00 AM

can you upload the cis - cpg dumps

D
Did
1/12/2024 3:01:00 AM

q6 = 1. download odt application 2. create a configuration file (xml) 3. setup.exe /download to download the installation files 4. setup.exe /configure to deploy the application

J
John
10/12/2023 12:30:00 PM

great material

D
Dinesh
8/1/2023 2:26:00 PM

could you please upload sap c_arsor_2302 questions? it will be very much helpful.

L
LBert
6/19/2023 10:23:00 AM

vraag 20c: rsa veilig voor symmtrische cryptografie? antwoord c is toch fout. rsa is voor asymmetrische cryptogafie??

G
g
12/22/2023 1:51:00 PM

so far good

M
Milos
8/4/2023 9:33:00 AM

question 31 has obviously wrong answers. tls and ssl are used to encrypt data at transit, not at rest.

D
Diksha
9/25/2023 2:32:00 AM

pls provide dump for 1z0-1080-23 planning exams

H
H
7/17/2023 4:28:00 AM

could you please upload the exam?

A
Anonymous
9/14/2023 4:47:00 AM

please upload this

N
Naveena
1/13/2024 9:55:00 AM

good material

W
WildWilly
1/19/2024 10:43:00 AM

lets see if this is good stuff...

L
Lavanya
11/2/2023 1:53:00 AM

useful information

M
Moussa
12/12/2023 5:52:00 AM

intéressant

M
Madan
6/22/2023 9:22:00 AM

thank you for making the interactive questions

V
Vavz
11/2/2023 6:51:00 AM

questions are accurate

S
Su
11/23/2023 4:34:00 AM

i need questions/dumps for this exam.

L
LuvSN
7/16/2023 11:19:00 AM

i need this exam, when will it be uploaded

M
Mihai
7/19/2023 12:03:00 PM

i need the dumps !

AI Tutor 👋 I’m here to help!