The flow is invoicing a target API. The API’s protocol is HTTPS. The TLS configuration in the HTTP
Request Configuration global element is set to None. A web client submits a request to
http:localhost:8081/vehicles.
If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP
Request operation when the flow executes?
B
Explanation:
The HTTP Request operation will use the default truststore of the JRE to validate the certificate of the
target API. If the CA’s certificate is present in the truststore, the operation will succeed. Otherwise, it
will fail with a handshake exception. Reference:
https://docs.mulesoft.com/mule-runtime/4.3/tls-
configuration#tls-default
When a client and server are exchanging messages during the mTLS handshake, what is being agreed
on during the cipher suite exchange?
C
Explanation:
A cipher suite is a set of cryptographic algorithms that are used to secure the communication
between a client and a server. A cipher suite consists of four components: a key exchange algorithm,
an authentication algorithm, an encryption algorithm, and a message authentication code (MAC)
algorithm. During the cipher suite exchange, the client and the server agree on which encryption
algorithm
to
use
for
encrypting
and
decrypting
the
data.
Reference:
https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#cipher-suites
A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule
applications.
Which XML element must be used to intercept outbound HTTP requests?
D
Explanation:
The http-policy:processor element is used to intercept outbound HTTP requests made by Mule
applications. It allows customizing the request before it is sent to the target API and modifying the
response after it is received from the target API. Reference:
https://docs.mulesoft.com/api-
manager/2.x/policy-mule4-custom-policy#policy-xml-file
An API has been built to enable scheduling email provider. The front-end system does very little data
entry validation, and problems have started to appear in the email that go to patients. A validate-
customer’’ flow is added validate the data.
What is he expected behavior of the ‘validate-customer’’ flow?
A
Explanation:
The validate-customer flow uses an until-successful scope to validate each field of the customer data.
The until-successful scope executes its processors until they succeed or exhausts the maximum
number of retries. If any processor fails, it raises an error and stops executing the remaining
processors. Therefore, if only the email address is invalid, a VALIDATION.INVALID_EMAIL error is
raised and the validation of appointment date and customer name is skipped. Reference:
https://docs.mulesoft.com/mule-runtime/4.3/until-successful-scope
When implementing a synchronous API where the event source is an HTTP Listener, a developer
needs to return the same correlation ID back to the caller in the HTTP response header.
How can this be achieved?
D
Explanation:
When implementing a synchronous API where the event source is an HTTP Listener, Mule
automatically propagates some message attributes between flows via outbound and inbound
properties. One of these attributes is correlation ID, which is returned to the caller in the response
header by default as MULE_CORRELATION_ID. Reference: https://docs.mulesoft.com/mule-
runtime/4.3/about-mule-message#message-attributes
Which statement is true about using mutual TLS to secure an application?
B
Explanation:
Mutual TLS (mTLS) is an extension of TLS that requires both parties (client and server) to present
their certificates to each other during the handshake process. This way, both parties can verify each
other’s identity and establish a secure connection. The authentication of the server happens before
the authentication of the client, as the server sends its certificate first and then requests the client’s
certificate.
Reference:
https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#mutual-
authentication
Which statement is true when using XML SDK for creating custom message processors?
D
Explanation:
When using XML SDK for creating custom message processors, all operations are public by default
and can be used by any Mule application that imports them. There is no way to make an operation
private or protected in XML SDK. Reference:
https://docs.mulesoft.com/mule-sdk/1.1/xml-
sdk#operations
Which type of cache invalidation does the Cache scope support without having to write any
additional code?
C
Explanation:
The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write
any additional code. TTL specifies how long the cached response is valid before it expires and needs
to be refreshed. The Cache scope also supports custom invalidation strategies using MEL or
DataWeave
expressions.
Reference:
https://docs.mulesoft.com/mule-runtime/4.3/cache-
scope#cache_invalidation
What is the MuleSoft recommended method to encrypt sensitive property data?
A
Explanation:
The MuleSoft recommended method to encrypt sensitive property data is to use the Secure
Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a
secret key and then decrypting them at runtime using the same key. The encryption key and sensitive
data should be different for each environment to ensure security and avoid accidental exposure of
sensitive data. Reference:
https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-
properties
A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to
implement a custom policy using the HTTP Policy Transform Extension to match the token received in
the header from the heathcare portal.
Which files does the developer need to create in order to package the custom policy?
D
Explanation:
To package a custom policy using the HTTP Policy Transform Extension, the developer needs to
create an XML template file and a YAML configuration file. The XML template file defines the policy
logic using Mule components and placeholders for user-defined properties. The YAML configuration
file defines the metadata of the policy, such as its name, description, category, parameters, and
dependencies.
Reference:
https://docs.mulesoft.com/api-manager/2.x/http-policy-
transform#packaging-the-policy
Refer to the exhibit.
What action must be performed to log all the errors raised by the VM Connector?
B
Explanation:
To log all the errors raised by the VM Connector, the developer needs to add an async logger with the
name ‘org.mule.extension.vm’ and the level ‘ERROR’ inside the appenders tag of the log4j2.xml file.
This will enable logging all error-level events generated by the VM Connector to the console
appender. Reference:
https://docs.mulesoft.com/mule-runtime/4.3/logging-in-mule#configuring-
custom-logging-settings
A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During
testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box
HTTP Caching policy is applied first, and the OAuth API policy is applied second.
What will happen when an HTTP request is received?
B
Explanation:
When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a
cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached
response exists, then only the HTTP Caching policy is evaluated and the cached response is returned
to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss,
meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth
policy
are
evaluated
before
invoking
the
API
implementation.
Reference:
https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering
A system API that communicates to an underlying MySQL database is deploying to CloudHub. The
DevOps team requires a readiness endpoint to monitor all system APIs.
Which strategy should be used to implement this endpoint?
A
Explanation:
To implement a readiness endpoint to monitor all system APIs, the developer should create a
dedicated endpoint that responds with the API status and reachability of the underlying systems.
This way, the DevOps team can check if the system API is ready to receive requests and if it can
communicate with its backend systems without errors. Reference:
https://docs.mulesoft.com/mule-
runtime/4.3/deployment-strategies#readiness-probes
The HTTP Request operation raises an HTTP CONNECTIVITY error.
Which HTTP status code and body are returned to the web client?
C
Explanation:
When the HTTP Request operation raises an HTTP CONNECTIVITY error, it triggers an on-error-
continue handler that sets a payload with ‘Error in processing your request’. Since no status code is
explicitly set in this handler, it defaults to 500 (INTERNAL SERVER ERROR). Therefore, the web client
receives an HTTP response with status code 500 and body ‘Error in processing your request’.
Reference:
https://docs.mulesoft.com/mule-runtime/4.3/error-handling#on-error-continue
A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure.
How can this property be referenced to access its value within the application?
B
Explanation:
∗∗
secure::tiskeystore,keyPassowrd
ShortExplanationofCorrectAnswerOnly:Toreferenceasecureproper
tyvaluewithintheapplication,thedeveloperneedstousethesyntax{secure::}. In this case, the property
name is tiskeystore,keyPassword, so the correct syntax is ${secure::tiskeystore,keyPassowrd}.
Reference:
https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-
properties#referencing-secure-properties