Free MCD-Level-2 Exam Braindumps (page: 3)

Page 3 of 16

What is the MuleSoft recommended method to encrypt sensitive property data?

  1. The encryption key and sensitive data should be different for each environment
  2. The encryption key should be identical for all environments
  3. The encryption key should be identical for all environments and the sensitive data should be different for each environment
  4. The encryption key should be different for each environment and the sensitive data should be the same for all environments

Answer(s): A

Explanation:

The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data.


Reference:

https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration- properties



A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.
Which files does the developer need to create in order to package the custom policy?

  1. Deployable ZIP file, YAML configuration file
  2. JSON properties file, YAML configuration file
  3. JSON properties file, XML template file
  4. XML template file, YAML configuration file

Answer(s): D

Explanation:

To package a custom policy using the HTTP Policy Transform Extension, the developer needs to create an XML template file and a YAML configuration file. The XML template file defines the policy logic using Mule components and placeholders for user-defined properties. The YAML configuration file defines the metadata of the policy, such as its name, description, category, parameters, and dependencies.


Reference:

https://docs.mulesoft.com/api-manager/2.x/http-policy- transform#packaging-the-policy



Refer to the exhibit.
What action must be performed to log all the errors raised by the VM Connector?

  1. Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'I> inside the Logger tag
  2. Add <AsyncLOgger name='orgroute.extensions vm' level=ERROR'/> inside the Appenders tag
  3. Configure <Logger level-`ERROR'/> inside the VM Connector configuration
  4. Nothing, as error-level events are automatically logged

Answer(s): B

Explanation:

To log all the errors raised by the VM Connector, the developer needs to add an async logger with the name `org.mule.extension.vm' and the level `ERROR' inside the appenders tag of the log4j2.xml file. This will enable logging all error-level events generated by the VM Connector to the console appender.


Reference:

https://docs.mulesoft.com/mule-runtime/4.3/logging-in-mule#configuring- custom-logging-settings



A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.
What will happen when an HTTP request is received?

  1. In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller
  2. In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller
  3. In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store
  4. In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store

Answer(s): B

Explanation:

When an HTTP request is received and the HTTP Caching policy is applied first, it checks if there is a cached response for that request in Object Store. If there is a cache hit, meaning that a valid cached response exists, then only the HTTP Caching policy is evaluated and the cached response is returned to the caller without invoking the OAuth policy or the API implementation. If there is a cache miss, meaning that no valid cached response exists, then both the HTTP Caching policy and the OAuth policy are evaluated before invoking the API implementation.


Reference:

https://docs.mulesoft.com/api-manager/2.x/http-caching-policy#policy-ordering



Page 3 of 16



Post your Comments and Discuss MuleSoft MCD-Level-2 exam with other Community members:

Anonymous commented on November 10, 2024
Good ONE FOR mcd l2
INDIA
upvote

RM commented on October 30, 2024
Thank you for the dumps
Anonymous
upvote

Champ commented on September 26, 2024
Good to see that something is still free. I truly appreciate this service.
Mexico
upvote