Free MHS Exam Braindumps (page: 5)

Page 4 of 16

Northern Trail Outfitters is developing an API that connects to a vendor's database.
Which two strategies should their Ops team use to monitor the overall health of the API and database using API Functional Monitoring? (Choose two.)

  1. Monitor the CtoudHub worker logs for JDBC database connection exceptions.
  2. Make a call to a health-heck endpoint, and then verify that the endpoint is still running.
  3. Monitor the Mule worker logs for "ERROR" statements and verify that the results match expected errors.
  4. Make a GET call to an existing API endpoint, and then verify that the results match expected data.

Answer(s): B,D



A Salesforce administrator asks for advice on how to build their Salesforce flow. They need to complete several DML actions as part of their Salesforce flow and are running into DML governor limits during testing.

Which two pieces of advice should be given to the Salesforce administrator to improve their flow? (Choose two.)

  1. Avoid putting DML statements inside of For Loop occurrences.
  2. Use the upsert action to reduce the amount of DML statements required during the flow runtime.
  3. Loop through a collection variable to save more records with a single DML statement.
  4. Use DML statements at the end of the flow wherever possible.

Answer(s): A,C



AnyAirlines has MuleSoft Composer installed on their production Salesforce environment.
To test flows with data in multiple non-production environments, what does the hyperautomation specialist need to do?

  1. Create a connection to each of the non-production environments within the Composer UI.
  2. Install MuleSoft Composer in each of the non-production Salesforce environments.
  3. Install MuleSoft Composer in only one non-production Salesforce environment and create a proxy to all other non-production environments.
  4. Use mocked data because non-production data is not available to MuleSoft Composer.

Answer(s): B



Northern Trail Outfitters is concerned about security in their Salesforce org regarding their newly created hyperautomation flow that calls a MuleSoft API. A mechanism needs to be implemented that restricts which users can invoke the flow.
Which setting is available to a hyperautomation practitioner that meets this security requirement?

  1. Configure OAuth 2.0 in the connected app.
  2. Assign an appropriate profile or permission set to users in the external service.
  3. Assign an appropriate profile or permission set to users in the connected app.
  4. Configure OAuth 2.0 in the external service.

Answer(s): C






Post your Comments and Discuss MuleSoft MHS exam with other Community members:

MHS Discussions & Posts