Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

MCD-Level-2 MuleSoft Certified Developer - Level 2 (Mule 4) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your MuleSoft MCD-Level-2 MuleSoft Certified Developer - Level 2 (Mule 4) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

A company has been using CI/CD. Its developers use Maven to handle build and deployment activities.

What is the correct sequence of activities that takes place during the Maven build and deployment?

A.

Initialize, validate, compute, test, package, verify, install, deploy

B.

Validate, initialize, compile, package, test, install, verify, verify, deploy

C.

Validate, initialize, compile, test package, verify, install, deploy

D.

Validation, initialize, compile, test, package, install verify, deploy

A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.

Which strategy should be used to implement this endpoint?

A.

Create a dedicated endpoint that responds with the API status and reachability of the underlying systems

B.

Create a dedicated endpoint that responds with the API status and health of the server

C.

Use an existing resource endpoint of the API

D.

Create a dedicated endpoint that responds with the API status only

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

A.

Add inside the Logger tag

B.

Add inside the Appenders tag

C.

Configure inside the VM Connector configuration

D.

Nothing, as error-level events are automatically logged

Which statement is true about using mutual TLS to secure an application?

A.

Mutual TLS requires a hardware security module to be used

B.

Mutual TLS authenticates the identity of the server before the identity of the client

C.

Mutual TLS ensures only authorized end users are allowed to access an endpoint

D.

Mutual TLS increases the encryption strength versus server-side TLS alone

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist.

What must the developer do in order to run this test locally without the policies applied?

A.

Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager

B.

Pass in the runtime parameter ‘’-Danpow.platform.gatekeeper=disabled’’

C.

Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio

D.

Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager

Which type of cache invalidation does the Cache scope support without having to write any additional code?

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

The Center for Enablement team published a common application as a reusable module to the central Nexus repository.

How can the common application be included in all API implementations?

A.

Download the common application from Naxus and copy it to the src/main/resources folder in the API

B.

Copy the common application’s source XML file and out it in a new flow file in the src/main/mule folder

C.

Add a Maven dependency in the PCM file with multiple-plugin as

D.

Add a Maven dependency in the POM file with jar as

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.

When a HTTP request arrives at the Mule application’s endpoint, what will be the execution order?

A.

A1, B1, F1, B2, A2

B.

B1, A1, F1, A2, B2

C.

F1, A1, B1, B2, A2

D.

F1, B1, A1, A2, B2

A scatter-gather router is configured with four routes:Route A, B, C and D.

Route C false.

A.

Error,errorMesage.payload.results [‘2’]

B.

Payload failures[‘2’]

C.

Error,errorMessage,payload.failures[‘2’]

D.

Payload [‘2’]

A Mule application for processing orders must log the order ID for every log message output.

What is a best practice to enrich every log message with the order ID?

A.

Use flow variables within every logger processor to log the order ID

B.

Set a flow variable and edit the log4/2.xml file to output the variable as part of the message pattern

C.

Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector

D.

Use the Tracing module to set logging variables with a Mapped Diagnostic Context

An organization uses CloudHub to deploy all of its applications.

How can a common-global-handler flow be configured so that it can be reused across all of the organization’s deployed applications?

A.

Create a Mule plugin project

Create a common-global-error-handler flow inside the plugin project.

Use this plugin as a dependency in all Mute applications.

Import that configuration file in Mute applications.

B.

Create a common-global-error-handler flow in all Mule Applications Refer to it flow-ref wherever needed.

C.

Create a Mule Plugin project

Create a common-global-error-handler flow inside the plugin project.

Use this plugin as a dependency in all Mule applications

D.

Create a Mule daman project.

Create a common-global-error-handler flow inside the domain project.

Use this domain project as a dependency.

A developer is working on a project that requires encrypting all data before sending it to a backend application. To accomplish this, the developer will use PGP encryption in the Mule 4 Cryptography module.

What is required to encrypt the data before sending it to the backend application?

A.

The application needs to configure HTTPS TLS context information to encrypt the data

B.

The application needs to both the private and public keys to encrypt the data

C.

The application needs the public key from the backend service to encrypt the data

D.

The application needs the private key from the backend service to encrypt the data

Refer to the exhibit.

When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?

A.

Import a published API

B.

Generate a local RAML from anypoint Studio

C.

Download RAML from Design Center

D.

Import RAML from local file

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer’’ flow is added validate the data.

What is he expected behavior of the ‘validate-customer’’ flow?

A.

If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised

B.

If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid

C.

If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised

D.

If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME

Which properties are mandatory on the HTTP Connector configuration in order to use the OAuth 2.0 Authorization Code grant type for authentication?

A.

External callback URL, access token URL, client ID response access token

B.

Token URL, authorization URL, client ID, client secret local callback URL

C.

External callback URL, access token URL, client ID, response refresh token

D.

External callback URL, access token URL, local authorization URL, authorization URL, client ID, client secret

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.

Which files does the developer need to create in order to package the custom policy?

A.

Deployable ZIP file, YAML configuration file

B.

JSON properties file, YAML configuration file

C.

JSON properties file, XML template file

D.

XML template file, YAML configuration file

A Mule application includes a subflow containing a Scatter.Gather scope. Within each log of the Scatter.Gatter. an HTTP connector calls a PUT endpoint to modify records in different upstream system. The subflow is called inside an Unit successful scope to retry if a transitory exception is raised.

A technical spike is being performed to increase reliability of the Mule application.

Which steps should be performed within the Mule flow above the ensure idempontent behavior?

A.

Change the PUT requests inside the Scatter-Gather to POST requests

B.

Ensure an error-handling flow performs corrective actions to roll back all changes if any leg of the Scatter-Gather fails

C.

Remove the Put requests from the Scatter-Getter and perform them sequentially

D.

None, the flow already exhibits idempotent behavior

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved