Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal.

Which files does the developer need to create in order to package the custom policy?

A.

Deployable ZIP file, YAML configuration file

B.

JSON properties file, YAML configuration file

C.

JSON propertiesfile, XML template file

D.

XML template file, YAML configuration file

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Refer to the exhibit.

What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?

A.

The HTTP Listener will trust any certificate presented by the HTTP client

B.

The HTTP Lister will accept any unauthenticated request

C.

The HTTP listener will only accept HTTP requests

D.

Mutual TLS authentication will be enabled between this HTTP Listener and an HTTP client

What is the MuleSoft recommended method to encrypt sensitive property data?

A.

The encryption key and sensitive data should be different for each environment

B.

The encryption key should be identical for all environments

C.

The encryption keyshould be identical for all environments and the sensitive data should be different for each environment

D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of propertyits,keystorePassoword in CloudHub 2.0?

A.

CloudHub encrypts the value

B.

The Mule server encrypts the value

C.

Anypoint Studio secures the value

D.

Runtime Manager masks the value

Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A’S Object Store?

A.

Object Store v2 RESTAPI

B.

CloudHub Connector

C.

Object Store Connector

D.

CloudHub REST API

A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API.

How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?

A.

Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response.

B.

In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED.

C.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED.

D.

Put the HTTP Request inside a try scope in Unit Successful.

In the error handler, use On Error Propagate to catch permanent errors like HTTP UNAUTHORIZED.

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID backto the caller in the HTTP response header.

How can this be achieved?

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default