Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Salesforce-MuleSoft-Developer-II Salesforce Certified MuleSoft Developer II (Mule-Dev-301) Questions and Answers

Questions 4

Which statement is true when using XML SDK for creating custom message processors?

Options:

A.

Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used

B.

An XML SDK provides both inbound and outbound operations

C.

Operations can be reused in recursive calls

D.

All operations are public

Buy Now
Questions 5

A mule application exposes and API for creating payments. An Operations team wants to ensure that the Payment API is up and running at all times in production.

Which approach should be used to test that the payment API is working in production?

Options:

A.

Create a health check endpoint that listens on a separate port and uses a separate HTTP Listener configuration from the API

B.

Configure the application to send health data to an external system

C.

Create a health check endpoint that reuses the same port number and HTTP Listener configuration as the API itself

D.

Monitor the Payment API directly sending real customer payment data

Buy Now
Questions 6

Which configurations are required for HTTP Listener to enable mTLS authentication?

Options:

A.

Set an appropriate reconnection strategy and use persistent connections for the listener

B.

Set an appropriate keystore configuration and use persistent connections for the listener

C.

Set an appropriate keystore and truststore configuration for the listener

D.

Set an appropriate truststore configuration and reconnection strategy for the listener

Buy Now
Questions 7

A developer is working on a project that requires encrypting all data before sending it to a backend application. To accomplish this, the developer will use PGP encryption in the Mule 4 Cryptography module.

What is required to encrypt the data before sending it to the backend application?

Options:

A.

The application needs to configure HTTPS TLS context information to encrypt the data

B.

The application needs to both the private and public keys to encrypt the data

C.

The application needs the public key from the backend service to encrypt the data

D.

The application needs the private key from the backend service to encrypt the data

Buy Now
Questions 8

Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub.

The plugin configuration should .. reused where necessary and anything project, specific should be property-based.

Where should the Mule Maven details be configured?

Options:

A.

A parent pom.xml

B.

Settings, xml

C.

Pom, xml

D.

A Bill of Materials (BOM) parent pm

Buy Now
Questions 9

Which command is used to convert a JKS keystore to PKCS12?

Options:

A.

Keytool-importkeystore –srckeystore keystore p12-srcstoretype PKCS12 –destkeystore keystore.jks –deststoretype JKS

B.

Keytool-importkeystore –srckeystore keystore p12-srcstoretype JKS –destkeystore keystore.p12 –deststoretype PKCS12

C.

Keytool-importkeystore –srckeystore keystore jks-srcstoretype JKS –destkeystore keystore.p13 –deststoretype PKCS12

D.

Keytool-importkeystore –srckeystore keystore jks-srcstoretype PKCS12 –destkeystore keystore.p12 –deststoretype JKS

Buy Now
Questions 10

A developer has created the first version of an API designed for business partners to work commodity prices.

What should developer do to allow more than one major version of the same API to be exposed by the implementation?

Options:

A.

In Design Center, open the RAML and modify each operation to include the major version number

B.

In Anypoint Studio, generate scaffolding from the RAML, and the modify the in the generated flows to include a parameter to replace the version number

C.

In Design Center, open the RAML and modify baseUn to include a variable that indicates the version number

D.

In Anypoint Studio, generate scaffolding from the RAML, and then modify the flow names generated by APIKit to include a variable with the major version number

Buy Now
Questions 11

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

Options:

A.

In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller

B.

In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller

C.

In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store

D.

In case of a cache miss, both the OAuth and HTTP Caching policies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store

Buy Now
Questions 12

A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure.

How can this property be referenced to access its value within the application?

Options:

A.

#{secure::tiskeystore,keyPassowrd}

B.

${secure::tiskeystore,keyPassowrd}

C.

${secure::tiskeystore,keyPassowrd}

D.

p{secure::tiskeystore,keyPassowrd}

Buy Now
Questions 13

A Mule application deployed to a standardalone Mule runtime uses VM queues to publish messages to be consumed asynchronously by another flow.

In the case of a system failure, what will happen to in-flight messages in the VM queues that have been consumed?

Options:

A.

For nay type of queue, the message will be processed after the system comes online

B.

For persistent queues, the message will be processed after the system comes online

C.

For transient queues, the message will be processed after the system comes online

D.

For any type of queue, the message will be lost

Buy Now
Questions 14

A heathcare customer wants to use hospital system data, which includes code that was developed using legacy tools and methods. The customer has created reusable Java libraries in order to read the data from the system.

What is the most effective way to develop an API retrieve the data from the hospital system?

Options:

A.

Refer to JAR files in the code

B.

Include the libraries writes deploying the code into the runtime

C.

Create the Java code in your project and invoice the data from the code

D.

Install libraries in a local repository and refer to it in the pm.xml file

Buy Now
Questions 15

Refer to the exhibit.

Salesforce-MuleSoft-Developer-II Question 15

Based on the code snippet, schema,json file, and payload below, what is the outcome of the given code snippet when a request is sent with the payload?

Options:

A.

The Mule flow will execute successfully with status code 200, and the response will be the JSON sent in request

B.

The Mule flow will execute successfully with status code 204

C.

The Mule flow will throw the exception ‘JSON:SCHEMA_NOT_HONOURED

D.

The Mule flow will execute successfully with status code 200m and a response will display the message ‘’ Age in years which must equal to or greater than zero.’’

Buy Now
Questions 16

A Mule application for processing orders must log the order ID for every log message output.

What is a best practice to enrich every log message with the order ID?

Options:

A.

Use flow variables within every logger processor to log the order ID

B.

Set a flow variable and edit the log4/2.xml file to output the variable as part of the message pattern

C.

Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector

D.

Use the Tracing module to set logging variables with a Mapped Diagnostic Context

Buy Now
Questions 17

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

Options:

A.

It is not possible to intercept outgoing HTTP requests, only inbound requests

B.

http-policy:source

C.

htt-policy:operation

D.

http-policy:processor

Buy Now
Questions 18

Refer to the exhibit.

Salesforce-MuleSoft-Developer-II Question 18

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project’s src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

Salesforce-MuleSoft-Developer-II Question 18

B)

Salesforce-MuleSoft-Developer-II Question 18

C)

Salesforce-MuleSoft-Developer-II Question 18

D)

Salesforce-MuleSoft-Developer-II Question 18

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Exam Name: Salesforce Certified MuleSoft Developer II (Mule-Dev-301)
Last Update: Oct 15, 2025
Questions: 60

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90