A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process. Which implementation should be used to get response data from the external API after it completes processing?
A. Use an HTTP Connector to invoke the API and wait for a response
B. Use a Scheduler to check for a response every minute
C. Use an HTTP Connector inside Async scope to invoice the API and wait for a response
D. Expose an HTTP callback API in Mule and register it with the external system
Explanation:
To get response data from the external API after it completes processing, the developer should expose an HTTP callback API in Mule and register it with the external system. This way, the external API can invoke the callback API with the response data when it is ready, instead of making the Mule application wait for a long time or poll for a response repeatedly. References: https://docs.mulesoft.com/mule-runtime/4.3/http-listener-ref#callback
A Mule application for processing orders must log the order ID for every log message output. What is a best practice to enrich every log message with the order ID?
A. Use flow variables within every logger processor to log the order ID
B. Set a flow variable and edit the log4/2.xml file to output the variable as part of the message pattern
C. Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector
D. Use the Tracing module to set logging variables with a Mapped Diagnostic Context
Explanation:
To enrich every log message with the order ID, the developer should use the Tracing module to set logging variables with a Mapped Diagnostic Context (MDC). The Tracing module allows adding custom key-value pairs to log messages using MDC variables. The developer can use Set Logging Variables operation to set the order ID as an MDC variable and then use it in any logger processor within the same thread or event.
References: https://docs.mulesoft.com/tracing-module/1.0/tracing-module-reference#set-logging-variables
Which statement is true when using XML SDK for creating custom message processors?
A. Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
B. An XML SDK provides both inbound and outbound operations
C. Operations can be reused in recursive calls
D. All operations are public
Explanation:
When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK. References: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations
A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs. Which strategy should be used to implement this endpoint?
A. Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
B. Create a dedicated endpoint that responds with the API status and health of the server
C. Use an existing resource endpoint of the API
D. Create a dedicated endpoint that responds with the API status only
Explanation:
To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors. References: https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes
Which pattern should be used to invoke multiple HTTP APIs in parallel and roll back failed requests in sequence?
A. A database as a transactional outbox and an Until Successful router to retry any requests
B. A Parallel for Each scope with each HTTP request wrapped in a Try scope
C. Scatter-Gather as central Saga orchestrator for all API request with compensating actions for failing routes
D. VM queues as a reliability pattern with error handlers to roll back any requests
Explanation:
To invoke multiple HTTP APIs in parallel and roll back failed requests in sequence, the developer should use a Scatter-Gather router as a central Saga orchestrator for all API requests with compensating actions for failing routes. A Scatter-Gather router executes multiple routes concurrently and aggregates the results. A Saga orchestrator coordinates a series of actions across different services and handles failures by executing compensating actions. Therefore, using a Scatter-Gather router as a Saga orchestrator allows invoking multiple HTTP APIs in parallel and rolling back any failed requests in sequence. References: https://docs.mulesoft.com/mule-runtime/4.3/scatter-gather-concept https://docs.mulesoft.com/mule-runtime/4.3/saga
What is the MuleSoft recommended method to encrypt sensitive property data?
A. The encryption key and sensitive data should be different for each environment
B. The encryption key should be identical for all environments
C. The encryption key should be identical for all environments and the sensitive data should be different for each environment
D. The encryption key should be different for each environment and the sensitive data should be the same for all environments
Explanation:
The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data. References: https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties
A mule application exposes and API for creating payments. An Operations team wants to ensure that the Payment API is up and running at all times in production. Which approach should be used to test that the payment API is working in production?
A. Create a health check endpoint that listens on a separate port and uses a separate HTTP Listener configuration from the API
B. Configure the application to send health data to an external system
C. Create a health check endpoint that reuses the same port number and HTTP Listener configuration as the API itself
D. Monitor the Payment API directly sending real customer payment data
Explanation:
To test that the payment API is working in production, the developer should create a health check endpoint that listens on a separate port and uses a separate HTTP Listener configuration from the API. This way, the developer can isolate the health check endpoint from the API traffic and avoid affecting the performance or availability of the API. The health check endpoint should return a simple response that indicates the status of the API, such as OK or ERROR.
References:
https://docs.mulesoft.com/api-functional-monitoring/afm-create-monitor#create-a-monitor
A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications. Which XML element must be used to intercept outbound HTTP requests?
A. It is not possible to intercept outgoing HTTP requests, only inbound requests
B. http-policy:source
C. htt-policy:operation
D. http-policy:processor
Explanation:
The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API.
References: https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file
Which configurations are required for HTTP Listener to enable mTLS authentication?
A. Set an appropriate reconnection strategy and use persistent connections for the listener
B. Set an appropriate keystore configuration and use persistent connections for the listener
C. Set an appropriate keystore and truststore configuration for the listener
D. Set an appropriate truststore configuration and reconnection strategy for the listener
Explanation:
To enable mTLS authentication for HTTP Listener, the developer needs to set an appropriate keystore and truststore configuration for the listener. The keystore contains the certificate and private key of the Mule application that are used to prove its identity to clients. The truststore contains the certificates of trusted clients that are allowed to access the Mule application. References: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#mutual-authentication
Which plugin or dependency is required to unit test modules created with XML SDK?
A. XMLUnit
B. Junit
C. MUnit Extensions Maven plugin
D. MUnit Maven plugin
Explanation:
To unit test modules created with XML SDK, the developer needs to use the MUnit Extensions Maven plugin. This plugin allows testing XML SDK modules using MUnit by adding a dependency to the module under test and using a custom processor tag to invoke it. References: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#testing
Page 2 out of 7 Pages |
Previous |