A Mule implementation uses a HTTP Request within an Unit Successful scope to connect to an API. How should a permanent error response like HTTP:UNAUTHORIZED be handle inside Until Successful to reduce latency?
A.
Configure retrying until a MULERETRY_EXHAUSTED error is raised or the API responds back with a successful response.
B.
In Until Successful configuration, set the retry count to 1 for error type HTTP: UNAUTHORIZED.
C.
Put the HTTP Request inside a try scope in Unit Successful.
In the error handler, use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED.
D.
Put the HTTP Request inside a try scope in Unit Successful.
In the error handler, use On Error Propagate to catch permanent errors like HTTP UNAUTHORIZED.
Put the HTTP Request inside a try scope in Unit Successful.
In the error handler, use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED.
Explanation:
To handle a permanent error response like HTTP:UNAUTHORIZED inside Until Successful, the developer should put the HTTP Request inside a try scope in Unit Successful, and use On Error Continue to catch permanent errors like HTTP UNAUTHORIZED in the error handler. This way, the developer can avoid retrying requests that will always fail due to a permanent error, and reduce latency. On Error Continue allows the flow to continue processing after handling the error.
References:
https://docs.mulesoft.com/mule-runtime/4.3/until-successful-scope
https://docs.mulesoft.com/mule-runtime/4.3/on-error-continue-concept
Which statement is true when using XML SDK for creating custom message processors?
A.
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
B.
An XML SDK provides both inbound and outbound operations
C.
Operations can be reused in recursive calls
D.
All operations are public
All operations are public
Explanation:
When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK.
References: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations
Which configurations are required for HTTP Listener to enable mTLS authentication?
A.
Set an appropriate reconnection strategy and use persistent connections for the listener
B.
Set an appropriate keystore configuration and use persistent connections for the listener
C.
Set an appropriate keystore and truststore configuration for the listener
D.
Set an appropriate truststore configuration and reconnection strategy for the listener
Set an appropriate keystore and truststore configuration for the listener
To enable mTLS authentication for HTTP Listener, the developer needs to set an appropriate keystore and truststore configuration for the listener. The keystore contains the certificate and private key of the Mule application that are used to prove its identity to clients. The truststore contains the certificates of trusted clients that are allowed to access the Mule application.
References:
https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#mutual-authentication
Which pattern should be used to invoke multiple HTTP APIs in parallel and roll back failed requests in sequence?
A.
A database as a transactional outbox and an Until Successful router to retry any requests
B.
A Parallel for Each scope with each HTTP request wrapped in a Try scope
C.
Scatter-Gather as central Saga orchestrator for all API request with compensating actions for failing routes
D.
VM queues as a reliability pattern with error handlers to roll back any requests
Scatter-Gather as central Saga orchestrator for all API request with compensating actions for failing routes
Explanation:
To invoke multiple HTTP APIs in parallel and roll back failed requests in sequence, the developer should use a Scatter-Gather router as a central Saga orchestrator for all API requests with compensating actions for failing routes. A Scatter-Gather router executes multiple routes concurrently and aggregates the results. A Saga orchestrator coordinates a series of actions across different services and handles failures by executing compensating actions. Therefore, using a Scatter-Gather router as a Saga orchestrator allows invoking multiple HTTP APIs in parallel and rolling back any failed requests in sequence.
References:
https://docs.mulesoft.com/mule-runtime/4.3/scatter-gather-concept
https://docs.mulesoft.com/mule-runtime/4.3/saga
A Mule application deployed to multiple Cloudhub 2.0 replicas needs to temporarily persist large files over 10MB between flow executions, and routinely needs to query whether the file data exists on separate executions. How can this be achieved?
A.
Store the contents of the file on separate storage, and store the key and location of the file Object using Object Store v2
B.
Use an in-memory Object Store
C.
Store the key and full contents of the file in an Object Store
D.
Store the key and full contents of the file, caching the filename and location between requests
Store the contents of the file on separate storage, and store the key and location of the file Object using Object Store v2
To temporarily persist large files over 10MB between flow executions, and routinely query whether the file data exists on separate executions, the developer should store the contents of the file on separate storage, and store the key and location of the file object using Object Store v2. This way, the developer can avoid storing large files in memory or exceeding the size limit of Object Store v2 (10MB per object). The developer can also use Object Store v2 operations to query, retrieve, or delete the file object by its key.
References:
https://docs.mulesoft.com/object-store/osv2-faq#can-i-store-files-in-object-store-v2
In a Mule project, Flow-1 contains a flow-ref to Flow-2 depends on data from Flow-1 to execute successfully. Which action ensures the test suites and test cases written for Flow-1 and Flow-2 will execute successfully?
A.
Chain together the test suites and test cases for Flow-1 and Flow-2
B.
Use ‘’Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 Independent
C.
Use ‘’Before Test Case’’ To collect data from Flow-1 test cases before running Flow-2 test cases
D.
Use ‘After Test Case’ to produce the data needed from Flow-1 test cases to pass to Flow-2 test cases
Use ‘’Set Event to pass the input that is needed, and keep the test cases for Flow-1 and Flow-2 Independent
Explanation
To ensure the test suites and test cases written for Flow-1 and Flow-2 will execute successfully, the developer should use a Set Event processor to pass the input that is needed by Flow-2, and keep the test cases for Flow-1 and Flow-2 independent. This way, the developer can isolate the testing of each flow and avoid coupling them together.
References:
https://docs.mulesoft.com/munit/2.3/munit-test-flow
A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process.
Which implementation should be used to get response data from the external API after it completes processing?
A.
Use an HTTP Connector to invoke the API and wait for a response
B.
Use a Scheduler to check for a response every minute
C.
Use an HTTP Connector inside Async scope to invoice the API and wait for a response
D.
Expose an HTTP callback API in Mule and register it with the external system
Expose an HTTP callback API in Mule and register it with the external system
Explanation:
To get response data from the external API after it completes processing, the developer should expose an HTTP callback API in Mule and register it with the external system. This way, the external API can invoke the callback API with the response data when it is ready, instead of making the Mule application wait for a long time or poll for a response repeatedly.
References:
https://docs.mulesoft.com/mule-runtime/4.3/http-listener-ref#callback
What is the MuleSoft recommended method to encrypt sensitive property data?
A.
The encryption key and sensitive data should be different for each environment
B.
The encryption key should be identical for all environments
C.
The encryption key should be identical for all environments and the sensitive data should be different for each environment
D.
The encryption key should be different for each environment and the sensitive data should be the same for all environments
The encryption key and sensitive data should be different for each environment
Explanation:
The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data.
References:
https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties
Page 1 out of 6 Pages |