When the MUnit test case is executed, what is the expected result?

Refer to the exhibit. The flow name is ‘’implementation’’ with code for the MUnit test case. When the MUnit test case is executed, what is the expected result?A . The test case fails with an assertion error B. The test throws an error and does not start C. The test...

August 21, 2023 No Comments READ MORE +

Which statement is true about using mutual TLS to secure an application?

Which statement is true about using mutual TLS to secure an application?A . Mutual TLS requires a hardware security module to be used B. Mutual TLS authenticates the identity of the server before the identity of the client C. Mutual TLS ensures only authorized end users are allowed to access...

August 21, 2023 No Comments READ MORE +

How can this property be referenced to access its value within the application?

A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure. How can this property be referenced to access its value within the application?A . #{secure::tiskeystore,keyPassowrd} B. ${secure::tiskeystore,keyPassowrd} C. ${secure::tiskeystore,keyPassowrd} D. p{secure::tiskeystore,keyPassowrd}View AnswerAnswer: B Explanation: secure::tiskeystore,keyPassowrdShor : ofCorrectAnswerOnly:Toreferenceasecurepropertyvaluewithin In this case, the property name is tiskeystore,keyPassword, so the correct syntax...

August 21, 2023 No Comments READ MORE +

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Which type of cache invalidation does the Cache scope support without having to write any additional code?A . Write-through invalidation B. White-behind invalidation C. Time to live D. Notification-based invalidationView AnswerAnswer: C Explanation: The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write...

August 20, 2023 No Comments READ MORE +

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?A . A protocol B. The TLS version C. An encryption algorithm D. The Public key formatView AnswerAnswer: C Explanation: A cipher suite is a set of cryptographic algorithms...

August 19, 2023 No Comments READ MORE +

What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?

Refer to the exhibit. What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?A . The HTTP Listener will trust any certificate presented by the HTTP client B. The HTTP Lister will accept any unauthenticated request C. The HTTP listener will only accept HTTP requests D....

August 19, 2023 No Comments READ MORE +

Which files does the developer need to create in order to package the custom policy?

A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal. Which files does the developer need to create in...

August 18, 2023 No Comments READ MORE +

When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?

Refer to the exhibit. When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?A . Import a published API B. Generate a local RAML from anypoint Studio C. Download RAML from Design Center' D. Import RAML from...

August 18, 2023 No Comments READ MORE +

How can the data be validation before posting to the target system?

A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid. How can the data be validation before posting to the target system?A . Use a DataWeave 2.09 transform operation, and at the log of...

August 17, 2023 No Comments READ MORE +

When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?

When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?A . To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permission B....

August 16, 2023 No Comments READ MORE +