When the MUnit test case is executed, what is the expected result?
Refer to the exhibit. The flow name is ‘’implementation’’ with code for the MUnit test case. When the MUnit test case is executed, what is the expected result?A . The test case fails with an assertion error B. The test throws an error and does not start C. The test...
Which statement is true about using mutual TLS to secure an application?
Which statement is true about using mutual TLS to secure an application?A . Mutual TLS requires a hardware security module to be used B. Mutual TLS authenticates the identity of the server before the identity of the client C. Mutual TLS ensures only authorized end users are allowed to access...
How can this property be referenced to access its value within the application?
A Mule application defines as SSL/TLS keystore properly ‘tis,keystore.keyPassword’’ as secure. How can this property be referenced to access its value within the application?A . #{secure::tiskeystore,keyPassowrd} B. ${secure::tiskeystore,keyPassowrd} C. ${secure::tiskeystore,keyPassowrd} D. p{secure::tiskeystore,keyPassowrd}View AnswerAnswer: B Explanation: secure::tiskeystore,keyPassowrdShor : ofCorrectAnswerOnly:Toreferenceasecurepropertyvaluewithin In this case, the property name is tiskeystore,keyPassword, so the correct syntax...
Which type of cache invalidation does the Cache scope support without having to write any additional code?
Which type of cache invalidation does the Cache scope support without having to write any additional code?A . Write-through invalidation B. White-behind invalidation C. Time to live D. Notification-based invalidationView AnswerAnswer: C Explanation: The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write...
When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?
When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?A . A protocol B. The TLS version C. An encryption algorithm D. The Public key formatView AnswerAnswer: C Explanation: A cipher suite is a set of cryptographic algorithms...
What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?
Refer to the exhibit. What is the result if ‘’Insecure’’ selected as part of the HTTP Listener configuration?A . The HTTP Listener will trust any certificate presented by the HTTP client B. The HTTP Lister will accept any unauthenticated request C. The HTTP listener will only accept HTTP requests D....
Which files does the developer need to create in order to package the custom policy?
A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal. Which files does the developer need to create in...
When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?
Refer to the exhibit. When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?A . Import a published API B. Generate a local RAML from anypoint Studio C. Download RAML from Design Center' D. Import RAML from...
How can the data be validation before posting to the target system?
A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid. How can the data be validation before posting to the target system?A . Use a DataWeave 2.09 transform operation, and at the log of...
When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?
When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?A . To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permission B....