Which type of cache invalidation does the Cache scope support without having to write any additional code?
Which type of cache invalidation does the Cache scope support without having to write any additional code?A . Write-through invalidationB . White-behind invalidationC . Time to liveD . Notification-based invalidationView AnswerAnswer: C Explanation: The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write...
What is a best practice to enrich every log message with the order ID?
A Mule application for processing orders must log the order ID for every log message output. What is a best practice to enrich every log message with the order ID?A . Use flow variables within every logger processor to log the order IDB . Set a flow variable and edit...
If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?
The flow is invoicing a target API. The API’s protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles. If the certificate of the target API is signed by a certificate authority (CA), what is...
Which files does the developer need to create in order to package the custom policy?
A healthcare portal needs to validate the token that it sends to a Mule API. The developer plans to implement a custom policy using the HTTP Policy Transform Extension to match the token received in the header from the heathcare portal. Which files does the developer need to create in...
What is the correct sequence of activities that takes place during the Maven build and deployment?
A company has been using CI/CD. Its developers use Maven to handle build and deployment activities. What is the correct sequence of activities that takes place during the Maven build and deployment?A . Initialize, validate, compute, test, package, verify, install, deployB . Validate, initialize, compile, package, test, install, verify, verify,...
Where should the Mule Maven details be configured?
Multiple individual Mute application need to use the Mule Maven plugin to deploy to CloudHub. The plugin configuration should .. reused where necessary and anything project, specific should be property-based. Where should the Mule Maven details be configured?A . A parent pom.xmlB . Settings, xmlC . Pom, xmlD . A...
Which statement is true about using mutual TLS to secure an application?
Which statement is true about using mutual TLS to secure an application?A . Mutual TLS requires a hardware security module to be usedB . Mutual TLS authenticates the identity of the server before the identity of the clientC . Mutual TLS ensures only authorized end users are allowed to access...
Which statement is true when using XML SDK for creating custom message processors?
Which statement is true when using XML SDK for creating custom message processors?A . Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are usedB . An XML SDK provides both inbound...
When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?
When registering a client application with an existing API instance or API Group instance, what is required to manually approve or reject request access?A . To configure the SLA tier for the application and have the role of Organization Administrator, API Manager Environment Administrator, or the Manage Contacts permissionB ....
Which implementation should be used to get response data from the external API after it completes processing?
A Mule application need to invoice an API hosted by an external system to initiate a process. The external API takes anywhere between one minute and 24 hours to compute its process. Which implementation should be used to get response data from the external API after it completes processing?A ....