Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Salesforce-MuleSoft-Developer-II Salesforce Certified MuleSoft Developer II (Mule-Dev-301) Questions and Answers

Questions 4

Which statement is true about using mutual TLS to secure an application?

Options:

A.

Mutual TLS requires a hardware security module to be used

B.

Mutual TLS authenticates the identity of the server before the identity of the client

C.

Mutual TLS ensures only authorized end users are allowed to access an endpoint

D.

Mutual TLS increases the encryption strength versus server-side TLS alone

Buy Now
Questions 5

A company deploys 10 public APIs to CloudHub. Each API has its individual health endpoint defined. The platform operation team wants to configure API Functional Monitoring to monitor the health of the APIs periodically while minimizing operational overhead and cost.

How should API Functional Monitoring be configured?

Options:

A.

From one public location with each API in its own schedule

B.

From one private location with all 10 APIs in a single schedule

C.

From one public location with all 10 APIs in a single schedule

D.

From 10 public locations with each API in its own schedule

Buy Now
Questions 6

Refer to the exhibit.

What action must be performed to log all the errors raised by the VM Connector?

Salesforce-MuleSoft-Developer-II Question 6

Options:

A.

Add inside the Logger tag

B.

Add inside the Appenders tag

C.

Configure inside the VM Connector configuration

D.

Nothing, as error-level events are automatically logged

Buy Now
Questions 7

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Options:

A.

Write-through invalidation

B.

White-behind invalidation

C.

Time to live

D.

Notification-based invalidation

Buy Now
Questions 8

Refer to the exhibit.

Salesforce-MuleSoft-Developer-II Question 8

The flow name is ‘’implementation’’ with code for the MUnit test case.

When the MUnit test case is executed,what is the expected result?

Options:

A.

The test case fails with an assertion error

B.

The test throws an error and does not start

C.

The test case fails with an unexpected error type

D.

The test case passes

Buy Now
Questions 9

Refer to the exhibit.

What required changes can be made to give a partial successful response in case the United Airlines API returns with a timeout?

Salesforce-MuleSoft-Developer-II Question 9

Options:

A.

Add a Scatter-gather component inside a Try scope.

Set the payload to a default value ‘Error’ inside the error handler using the On Error Propagate scope.

B.

Add Flow Reference components inside a Try scope.

Set the payload to a default value’’ insider the error handler using the ON Error Continue scope

C.

Add Flow Reference components inside a Try scope

Set the payload to a default value ‘’ inside the error handler using the On Error Propagate scope

D.

Add a Scatter-Gather component inside a Try scope.

Set the payload to a defaultvalue ‘Error’’ inside the error handler using the On Error Continue scope.

Buy Now
Questions 10

Two APIs are deployed to a two-node on-prem cluster. Due to a requirements change, the two APIs must communicate to exchange data asynchronously.

Options:

A.

If the two APIs use the same domain, the VM Connector can be leveraged

B.

The VM Connector is used to inter-applicationcommunication, so it is not possible to use the VM Connector

C.

Instead of using the VM Connector use directly

D.

It is not possible to use the VM Connector since the APIs are running in a cluster mode and each mode has it own set of VM Queues

Buy Now
Questions 11

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

Options:

A.

A protocol

B.

The TLS version

C.

An encryption algorithm

D.

The Public key format

Buy Now
Questions 12

The flow is invoicing a target API. The API’s protocol is HTTPS. TheTLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles.

Salesforce-MuleSoft-Developer-II Question 12

If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?

Options:

A.

The HTTP Request operation will succeed if the CA’S certificate is present in the JRE’s default keystore

B.

The HTTP Request operation will succeed if the CA’s certificate is present in the JRE’s default truststore.

C.

The HTTP Request operation will always succeed regardless of the CA

D.

The HTTP Request operation will always fail regardless of the CA

Buy Now
Questions 13

A Mule application for processing orders must log the order ID for every log message output.

What is a best practice to enrich every log message with the order ID?

Options:

A.

Use flow variables within every logger processor to log the order ID

B.

Set a flow variable and edit the log4/2.xml file to output the variable as part of the message pattern

C.

Create a custom XML SDK component to wrap the logger processor and automatically add the order ID within the connector

D.

Use the Tracing module to set logging variables with a Mapped Diagnostic Context

Buy Now
Questions 14

A Mule API receives a JSON payload and updates the target systemwith the payload. The developer uses JSON schemas to ensure the data is valid.

How can the data be validation before posting to the target system?

Options:

A.

Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add:

%dw 2.0

Import.json-moduls

B.

Using the DataWeave if Else condition test the values of the payload against the examples included in the schema

C.

Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration

D.

Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema

Buy Now
Questions 15

What is the MuleSoft recommended method to encrypt sensitive property data?

Options:

A.

The encryption key and sensitive data should be different for each environment

B.

The encryption key should be identical for all environments

C.

The encryption keyshould be identical for all environments and the sensitive data should be different for each environment

D.

The encryption key should be different for each environment and the sensitive data should be the same for all environments

Buy Now
Questions 16

A company has been using CI/CD. Its developers use Maven to handle build and deployment activities.

What is the correct sequence of activities that takes place during the Maven build and deployment?

Options:

A.

Initialize, validate, compute, test, package, verify, install, deploy

B.

Validate, initialize, compile, package, test, install, verify, verify, deploy

C.

Validate, initialize, compile, test package, verify, install, deploy

D.

Validation, initialize, compile, test, package, install verify, deploy

Buy Now
Questions 17

Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A’S Object Store?

Options:

A.

Object Store v2 RESTAPI

B.

CloudHub Connector

C.

Object Store Connector

D.

CloudHub REST API

Buy Now
Questions 18

A scatter-gather router isconfigured with four routes:Route A, B, C and D.

Route C false.

Options:

A.

Error,errorMesage.payload.results [‘2’]

B.

Payload failures[‘2’]

C.

Error,errorMessage,payload.failures[‘2’]

D.

Payload [‘2’]

Buy Now
Exam Name: Salesforce Certified MuleSoft Developer II (Mule-Dev-301)
Last Update: Jul 29, 2025
Questions: 60

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now Salesforce-MuleSoft-Developer-II testing engine

PDF (Q&A)

$49.8  $124.49
buy now Salesforce-MuleSoft-Developer-II pdf