Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

MCD-Level-2 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

MCD-Level-2 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: MuleSoft Certified Developer - Level 2 (Mule 4)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 60
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

MCD-Level-2 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

MCD-Level-2 Practice Exam Questions with Answers MuleSoft Certified Developer - Level 2 (Mule 4) Certification

Question # 6

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

A.

Enable the auto-generate CorrelationID option when scaffolding the flow

B.

Enable the CorrelationID checkbox in the HTTP Listener configuration

C.

Configure a custom correlation policy

D.

NO action is needed as the correlation ID is returned to the caller in the response header by default

Full Access
Question # 7

A Mule API receives a JSON payload and updates the target system with the payload. The developer uses JSON schemas to ensure the data is valid.

How can the data be validation before posting to the target system?

A.

Use a DataWeave 2.09 transform operation, and at the log of the DataWeave script, add:

%dw 2.0

Import.json-moduls

B.

Using the DataWeave if Else condition test the values of the payload against the examples included in the schema

C.

Apply the JSON Schema policy in API Manager and reference the correct schema in the policy configuration

D.

Add the JSON module dependency and add the validate-schema operation in the flow, configured to reference the schema

Full Access
Question # 8

Which configurations are required for HTTP Listener to enable mTLS authentication?

A.

Set an appropriate reconnection strategy and use persistent connections for the listener

B.

Set an appropriate keystore configuration and use persistent connections for the listener

C.

Set an appropriate keystore and truststoreconfiguration for the listener

D.

Set an appropriate truststore configuration and reconnection strategy for the listener

Full Access
Question # 9

An order processing system is composed of multiple Mule application responsible for warehouse, sales and shipping. Each application communication usingAnypoint MQ. Each message must be correlated against the original order ID for observability and tracing.

How should a developer propagate the order ID as the correlation ID across each message?

A.

Use the underlying HTTP request of Anypoint MQ to set the‘X-CORRELATION_ID’ header to the orderID

B.

Set a custom Anypoint MQ user propertyto propagate the order ID and set the correlation ID in the receiving applications.

C.

Use the default correlation ID, Anypoint MQ will sutomatically propagate it.

D.

Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID

Full Access
Question # 10

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

A.

A protocol

B.

The TLS version

C.

Anencryption algorithm

D.

The Public key format

Full Access
Question # 11

A developer is working on a project that requires encrypting all data before sending it to a backend application. To accomplish this, the developer will use PGP encryption in the Mule 4 Cryptography module.

What is required to encrypt the data before sending it to the backend application?

A.

The application needs to configure HTTPS TLS context information to encrypt the data

B.

The application needs to both the private and public keys to encrypt the data

C.

The application needs the public key from the backend service to encrypt the data

D.

The application needs the private key from the backend service to encrypt the data

Full Access
Question # 12

Refer to the exhibit.

MCD-Level-2 question answer

When creating a new project, which API implementation allows for selecting the correct API version and scaffolding the flows from the API specification?

A.

Import a published API

B.

Generate a local RAML from anypoint Studio

C.

Download RAML from Design Center'

D.

Import RAML from local file

Full Access
Question # 13

A Mule application deployed to multiple Cloudhub 2.0 replicas needs to temporarily persist large files over 10MB between flow executions, and routinely needs to query whether the file data exists on separate executions.

How can this be achieved?

A.

Store the contents of the file on separate storage, and store the key and location of the file Object using Object Store v2

B.

Use an in-memory Object Store

C.

Store the key and full contents of the file in an Object Store

D.

Store the key and full contents of the file, caching the filename and location between requests

Full Access
Question # 14

Refer to the exhibits.

Bioinfo System API is implemented and published to Anypoint Exchange. A developer wants to invoke this API using its REST Connector.

What should be added to the POM?

A)

MCD-Level-2 question answer

B)

MCD-Level-2 question answer

C)

MCD-Level-2 question answer

D)

MCD-Level-2 question answer

E)

MCD-Level-2 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 15

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer’’ flow is added validate the data.

What is he expected behavior of the ‘validate-customer’’ flow?

MCD-Level-2 question answer

A.

If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised

B.

If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid

C.

If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised

D.

If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME

Full Access
Question # 16

The HTTP Request operation raises an HTTP CONNECTIVITY error.

Which HTTP status code and body are returned to the web client?

MCD-Level-2 question answer

A.

HTTP Status Code:200.

Body ‘Error in processing your request

B.

HTTP Status Code:500.

Body ‘The HTTP CONNECTIVITY Error description

C.

HTTP Status Code:500.

Body ‘Error in processing your request

D.

HTTP Status Code:500.

Body ‘Error in processing your request

Full Access
Question # 17

A developer deploys an API to CloudHub and applies an OAuth policy on API Manager. During testing, the API response is slow, so the developer reconfigures the API so that the out-of-the-box HTTP Caching policy is applied first, and the OAuth API policy is applied second.

What will happen when an HTTP request is received?

A.

In case of a cache hit, both the OAuth and HTTP Caching policies are evaluated; then the cached response is returned to the caller

B.

In case of a cache it, only the HTTP Caching policy is evaluating; then the cached response is returned to the caller

C.

In case of a cache miss, only the HTTP Caching policy is evaluated; then the API retrieves the data from the API implementation, and the policy stores the data to be cached in Object Store

D.

In case of a cache miss, both the OAuth and HTTP Cachingpolicies are evaluated; then the API retrieves the data from the API implementation, and the policy does not store the data in Object Store

Full Access
Question # 18

Refer to the exhibit.

MCD-Level-2 question answer

The flow name is ‘’implementation’’ with code for the MUnit test case.

When the MUnit test case is executed, what is the expected result?

A.

The test case fails with an assertion error

B.

The test throws an error and does not start

C.

The test case fails with an unexpected error type

D.

The test case passes

Full Access