A developer is working on a project that requires encrypting all data before sending it to a backend application. To accomplish this, the developer will use PGP encryption in the Mule 4 Cryptography module. What is required to encrypt the data before sending it to the backend application?
A.
The application needs to configure HTTPS TLS context information to encrypt the data
B.
The application needs to both the private and public keys to encrypt the data
C.
The application needs the public key from the backend service to encrypt the data
D.
The application needs the private key from the backend service to encrypt the data
The application needs the public key from the backend service to encrypt the data
Explanation:
To encrypt the data before sending it to the backend application using PGP encryption, the application needs the public key from the backend service. PGP encryption uses a public-key cryptography system, which means that each party has a pair of keys: a public key and a private key. The public key is used to encrypt data, and the private key is used to decrypt data. Therefore, to encrypt data for a specific recipient (the backend service), the application needs to use the recipient’s public key. The recipient can then use its own private key to decrypt the data.
References:
https://docs.mulesoft.com/mule-runtime/4.3/cryptography-pgp
What is the MuleSoft recommended method to encrypt sensitive property data?
A.
The encryption key and sensitive data should be different for each environment
B.
The encryption key should be identical for all environments
C.
The encryption key should be identical for all environments and the sensitive data should be different for each environment
D.
The encryption key should be different for each environment and the sensitive data should be the same for all environments
The encryption key and sensitive data should be different for each environment
Explanation:
The MuleSoft recommended method to encrypt sensitive property data is to use the Secure Properties Tool that comes with Anypoint Studio. This tool allows encrypting properties files with a secret key and then decrypting them at runtime using the same key. The encryption key and sensitive data should be different for each environment to ensure security and avoid accidental exposure of sensitive data.
References:
https://docs.mulesoft.com/mule-runtime/4.3/secure-configuration-properties
An order processing system is composed of multiple Mule application responsible for warehouse, sales and shipping. Each application communication using Anypoint MQ. Each message must be correlated against the original order ID for observability and tracing. How should a developer propagate the order ID as the correlation ID across each message?
A.
Use the underlying HTTP request of Anypoint MQ to set the ‘X-CORRELATION_ID’ header to the order ID
B.
Set a custom Anypoint MQ user property to propagate the order ID and set the correlation ID in the receiving applications
C.
Use the default correlation ID, Anypoint MQ will sutomatically propagate it.
D.
Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID
Wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID
Explanation:
To propagate the order ID as the correlation ID across each message using Anypoint MQ, the developer should wrap all Anypoint MQ Publish operations within a With CorrelationID scope from the Tracing module, setting the correlation ID to the order ID. The With CorrelationID scope allows setting a custom correlation ID for any event that occurs within it. The Tracing module also enables distributed tracing across different Mule applications and services using Anypoint Monitoring.
References:
https://docs.mulesoft.com/tracing-module/1.0/tracing-module-reference#with-correlation-id-scope
https://docs.mulesoft.com/tracing-module/1.0/tracing-module-concepts
An API has been developed and deployed to CloudHub Among the policies applied to this API is an allowlist of IP addresses. A developer wants to run a test in Anypoint Studio and does not want any policies applied because their workstation is not included in the allowlist. What must the developer do in order to run this test locally without the policies applied?
A.
Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager
B.
Pass in the runtime parameter ‘’-Danpow.platform.gatekeeper=disabled’’
C.
Deactivate the API in API Manager so the Autodiscovery element will not find the application when it runs in Studio
D.
Run the test as-s, with no changes because the Studio runtime will not attempt to connect to API Manager
Create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager
To run a test locally without the policies applied, the developer should create a properties file specifically for local development and set the API instance ID to a value that is not used in API Manager. This way, the developer can use different configuration properties for different environments and avoid triggering API autodiscovery when running tests locally. API autodiscovery is a mechanism that associates an API implementation with its corresponding API specification and policies in API Manager based on its API instance ID. By setting this ID to a value that does not exist in API Manager, the developer can prevent API autodiscovery from finding and applying any policies to the local test.
References:
https://docs.mulesoft.com/api-manager/2.x/api-auto-discovery-new-concept#configuring-api-autodiscovery
https://docs.mulesoft.com/mule-runtime/4.3/configuring-properties
A system API that communicates to an underlying MySQL database is deploying to CloudHub. The DevOps team requires a readiness endpoint to monitor all system APIs.
Which strategy should be used to implement this endpoint?
A.
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
B.
Create a dedicated endpoint that responds with the API status and health of the server
C.
Use an existing resource endpoint of the API
D.
Create a dedicated endpoint that responds with the API status only
Create a dedicated endpoint that responds with the API status and reachability of the underlying systems
Explanation:
To implement a readiness endpoint to monitor all system APIs, the developer should create a dedicated endpoint that responds with the API status and reachability of the underlying systems. This way, the DevOps team can check if the system API is ready to receive requests and if it can communicate with its backend systems without errors.
References:
https://docs.mulesoft.com/mule-runtime/4.3/deployment-strategies#readiness-probes
Page 2 out of 10 Pages |
Previous |