Salesforce-MuleSoft-Developer-II Exam Questions With Explanations

The best Salesforce-MuleSoft-Developer-II practice exam questions with research based explanations of each question will help you Prepare & Pass the exam!

Over 15K Students have given a five star review to SalesforceKing

Why choose our Practice Test

By familiarizing yourself with the Salesforce-MuleSoft-Developer-II exam format and question types, you can reduce test-day anxiety and improve your overall performance.

Up-to-date Content

Ensure you're studying with the latest exam objectives and content.

Unlimited Retakes

We offer unlimited retakes, ensuring you'll prepare each questions properly.

Realistic Exam Questions

Experience exam-like questions designed to mirror the actual Salesforce-MuleSoft-Developer-II test.

Targeted Learning

Detailed explanations help you understand the reasoning behind correct and incorrect answers.

Increased Confidence

The more you practice, the more confident you will become in your knowledge to pass the exam.

Study whenever you want, from any place in the world.

Salesforce Salesforce-MuleSoft-Developer-II Exam Sample Questions 2025

Start practicing today and take the fast track to becoming Salesforce Salesforce-MuleSoft-Developer-II certified.

2604 already prepared
Salesforce Spring 25 Release
60 Questions
4.9/5.0

Which statement is true when working with correlation IDS?

A. The HTTP Listener regenerates correlation IDs regardless of the HTTP request

B. The Anypoint MQ Connector automatically propagates correlation IDS

C. The HTTP Listener generates correlation IDS unless a correlation ID is received in the HTTP request

D. The VM Connector does not automatically propagate correction IDs

C.   The HTTP Listener generates correlation IDS unless a correlation ID is received in the HTTP request

Explanation:

✅ Correct Answer: C. The HTTP Listener generates correlation IDs unless a correlation ID is received in the HTTP request
In MuleSoft, the HTTP Listener generates a correlation ID for each incoming request if no correlation ID is provided in the HTTP request headers (typically in the X-Correlation-ID or X-Request-ID header). If the request includes a correlation ID, the HTTP Listener preserves and propagates the received ID instead of generating a new one. This behavior ensures consistent tracking of requests across flows and systems while respecting any existing correlation context. MuleSoft’s documentation on the HTTP Listener (Mule 4) confirms that it automatically assigns a correlation ID unless one is supplied in the request headers.

❌ Incorrect Answers:

❌ A. The HTTP Listener regenerates correlation IDs regardless of the HTTP request
The HTTP Listener does not always regenerate correlation IDs. If an HTTP request includes a correlation ID in its headers, the listener uses that ID instead of generating a new one. Regenerating a correlation ID regardless of the request would break traceability in scenarios where a client-provided correlation ID is needed for end-to-end tracking. MuleSoft’s HTTP Connector documentation clarifies that the listener respects existing correlation IDs in the request.

❌ B. The Anypoint MQ Connector automatically propagates correlation IDs
The Anypoint MQ Connector does not automatically propagate correlation IDs. While it can handle correlation IDs if explicitly configured (e.g., by setting the correlationId property in the message), the default behavior does not automatically propagate the correlation ID from the Mule message context. Developers must configure the connector to include the correlation ID in published messages. MuleSoft’s Anypoint MQ Connector documentation specifies that correlation ID handling requires explicit configuration.

❌ D. The VM Connector does not automatically propagate correction IDs
This statement is incorrect because the VM Connector in MuleSoft does automatically propagate correlation IDs. When a message is published to a VM queue, the correlation ID from the Mule message context is preserved and passed along with the message unless explicitly overridden. MuleSoft’s documentation on the VM Connector (Mule 4) confirms that it maintains the correlation ID as part of the message attributes during intra-application communication.

🧩 Summary:
Option C is correct because the HTTP Listener generates a correlation ID for incoming requests unless one is provided in the HTTP request headers. Options A (always regenerates), B (Anypoint MQ auto-propagates), and D (VM does not propagate) are incorrect because the HTTP Listener respects existing IDs, Anypoint MQ requires explicit configuration for correlation IDs, and the VM Connector automatically propagates them.

ℹ️ References:
🧩 MuleSoft Documentation: HTTP Connector (Mule 4) – Details the HTTP Listener’s behavior of generating a correlation ID if none is provided in the request headers.
🧩 MuleSoft Documentation: Anypoint MQ Connector – States that correlation ID propagation requires explicit configuration in message properties.
🧩 MuleSoft Documentation: VM Connector (Mule 4) – Confirms that the VM Connector automatically propagates correlation IDs with messages.

Refer to the exhibit.

What is the result of the Mule Maven Plugin configuration of the value of propertyits,keystorePassoword in CloudHub 2.0?

A. CloudHub encrypts the value

B. The Mule server encrypts the value

C. Anypoint Studio secures the value

D. Runtime Manager masks the value

D.   Runtime Manager masks the value

Explanation:

In the given XML snippet, the value is defined inside :

This means the property tls.keyStore.password is marked as secure. When this app is deployed to CloudHub 2.0, Mule runtime and Anypoint Runtime Manager handle these secure properties carefully.

In CloudHub 2.0, secure properties:

➜ Are not visible in plaintext in Runtime Manager
➜ Are automatically masked in logs, monitoring tools, and configuration screens
➜ Must be injected as environment variables or stored as secure properties

So, the Mule Maven Plugin will deploy the app, but Anypoint Runtime Manager is the one that masks the value in the UI and logs.

❌ Why others are wrong:

A. CloudHub encrypts the value
🔸 Incorrect: CloudHub doesn't handle encryption at this level. Encryption might occur in storage but masking is what happens in the UI.

B. The Mule server encrypts the value
🔸 Incorrect: Mule runtime may use secure property placeholders, but it doesn't encrypt them — it simply prevents exposure in logs.

C. Anypoint Studio secures the value
🔸 Incorrect: Studio helps during local development, but this question concerns deployment via Mule Maven Plugin to CloudHub 2.0.

Reference:
MuleSoft Docs – Secure Configuration Properties
CloudHub 2.0 - Secure Property Masking

Which configurations are required for HTTP Listener to enable mTLS authentication?

A. Set an appropriate reconnection strategy and use persistent connections for the listener

B. Set an appropriate keystore configuration and use persistent connections for the listener

C. Set an appropriate keystore and truststore configuration for the listener

D. Set an appropriate truststore configuration and reconnection strategy for the listener


Explanation:

Key Concept:
Mutual TLS (mTLS) in HTTP Listener Mutual TLS (mTLS) requires both the server and client to authenticate each other using digital certificates. To enable mTLS in an HTTP Listener in MuleSoft 4, you must configure:

Keystore (Server Identity):
Contains the server’s certificate and private key.
Proves the server’s identity to the client.
Truststore (Client Validation):
Contains trusted client certificates (or CA certificates).
Validates the client’s certificate during the TLS handshake.

Why Option C is Correct?
Keystore:
Ensures the server presents a valid certificate to the client.
Truststore:
Ensures the server only accepts connections from clients with trusted certificates.
Together, they enforce mutual authentication.

Why Other Options Are Incorrect?
1.Option A (Reconnection strategy + persistent connections):
These are performance-related settings and do not enable mTLS.
2.Option B (Keystore + persistent connections):
Missing the truststore, which is mandatory for client certificate validation.
3.Option D (Truststore + reconnection strategy):
Missing the keystore, which is required for server identity.

Additional Notes:
mTLS Flow:
Client connects to the HTTP Listener.
Server presents its certificate (keystore).
Client validates the server’s certificate.
Client sends its certificate.
Server validates the client’s certificate (truststore).

Without Truststore:
The server cannot verify client certificates, breaking mTLS.

Reference:
MuleSoft TLS Configuration Guide

A Mule application contain two policies Policy A and Policy A has order1, and Policy B has order 2. Policy A Policy B, and a flow are defined by he configuration below.



When a HTTP request arrives at the Mule application’s endpoint, what will be the execution order?

A. A1, B1, F1, B2, A2

B. B1, A1, F1, A2, B2

C. F1, A1, B1, B2, A2

D. F1, B1, A1, A2, B2

A.   A1, B1, F1, B2, A2

Explanation:

Understanding Policy Execution Order in Mule 4
Policies are applied in ascending order (lower order value executes first).
Policy A (order=1) runs before Policy B (order=2).
Policy Execution Flow:
Each policy executes before (, ) and after (, ) the target flow ().
passes control to the next policy (or flow) in the chain.

Step-by-Step Execution:
Request arrives → Policy A (order=1) starts:
executes (first part of Policy A).
triggers Policy B (next in order).

Policy B (order=2) runs:
executes (first part of Policy B).
triggers the main flow ().

Main Flow () executes:
processes the request.
Post-Flow Policy Execution (Reverse Order): After , control returns to Policy B:
executes (second part of Policy B).

Then back to Policy A:
executes (second part of Policy A).

Visual Flow:
text Request → A1 → B1 → F1 → B2 → A2 → Response

Why Other Options Are Incorrect?
Option B:
Incorrectly reverses Policy A/B order.
Option C/D:
Incorrectly place before policies or misorder post-flow steps.

Key Concept:
Policies wrap the target flow like an onion:
Pre-processing (A1, B1) runs top-down (order=1 → order=2).
Post-processing (B2, A2) runs bottom-up (order=2 → order=1).

Reference:
MuleSoft Docs:
HTTP Policy Execution Order
Conclusion:
The correct execution order is A1 → B1 → F1 → B2 → A2 (Option A).

Which statement is true about using mutual TLS to secure an application?

A. Mutual TLS requires a hardware security module to be used

B. Mutual TLS authenticates the identity of the server before the identity of the client

C. Mutual TLS ensures only authorized end users are allowed to access an endpoint

D. Mutual TLS increases the encryption strength versus server-side TLS alone

B.   Mutual TLS authenticates the identity of the server before the identity of the client

Explanation:

Mutual TLS (mTLS) is a security protocol that requires both the client and the server to authenticate each other using X.509 certificates before establishing a secure connection. Below is a clean explanation of why option B is correct and why the other options are incorrect, with references to standard cryptographic principles and TLS practices.

Correct Answer: B. Mutual TLS authenticates the identity of the server before the identity of the client

In mutual TLS, the authentication process follows the TLS handshake protocol. During the handshake:

➟ The client initiates a connection, and the server presents its certificate to prove its identity.
➟ The client verifies the server's certificate against a trusted Certificate Authority (CA).
➟ If the server is configured for mTLS, it then requests the client’s certificate.
➟ The client sends its certificate, which the server verifies against a trusted CA.

Thus, the server’s identity is authenticated first, followed by the client’s. This sequential order is a fundamental part of the TLS handshake in mTLS.

ℹ️ Reference:
RFC 5246 (TLS 1.2) and RFC 8446 (TLS 1.3) describe the TLS handshake process, where server authentication occurs before client authentication in mutual TLS scenarios. OWASP: TLS Security Guide emphasizes the handshake order in mTLS.

Incorrect Answers:

A. Mutual TLS requires a hardware security module to be used
Why it’s wrong: Mutual TLS does not mandate the use of a hardware security module (HSM). An HSM is a physical device used to manage and protect cryptographic keys, but mTLS can be implemented using software-based key stores or other secure storage mechanisms. While HSMs enhance security for key management, they are not a requirement for mTLS.
ℹ️ Reference: NIST SP 800-52r2 (Guidelines for TLS Implementations) does not list HSMs as a requirement for mTLS. HSMs are recommended for high-security environments but are optional.

C. Mutual TLS ensures only authorized end users are allowed to access an endpoint
Why it’s wrong: mTLS authenticates the client’s identity at the TLS layer using certificates, not the end user’s identity. It verifies that the client device or application possesses a valid certificate issued by a trusted CA, but it does not inherently authenticate individual end users. User authentication typically requires additional mechanisms (e.g., OAuth, SAML, or username/password) at the application layer.
ℹ️ Reference: IETF RFC 8705 (OAuth 2.0 Mutual-TLS Client Authentication) clarifies that mTLS authenticates clients, not end users. User authorization is handled separately.

D. Mutual TLS increases the encryption strength versus server-side TLS alone
Why it’s wrong: Mutual TLS does not inherently increase the encryption strength (e.g., cipher suite strength or key length) compared to server-side TLS. Both mTLS and server-side TLS use the same encryption algorithms and key exchange mechanisms defined by the TLS protocol. The primary difference is that mTLS adds client authentication, enhancing security by ensuring both parties are trusted, but it does not affect the encryption strength.
ℹ️ Reference: RFC 8446 (TLS 1.3) specifies that encryption strength depends on negotiated cipher suites, not on whether mutual authentication is used.

Summary
Option B is correct because mutual TLS follows the TLS handshake protocol, authenticating the server before the client. The other options are incorrect because mTLS does not require HSMs (A), does not authenticate end users (C), and does not increase encryption strength (D). These conclusions align with standard TLS specifications and security best practices.

Prep Smart, Pass Easy Your Success Starts Here!

Transform Your Test Prep with Realistic Salesforce-MuleSoft-Developer-II Exam Questions That Build Confidence and Drive Success!