MCIA - Level 1 Exam QuestionsBrowse all questions from this exam

MCIA - Level 1 Exam - Question 73


An organization is evaluating using the CloudHub Shared Load Balancer (SLB) vs. creating a CloudHub dedicated load balancer (DLB). They are evaluating how this choice affects the various types of certificates used by CloudHub-deployed Mule applications, including MuleSoft-provided, customer-provided, or Mule application-provided certificates.

What type of restrictions exist on the types of certificates that can be exposed by the CloudHub Shared Load Balancer (SLB) to external web clients over the public Internet?

Show Answer
Correct Answer: C

The CloudHub Shared Load Balancer (SLB) primarily handles SSL termination for incoming HTTPS requests from external web clients, using only MuleSoft-provided certificates. This setup does not allow for the use of customer-provided self-signed certificates, wildcard certificates, or underlying Mule application certificates. Therefore, external clients will see the MuleSoft-provided certificate for HTTPS connections.

Discussion

4 comments
Sign in to comment
SalikLPOption: C
Sep 6, 2021

Answer is C: https://docs.mulesoft.com/runtime-manager/dedicated-load-balancer-tutorial

Outdoor25Option: C
Dec 27, 2021

Should be C. Cannot be B because you cannot configure custom certs for SLB.

madgeezerOption: C
Aug 5, 2022

C. Only MuleSoft-provided certificates are exposed

gilofernandesOption: C
Nov 9, 2023

CloudHub Shared Load Balancer (SLB) primarily handles SSL termination for incoming HTTPS requests from external web clients. MuleSoft provides a default SSL certificate for the CloudHub SLB, which is used when clients connect to CloudHub over HTTPS. Therefore, when using the CloudHub SLB, external clients will see the MuleSoft-provided certificate for HTTPS connections. It's not possible to expose customer-provided or Mule application-specific certificates directly through the CloudHub SLB to external clients over the public Internet.