Exam overview This exam tests your knowledge of implementing core data center technologies, including: Network Compute Storage network Automation Security
Exam preparation Prepare for your certification exam with official Cisco training or study on your own with self-study resources found on the Cisco Learning Network. Official Cisco training
Implementing and Operating Cisco Data Center Core Technologies (DCCOR)
Self-study resources DCCOR training videos DCCOR study materials
Exam Description: Implementing Cisco Data Center Core Technologies v1.1 (DCCOR 350-601) is a 120-minute exam associated with the CCNP and CCIE Data Center Certifications. This exam certifies a candidate’s knowledge of implementing core data center technologies including network, compute, storage network, automation, and security. The course, Implementing Cisco Data Center Core Technologies, helps candidates to prepare for this exam. The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
25% 1.0 Network 1.1 Apply routing protocols 1.1.a OSPFv2 and OSPFv3 1.1.b MP-BGP 1.1.c PIM 1.1.d FHRP 1.2 Apply switching protocols such as RSTP+, LACP and vPC 1.3 Apply overlay protocols such as VXLAN EVPN 1.4 Apply ACI concepts 1.4.a Fabric setup 1.4.b Access policies 1.4.c VMM 1.5 Analyze packet flow (unicast, multicast, and broadcast) 1.6 Describe Cloud service and deployment models (NIST 800-145) 1.7 Describe software updates and their impacts 1.7.a Disruptive / nondisruptive 1.7.b EPLD 1.7.c Patches 1.8 Implement network configuration management 1.9 Implement infrastructure monitoring such as NetFlow and SPAN 1.10 Explain network assurance concepts such as streaming telemetry 1.11 Describe the capabilities and features of Nexus Dashboard 25% 2.0 Compute 2.1 Implement Cisco Unified Compute System Rack Servers 2.2 Implement Cisco Unified Compute System Blade Chassis 2.2.a Initial setup 2.2.b Infrastructure management 2.2.c Network management (VLANs, pools and policies, templates, QoS) 2.2.d Storage management (SAN connectivity, Fibre Channel zoning, VSANs, WWN pools, SAN policies, templates) 2.2.e Server management (Server pools and boot policies) 2.3 Explain HyperFlex Infrastructure Concepts and benefits (Edge and Hybrid Architecture vs all-flash) 2.4 Describe firmware and software updates and their impacts on B-Series and C-Series servers 2.5 Implement compute configuration management (Backup and restore) 2.6 Implement infrastructure monitoring such as SPAN and Cisco Intersight 20% 3.0 Storage Network 3.1 Implement Fibre Channel 3.1.a Switch fabric initialization 3.1.b Port channels 3.1.c FCID 3.1.d CFS 3.1.e Zoning 3.1.f FCNS 3.1.g Device alias 3.1.h NPV and NPIV 3.1.i VSAN 3.2 Implement FCoE Unified Fabric 3.3 Describe NFS and NAS concepts 3.4 Describe software updates and their impacts (Disruptive/nondisruptive and EPLD) 3.5 Implement infrastructure monitoring 15% 4.0 Automation 4.1 Implement automation and scripting tools 4.1.a EEM 4.1.b Scheduler 4.1.c Bash Shell and Guest Shell for NX-OS 4.1.d REST API (NX-API, JSON and XML encodings) 4.1.e On-box Python 4.2 Evaluate automation and orchestration technologies 4.2.a Ansible 4.2.b Python 4.2.c POAP 4.2.d Cisco Nexus Dashboard Fabric Controller 4.2.e PowerShell 4.2.f Terraform 15% 5.0 Security 5.1 Apply network security 5.1.a AAA and RBAC 5.1.b ACI contracts and microsegmentation 5.1.c First-hop security features 5.1.d Keychain authentication 5.2 Apply compute security 5.2.a AAA and RBAC 5.3 Apply storage security 5.3.a AAA and RBAC 5.3.b Port security 5.3.c Fabric binding
QUESTION 1 An engineer is implementing OTV on a transport that supports multicast. The solution needs to meet the following requirements: Establish adjacency to the remote peer by using multicast. Enable OTV advertisements for VLAN 100 to the other site. Which two commands should be configured to meet these requirements? (Choose two.)
A. otv site-vlan 100 B. otv data-group 232.2.2.0 C. otv use-adjacency-server 172.27.255.94 D. otv extend-vlan 100 E. otv control-group 232.1.1.1
Answer: DE
QUESTION 2 An engineer updated firmware on Fabric Interconnects and activates it. However, the endpoint fails to boot from the new firmware image. What is expected to occur in this case?
A. The system defaults to the backup image version B. The system defaults to and boots into GOLD firmware image C. The system defaults to the GOLD firmware image D. The system defaults to and boots into kickstart image
Answer: A
QUESTION 3 Which configuration statically assigns VSAN membership to a virtual Fibre Channel interface?
A. switch(config-vsan-cb># vsan 100 bind interface fc 3 B. switch<config-vsan-db)# vsan 100 bind interface vfc 31 C. switch(config-vsan-db># vsan 100 fc 3 D. switch(config-vsan-db)# vsan 100 interface vfc 31
Answer: D
QUESTION 4 An engineer must configure OSPF routing on Cisco Nexus 9000 Series Switches. The IP subnet of the Eth 1 interface for both switches must be advertised via OSPF. However, these interfaces must not establish OSPF adjacency or send routing updates. The current OSPF adjacency over the interface Eth1 on SW1 and Eth1 on SW2 must remain unaffected. Which configuration must be applied to both Nexus switches to meet these requirements?
A. interface ethernet 1 passive-interface default
B. Interface ethernet 1 Ip ospf network point-to-point
C. interface ethernet 1 ip ospf passive-interface
D. interface ethernet 1 no ip ospf passive-Interface
Answer: C
QUESTION 6 An engineer needs to perform a backup of user roles and locales from Cisco UCS Manager to replicate the setting to a different fabric interconnect. The engineer wants to review the file before importing it to a target fabric interconnect. Which backup type must be selected to meet these requirements?
A. all configuration B. system configuration C. logical configuration D. full state
Answer: B
QUESTION 7 An engineer must configure HTTPS secure management for Cisco UCS Manager using a key ring named kr2016 and a key size of 1024 bits. The environment consists of a primary fabric interconnect named UCS-A and a secondary fabric interconnect named UCS-B. Which command sequence must be used to accomplish this goal?
A. Option A B. Option B C. Option C D. Option D
Answer: B
QUESTION 8 Which server policy is used to install new Cisco IMC software on a server?
A. host firmware policy B. hypervisor firmware policy C. BIOS software policy D. Cisco IMC software policy
Answer: A
QUESTION 9 A network engineer must perform a backup and restore of the Cisco Nexus 5000 Series Switch configuration. The backup must be made to an external backup server. The only protocol permitted between the Cisco Nexus switch and the backup server is UDP. The backup must be used when the current working configuration of the switch gets corrupted. Which set of steps must be taken to meet these requirements?
A. 1 Perform a startup-config backup to an FTP server. 2 Copy startup-config in the boot flash to the running-config file
B. 1 Perform a running-config backup to an SFTP server 2 Copy backup-config from the SFTP server to the running-config file
C. 1 Perform a running-config backup to an SCP server 2 Copy running-config in the boot flash to the running-config file
D. 1 Perform a startup-config backup to a TFTP server 2 Copy backup-config from the backup server to the running-config file
Answer: D
Explanation: TFTP is the only protocol that uses UDP. FTP, SFTP, and SCP use TCP.
QUESTION 11 A customer wants to offload some of its order processing to a public cloud environment. The customer environment is based on Cisco ACI and uses Puppet with containenzed applications. The operations team requires a solution to orchestrate and optimize the cost of the new solution. Which product must be used to meet these requirements?
A. Cisco Intersight B. Cisco Workload Optimization Manager C. Cisco CloudCenter D. Cisco Data Center Network Manager
Sub-solution: NetWeaver: Web AS ABAP Delivery Methods: SAP Certification Level: Associate Exam: 80 questions Sample Questions: View more Cut Score: 65% Duration: 180 mins Languages: German, English, Spanish, French, Japanese,
Description
The “SAP Certified Associate – Back-End Developer – ABAP Cloud” certification exam validates that you possess ABAP programming language fundamentals based on ABAP RESTful Application Programming Model on SAP Business Technology Platform and principles of building custom extensions in SAP S/4HANA Cloud required of the back-end developer profile. This certification proves that you have an overall understanding and in‐depth skills to participate as a member of project team in a mentored role.
Topic Areas Please see below the list of topics that may be covered within this certification and the courses that cover them. Its accuracy does not constitute a legitimate claim; SAP reserves the right to update the exam content (topics, items, weighting) at any time.
Core ABAP programming 31% – 40% Describe ABAP data types; use the ABAP dictionary; use local classes (execute test classes, using methods…); describe modularization; explain how to manage exceptions; analyze logical expressions, operator precedence; describe constructors; explain internal tables, keys, single column, multi-column, sorted tables, hashed tables; use the IAM app
Acquire core ABAP skills
ABAP core data services and data modeling 21% – 30% Describe Core Data Services (CDS) views, naming conventions; differentiate CDS built-in functions (and difference to ABAP functions); explain CDS views: joins and associations, annotations; describe Access controls with CDS views: usage, setup; describe SAP HANA database tables; analyze foreign key relationships; use ABAP SQL; define SAP HANA database tables; define/use CDS views
Acquire core ABAP skills
ABAP RESTful Application Programming Model 11% – 20%
Explain the use of the ABAP Restful Application Programming model in ABAP development; describe the architecture of the ABAP Restful Application Programming model ; explain the binding of CDS views; analyze EML statements
Acquire core ABAP skills
Object-oriented design 11% – 20% Explain encapsulation, inheritance, upcast, downcast, polymorphism, interfaces; redefine components; analyze the sequence of constructor calls; explain the singleton pattern; use Exception classes.
Acquire core ABAP skills
SAP clean core extensibility and ABAP cloud 11% – 20%
Explain extension pattern, extension rules, use cases for developer extensions; describe side-by-side usage; describe ABAP cloud development , ABAP cloud rules; explain integration frameworks, release contract rules, SAP S/4HANA, public, private cloud differences.
Clean core extensibility
ABAP SQL and code pushdown <= 10%
Use ABAP SQL; describe and perform type conversions; use arithmetic expressions; manage dates; create joins
Acquire core ABAP skills
General Information
Exam Preparation
All SAP consultant certifications are available as Cloud Certifications in the Certification Hub and can be booked with product code CER006. With CER006 – SAP Certification in the Cloud, you can take up to six exams attempts of your choice in one year – from wherever and whenever it suits you! Test dates can be chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We define them as “Topic Areas” and they can be found on each exam description. You can find the number of questions, the duration of the exam, what areas you will be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for upcoming releases of the exam. These unscored items are randomly distributed across the certification topics and are not counted towards the final score. The total number of items of an examination as advertised in the Training Shop is never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification SAP Education has worked hard together with the Certification & Enablement Influence Council to enhance the value of certification and improve the exams. An increasing number of customers and partners are now looking towards certification as a reliable benchmark to safeguard their investments. Unfortunately, the increased demand for certification has brought with it a growing number of people who to try and attain SAP certification through unfair means. This ongoing issue has prompted SAP Education to place a new focus on test security. Our Certification Test Security Guidelines will help you as test taker to understand the testing experience.
Security Guidelines
QUESTION 1 Which function call returns 0?
A. Count_any_of ( val – ˜ABAP ABAP abap’ sub “AB” ) B. Count (val – ‘ABAP ABAP abap’ sub – ‘AB’ ) C. find_any_of (val = “ABAP ABAP abap’ sub = “AB”) D. find_any_not_of( val ‘ABAP ABAP abap sub = ‘AB’)
Answer: D
Explanation: The function find_any_not_of returns the position of the first character in the string val that is not contained in the string sub. If no such character is found, the function returns 0. In this case, the string val contains only the characters A, B, and a, which are all contained in the string sub, so the function returns 0. The other functions return positive values, as follows: Count_any_of returns the number of occurrences of any character in the string sub within the string val. In this case, it returns 8, since there are 8 As and Bs in val. Count returns the number of occurrences of the string sub within the string val. In this case, it returns 2, since there are 2 ABs in val. find_any_of returns the position of the first character in the string val that is contained in the string sub. In this case, it returns 1, since the first character A is in sub. Reference: String Functions – ABAP Keyword Documentation, Examples of String Functions – ABAP Keyword Documentation
QUESTION 2 In which products must you use the ABAP Cloud Development Model? Note: There are 2 correct answers to this question.
A. SAP SHANA Cloud, private edition B. SAP BTP, ABAP environment C. SAP SHANA on premise D. SAP SHANA Cloud, public edition
Answer: AB
Explanation: The ABAP Cloud Development Model is the ABAP development model to build cloud-ready business apps, services, and extensions. It comes with SAP BTP and SAP SHAN A. It works with public or private cloud, and even on-premise1. However, the complete ABAP Cloud Development Model, including the cloud-optimized ABAP language and public local SAP APIs and extension points, is available only in SAP BTP ABAP Environment and in the 22082 versions of the SAP SHANA editions1. Therefore, you must use the ABAP Cloud Development Model in SAP BTP, ABAP environment and SAP SHANA Cloud, private edition. You can also use it in SAP SHANA on premise, but it is not mandatory. You cannot use it in SAP SHANA Cloud, public edition, because it does not allow custom ABAP code2. Reference: 1: ABAP Cloud | SAP Blogs 2: SAP SHANA Cloud Extensibility “ Overview and Comparison | SAP Blogs
QUESTION 3 Which RESTful Application Programming object can be used to organize the display of fields in an app?
A. Data model view B. Metadata extension C. Service definition D. Projection view
Answer: B
Explanation: A metadata extension is a RESTful Application Programming object that can be used to organize the display of fields in an app. A metadata extension is a CDS view that annotates another CDS view with UI annotations, such as labels, icons, or facets. These annotations define how the data should be presented in the app, such as which fields should be shown on the object page, which fields should be editable, or which fields should be used for filtering or sorting. A metadata extension can also be used to add custom actions or validations to the app12. Reference: 1: Refine the Object Page with Annotations | SAP Tutorials 2: ABAP RAP : Enabling custom actions with a dialog for additional input fields | SAP Blogs
Implementing and Operating Cisco Service Provider Network Core Technologies Duration: 120 minutes Languages: English Price: $400 USD, plus tax or use Cisco Learning Credits
Associated certifications CCNP Service Provider CCIE Service Provider Cisco Certified Specialist – Service Provider Core
Exam overview This exam tests your knowledge of implementing core service provider network technologies, including:
Exam Description: Implementing and Operating Cisco Service Provider Network Core Technologies v1.0 (SPCOR 350-501) is a 120-minute exam associated with the CCNP and CCIE Service Provider Certifications. This exam tests a candidate’s knowledge of implementing core service provider network technologies including core architecture, services, networking, automation, quality of services, security, and network assurance. The course, Implementing and Operating Cisco Service Provider Network Core Technologies, helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. To better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
15% 1.0 Architecture 1.1 Describe service provider architectures 1.1.a Core architectures (Metro Ethernet, MPLS, unified MPLS, SR) 1.1.b Transport technologies (Optical, xDSL, DOCSIS, TDM, and xPON) 1.1.c Mobility (packet core, RAN xhaul transport for 4G and 5G) 1.2 Describe Cisco network software architecture 1.2.a IOS 1.2.b IOS XE 1.2.c IOS XR 1.3 Describe service provider virtualization 1.3.a NFV infrastructure 1.3.b VNF workloads 1.3.c OpenStack 1.4 Describe QoS architecture 1.4.a MPLS QOS models (Pipe, Short Pipe, and Uniform) 1.4.b MPLS TE QoS (MAM, RDM, CBTS, PBTS, and DS-TE) 1.4.c DiffServ and IntServ QoS models 1.4.d Trust boundaries between enterprise and SP environments 1.4.e IPv6 flow label 1.5 Configure and verify control plan security 1.5.a Control plane protection techniques (LPTS and CoPP) 1.5.b BGP-TTL security and protocol authentication 1.5.c BGP prefix suppression 1.5.d LDP security (authentication and label allocation filtering) 1.5.e BGP sec 1.5.f BGP flowspec 1.6 Describe management plane security 1.6.a Traceback 1.6.b AAA and TACACS 1.6.c RestAPI security 1.6.d DdoS 1.7 Implement data plane security 1.7.a uRPF 1.7.b ACLs 1.7.c RTBH 30% 2.0 Networking 2.1 Implement IS-IS (IPv4 and IPv6) 2.1.a Route advertisement 2.1.b Area addressing 2.1.c Multitopology 2.1.d Metrics 2.2 Implement OSPF (v2 and v3) 2.2.a Neighbor adjacency 2.2.b Route advertisement 2.2.c Multiarea (addressing and types) 2.2.d Metrics 2.3 Describe BGP path selection algorithm 2.4 Implement BGP (v4 and v6 for IBGP and EBGP) 2.4.a Neighbors 2.4.b Prefix advertisement 2.4.c Address family 2.4.d Path selection 2.4.e Attributes 2.4.f Redistribution 2.5 Implement routing policy language and route maps (BGP, OSPF, IS-IS) 2.6 Troubleshoot routing protocols 2.6.a Neighbor adjacency (IS-IS, OSPF, BGP) 2.6.b Route advertisement (IS-IS, OSPF, BGP) 2.7 Describe IPv6 transition (NAT44, NAT64, 6RD, MAP, and DS Lite) 2.8 Implement high availability 2.8.a NSF / graceful restart 2.8.b NSR 2.8.c BFD 2.8.d Link aggregation 20% 3.0 MPLS and Segment Routing 3.1 Implement MPLS 3.1.a LDP sync 3.1.b LDP session protection 3.1.c LDP neighbors 3.1.d Unified MPLS 3.1.e MPLS OAM 3.2 Describe traffic engineering 3.2.a ISIS and OSPF extensions 3.2.b RSVP functionality 3.2.c FRR 3.3 Describe segment routing 3.3.a Segment types 3.3.b IGP control plane 3.3.c Segment routing traffic engineering 3.3.d TI-LFa 3.3.e PCE-PCC architectures 20% 4.0 Services 4.1 Describe VPN services 4.1.a EVPN 4.1.b Inter-AS VPN 4.1.c CSC 4.1.d mVPN 4.2 Configure L2VPN and Carrier Ethernet 4.2.a Ethernet services (E-Line, E-Tree, E-Access, E-LAN) 4.2.b IEEE 802.1ad, IEEE 802.1ah, and ITU G.8032 4.2.c Ethernet OAM 4.2.d VLAN tag manipulation 4.3 Configure L3VPN 4.3.a Intra-AS VPN 4.3.b Shared services (extranet and Internet) 4.4 Implement multicast services 4.4.a PIM (PIM-SM, PIM-SSM, and PIM-BIDIR) 4.4.b IGMP v1/v2/v3 and MLD 4.5 Implement QoS services 4.5.a Classification and marking 4.5.b Congestion avoidance, traffic policing, and shaping 15% 5.0 Automation and Assurance 5.1 Describe the programmable APIs used to include Cisco devices in network automation 5.2 Interpret an external script to configure a Cisco device using a REST API 5.3 Describe the role of Network Services Orchestration (NSO) 5.4 Describe the high-level principles and benefits of a data modeling language, such as YANG 5.5 Compare agent vs. agentless configuration management tools, such as Chef, Puppet, Ansible, and SaltStack 5.6 Describe data analytics and model-driven telemetry in service provider 5.7 Configure dial-in/out telemetry streams using gRPC 5.8 Configure and verify NetFlow/IPFIX 5.9 Configure and verify NETCONF and RESTCONF 5.10 Configure and verify SNMP (v2c/v3)
Sample Questions and Answers QUESTION 1 Egress PE NAT is being used via a single centralized router to provide Internet access to L3VPN customers. Which description of the NAT operation is true?
A. Users m different VRFs cannot share the same outside global IP address B. The NAT table contains a field to identify the inside VRF of a translation C. Multiple address pools are needed for the same L3VPN because each site has a separate NAT D. The different L3VPNs using the Internet access must not have IP overlaps internally
Answer: B
QUESTION 2 How much must the MTU be increased when configuring the 802.1q VLAN tag?
A. 2 bytes B. 4 bytes C. 8 bytes D. 12 bytes
Answer: B
QUESTION 3 Refer to the exhibit: Export statistics received do not include the BGP next hop. Which statement about the NetFlow export statistics is true?
A. Only the origin AS of the source router will be included in the export statistics. B. Loopback 0 must be participating in BGP for it to be included in the export statistics. C. The origin AS and the peer-as will be included in the export statistics. D. To include the BGP next hop in the export statistics, those keywords must be included with the version 9 entry.
Answer: D
QUESTION 4 Refer to the exhibit: Which three outcomes occur if the prefix list is added to the neighbor? (Choose three)
A. 192.168 0.0 is denied. B. 192.168 0.0 is denied. C. 192.168 0.0 is permitted D. 192.168.0.0 is denied E. 192.168 0.0 is permitted F. 192.168 0.0 is permitted
Answer: CDF
QUESTION 5 Which statement about segment routing prefix segments is true?
A. It is linked to a prefix SID that is globally unique within segment routing domain. B. It is the longest path to a node. C. It is linked to an adjacency SID that is globally unique within the router. D. It requires using EIGRP to operate.
Answer: A QUESTION 6 DRAG DROP Drag and drop the functions from the left onto the correct Path Computation Element Protocol roles on the right Answer: Explanation: Path Computation Element (Calculates paths through the network, keeps TE topology database information, sends path status updates) Path computation Client (sends path calculation request, sends path creation request) Path Computation Element (PCE) Represents a software module (which can be a component or application) that enables the router to compute paths applying a set of constraints between any pair of nodes within the routers TE topology database. PCEs are discovered through IGP. Path Computation Client (PCC) Represents a software module running on a router that is capable of sending and receiving path computation requests and responses to and from PCEs. The PCC is typically an LSR (Label Switching Router). https://www.cisco.com/c/en/us/td/docs/routers/crs/software/crs_r5-3/mpls/configuration/guide/bmplscg53x- crs/b-mpls-cg53x-crs_chapter_0110.html#con_1279822
QUESTION 7 You are creating new Cisco MPLS TE tunnels. Which type of RSVP message does the headend router send to reserve bandwidth on the path to the tunnels router?
A. error B. reservation C. path D. tear
Answer: C
QUESTION 8 An engineer is setting up overlapping VPNs to allow VRF ABC and XYZ to communicate with VRF CENTRAL but wants to make sure that VRF ABC and XYZ cannot communicate. Which configuration accomplishes these objectives?
A. Option A B. Option B C. Option C D. Option D
Answer: C
QUESTION 9 In an MPLS network, which protocol can be used to distribute a Segment Prefix?
A. OSPF B. LDP C. RSVP-TE D. EIGRP
Answer: A QUESTION 10 DRAG DROP Drag and drop the NAT64 descriptions from the left onto the correct NAT64 types on the right. Answer: Explanation: Stateful (It has 1: N translation, It uses address overloading, It conservers IPv4 addresses) Stateless (It is limited on the number of endpoints, It mandates IPv4-translatable IPv6 address allocation) QUESTION 11 Which statement about Network Services Orchestrator (NSO) is true?
A. It is used only in service provider environments B. It can be used only with XML coding C. It uses YANG modeling language to automate devices D. It must use SDN as an overlay for addressing
Answer: C
QUESTION 12 Which task must be performed first to Implement BFD in an IS-IS environment?
A. Disable Cisco Express Forward.ng on all interfaces running routing protocols other than IS-IS B. Configure BFD under the IS-IS process C. Configure all ISIS routers as Level 2 devices D. Configure BFD in an interface configuration mode
Answer: D
QUESTION 13 An engineer working for telecommunication company with an employee id: 3715 15 021 needs to secure the LAN network using a prefix list Which best practice should the engineer follow when he implements a prefix list?
A. An engineer must use non sequential sequence numbers in the prefix list so that he can insert additional entries later. B. The final entry in a prefix list must be C. An engineer must identity the prefix list with a number only D. An engineer must include only the prefixes for which he needs to log activity.
C_IBP_2311 SAP Certified Application Associate – SAP IBP for Supply Chain (2311) Delivery Methods: SAP Certification Level: Associate Exam: 80 questions Sample Questions: View more Cut Score: 73% Duration: 180 mins Languages: English
Description The “SAP Certified Application Associate – SAP IBP for Supply Chain (2311)” certification exam verifies that the candidate possesses the basic knowledge in the area of the SAP supply chain planning. This certificate proves that the candidate has a basic overall understanding within this consultant profile of the industry solutions, and can implement this knowledge practically in projects under guidance of an experienced consultant. It is recommended as an entry-level qualification to allow consultants to get acquainted with the fundamentals of SAP Integrated Business Planning. Please note that this 2311 version of the exam takes part in the Stay Current with SAP Global Certification program. Once you pass this version of the exam, make sure that you start your stay current process. You will be required to take the quarterly stay current assessment for all subsequent SAP IBP releases via the SAP Learning Hub starting with the 2311 release to maintain your SAP IBP consultant certification status and badge.
Please see below the list of topics that may be covered within this certification and the courses that cover them. Its accuracy does not constitute a legitimate claim; SAP reserves the right to update the exam content (topics, items, weighting) at any time.
User Interface 11% – 20% Use the Fiori Launchpad to customize the UI, work with Excel UI IBP110 SAP LH Content only
General Configuration of a Planning Area 11% – 20% Display, create, copy, edit, check, and activate a planning area. IBP200 (SAP IBP OD 2311) IBP300 (SAP IBP OD 2311)
Key Figures & Attributes 11% – 20% Create and use key figures and attributes to model the supply chain. IBP200 (SAP IBP OD 2311) IBP300 (SAP IBP OD 2311)
Planning Operators & Application Jobs 11% – 20% Configure and use Planning Operators to automate processes in your planning model. IBP300 (SAP IBP OD 2311) IBP700 (SAP IBP OD 2311) IBP200 (SAP IBP OD 2311)
Model Supply Processes 11% – 20% Configure supply planning, run various solvers to generate planning results IBP200 (SAP IBP OD 2311) IBP700 (SAP IBP OD 2311)
Model Sales & Operations Processes <= 10% Describe how IBP extends the logic of S&OP in the network using advanced demand and supply planning integrated with financial plans. IBP200 (SAP IBP OD 2311)
Solution Architecture & Data Integration <= 10% Optimize the integration scenarios and architecture of your planning solution. IBP200 (SAP IBP OD 2311) IBP300 (SAP IBP OD 2311) IBP700 (SAP IBP OD 2311)
Analytics and Reporting <= 10% Define and view information with user-defined charts and dashboards. IBP200 (SAP IBP OD 2311)
Demand Planning <= 10% Create and transform forecasts in your planning model. IBP200 (SAP IBP OD 2311)
Master Data <= 10% Optimize inventory in the supply chain utilizing algorithms that derive inventory targets. IBP200 (SAP IBP OD 2311)
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in the Certification Hub and can be booked with product code CER006. With CER006 – SAP Certification in the Cloud, you can take up to six exams attempts of your choice in one year – from wherever and whenever it suits you! Test dates can be chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We define them as “Topic Areas” and they can be found on each exam description. You can find the number of questions, the duration of the exam, what areas you will be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for upcoming releases of the exam. These unscored items are randomly distributed across the certification topics and are not counted towards the final score. The total number of items of an examination as advertised in the Training Shop is never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification SAP Education has worked hard together with the Certification & Enablement Influence Council to enhance the value of certification and improve the exams. An increasing number of customers and partners are now looking towards certification as a reliable benchmark to safeguard their investments. Unfortunately, the increased demand for certification has brought with it a growing number of people who to try and attain SAP certification through unfair means. This ongoing issue has prompted SAP Education to place a new focus on test security. Our Certification Test Security Guidelines will help you as test taker to understand the testing experience. Security Guidelines
Sample Question and Answers
QUESTION 1 How many different time levels can be selected within one planning view?
A. Only time levels from the base planning level of selected key figures B. All time levels available in the time profile, restricted by global configuration parameter C. All time levels available in the time profile D. The number of time levels is restricted to four to avoid negative effects on performance
Answer: B
QUESTION 2 You need to define a new logic for a key figure to drive values from the PERPRODCUSTREGION level to thePERPRODCUST level. Which of the following configuration options are possible for this process? Note: There are 2 correct answers to this question
A. Splitting the values from detailed to aggregated level by using a copy operator B. Splitting the values from aggregated to detailed level using multiplication by the proportions C. Splitting the values form aggregated to detailed level, based on the time profile attribute D. Splitting the values from aggregated to detailed level, based on a stored split-factor key figure
Answer: B, D
QUESTION 3 You are setting up planning with lot sizes. What are some of the properties of lot sizes that you need to beware of? Note: There are 2 correct answers to this question
A. Lot sizes are applicable for production and handling quantities. B. Periodic lot size setting overrides the minimum lot size. C. Lot size are time-independent master data settings D. Lot size are applicable for production and transportation quantities
Answer: C, D
QUESTION 4 You need to work in two separate sessions for two different SAP IBP tenants. What can help you differentiate the appearance of their user interfaces? Note: There are 2 correct answers to this question
A. Define a different default planning area via the User Preferences B. Have a different set to tiles in the Home group of apps C. Set a separate theme for the Home page in the Web UI. D. Add the system name and tenant information from the About section to the Home pages
Answer: B, C
QUESTION 5 Which Master Data Types are used in time-series-based planning within SAP IBP for response and supply? Note: There are 3 correct answers to this question
A. DS Order fulfilment B. Transportation lane C. Customer D. Location E. Product
AZ-801 Configuring Windows Server Hybrid Advanced Services Exam
Updates to the exam Our exams are updated periodically to reflect skills that are required to perform a role. We have included two versions of the Skills Measured objectives depending on when you are taking the exam.
We always update the English language version of the exam first. Some exams are localized into other languages, and those are updated approximately eight weeks after the English version is updated. While Microsoft makes every effort to update localized versions as noted, there may be times when the localized versions of an exam are not updated on this schedule. Other available languages are listed in the Schedule Exam section of the Exam Details webpage. If the exam isn’t available in your preferred language, you can request an additional 30 minutes to complete the exam.
Note The bullets that follow each of the skills measured are intended to illustrate how we are assessing that skill. Related topics may be covered in the exam.
Note Most questions cover features that are general availability (GA). The exam may contain questions on Preview features if those features are commonly used.
Audience profile Candidates for this exam are responsible for configuring and managing Windows Server on-premises, hybrid, and Infrastructure as a Service (IaaS) platform workloads. The Windows Server Hybrid Administrator is tasked with integrating Windows Server environments with Azure services and managing Windows Server in on-premises networks. This role manages and maintains Windows Server IaaS workloads in Azure as well as migrating and deploying workloads to Azure. This role typically collaborates with Azure Administrators, Enterprise Architects, Microsoft 365 administrators, and network engineers.
Candidates for this exam deploy, package, secure, update, and configure Windows Server workloads using on-premises, hybrid, and cloud technologies. This role implements and manages on-premises and hybrid solutions, such as identity, security, management, compute, networking, storage, monitoring, high availability, and disaster recovery. This role uses administrative tools and technologies such as Windows Admin Center, PowerShell, Azure Arc, Azure Policy, Azure Monitor, Azure Automation Update Management, Microsoft Defender for Identity, Microsoft Defender for Cloud, and IaaS VM administration.
Candidates for this exam have several years of experience with Windows Server operating systems.
Secure Windows Server on-premises and hybrid infrastructures (25–30%) Implement and manage Windows Server high availability (10–15%) Implement disaster recovery (10–15%) Migrate servers and workloads (20–25%) Monitor and troubleshoot Windows Server environments (20–25%)
Secure Windows Server on-premises and hybrid infrastructures (25–30%) Secure Windows Server operating system Configure and manage Exploit Protection Configure and manage Windows Defender Application Control Configure and manage Microsoft Defender for Servers Configure and manage Windows Defender Credential Guard Configure SmartScreen Implement operating system security by using Group Policies Secure a hybrid Active Directory infrastructure Configure password policies Enable password block lists Manage protected users Manage account security on an RODC Harden domain controllers Configure authentication policy silos Restrict access to domain controllers Configure account security Manage AD built-in administrative groups Manage AD delegation Implement and manage Microsoft Defender for Identity Identify and remediate Windows Server security issues by using Azure services Monitor on-premises servers and Azure IaaS VMs by using Microsoft Sentinel Identify and remediate security issues on-premises servers and Azure IaaS VMs by using Microsoft Defender for Cloud Secure Windows Server networking Manage Windows Defender Firewall Implement domain isolation Implement connection security rules Secure Windows Server storage Manage Windows BitLocker Drive Encryption (BitLocker) Manage and recover encrypted volumes Enable storage encryption by using Azure Disk Encryption Manage disk encryption keys for IaaS virtual machines
Implement and Manage Windows Server high availability (10–15%) Implement a Windows Server failover cluster Implement a failover cluster on-premises, hybrid, or cloud-only Create a Windows failover cluster Implement a stretch cluster across datacenters or Azure regions Configure storage for failover clustering Modify quorum options Configure network adapters for failover clustering Configure cluster workload options Configure cluster sets Configure Scale-Out File servers Create an Azure witness Configure a floating IP address for the cluster Implement load balancing for the failover cluster Manage failover clustering Implement cluster-aware updating Recover a failed cluster node Upgrade a node to Windows Server 2022 Failover workloads between nodes Install Windows updates on cluster nodes Manage failover clusters using Windows Admin Center Implement and manage Storage Spaces Direct Create a failover cluster using Storage Spaces Direct Upgrade a Storage Spaces Direct node Implement networking for Storage Spaces Direct Configure Storage Spaces Direct
Implement disaster recovery (10–15%) Manage backup and recovery for Windows Server Back up and restore files and folders to Azure Recovery Services Vault Install and manage Azure Backup Server Back up and recover using Azure Backup Server Manage backups in Azure Recovery Services Vault Create a backup policy Configure backup for Azure VM using the built-in backup agent Recover VM using temporary snapshots Recover VMs to new Azure VMs Restore a VM Implement disaster recovery by using Azure Site Recovery Configure Azure Site Recovery networking Configure Site Recovery for on-premises VMs Configure a recovery plan Configure Site Recovery for Azure VMs Implement VM replication to secondary datacenter or Azure region Configure Azure Site Recovery policies Protect virtual machines by using Hyper-V replicas Configure Hyper-V hosts for replication Manage Hyper-V replica servers Configure VM replication Perform a failover
Migrate servers and workloads (20–25%) Migrate on-premises storage to on-premises servers or Azure Transfer data and share Cut over to a new server by using Storage Migration Service (SMS) Use Storage Migration Service to migrate to Azure VMs Migrate to Azure file shares Migrate on-premises servers to Azure Deploy and configure Azure Migrate appliance Migrate VM workloads to Azure IaaS Migrate physical workloads to Azure IaaS Migrate by using Azure Migrate Migrate workloads from previous versions to Windows Server 2022 Migrate IIS Migrate Hyper-V hosts Migrate RDS host servers Migrate DHCP Migrate print servers Migrate IIS workloads to Azure Migrate IIS workloads to Azure Web Apps Migrate IIS workloads to containers Migrate an AD DS infrastructure to Windows Server 2022 AD DS Migrate AD DS objects, including users, groups and Group Policies using AD Migration Tool Migrate to a new Active Directory forest Upgrade an existing forest
Monitor and troubleshoot Windows Server environments (20–25%) Monitor Windows Server by using Windows Server tools and Azure services Monitor Windows Server by using Performance Monitor Create and configure Data Collector Sets Monitor servers and configure alerts by using Windows Admin Center Analyze Windows Server system data by using System Insights Manage event logs Deploy Azure Monitor agents Collect performance counters to Azure Create alerts Monitor Azure VMs by using Azure diagnostics extension Monitor Azure VMs performance by using VM Insights Troubleshoot Windows Server on-premises and hybrid networking Troubleshoot hybrid network connectivity Troubleshoot on-premises connectivity Troubleshoot Windows Server virtual machines in Azure Troubleshoot deployment failures Troubleshoot booting failures Troubleshoot VM performance issues Troubleshoot VM extension issues Troubleshoot disk encryption issues Troubleshoot storage Troubleshoot VM connection issues Troubleshoot Active Directory Restore objects from AD recycle bin Recover Active Directory database using Directory Services Restore mode Recover SYSVOL Troubleshoot Active Directory replication Troubleshoot Hybrid authentication issues Troubleshoot on-premises Active Directory
QUESTION 1 DRAG DROP You are planning the implementation of Cluster2 to support the on-premises migration plan. You need to ensure that the disks on Cluster2 meet the security requirements. In which order should you perform the actions? To answer, move all actions from the list of actions to the answer area and arrange them in the correct order.
Answer:
QUESTION 2 HOTSPOT You need to implement a security policy solution to authorize the applications. The solution must meet the security requirements. Which service should you use to enforce the security policy, and what should you use to manage the policy settings? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Answer:
Explanation:
QUESTION 3 You are remediating the firewall security risks to meet the security requirements. What should you configure to reduce the risks?
A. a Group Policy Object (GPO) B. adaptive network hardening in Microsoft Defender for Cloud C. a network security group (NSG) in Sub1 D. an Azure Firewall policy
Answer: A
QUESTION 4 You are planning the deployment of Microsoft Sentinel. Which type of Microsoft Sentinel data connector should you use to meet the security requirements?
A. Threat Intelligence – TAXII B. Azure Active Directory C. Microsoft Defender for Cloud D. Microsoft Defender for Identity
Answer: D
QUESTION 5 You are planning the migration of Archive1 to support the on-premises migration plan. What is the minimum number of IP addresses required for the node and cluster roles on Cluster3?
A. 2 B. 3 C. 4 D. 5
Answer: B
Explanation: One IP for each of the two nodes in the cluster and one IP for the cluster virtual IP (VIP).
QUESTION 6 HOTSPOT You are planning the www.fabrikam.com website migration to support the Azure migration plan. How should you configure WebApp1? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Answer:
Explanation: Box 1: Add a custom domain name To migrate www.fabrikam.com website to an Azure App Service web app, you need to add Fabrikam.com as a custom domain in Azure. This will make the domain name available to use in the web app.
Box 2: Modify a DNS record You need to change the DNS record for www.fabrikam.com to point to the Azure web app. HTTP redirect rules wont work because WEB1 and WEB2 will be decommissioned.
QUESTION 7 DRAG DROP You are planning the DHCP1 migration to support the DHCP migration plan. Which two PowerShell cmdlets should you run on DHCP1, and which two PowerShell cmdlets should you run on DHCP2? To answer, drag the appropriate cmdlets to the correct servers. Each cmdlet may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Answer:
QUESTION 8 You are planning the data share migration to support the on-premises migration plan. What should you use to perform the migration?
A. Storage Migration Service B. Microsoft File Server Migration Toolkit C. File Server Resource Manager (FSRM) D. Windows Server Migration Tools
Answer: A QUESTION 9 HOTSPOT You are planning the migration of APP3 and APP4 to support the Azure migration plan. What should you do on Cluster1 and in Azure before you perform the migration? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point.
Answer:
QUESTION 10 HOTSPOT You are planning the europe.fabrikam.com migration to support the on-premises migration plan- Where should you install the Password Export Server (PES) service, where should you generate the encryption key? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation:
This is a mock exam bundle of 3 mock exams and have the similar approach & feel in line with actual exam
Question type : Multiple choice or Multi select. Number of Questions: 40 questions (Total 120 question – 3 mock exams). Duration : 90 minutes. Passing score : 60%. The topic of the test will be on the following:
Mock Tests |1Z0-1112-2 | Oracle Procurement Business Process Foundations Associate Build confidence and work towards success for certification, Interview & work
The Oracle Procurement Business Process Foundations Associate exam will validate your understanding of all major aspects of the Oracle Procurement Cloud and the business processes that are associated with it. You will be tested on the following product areas: Requisitions, Purchase Orders, Receiving, Suppliers, Supplier Qualification, Sourcing, and Procurement Contracts. The Supplier Registration to Supplier Performance Lifecycle
The Supplier Registration to Supplier Performance Lifecycle Supplier Registration (External and Internal) and Approval Activate Supplier Enablement Manage Supplier Qualification Optimize Supplier Portfolio
Insight to Smart Sourcing Lifecycle Insight to Smart Sourcing Lifecycle Sourcing Event Manage Negotiations Award Business
The Contract Creation to Spend Compliance Lifecycle The Contract Creation to Spend Compliance Lifecycle Create Contract Enforce Policy Compliance Approve and Accept Contracts
The Requisition to Receipt Lifecycle The Requisition to Receipt Lifecycle Raise and Approve Requisition Create and Approve PO Record Goods & Services Received
The Supplier Invoice to Payment Lifecycle The Supplier Invoice to Payment Lifecycle Supplier Invoice To Payment.
Wishing you good luck in certification & career ahead !
Who this course is for: Procurement or SCM consultants preparing for Oracle Sales Business process Foundation certification Oracle Procurement & SCM Functional consultants preparing for certification or Interview or to gain knowledge Business Users, Business Process Owner, University Students to test understanding on Oracle Procurement process
QUESTION 1 Select three reasons why contracts should be approved.
A. Protects the organization B. Aligns spending policies in the contract C. Supports fraud D. Checks contract terms and clauses E. Encourages ad hoc buying
Answer: A, B, D
QUESTION 2 Identify THREE true statements about the Contract Creation process?
A. Contract can be optionally signed electronically B. Contract is automatically validated upon submission C. Contract terms library can be used to add and delete clauses D. Contract needs approval before it is validated
Answer: A, B, C
QUESTION 3 Glenn Systems has decided to enable the Additional Duplicate Invoice Check feature: Which THREE additional attributes are considered for duplicate invoice check when this feature is enabled?
A. Supplier Location B. Invoice Amount C. Invoice Date D. Supplier Tax Registration Number E. Invoice Type
Answer: B, C, D
QUESTION 4 Which two steps are required when creating contracts using guided authoring (wizard)?
A. Validate the contract B. Submit the contract for approval C. Preview any added clauses D. Add digital signature
Answer: A, B
QUESTION 5 Identify two correct pairs of activity and the required job role
A. Submit responses to quotations – Supplier Bidder B. Manage supplier contact – Supplier Administrator C. Create and submit change request – Supplier Customer Service Representative D. Approve change request – Supplier Self Service Administrator
Updates to the exam Our exams are updated periodically to reflect skills that are required to perform a role. We have included two versions of the Skills Measured objectives depending on when you are taking the exam.
We always update the English language version of the exam first. Some exams are localized into other languages, and those are updated approximately eight weeks after the English version is updated. While Microsoft makes every effort to update localized versions as noted, there may be times when the localized versions of an exam are not updated on this schedule. Other available languages are listed in the Schedule Exam section of the Exam Details webpage. If the exam isn’t available in your preferred language, you can request an additional 30 minutes to complete the exam. Note
The bullets that follow each of the skills measured are intended to illustrate how we are assessing that skill. Related topics may be covered in the exam. Note
Most questions cover features that are general availability (GA). The exam may contain questions on Preview features if those features are commonly used.
Skills measured as of September 26, 2023 Audience profile As a candidate for this exam, you’re a solution architect who: Leads successful implementations. Focuses on how solutions address the broader business and technical needs of organizations. This role requires you to have the ability to identify opportunities to solve business problems. You should have functional and technical knowledge of: Microsoft Power Platform Dynamics 365 customer engagement apps Related Microsoft cloud solutions Other third-party technologies You apply knowledge and experience throughout an engagement. You perform proactive and preventative work to: Increase the value of the customer’s investment. Promote organizational health.
As a candidate for this exam, you should have experience across functional and technical disciplines of Microsoft Power Platform. You should be able to facilitate design decisions across development, configuration, integration, infrastructure, security, licensing, availability, storage, and change management. In this role, you balance project’s business needs while meeting functional and non-functional requirements.
Perform solution envisioning and requirement analysis (35–40%) Architect a solution (40–45%) Implement the solution (15–20%)
Perform solution envisioning and requirement analysis (35–40%) Initiate solution planning Evaluate business requirements Identify Microsoft Power Platform solution components Identify other components including existing apps, Microsoft Dynamics 365 apps, AppSource apps, third-party components, and components from independent software vendors (ISVs) Identify and estimate migration and integration efforts Identify organization information and metrics Identify desired high-level organizational business processes Identify business process improvement opportunities Assess an organization’s risk factors Review key success criteria Identify existing solutions and systems Evaluate an organization’s enterprise architecture Identify data sources needed for a solution Define use cases and quality standards for existing data Identify and document an organization’s existing business processes Capture requirements Refine high-level requirements Identify functional requirements Identify non-functional requirements Confirm that requirements meet an organization’s goals Identify and document an organization’s desired business processes Perform fit/gap analyses Determine the feasibility of meeting specific requirements Evaluate Dynamics 365 apps and AppSource options to solve requirements Address functional gaps through alternate solutions Determine the scope for a solution
Architect a solution (40–45%) Lead the design process Design the solution topology Design customizations for existing apps Design and validate user experience prototypes Identify opportunities for component reuse Communicate system design visually Design application lifecycle management (ALM) processes Design a data migration strategy Design apps by grouping required features based on role or task Design a data visualization strategy Design an automation strategy that uses Power Automate Design environment strategy Design the data model Design tables and columns Design reference and configuration data Design relationships and relationship behaviors Determine when to connect to external data versus import data Design data models to address complex sets of requirements Design integrations Design collaboration integrations Design integrations between Microsoft Power Platform solutions and Dynamics 365 apps Design integrations with an organization’s existing systems Design third-party integrations Design an authentication strategy Design a business continuity strategy Identify opportunities to integrate and extend Microsoft Power Platform solutions by using Microsoft Azure Design robotic process automation (RPA) Design networking Design the security model Design the business unit and team structure Design security roles Design column and row level security Design security models to address complex sets of requirements Determine security model management policies and processes Identify Microsoft Entra groups and app registrations required to support a solution Identify data loss prevention (DLP) policies for a solution Determine how external users will access a solution
Implement the solution (15–20%) Validate the solution design Evaluate detail designs and implementation Validate security Ensure that the solution conforms to API limits Assess the solution performance and impact on resources Resolve automation conflicts Resolve integration conflicts Support go-live Identify and resolve potential and actual performance issues Troubleshoot data migration Resolve any identified issues with deployment plans Identify factors that impact go-live readiness and remediate issues
Sample Question:
QUESTION 2 You need to recommend a reporting solution for the organization. Which two options should you recommend? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. AI Builder B. SQL Server Reporting Services (SSRS) C. Dynamics 365 D. Power BI
Answer: BC
Explanation: Scenario: The reporting and analytics team must be able to create reports that include data from all facilities and all workers. Management reports must present an overview of the entire organization. Other reports may be limited to specific offices. B: Power Apps apps can include reports that provide useful business information to the user. These reports are based on SQL Server Reporting Services and provide the same set of features that are available for typical SQL Server Reporting Services reports. C: Microsoft Dynamics 365 online and Model-Driven PowerApps offers several advanced reporting options. Advanced reports are often necessary when business requirements demand complex calculations, returning multiple data sets, grouping large sets of data based on rules, and retrieving data from different data sources. Incorrect Answers: D: Scenario: Users cannot view Power BI reports within the Power Platform apps. Note: Power BI enables data insights and better decision-making, while Power Apps enables everyone to build and use apps that connect to business data. Using the Power Apps visual, you can pass context-aware data to a canvas app, which updates in real time as you make changes to your report.
QUESTION 3 You need to recommend a solution for handling data entry requirements for the mobile audit teams. What are two possible ways to achieve the goal? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. Canvas app within Power Apps Player B. Canvas app within a browser C. Dynamics 365 Field Service D. Dynamics 365 App for Outlook
Answer: AB
Explanation: Scenario: Audit teams must have the ability to view worker information on their mobile devices. Audit teams must be able to record data during visits to locations where workers are placed. When you create an app, or someone shares an app with you, you can run that app on the Power Apps mobile app or in a web browser.
QUESTION 6 You need to recommend technology for accessing historical job placement data. What should you recommend?
A. Power Virtual Agents chatbots B. Virtual tables C. Power Bl D. Power Automate flows
Answer: B
Explanation: A virtual table is a custom table in Microsoft Dataverse that has columns containing data from an external data source. Virtual tables appear in your app to users as regular table rows, but contain data that is sourced from an external database, such as an Azure SQL Database. Rows based on virtual tables are available in all clients including custom clients developed using the Dataverse web services. Scenario: First Up uses an on-premises system to manage current and historical patient data including medications and medical visits. The company plans to reference historical data in the existing system. The records held in these systems will not be migrated to the new solution except for medication information. The solution must provide a worker appointment booking system that can access worker historical job placement data. First Up staff members must be able to view and update worker records. They must be able to see current and historical job placement data on the same form in the new solution.
QUESTION 7 HOTSPOT You need to design tables for the solution. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: Virtual Table A virtual table is a custom table in Microsoft Dataverse that has columns containing data from an external data source. Virtual tables appear in your app to users as regular table rows, but contain data that is sourced from an external database, such as an Azure SQL Database. Rows based on virtual tables are available in all clients including custom clients developed using the Dataverse web services. Scenario: First Up uses an on-premises system to manage current and historical patient data including medications and medical visits. The company plans to reference historical data in the existing system. The records held in these systems will not be migrated to the new solution except for medication information. The solution must provide a worker appointment booking system that can access worker historical job placement data. First Up staff members must be able to view and update worker records. They must be able to see current and historical job placement data on the same form in the new solution. Box 2: Lookup (N:1) Each worker can have many security clearances, so need a 1:N relationship. Scenario: The solution must support tracking of security clearance information for a worker including the date, status, and certifying agency.
QUESTION 8 HOTSPOT You need to recommend solutions for the organizations technical challenges. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: Power Automate Self-service purchase is available for Power Platform (Power BI, Power Apps, and Power Automate), Project, and Visio. Box 2: Azure Active Directory B2B Scenario: First Up Consulting recruits information technology (IT) workers for temporary or permanent positions at client companies. Azure Active Directory (Azure AD) business-to-business (B2B) collaboration is a feature within External Identities that lets you invite guest users to collaborate with your organization. With B2B collaboration, you can securely share your company’s applications and services with guest users from any other organization, while maintaining control over your own corporate data. Work safely and securely with external partners, large or small, even if they don’t have Azure AD or an IT department. A simple invitation and redemption process lets partners use their own credentials to access your company’s resources. Note, Scenario: Workers must be able to sign into a portal by using their own email address. Workers must be required to use a secure method of authentication to be able to view their data. User security roles must be customized to ensure that users are able to interact only with the specific data in which they need access. Box 3: Dynamics 365 Field Service Dynamics 365 Field Service functionality include: An interactive schedule board helps dispatchers assign work orders to the best resources based on location, availability, skill set, priority, and more. This is done via a manual drag-and-drop method, a semi-automated scheduling assistant, or fully automated with Resource Scheduling Optimization. The schedule board displays each resource–whether an employee, contractor, or equipment–and their scheduled work orders. Resources and their assigned jobs are also displayed on a map along with routes and traffic patterns in real time. QUESTION 9 HOTSPOT You need to recommend methods to resolve the organizations issues. What should you recommend? To answer, select the appropriate options in the answer area. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: Add users to Microsoft 365. Scenario: Users cannot view Power BI reports within the Power Platform apps. Issue: The people you share with may see a locked tile in a dashboard, or a “Permission required” message when they try to view a report. Solution: You need to grant them permission to the underlying dataset. Go to the All or the Datasets + dataflows tab in your content list. Select More options (…) next to a dataset, then select Manage permissions. Select Add user. Enter the full email addresses for individuals, distribution groups, or security groups. Select Grant access. Box 2: Configure an on-premises data gateway. Scenario: The company plans to reference historical data in the [on-premises] existing system. The records held in these systems will not be migrated to the new solution except for medication information. The on-premises data gateway acts as a bridge to provide quick and secure data transfer between onpremises data (data that isn’t in the cloud) and several Microsoft cloud services. These cloud services include Power BI, PowerApps, Power Automate, Azure Analysis Services, and Azure Logic Apps. By using a gateway, organizations can keep databases and other data sources on their on-premises networks, yet securely use that on-premises data in cloud services.
QUESTION 10 DRAG DROP You need to recommend methods for assigning security to each group of users. What should you recommend? To answer, drag the appropriate methods to the correct groups of users. Each method may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point. Answer: Explanation: Box 1: Power Platform Local Business Owner Team Owner team: An owner team owns records and has security roles assigned to the team. A user’s privileges can come from their individual security roles, those of the teams that they’re part of or the ones they inherit. A team has full access rights on the records that the team owns. Team members are added manually to the owner team. Scenario: Employee authentication with the existing system is provided by an on-premises Active Directory instance that is linked to Azure Active Directory. Box 2: Azure Active Directory Security Group Team An Azure Active Directory (Azure AD) group team. Similar to owner team, an Azure AD group team can own records and can have security roles assigned to the team. Note: The administration of app and data access for Microsoft Dataverse has been extended to allow administrators to use their organization’s Azure Active Directory (Azure AD) groups to manage access rights for licensed Dataverse users. Box 3: Azure Active Directory B2B Guest Access An Azure AD B2B collaboration user is an external user, typically from a partner organization, that you invite to sign into your Azure AD organization using their own credentials. This B2B collaboration user (also generally referred to as a guest user) can then access the apps and resources you want to share with them. A user object is created for the B2B collaboration user in the same directory as your employees. B2B collaboration user objects have limited privileges in your directory by default, and they can be managed like employees, added to groups, and so on. Scenario: Before First Up signs a contract to place workers at a client company, a member of the audit team visits the company and interviews company management. Audit members use different types of devices including Android and iOS devices. First Up has no plans to require the use of a single type of device.
QUESTION 11 You need to investigate the canvas app functionality issues. Which two tools can you use? Each correct answer presents a complete solution. NOTE: Each correct selection is worth one point.
A. App checker B. Errors function C. Solution checker D. Power Platform admin center
Answer: AC
Explanation: Scenario: The testing team reports that one of the canvas apps is not working as expected. An error message displays as specific pages load. A: The App checker is now available to help provide a clear list of formula issues in your app, and to provide items to fix to make your app accessible. The App checker is an area that the PowerApps team will continue to invest in, and build on in order help to make debugging, performance and best practice decisions an easier and more guided experience. C: With the solution checker feature, you can perform a rich static analysis check on your solutions against a set of best practice rules and quickly identify these problematic patterns. After the check completes, you receive a detailed report that lists the issues identified, the components and code affected, and links to documentation that describes how to resolve each issue.
Audience profile The candidate envisions and creates business solutions to simplify and automate tasks and processes for themselves and their team. They understand the data that they are working with, the issues that they need to resolve, and the required processes and app experiences. The candidate may not have formal IT training but is comfortable using technology to solve business problems.
The candidate is self-directed and focuses on solving problems that they encounter as part of their primary job role. They may connect to and use features of apps including Microsoft Power Platform, Microsoft Teams, Microsoft 365 apps and services, and third-party solutions. The candidate has a desire to understand the capabilities and limitations of available tools and understand how to apply them.
Design business solutions (20–25%) Analyze and visualize data (10–15%) Create business solutions (60–65%)
Design business solutions (20–25%) Create a high-level design Identify existing data sources needed to support a business solution Describe the expected user experience for targeted devices and describe the differences between Microsoft Power Platform app types Describe the expected logic and steps that a process will execute Create a high-level structure for a new data source Identify Microsoft Power Platform components Determine the required Microsoft Power Apps app type for a business solution Determine when to use Microsoft Dataverse for Teams Map a problem domain to Microsoft Power Platform tools Identify options for implementing business logic Describe connectors Describe uses cases for cloud flows and desktop flows Describe use cases for chatbots Design the user interface (UI) for a business solution Identify opportunities for component reuse Select UI elements for canvas apps Identify the model-driven forms and Dataverse views that are needed Design reporting and visualizations for business solutions Select reporting options for business solutions including views, Microsoft Power BI visualizations, and dashboards Define visualizations for Power BI dashboards Define visualizations for model-driven dashboards Define visualizations for canvas apps
Analyze and visualize data (10–15%) Create and consume Power BI dashboards Create a simple report from an existing dataset by using Power BI Service Create Power BI dashboards from existing reports Embed Power BI dashboards and tiles in canvas apps and model-driven apps Share Power BI dashboards Describe AI Builder models Describe use cases for AI Builder Describe differences between prebuilt models and custom models Describe the process for training custom models Use a model from within Microsoft Power Automate or Microsoft Power Apps
Create business solutions (60–65%) Manage Microsoft Power Platform components during development Create a publisher in Dataverse Create a Dataverse solution Export or import Dataverse solution Export or import a canvas app or a cloud flow Add existing apps and flows to a Dataverse solution Create model-driven apps Create model-driven apps Create and configure Dataverse table forms Create and configure Dataverse table views Share model-driven apps with other users and groups Create and configure model-driven dashboards Create and manage canvas apps Connect to data sources in canvas apps Interpret App checker results Manage versions of canvas apps Publish canvas apps Share canvas apps with other users and groups Build canvas apps screens Add canvas app assets and components to screens Create screens for canvas apps Determine when to use forms, galleries, button, labels, input controls, images, and custom controls Configure UI elements Implement Power Fx formulas Implement collections and variables Run a cloud flow from a canvas app Configure Microsoft Dataverse Create tables and table columns based on a data model Link tables by using lookups Describe use cases and capabilities of business rules Create Dataverse business rules Describe how Dataverse uses role-based access control (RBAC) Add table permissions to existing Dataverse security roles Create Power Automate flows Describe types of triggers for cloud flows Create cloud flows Configure triggers for cloud flows Configure flow actions Test a cloud flow and interpret flow checker results Implement conditional logic for a cloud flow Create approvals and monitor the approval process by using Power Automate and Teams Share cloud flows Create a desktop flow for personal use Create Microsoft Power Virtual Agents chatbots in Microsoft Teams Identify use cases and capabilities for chatbots Create a chatbot that uses topics and trigger phrases Test a chatbot Publish a chatbot
Sample Questions and Answeers
New Topic: Topic 1, Wide World Importers This is a case study. Case studies are not timed separately. You can use as much exam time as you would like to complete each case. However, there may be additional case studies and sections on this exam. You must manage your time to ensure that you are able to complete all questions included on this exam in the time provided. To answer the questions included in a case study, you will need to reference information that is provided in the case study. Case studies might contain exhibits and other resources that provide more information about the scenario that is described in the case study. Each question is independent of the other questions in this case study. At the end of this case study, a review screen will appear. This screen allows you to review your answers and to make changes before you move to the next section of the exam. After you begin a new section, you cannot return to this section. To start the case study To display the first question in this case study, click the Next button. Use the buttons in the left pane to explore the content of the case study before you answer the questions. Clicking these buttons displays information such as business requirements, existing environment, and problem statements. When you are ready to answer a question, click the Question button to return to the question. Background Current environment Sales representatives submit weekly status reports to regional managers. There is no standardized format for these status reports. The process for managing status reports is challenging. Wide World Importers has decided to use Microsoft 365, Microsoft Azure, and Power Platform for future app development. Both Wide World Importers and Tailwind Traders have identical Microsoft SharePoint and Azure configurations. Both companies use separate tenants. Requirements Application You must create a mobile app to streamline the creation of status reports by sales representatives. You must make the same app available to Tailwind Traders. The mobile app must meet the following requirements: Minimize the use of code. Use formulas and expressions when necessary. Support a variety of visual layouts. Use a SharePoint list to store information about regional managers and sales representatives. Use Azure SQL Database to store other data. Status reports Sales representatives must provide a weekly status report for all work processes each Monday. Representatives must enter the following information for each process: If a sales representative submits a status report and assigns the At Risk status to a process, the app must prompt the sales representative to enter a detailed description for the risk. This information must be emailed to the regional manager. If the category is Work/life balance, the information must be carbon copied to the human resources department. If a sales representative does not submit a weekly status report by an agreed upon deadline, the system must send an email to remind the sales representative. The app must be able to run both online and offline. If the mobile device on which the app runs is connected to the internet, the app must immediately submit the status report. You must display a visual indicator in the app so that sales representatives know whether the app is offline before submitting reports. When data is submitted offline, the data must be stored in the app until the app is back online. Technical Regardless of the UI layouts, the data recorded must be standardized in the Azure DB tables. You must use global variables in the app. Deployment Before deploying the app to production, you must ensure that the app conforms to Microsoft accessibility and performance guidelines. The completed app and all supporting components must be provided to Tailwind Traders. Tailwind Traders must not be able to make changes to any of the components. You must use the following version control numbering scheme: Major: The last two digits of the year the app is packaged Minor: Two digits that represent the month when the app is packaged Build: A number that is incremented to represent significant changes to the app Revision: The incremented revision for a package New versions of the application must completely replace previous versions of the app. When identifying versions of the app solution, all dependencies, entities, and user interfaces components must be identified to avoid any unintentional issues caused by reverting individual components to a previous version. Previous versions of the mobile app must be available for roll back purposes. All versions of software that have been used in production must be retained for five years. Issues The mobile app has been live for several months. Eight versions of the app have been released since the initial version of the app was deployed to sales representatives. You must revert the app to an earlier version and redesign some features. User1 often works in a warehouse that does not have internet connectivity. User1 needs to edit an existing status report and submit a new status report. Several sales representatives have accessibility restrictions. User2 is visually impaired and cannot see images. User3 is unable to use a mouse. QUESTION 1 You need to provide the app to Tailwind Traders. What should you do?
A. Within Managed Properties, set the value of the Allow customizations option to true. Export the app as a managed solution. B. Use the Share App feature. C. Within Managed Properties, set the value of the Allow customizations option to false. Export the app as a managed solution. D. Within Managed Properties, set the value of the Allow customizations option to false. Export the app as an unmanaged solution.
Answer: C
Explanation: Scenario: The completed app and all supporting components must be provided to Tailwind Traders. Tailwind Traders must not be able to make changes to any of the components. Managed Solution: A managed solution is a finalized solution that can be distributed and installed. They are created by exporting an unmanaged solution by setting restrictions to prevent any further customizations. The whole point of Managed is locking down the Component states so they cannot be edited. Deleting the Managed Solution will remove all its customisations as well as data contained. Managed Solutions become read only once deployed so they cannot be manipulated.
QUESTION 6 You need to provide all app components of the application to Tailwind Traders. What should you do?
A. Package the application and flow components into a single solution for export. B. Run the app checker and flow checker prior to publishing each component for export. C. Export each component separately but use the same version number for each component. D. Publish the application and flow solutions at the same time before exporting each one.
Answer: B
Explanation: Scenario: When identifying versions of the app solution, all dependencies, entities, and user interfaces components must be identified to avoid any unintentional issues caused by reverting individual components to a previous version. Power Apps has added components to the rule set that encourages best practices in the Power Apps Checker. You can check your canvas apps and flows that are included in solutions and then review all issues in a single, consolidated report.
QUESTION 8 You need to meet the requirements for sales representative that submit status reports. How should you configure the flow?
A. Add a parallel branch that uses the value of a dynamic content variable B. Add a number functions action that evaluates the risk value by using a static variable to determine if an email is required C. Add a condition that evaluates the risk value by using a dynamic content variable D. Add a data operation action that evaluates a dynamic content variable
Answer: C
Explanation: Salespeople often do not set status of RFQs in the Sales Log to Won when a sale is closed and the customer purchase order is received. Include a dashboard that shows all currently active quotes, their status in the sales cycle, the probability of closing, and estimated manufacturing and installation dates, by customer, product division, status, and salesperson.
QUESTION 10 You need to create the mobile app. Which type of app should you create?
A. model-driven app B. portal app C. Microsoft 365 web app D. canvas app
Answer: D
Explanation: An accessible canvas app will allow users with vision, hearing, and other impairments to successfully use the app. In addition to being a requirement for many governments and organizations, following the below guidelines increases usability for all users, regardless of their abilities.
Updates to the exam Our exams are updated periodically to reflect skills that are required to perform a role. We have included two versions of the Skills Measured objectives depending on when you are taking the exam.
We always update the English language version of the exam first. Some exams are localized into other languages, and those are updated approximately eight weeks after the English version is updated. While Microsoft makes every effort to update localized versions as noted, there may be times when the localized versions of an exam are not updated on this schedule. Other available languages are listed in the Schedule Exam section of the Exam Details webpage. If the exam isn’t available in your preferred language, you can request an additional 30 minutes to complete the exam.
Note The bullets that follow each of the skills measured are intended to illustrate how we are assessing that skill. Related topics may be covered in the exam.
Note Most questions cover features that are general availability (GA). The exam may contain questions on Preview features if those features are commonly used.
Audience profile As a Microsoft security operations analyst, you reduce organizational risk by: Rapidly remediating active attacks in the environment. Advising on improvements to threat protection practices. Referring violations of organizational policies to appropriate stakeholders. You perform: Triage. Incident response. Vulnerability management. Threat hunting. Cyber threat intelligence analysis. As a Microsoft security operations analyst, you monitor, identify, investigate, and respond to threats in multicloud environments by using: Microsoft Sentinel Microsoft Defender for Cloud Microsoft 365 Defender Third-party security solutions In this role, you collaborate with business stakeholders, architects, identity administrators, Azure administrators, and endpoint administrators to secure IT systems for the organization. As a candidate, you should be familiar with:
Microsoft 365 Azure cloud services Windows and Linux operating systems Skills at a glance
Mitigate threats by using Microsoft 365 Defender (25–30%) Mitigate threats by using Defender for Cloud (15–20%) Mitigate threats by using Microsoft Sentinel (50–55%)
Mitigate threats by using Microsoft 365 Defender (25–30%) Mitigate threats to the Microsoft 365 environment by using Microsoft 365 Defender Investigate, respond, and remediate threats to Microsoft Teams, SharePoint Online, and OneDrive Investigate, respond, and remediate threats to email by using Microsoft Defender for Office 365 Investigate and respond to alerts generated by data loss prevention (DLP) policies Investigate and respond to alerts generated by insider risk policies Discover and manage apps by using Microsoft Defender for Cloud Apps Identify, investigate, and remediate security risks by using Defender for Cloud Apps Mitigate endpoint threats by using Microsoft Defender for Endpoint Manage data retention, alert notification, and advanced features Recommend attack surface reduction (ASR) for devices Respond to incidents and alerts Configure and manage device groups Identify devices at risk by using the Microsoft Defender Vulnerability Management Manage endpoint threat indicators Identify unmanaged devices by using device discovery Mitigate identity threats Mitigate security risks related to events for Microsoft Entra ID Mitigate security risks related to Microsoft Entra ID Protection events Mitigate security risks related to Active Directory Domain Services (AD DS) by using Microsoft Defender for Identity Manage extended detection and response (XDR) in Microsoft 365 Defender Manage incidents and automated investigations in the Microsoft 365 Defender portal Manage actions and submissions in the Microsoft 365 Defender portal Identify threats by using Kusto Query Language (KQL) Identify and remediate security risks by using Microsoft Secure Score Analyze threat analytics in the Microsoft 365 Defender portal Configure and manage custom detections and alerts Investigate threats by using audit features in Microsoft 365 Defender and Microsoft Purview Perform threat hunting by using unified audit log Perform threat hunting by using Content Search
Mitigate threats by using Defender for Cloud (15–20%) Implement and maintain cloud security posture management Assign and manage regulatory compliance policies, including Microsoft cloud security benchmark (MCSB) Improve the Microsoft Defender for Cloud secure score by applying recommended remediations Configure plans and agents for Microsoft Defender for Servers Configure and manage Microsoft Defender for DevOps Configure and manage Microsoft Defender External Attack Surface Management (EASM) Configure environment settings in Microsoft Defender for Cloud Plan and configure Microsoft Defender for Cloud settings, including selecting target subscriptions and workspaces Configure Microsoft Defender for Cloud roles Assess and recommend cloud workload protection Enable plans for Microsoft Defender for Cloud Configure automated onboarding of Azure resources Connect compute resources by using Azure Arc Connect multi-cloud resources by using Environment settings Respond to alerts and incidents in Microsoft Defender for Cloud Set up email notifications Create and manage alert suppression rules Design and configure workflow automation in Microsoft Defender for Cloud Remediate alerts and incidents by using Microsoft Defender for Cloud recommendations Manage security alerts and incidents Analyze Microsoft Defender for Cloud threat intelligence reports
Mitigate threats by using Microsoft Sentinel (50–55%) Design and configure a Microsoft Sentinel workspace Plan a Microsoft Sentinel workspace Configure Microsoft Sentinel roles Design and configure Microsoft Sentinel data storage, including log types and log retention Plan and implement the use of data connectors for ingestion of data sources in Microsoft Sentinel Identify data sources to be ingested for Microsoft Sentinel Configure and use Microsoft Sentinel connectors for Azure resources, including Azure Policy and diagnostic settings Configure Microsoft Sentinel connectors for Microsoft 365 Defender and Defender for Cloud Design and configure Syslog and Common Event Format (CEF) event collections Design and configure Windows security event collections Configure threat intelligence connectors Create custom log tables in the workspace to store ingested data Manage Microsoft Sentinel analytics rules Configure the Fusion rule Configure Microsoft security analytics rules Configure built-in scheduled query rules Configure custom scheduled query rules Configure near-real-time (NRT) analytics rules Manage analytics rules from Content hub Manage and use watchlists Manage and use threat indicators Perform data classification and normalization Classify and analyze data by using entities Query Microsoft Sentinel data by using Advanced Security Information Model (ASIM) parsers Develop and manage ASIM parsers Configure security orchestration automated response (SOAR) in Microsoft Sentinel Create and configure automation rules Create and configure Microsoft Sentinel playbooks Configure analytic rules to trigger automation rules Trigger playbooks from alerts and incidents Manage Microsoft Sentinel incidents Configure an incident generation Triage incidents in Microsoft Sentinel Investigate incidents in Microsoft Sentinel Respond to incidents in Microsoft Sentinel Investigate multi-workspace incidents Use Microsoft Sentinel workbooks to analyze and interpret data Activate and customize Microsoft Sentinel workbook templates Create custom workbooks Configure advanced visualizations Hunt for threats by using Microsoft Sentinel Analyze attack vector coverage by using MITRE ATT&CK in Microsoft Sentinel Customize content gallery hunting queries Create custom hunting queries Use hunting bookmarks for data investigations Monitor hunting queries by using Livestream Retrieve and manage archived log data Create and manage search jobs Manage threats by using User and Entity Behavior Analytics Configure User and Entity Behavior Analytics settings Investigate threats by using entity pages Configure anomaly detection analytics rules
Change log Key to understanding the table: The topic groups (also known as functional groups) are in bold typeface followed by the objectives within each group. The table is a comparison between the two versions of the exam skills measured and the third column describes the extent of the changes.
Sample Question and Answers
QUESTION 1 The issue for which team can be resolved by using Microsoft Defender for Endpoint?
A. executive B. sales C. marketing
Answer: B
QUESTION 2 The issue for which team can be resolved by using Microsoft Defender for Office 365?
A. executive B. marketing C. security D. sales
Answer: B
QUESTION 4 You need to recommend a solution to meet the technical requirements for the Azure virtual machines. What should you include in the recommendation?
A. just-in-time (JIT) access B. Azure Defender C. Azure Firewall D. Azure Application Gateway
Answer: B
QUESTION 6 You need to remediate active attacks to meet the technical requirements. What should you include in the solution?
A. Azure Automation runbooks B. Azure Logic Apps C. Azure Functions D Azure Sentinel livestreams
Answer: B
QUESTION 8 You need to complete the query for failed sign-ins to meet the technical requirements. Where can you find the column name to complete the where clause?
A. Security alerts in Azure Security Center B. Activity log in Azure C. Azure Advisor D. the query windows of the Log Analytics workspace
Answer: D
QUESTION 9 You need to implement the Azure Information Protection requirements. What should you configure first?
A. Device health and compliance reports settings in Microsoft Defender Security Center B. scanner clusters in Azure Information Protection from the Azure portal C. content scan jobs in Azure Information Protection from the Azure portal D. Advanced features from Settings in Microsoft Defender Security Center
Answer: D
QUESTION 10 You need to modify the anomaly detection policy settings to meet the Cloud App Security requirements. Which policy should you modify?
A. Activity from suspicious IP addresses B. Activity from anonymous IP addresses C. Impossible travel D. Risky sign-in
Answer: C
Students Review and Discussion
Jose Lindo Meza 7 months, 3 weeks ago – Peru Took my exam today and passed with score 866. My exam had 48 questions, of which about 15 were not here (most of them were from the case study, which was totally different). I have contributor access upvoted 5 times
Hari P 8 months, 1 week ago – India Exam score 788. Only 4 new question upvoted 3 times
manissin 8 months, 2 weeks ago – japan TRUST ME..I have passed my 2 certification by this website. Great work TEAM… upvoted 5 times
ABDULLAH BAHKALI 1 months, 2 weeks ago – Saudi Arabia I took my exam with 788. Case study was exactly the same. 2-3 new questions upvoted 5 times
ROSE IBEMBU 3 months, 3 weeks ago – Angola I passed exam yesterday with 922 points. All questions were from here perhaps 1-2 question were different. I have contributor access. upvoted 7 times
Michael D 4 months, 3 weeks ago – Germany Cleared my exam yesterday with 800 out of total 49 questions , almost 15 were new but examtopics questions are great help. Thank you upvoted 3 times
Patrick Brazier 5 months, 3 weeks ago – Australia Passed 800 there were 48 questions and 15 new questions. upvoted 2 times
Richard Bain 9 months, 4 weeks ago – United States dump still valid, I passed exam on yesterday. upvoted 2 times
Exam: 80 questions Sample Questions: View more Cut Score: 60% Duration: 180 mins Languages: English Sub-solution: Ariba Delivery Methods: SAP Certification Level: Associate
Description The “SAP Certified Application Associate – SAP Ariba Sourcing” exam validates that the candidate possesses the fundamental and core knowledge required of the SAP Ariba Sourcing Associate Application Consultant profile. This certification proves that the candidate has an overall understanding and necessary technical skills to participate as a member of a project team in a mentored role. This certification exam is recommended as an entry level qualification to participate in SAP Ariba Sourcing design and implementation projects. Please note that this version of the exam takes part in the Stay Current with SAP Global Certification program. Once you pass this version of the exam, make sure that you participate in the subsequent stay current process. You will be required to take the bi-annual Stay Current Assessment for all subsequent SAP Ariba Sourcing releases via the SAP Learning Hub to maintain your SAP Ariba Sourcing application associate certification status and badge. In order to participate in the Stay Current program and access the Stay Current enablement and assessment, you will need at minimum an SAP Learning Hub, edition for Procurement and Networks subscription.
Topic Areas Please see below the list of topics that may be covered within this certification and the courses that cover them. Its accuracy does not constitute a legitimate claim; SAP reserves the right to update the exam content (topics, items, weighting) at any time.
Event and Auction Creation > 12% Define the different types of events available in SAP Ariba Sourcing and set up a new event. AR111 (SAP ARIBA SOURCING) AR130e SAP Learning Hub Content
Event Management: Advanced Features > 12% Use event template rules and advance features, such as scoring, conditional content and global events; Use pre-packaged reports. AR120 (SAP ARIBA SOURCING) AR121 (SAP ARIBA SOURCING)
Administration > 12% Configure workflows, projects and tasks and manage data. AR710 (SAP ARIBA SOURCING)
Auctions > 12% Define auction types, explain the business case for auctions, and create and manage an auction. AR130e SAP Learning Hub Content
Direct Spend Sourcing > 12% Describe, use and administer the product sourcing features for direct materials. AR140e SAP Learning Hub Content AR141e SAP Learning Hub Content
Project Creation and Management 8% – 12% Describe a sourcing project, including approval rules and sourcing requests. AR111 (SAP ARIBA SOURCING)
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in the Certification Hub and can be booked with product code CER006. With CER006 – SAP Certification in the Cloud, you can take up to six exams attempts of your choice in one year – from wherever and whenever it suits you! Test dates can be chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We define them as “Topic Areas” and they can be found on each exam description. You can find the number of questions, the duration of the exam, what areas you will be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for upcoming releases of the exam. These unscored items are randomly distributed across the certification topics and are not counted towards the final score. The total number of items of an examination as advertised in the Training Shop is never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification SAP Education has worked hard together with the Certification & Enablement Influence Council to enhance the value of certification and improve the exams. An increasing number of customers and partners are now looking towards certification as a reliable benchmark to safeguard their investments. Unfortunately, the increased demand for certification has brought with it a growing number of people who to try and attain SAP certification through unfair means. This ongoing issue has prompted SAP Education to place a new focus on test security. Our Certification Test Security Guidelines will help you as test taker to understand the testing experience.
Security Guidelines
Sample Questions and Answers QUESTION 1 Which of the following integration options leverages comma-separated values (CSV) upload over HTTPS?
A. SAP direct connectivity B. Mediated connectivity (Customer middleware) C. Batch file channel transfer with the integration toolkit (ITK) D. Web services (SOAP)
Answer: C
QUESTION 2 Which tiles on the product sourcing dashboard can the Materials Viewer group see? Note: there are 2 correct answers to this question.
A. Materials with owners B. BOMs missing programs C. BOMs missing contract MFRs D. Materials with missing price
Answer: A, D
QUESTION 3 Which factor determine how rules are displayed in event templates? Note: there are 3 correct answers to this question.
A. Conditionals Sourcing Library content B. Conditional values from other rules C. Currency rules D. Rules that are preset/hidden in a template E. Event type
Answer: B, D, E
QUESTION 4 Which of the following price attributes will be used in calculating the saving within a line item?
A. Historic price B. Reserve price C. Initial response D. Ceiling/floor value
Answer: A
QUESTION 5 Which of the following templates are available with SAP Ariba Supplier Information and Performance Management (SIPM) new architecture enabled? Note: there are 2 correct answers to this question.
A. Supplier qualification template B. Preferred supplier template C. Supplier request template D. Supplier registration template