Which of the following applications are typical examples of proxy applications? Note: There are 2 correct answers to this question.
Which of the following applications are typical examples of proxy applications? Note: There are 2 correct answers to this question.A . Online store B. Customer record update application C. Registration website D. Application to create and maintain new productsView AnswerAnswer: A,C
Which of the following activities run in XSUAA during the authentication setup? Note: There are 2 correct answers to this question.
Which of the following activities run in XSUAA during the authentication setup? Note: There are 2 correct answers to this question.A . Issue and grant JSON Web Token B. Validate JSON Web Token C. Validate login details D. Return response payloadView AnswerAnswer: A,C
Which of the following are the fundamental guidelines of a twelve-factor application? Note: There are 3 correct answers to this question.
Which of the following are the fundamental guidelines of a twelve-factor application? Note: There are 3 correct answers to this question.A . Cache management B. Stateless and self-contained application processes C. Security management of software layers D. Separation of application code and runtime configuration E. Traceability and reproducibility of all...
Which authentication and connection activity does the SAP Cloud SDK handle automatically?
Which authentication and connection activity does the SAP Cloud SDK handle automatically?A . It creates a communication arrangement with the user ID and password in the SAP S/4HANA Cloud system. B. It determines the configuration by consuming the destination service on SAP Cloud Platform. C. It exchanges the SAML assertion...
Where do you place the Apache JMeter test plans when using Apache JMeter and Gatling?
Where do you place the Apache JMeter test plans when using Apache JMeter and Gatling?A . In a folder under the /performance-tests directory B. In the /performance-tests directory C. In the /tests/performance directory D. In a folder under the/tests/performance directoryView AnswerAnswer: B
Where does the application router request the access token in the Cloud Foundry environment?
Where does the application router request the access token in the Cloud Foundry environment?A . From the CredentialStore service B. From the business application using the OAuth 2.0 client credential flow C. From the XSUAA service using the OAuth 2.0 authorization code flow D. From the protected resources hosted by...
What are the core components of a messaging infrastructure in SAP S/4HANA and SAP Cloud Platform? Note: There are 3 correct answers to this question.
What are the core components of a messaging infrastructure in SAP S/4HANA and SAP Cloud Platform? Note: There are 3 correct answers to this question.A . Rest API B. Enterprise Event Enablement C. Business Event Handling D. Enterprise Messaging E. DestinationView AnswerAnswer: B,C,D
What is the correct sequence of steps when implementing Tenant-aware Persistence?
What is the correct sequence of steps when implementing Tenant-aware Persistence?A . Configure a data source Configure Hibernate for multi-tenancy Tenant onboarding and offboarding Persisting and accessing the data B. Configure Hibernate for multi-tenancy Configure a data source Tenant onboarding and offboarding Persisting and accessing the data C. Configure a...
Which app can you use to display an overview of your extensibility items and to view associations or dependencies between various in-app extension items?
Which app can you use to display an overview of your extensibility items and to view associations or dependencies between various in-app extension items?A . SAP Extensibility Explorer B. Extensibility Cockpit C. Extensibility Catalog D. Extensibility InventoryView AnswerAnswer: B
What are some of the characteristics of reactive systems? Note: There are 2 correct answers to this question.
What are some of the characteristics of reactive systems? Note: There are 2 correct answers to this question.A . They can respond quickly on a high volume of API calls. B. They are defined as responsive, resilient, elastic, and message-driven. C. They register for callback and returns when calling other...