test (2).txt
Document Details
Uploaded by ReformedSerendipity8666
Tags
Full Transcript
Question 1 You are tasked with developing a simple end-to-end application with data persistency in SAP HANA Cloud and with SAP Fiori as the user frontend, to perform CRUD operations. According to the programming model's golden path, which activities are mandatory when building such applications? Not...
Question 1 You are tasked with developing a simple end-to-end application with data persistency in SAP HANA Cloud and with SAP Fiori as the user frontend, to perform CRUD operations. According to the programming model's golden path, which activities are mandatory when building such applications? Note: There are 3 correct answers to this question. A. Reuse existing services. B. Define services. C. Add the SAP Fiori UI. D. Define the data model. E. Add custom logic. Answer B C D Question 2 What does SAP Fiori elements use to generate the UI? Note: There are 2 correct answers to this question. A. Custom UI logic B. Annotations in the OData service C. The entity definition of the OData service D. Authorizations in the OData service Answer B C Question 3 Which of the following tools are required to build Spring Boot applications using the SAP Cloud SDK? Note: There are 2 correct answers to this question. A. Java SE Development Kit 8 B. Apache Maven version 3.5 or above C. SAP Mobile Services (MDK) D. Spring Initializ Answer A B Question 4 Which method can you use to collect error messages with high severity and return them to the caller in the request-response? A. req.reply B. req.notify C. req.reject D. req.error Answer D Question 5 In SAP Build Process Automation, what is a decision table rule? A. A tabular set of input/output rule expressions B. A set of pre-defined data objects C. A tabularset of business process decisions D. A set of rule expressions in an IF-THEN format Answer A Question 6 Which sequence of steps do you follow when working with files locally in Git in SAP Business Application Studio? A. Stage Create, modify, save Commit Check out B. Stage Create, modify, save Check out Commit C. Check out Create, modify, save Stage Commit D. Create, modify, save Stage Check out Commit Answer C Question 7 Which language do you use to create a data model in a CAP project? A. Core Data Services Definition Language (CDL) B. ABAP C. Core Data Services Query Language (CQL) D. SQL Answer A Question 8 With respect to the Flow principle of DevOps, which are flow inhibitors? Note: There are 3 correct answers to this question. A. Manual testing of software B. Manually created software environment C. Source code management tool D. Manually coded user interfaces E. Overly tight architectures on a technical level Answer A B D Question 9 Which error is thrown by the CAP SDK for Node.js, when a CRUD operation violates the foreign key constraints? A. FOREIGN\_KEY\_VIOLATION B. CX\_SY\_CONSTRAINT\_VIOLATION C. ILLEGAL CRUD OPERATION D. UNIQUE CONSTRAINT\_VIOLATION Answer A Question 10 What is a necessary step to implement a custom error handler in the CAP SDK for Node.js? A. Register the error handler function for the before phase of the error. B. Catch exceptions during a CRUD operation. C. Register the error handler function for the on phase of the error. D. Write a custom Node.js package. Answer C Question 11 What can you use to register the JavaScript implementation of an event handler for external services to the framework? A. An inline function passed to result of cds.connect() B. An inline function passed to result of cds.serve() C. A.js file with the same name as the.cds file D. An [\@impl]{.citation data-cites="impl"} annotation in your CDS model fille Answer A Question 12 In SAP Build Process Automation, what is a policy? A. A guide to business process mapping B. A collection of decisions C. A basis for making business rules D. A collection of business rules Answer D Question 13 What are some characteristics of YAML files? Note: There are 2 correct answers to this question. A. YAML files can be used as configuration files. B. YAML files are also valid JSON files. C. YAML files are based on XML. D. YAML files rely on correct indentation. Answer A D Question 14 Which of the following are benefits of using the OData Virtual Data Model of the SAP Cloud SDK? Note: There are 3 correct answers to this question. A. Commonly used SQL query technology B. Easy access to create, update, and delete operations C. Type safety for functions D. Auto-completion of function names and properties E. Database procedures provided out of the box Answer B C D Question 15 What is the prerequisite before you can create a CI/CD job for a project? A. The project has been shared to a remote Git repository. B. The project has been deployed. C. The project has been previewed. Answer A Question 16 What are the main features and capabilities of the app router? Note: There are 3 correct answers to this question. A. It can serve static content such as web pages, SAPUI5 or other client side code. B. It manages the authentication flows for the application. C. It acts as an authorization server. D. It downloads all necessary libraries. E. It is the central entry point of the application. Answer A B E Question 17 Your CAP project contains an entity called Books. You want to extend the Books entity with the managed aspect. You have already imported the aspect from the '[\@sap/cds/common]{.citation data-cites="sap/cds/common"}' package (see code). A. using {managed} from '[\@sap/cds/common]{.citation data-cites="sap/cds/common"}'; entity Books { key ID: UUID @(Core.computed: true); title: String; author: String; } B. Which is a valid way to extend the entity with the aspect? entity Books: managed { key ID UUID @(Core.Computed: true); title: String; author: String; } C. entity Books: { } key ID UUID @(Core.Computed: true); title: String; author: String; aspect managed Books{} D. entity Books: { key ID UUID (Core.Computed: true); title: String; author: String; aspect managed; } Answer B Question 18 You need to secure your application in the Cloud Foundry environment. In which file do you maintain routes during design time? A. xs-app.json B. mta.yml C. C xs-security.json D. C manifest.yml Answer A Question 19 Which actions are executed in Cloud Foundry under the Deploy & Execute phase when you run an application? Note: There are 2 correct answers to this question. A. Fueling generic runtimes to serve recurring tasks automatically B. Integrating the data with other SAP systems C. Declaratively capturing domain knowledge in CDS models D. Maximizing boilerplate code to real custom logic Answer A B Question 20 When you create an API Rule for a service, what is created automatically? A. A Helm Chart B. An Istio VirtualService C. A Kubernetes Deployment D. A Kubernetes Service Answer B Question 21 How do you debug a Node.js module in SAP Business Application Studio? A. Add the sap.hana.xs.debugger:Debugger role to the HDI container's \#RT user. B. Start the debugger from the CF command line interface and run the program. C. Set the enabled parameter to true in the section debugger of the xsengine.ini file. D. Attach the debugger to the application. Answer D Question 22 You have configured an approuter by creating the xs-app.json file in the approuter folder with the following content: What does this routes array tell the approuter? Note: There are 2 correct answers to this question. A. The files requested for /app will be put to the resources folder. B. All requests starting with /service will be forwarded to the CAP service. C. The files in the resources folder will be served for all requests to /app. D. All requests starting with /service will be targeted to the folder resources. Answer B C Question 23 What must you do first before you can get visibility into how a process is running? A. Save the version of the process you are working on. B. Circulate the process for pre-approvals before finalizing it. C. Prepare the process to be consumed by the visibility scenario. D. Purchase the visibility dashboard capabilities from the SAP store. Answer C Question 24 What is the correct sequence of steps when implementing Tenant-aware Persistence? A. Configure a data source Configure Hibernate for multi-tenancy Persisting and accessing the data Tenant onboarding and offboarding B. Configure a data source Configure Hibernate for multi-tenancy Tenant onboarding and offboarding Persisting and accessing the data C. Tenant onboarding and offboarding Configure a data source Configure Hibernate for multi-tenancy Persisting and accessing the data D. Configure Hibernate for multi-tenancy Configure a data source Tenant onboarding and offboarding Persisting and accessing the data Answer A Question 25 Which configuration steps are necessary to set process conditions in SAP Build Process Automation? Note: There are 3 correct answers to this question. A. Define If/Else criteria B. Map condition input to process content C. Add environment variables D. Define flow for different conditional paths E. Add a condition to the process Answer A D E Question 26 What are tasks of the approuter? Note: There are 3 correct answers to this question. A. Routing requests from the web browser to the provider of the UI service. B. Routing requests from the application to the SAP Launchpad service. C. Authorizing users for the CAP service and the provider of the UI service. D. Routing requests from the web browser to the CAP service. E. Forwarding user requests to the XSUAA service for authentication and authorization. Answer A D E Question 27 How do you run a CI/CD build manually without pushing changes to Git? A. Select Deploy from the project's context menu in the Project Explorer B. Submit Changes via Sync & Share action C. Select "Trigger a Build' in the CI/CD job's context menu D. Create and run"Build task\" in Task Explorer Answer C Question 28 When creating a CI/CD job, what does defining Source Control Management (SCM) credentials enable? A. Retrieving your project from SCM when its build is triggered B. Managing your SCM credentials C. Modifying your projectsource code automatically Answer A Question 29 Which of the following are features of Kubernetes? Note: There are 3 correct answers to this question. A. Immutability and self-healing B. Hardware virtualization C. Service Discovery and load balancing D. Operating system management Storage orchestration Answer A C D Question 30 You want to implement an event handler to show a console log once a supplier record is read. What is the correct syntax to implement this? A. const cds = require('[\@sap/cds]{.citation data-cites="sap/cds"}') module.exports = cds.service.impl(function () { const {Supplier) = this.entities() this after('each Supplier, row =\>{ console.log("Read Supplier: \${row.ID}') }) B. const cds = require("[\@sap/cds]{.citation data-cites="sap/cds"}') module.exports = cds.service.impl(function () { const {Supplier) = this.entities() this.on('each',Supplier, row =\>{ output.log("Read Supplier: \${row.ID}") }) }) C. const cds = require('[\@sap/cds]{.citation data-cites="sap/cds"}") module.exports = cdsservice.impl(function() { const {Supplier) = this.entities() this.on('each, Supplier, row =\> console.log("Read Supplier: \${row.ID}") }) D. const cds = require('[\@sap/cds]{.citation data-cites="sap/cds"}') module.exports = cds.service.impl(function() { const {Supplier) = this.entities() this after('each Supplier, row =\> { output.log("Read Supplier: \$\[row.ID}") }) }) Answer A Question 31 What can you define in the application router's design-time descriptor: xs-app.json? Note: There are 2 correct answers to this question. A. role-templates B. routes C. authentication Method D. modules Answer B C Question 32 Which identifier is used by the XSUAA service to distinguish applications and scopes? A. xsappname B. xs-security C. VCAP\_SERVICES D. tenant-mode Answer A Question 33 When would you choose SAP Fiori elements for app development? Note: There are 2 correct answers to this question. A. When standard floorplans are sufficient B. When unique floorplans are required C. When flexibility is more important than speed D. When speed is more important than flexibility Answer A D Question 34 After you create a business process in SAP Build Process Automation by giving it a name and identifier and clicking"Create,\" what can you add to it? Note: There are 3 correct answers to this question. A. Forms B. Decisions C. Packages D. Filters E. Automations Answer A B E Question 35 You have deployed a workload through a Kubernetes Deployment to SAP BTP, Kyma runtime. What must you do to expose the workload to the public internet? Note: There are 3 correct answers to this question. A. Add a readiness probe for your workload. B. Create an API Rule CR. C. Add a custom VirtualService CR to secure the service. D. Configure rules and accessStrategies. E. Create a service to group your pods. Answer B D E Question 36 Your company is using the SAP Authorization and Trust Management service in conjunction with the XSUAA service to authorize their applications. Where do you bundle your defined scopes in roletemplates? A. In an xs-security.json fille B. In a role-collection C. In an instance of the XSUAA service Answer A Question 37 You have set up the scopes and attributes that are needed to protect your application in the Cloud Foundry environment, but a user is unable to access your application. What might be the reason? A. Roles aren't assigned to the client application. B. Role collections aren't assigned to the user. C. Roles aren't assigned to the user. D. Role collections aren't assigned to the client application. Answer B Question 38 Which property of access control with [\@restrict]{.citation data-cites="restrict"} accepts all standard CDS CRUD events, as well as action and function names? A. To B. on C. where D. grant Answer B Question 39 What are some benefits of using Forms in SAP Build Process Automation? Note: There are 2 correct answers to this question. A. Streamline business process approvals easily B. Create documents for processes easily C. Create an interactive Ul easily D. Create and share email templates easily Answer A C Question 40 You have developed a CAP project and added the XSUAA security configuration. What information is stored in the xs-security.json file? Note: There are 2 correct answers to this question. A. role-templates B. users C. roles D. scopes Answer A D Question 41 To grant a user access to an application in an SAP BTP subaccount, what must you assign to this user? A. A role B. A role collection C. A role template Answer B Question 42 What are the benefits of using Side-by-Side Extensibility? Note: There are 3 correct answers to this question. A. It can be implemented in the same software stack as the extended application. B. It integrates with other cloud/non-cloud solutions when using SAP Business Technology Platform Integration services. C. It uses a complete development platform for creating extension applications. D. It provides support for hybrid scenarios. E. It uses In-App tools to adapt the standard UI. Answer B C D Question 43 You want a service to react to a specific event. What can you specify as in the statement srv. ()? Note: There are 2 correct answers to this question. A. end B. begin C. after D. before Answer C D Question 44 You develop custom SAP S/4HANA side-by-side extensions. For which development objects can you enable OData services? Note: There are 2 correct answers to this question. A. SAP-delivered business objects B. Custom CDS views C. Custom forms D. Custom business objects Answer A B Question 45 Your customer presents you with the following Ul requirements: Users need to work through a comparatively small set of items, one by one Multiple views of the same content One kind of data visualization Which SAP Fiori elements floorplan do you recommend they use? A. Object page B. C List report C. Analytical list page D. Worklist Answer D Question 46 What are some benefits of using the Istio service mesh in SAP BTP, Kyma runtime? Note: There are 3 correct answers to this question. A. Traffic management between services can be controlled. B. Distributed tracing can be used to trace request flows. C. Networking is decoupled from the application logic. D. Mutual TLS is supported for service-to-service communication. E. Networking is coupled to the application logic. Answer A B C Question 47 You have set up a pipeline in the SAP Continuous Integration and Delivery service with automated deployment. A build was initiated and failed. What do you check to find out which step of the pipeline failed? A. The webhook event receiver B. The webhook of your version control system C. The stages in the config.yml in the pipeline folder D. The stages of the failed job run Answer D Question 48 What do you use to update the Git history of the local file you are working on? A. Save B. Commit C. Stage D. Check out Answer B Question 49 How can you ensure that the value creation process continuously becomes safer and more resilient? A. Establish short and efficient feedback cycles. B. Develop tight software architectures. C. Optimize batch working style. D. Apply strict top-down software design. Answer A Question 50 What are key elements of reactive systems in the distributed environment of side-by-side extensions? Note: There are 2 correct answers to this question. A. Asynchronous interaction between a browser and a system B. Asynchronousmessage-driven communication between systems C. Loose coupling and isolation between systems D. Synchronous API communication between server and client Answer B C Question 51 Which of the following can be used to implement side-by-side extensions in the Cloud Foundry environment of SAP Business Technology Platform? Note: There are 2 correct answers to this question. A. ABAP B. Java C. Node. D. js ActionScript Answer B C Question 52 Which are characteristics of Continuous Delivery? Note: There are 3 correct answers to this question. A. No ambiguity in long term plans B. Fast recovery from defects C. Waterfall model D. Short release cycle E. High degree of automation Answer B D E Question 53 According to SAP CAP best practices, which error types should you NOT catch? Note: There are 2 correct answers to this question. A. Programming errors B. Rejections of promises C. Runtime errors D. Unexpected errors Answer B D Question 54 During application development, what are some principles of dealing with application errors? Note: There are 2 correct answers to this question. A. Use try/catch blocks sparingly B. Hide errors and continue silently C. Use as many try/catch blocks as possible D. Log unexpected errors Answer A D Question 55 What must you do to pull a container image from a private registry? Note: There are 2 correct answers to this question. A. Create a secret with the type "kubernetes.io/dockerconfigjson". B. Create a secret with the type "Opaque". C. Provide credentials in the pod manifest via "imagePullSecrets" in spec.template.metadata.annotations". D. Provide credentials in the pod manifest via"imagePullSecrets\" in spec.template.spec. Answer A D Question 56 What are some characteristics of CAP event handling? Note: There are 2 correct answers to this question. A. You can register only one event handler for a specific event. B. You must use the handler registration API srv.emit () to de-register event handlers. C. You can register multiple event handlers for each event phase. D. You can register event handlers with instances of cds.service to add custom logic. Answer C D Question 57 What are some of the capabilities of the SAP S/4HANA Virtual Data Model? Note: There are 2 correct answers to this question. A. It documents the relationships between entities. B. It allows direct access to underlying database tables. C. It provides a native UI to query the database tables. D. It enriches the entities with business semantics. Answer A D Question 58 Which of the following are use cases for SAP Business Technology Platform? Note: There are 3 correct answers to this question. A. Integrate apps, data, and processes. B. Build innovative digital apps. C. Extend cloud and on-premise apps. D. Build tightly coupled applications. E. Supports only Cloud scenarios with seamless interoperability with hyperscalers. Answer A B C Question 59 You want to register custom event handlers using instances of CAP Node.js SDK classes. Which one do you use? A. cds.Service B. cds.Request C. cds.Event Answer A Question 60 You develop an application using the Cloud Foundry environment. What are some steps to restrict access to this application? Note: There are 2 correct answers to this question. A. Set the Scopes element to the required scope name in the xs-app.json file. B. Set the role-name attribute of the Security-role element in the web.xml file to the required role template name. C. Define the role template name in the role-templates element of the xs-security.json file. D. Set the Scopes element to the required scope name in the xs-security.json file. Answer C D Question 61 Which formats are supported by OData? Note: There are 2 correct answers to this question. A. JSON B. XML-based AtomPub C. YAML D. XHTML Answer A B Question 62 Which of the following are the fundamental guidelines of a twelve-factor application? Note: There are 3 correct answers to this question. A. Cache management B. Traceability and reproducibility of all changes C. Security management ofsoftware layers D. Stateless and self-contained application processes E. Separation of application code and runtime configuration Answer B D E Question 63 What are some characteristics of logic flows? Note: There are 3 correct answers to this question. A. They are a sequence of events, actions, and functions B. They can be used to customize any kind of behavior in an app C. They first need to be modelled in Excel to ensure there is a result D. They always require a decision loop E. They can be simple or branching Answer A B E Question 64 What are some scenarios where you would use the SAP Cloud SDK in your application? Note: There are 2 correct answers to this question. A. You want to allow key users to create fields B. You need advanced features in your app such as resilience and caching C. You want to add new features to an existing Java application D. You want to build extensions using.NET Answer B C Question 65 Why are extensions on top of SAP S/4HANA Cloud NOT affected by the quarterly update cycle of SAP S/4HANA Cloud? A. The Virtual Data Model of SAP S/4HANA Cloud remains unchanged. B. The extension application runs only on SAP Business Technology Platform. C. The public interfaces of SAP S/4HANA represent a stable contract across the versions of SAP S/4HANA Cloud. D. SAP provides maintenance agreements to fix any extension issues. Answer C Question 66 What are some prerequisites for functions to receive events from Kyma Eventing? Note: There are 2 correct answers to this question. A. An API Rule with Oathkeeper AccessRules for GET-Requests B. The request to the function contains the event context C. A Subscription CR. D. A CloudEvents specification Answer C D Question 67 What feature of the pre-built content packages in SAP Build Process Automation increases the speed of development? Note: There are 2 correct answers to this question. A. Templated automations B. Predetermined decisions C. Enhanced user interface D. Plug-and-play availability Answer A D