Exam Description: The Splunk Core Certified Power User exam is the final
step towards completion of the Splunk Core Certified Power User certification.
This next-level certification exam is a 57-minute,
60-question assessment which evaluates a candidate’s knowledge and skills of
field aliases and calculated fields, creating tags and event types, using
macros, creating workflow actions and data
models, and normalizing data with the CIM. Candidates can expect an additional 3
minutes to review the exam agreement, for a total seat time of 60 minutes.
Candidates for this certification must complete the
lecture, hands-on labs, and quizzes that are part of the Splunk Fundamentals 2
course in order to be eligible for the certification exam. Splunk Core Certified
Power User is a required prerequisite to the
Splunk Enterprise Certified Admin certification track.
This course focuses on searching and reporting commands, as well as on the
creation of knowledge objects. Major topics include using transforming commands
and visualizations, filtering and formatting
results, correlating events, creating knowledge objects, using field aliases and
calculated fields, creating tags and event types, using macros, creating
workflow actions and data models, and normalizing data
with the Common Information Model (CIM).
The following content areas are general guidelines for the content to be
included on the exam: * Transforming commands and visualizations
* Filtering and formatting results
* Correlating events
* Knowledge objects
* Fields (field aliases, field extractions, calculated fields)
* Tags and event types
* Macros
* Workflow actions
* Data models
* Splunk Common Information Model (CIM)
The following topics are general guidelines for the content likely to be
included on the exam; however,
other related topics may also appear on any specific delivery of the exam. In
order to better reflect the
contents of the exam and for clarity purposes, the guidelines below may change
at any time without notice.
1.0 Using Transforming Commands for Visualizations 5% 1.1 Use the chart command
1.2 Use the timechart command
2.0 Filtering and Formatting Results 10% 2.1 The eval command
2.2 Use the search and where commands to filter results
2.3 The fillnull command
3.0 Correlating Events 15%
3.1 Identify transactions
3.2 Group events using fields
3.3 Group events using fields and time
3.4 Search with transactions
3.5 Report on transactions
3.6 Determine when to use transactions vs. stats
4.0 Creating and Managing Fields 10% 4.1 Perform regex field extractions using the Field Extractor (FX)
4.2 Perform delimiter field extractions using the FX
5.0 Creating Field Aliases and Calculated Fields 10% 5.1 Describe, create, and use field aliases
5.2 Describe, create, and use calculated fields
6.0 Creating Tags and Event Types 10% 6.1 Create and use tags
6.2 Describe event types and their uses
6.3 Create an event type
7.0 Creating and Using Macros 10% 7.1 Describe macros
7.2 Create and use a basic macro
7.3 Define arguments and variables for a macro
7.4 Add and use arguments with a macro
8.0 Creating and Using Workflow Actions 10% 8.1 Describe the function of GET, POST, and Search workflow actions
8.2 Create a GET workflow action
8.3 Create a POST workflow action
8.4 Create a Search workflow action
9.0 Creating Data Models 10% 9.1 Describe the relationship between data models and pivot
9.2 Identify data model attributes
9.3 Create a data model
10.0 Using the Common Information Model (CIM) Add-On 10% 10.1 Describe the Splunk CIM
10.2 List the knowledge objects included with the Splunk CIM Add-On
10.3 Use the CIM Add-On to normalize data
Sample Questions and Answers
Question: 1
Selected fields are displayed ______each event in the search results.
A. below
B. interesting fields
C. other fields
D. above
Answer: A
Question: 2 Search terms are not case sensitive.
A. True
B. False
Answer: A
Question: 3 These two searches will NOT return the same results. SEARCH 1:login failure
SEARCH 2: "login failure".
A. True
B. False
Answer: A
Question: 4 A space is an implied _____ in a search string.
A. OR
B. AND
C. ()
D. NOT
Answer: B
Question: 5 You can not specify a relative time range, such as 45 seconds ago, for a
search.
A. True
B. False
Answer: B
Students Reviews and Discussion
Bandile Ndlela Voted 2 weeks ago
Hello, with the new version released at 20th september, if this update all
questions?
upvoted 32 times
AGUIDI MAHAMAT Highly 4 months ago - Chad
95% of the questions are valid. Review the answers. Review discussions of why
some answers are inaccurate. This will provide better study and understanding of
content.
upvoted 32 times
Mahendrie Dwarika Most Recent 1 week - South Africa
More than 90% of the question on the exam were from here. Thxs Exam Topics
upvoted 5 times
valisetti ravishankar 3 weeks, 2 days ago - USA
Thank you so much for providing excellent study material. I prepared for my
350-501 exam and aced the exam with 950 marks
upvoted 7 times
Dos Santos Daniel 1 month, 1 week ago - Brazil Passed My Exam on 19th , 91 multiple choice question , 5 new question and 86
question in here.
upvoted 23 times
Course Description This course teaches you how to search and navigate in Splunk, use fields,
get statistics from your data, create reports, dashboards, lookups, and alerts.
Scenario-based examples and hands-on challenges will enable you to create robust
searches, reports, and charts. It will also introduce you to Splunk's datasets
features and Pivot interface.
Course Topics Introduction to Splunk's interface
Basic searching
Using fields in searches
Search fundamentals
Transforming commands
Creating reports and dashboards
Datasets
The Common Information Model (CIM)
Creating and using lookups
Scheduled Reports
Alerts
Using Pivot
Module 1 – Introduction Overview of Buttercup Games Inc.
Module 2 – What is Splunk? Splunk components
Installing Splunk
Getting data into Splunk
Module 3 – Introduction to Splunk's User Interface Understand the uses of Splunk
Define Splunk Apps
Customizing your user settings
Learn basic navigation in Splunk
Module 4 – Basic Searching
Run basic searches
Use autocomplete to help build a search
Set the time range of a search
Identify the contents of search results
Refine searches
Use the timeline
Work with events
Control a search job
Save search results
Module 5 – Using Fields in Searches
Understand fields
Use fields in searches
Use the fields sidebar
Module 6 – Search Language Fundamentals
Review basic search commands and general search practices
Examine the search pipeline
Specify indexes in searches
Use autocomplete and syntax highlighting
Use SPL search commands to perform searches:
Module 7 – Using Basic Transforming Commands
The top command
The rare command
The stats command
Module 8 – Creating Reports and Dashboards
Save a search as a report
Edit reports
Create reports that include visualizations such as charts
and tables
Create a dashboard
Add a report to a dashboard
Edit a dashboard
Module 9 – Datasets and the Common Information Model
Naming conventions
What are datasets?
What is the Common Information Model (CIM)?
Module 10 – Creating and Using Lookups
Describe lookups
Create a lookup file and create a lookup definition
Configure an automatic lookup
Module 12 - Using Pivot
Describe Pivot
Understand the relationship between data models and pivot
Select a data model object
Create a pivot report
Create an instant pivot from a search
Add a pivot report to a dashboard
Professional Google Workspace Administrator A Professional Google Workspace Administrator transforms business objectives
into tangible configurations, policies, and security practices as they relate to
users, content, and integrations. Through their understanding of their
organization's infrastructure, Google Workspace Administrators enable people to
work together, communicate, and access data in a secure and efficient manner.
Operating with an engineering and solutions mindset, they use tools, programming
languages, and APIs to automate workflows. They look for opportunities to
educate end users and increase operational efficiency while advocating for
Google Workspace and the Google toolset.
Related job roles: IT systems administrator, cloud solutions engineer,
collaboration engineer, systems engineer
The Professional Google Workspace Administrator exam assesses your ability
to: Plan and implement Google Workspace authorization and access
Manage user, resource, and shared drive life cycles
Control and configure Google Workspace services
Configure and manage endpoint access
Monitor organizational operations
Advance Google Workspace adoption and collaboration
About this certification exam
Length: 2 hours
Registration fee: $200 (plus tax where applicable)
Languages: English, Japanese
Exam format: 50-60 multiple choice and multiple select questions
Exam Delivery Method: a) Take the online-proctored exam from a remote location. Review the online
testing requirements.
b) Take the onsite-proctored exam at a testing center. Locate a test center near
you.
Prerequisites: None Recommended experience: 3+ years of industry experience including 1+ year
Google Workspace (formerly G Suite) administration experience.
Certification Renewal / Recertification: Candidates must recertify in order to
maintain their certification status. Unless explicitly stated in the detailed
exam descriptions, all Google Cloud certifications are valid for two years from
the date of certification. Recertification is accomplished by retaking the exam
during the recertification eligibility time period and achieving a passing
score. You may attempt recertification starting 60 days prior to your
certification expiration date.
Exam overview 1. Review the exam guide
The exam guide contains a complete list of topics that may be included on the
exam. Review the exam guide to determine if your skills align with the topics on
the exam.
1.2 Configure shared drives
1.3 Manage calendar resources
1.4 Configure and manage Google Groups for Business. Considerations include: ● Configuring Google Groups
● Adding users to groups
● Implications of current Google Workspace APIs to development efforts
● Using Apps Script to automate tasks
2.1 Implement and manage Google Workspace configurations based on corporate
policies. Considerations include: ● Managing company profile settings
● Modifying OU policies
● Managing rollout of new Google functionality to end users
● Troubleshooting Google Workspace services (e.g., performance issues for
services suite, apps for OUs)
● Scanning email with Data Loss Prevention (DLP)
● Managing content compliance rules
● Configuring security and data region
● Monitoring security health check
● Configuring security settings
● Creating security records
● Designing security integration and addressing objections
2.2 Demonstrate how to set up and configure Gmail. Considerations include: ● Enabling email delegation for an OU
● Managing Gmail archives
Section 3: Troubleshooting
3.1 Troubleshoot user reports of mail delivery problems
3.2 Collect log files or reports needed to engage with support
3.3 Classify and mitigate basic email attacks. Considerations Include: ● Configuring attachment compliance
● Configuring blocked senders
● Configuring email allowlist
● Configuring objectionable content
● Configuring phishing settings
● Configuring spam settings
● Managing admin quarantine
● Configuring Secure Transport compliance
● Configuring safety settings
3.4 Troubleshoot workspace access and performance
Section 4: Data access and authentication
4.1 Configure policies for all devices (mobile, desktop, Chrome OS, Meet,
Chrome Browser). Considerations include: ● Company-owned vs. personal devices
● Configuring personal device settings (e.g., password, Android, iOS, advanced,
device approvals, app management, insights
4.2 Configure and implement data governance policies
4.3 Describe how to manage third-party applications. Considerations include: ● Configuring third-party SSO for Google Workspace
● Integrating with third-party for provisioning
● Integrating third-party marketplace apps to specific OUs in Google Workspace
● Granting API access to applications that need access
● Revoking third-party author access
● Removing connected applications and sites
4.4 Configure user authentication. Considerations include: ● Basic user security controls (e.g., password length enforcement and 2-Step
Verification)
● Security aspects of identity, perimeter security, and data protection
Section 5: Support business initiatives
5.1 Use Vault to assist legal teams. Considerations Include: ● Setting retention rules (e.g., Setting retention rules, placing legal
holds, searching your domain's data by user account, OU, date, or keyword,
exporting data for additional processing and review, auditing reports)
● Holding and exporting data
● Running Vault audit reports
5.2 Interpret reports for the business
5.3 Describe how to import and export data
Sample Questions
QUESTION 1 Madeupcorp.com is in the process of migrating from a third-party email
system to Google
Workspace. The VP of Marketing is concerned that her team already administers
the corporate
AdSense, AdWords, and YouTube channels using their @madeupcorp.com email
addresses, but has
not tracked which users have access to which service. You need to ensure that
there is no disruption.
What should you do?
A. Run the Transfer Tool for Unmanaged users.
B. Use a Google Form to survey the Marketing department users.
C. Assure the VP that there is no action required to configure Google Workspace.
D. Contact Google Enterprise Support to identify affected users.
Answer: A
QUESTION 2 Your company has an OU that contains your sales team and an OU that contains
your market
research team. The sales team is often a target of mass email from legitimate
senders, which is
distracting to their job duties. The market research team also receives that
email content, but they
want it because it often contains interesting market analysis or competitive
intelligence. Constant
Contact is often used as the source of these messages. Your company also uses
Constant Contact for
your own mass email marketing. You need to set email controls at the Sales OU
without affecting
your own outgoing email or the market research OU.
What should you do?
A. Create a blocked senders list as the Sales OU that contains the mass email
sender addresses, but bypass this setting for Constant Contact emails.
B. Create a blocked senders list at the root level, and then an approved senders
list at the Market Research OU, both containing the mass email sender addresses.
C. Create a blocked senders list at the Sales OU that contains the mass email
sender addresses.
D. Create an approved senders list at the Market Research OU that contains the
mass email sender addresses.
Answer: C
QUESTION 3 Your organization is part of a highly regulated industry with a very high
turnover. In order to recycle
licenses for new employees and comply with data retention regulations, it has
been determined that
certain Google Workspace data should be stored in a separate backup environment.
How should you store data for this situation?
A. Use routing rules to dual-deliver mail to an on-premises SMTP server and
Google Workspace.
B. Write a script and use Google Workspace APIs to access and download user
data.
C. Use a third-party tool to configure secure backup of Google Workspace data.
D. Train users to use Google Takeout and store their archives locally.
Answer: C
QUESTION 4 Your organization is on Google Workspace Enterprise and allows for external
sharing of Google Drive
files to facilitate collaboration with other Google Workspace customers.
Recently you have had
several incidents of files and folders being broadly shared with external users
and groups. Your chief
security officer needs data on the scope of external sharing and ongoing
alerting so that external
access does not have to be disabled.
What two actions should you take to support the chief security officer's
request? (Choose two.)
A. Review who has viewed files using the Google Drive Activity Dashboard.
B. Create an alert from Drive Audit reports to notify of external file sharing.
C. Review total external sharing in the Aggregate Reports section.
D. Create a custom Dashboard for external sharing in the Security Investigation
Tool.
E. Automatically block external sharing using DLP rules.
Answer: BD
QUESTION 5 Your organization's Sales Department uses a generic user account (sales@company.com)
to manage
requests. With only one employee responsible for managing the departmental
account, you are
tasked with providing the department with the most efficient means to allow
multiple employees
various levels of access and manage requests from a common email address.
What should you do?
A. Configure a Google Group as an email list.
B. Delegate email access to department employees.
C. Configure a Google Group as a collaborative inbox.
D. Configure a Google Group, and set the Access Level to Announcement Only.
Answer: C
QUESTION 6 Your employer, a media and entertainment company, wants to provision Google
Workspace
Enterprise accounts on your domain for several world-famous celebrities.
Leadership is concerned
with ensuring that these VIPs are afforded a high degree of privacy. Only a
small group of senior
employees must be able to look up contact information and initiate collaboration
with the VIPs using
Google Workspace services such as Docs, Chat, and Calendar.
You are responsible for configuring to meet these requirements. What should you
do?
A. In the Users list, find the VIPs and turn off the User setting oeDirectory
Sharing.
B. Create a Group for the VIPs and their handlers, and set the Group Access
Level to Restricted.
C. In Directory Settings, disable Contact Sharing.
D. Create separate Custom Directories for the VIPs and regular employees.
Delivery Methods: SAP Certification
Level: Associate
Exam: 80 questions
Sample Questions: View more
Cut Score: 64%
Duration: 180 mins
Languages: English
Description The "SAP Certified Application Associate - SAP HANA Cloud Modeling"
certification exam verifies that the candidate possesses the required knowledge
in the SAP HANA Cloud QRC 01/2022 for the profile of an SAP HANA Cloud
application consultant. This certificate builds on the basic knowledge gained
through related SAP HANA Cloud training and preferably refined by practical
experience within an SAP HANA Cloud project team, whereby the consultant applies
acquired knowledge in this specialist area practically in projects. Furthermore,
the " SAP Certified Application Associate - SAP HANA Cloud Modeling "
certification exam verifies, that the candidate has the knowledge of
implementing calculation view graphical modeling and managing modeling content
in SAP Business Application Studio required by the profile of an SAP HANA Cloud
application consultant. The certificate issued for passing this exam will be
valid for 5 years.
Notes To ensure success, SAP recommends combining education courses and hands-on
experience to prepare for your certification exam as questions will test your
ability to apply the knowledge you have gained in training.
You are not allowed to use any reference materials during the certification test
(no access to online documentation or to any SAP system).
Topic Areas Please see below the list of topics that may be covered within this
certification and the courses that cover them. Its accuracy does not constitute
a legitimate claim; SAP reserves the right to update the exam content (topics,
items, weighting) at any time.
SAP HANA Cloud modeling basics > 12% Understanding SAP BTP and SAP HANA Cloud concepts and technologies of the
SAP HANA Cloud, SAP HANA database
HC100e (SAP Learning Hub only)
Build calculation views > 12% Creating all types of calculation views using nodes
HC300e (SAP Learning Hub only)
Manage and administer models > 12% Deploying modeling content, administration of calculation views, defining
new projects, namespaces, cross-container access, and working with Git
HC300e (SAP Learning Hub only)
Optimize performance of models > 12% Following modeling best practices and using performance monitoring tools
HC300e (SAP Learning Hub only)
Secure data models 8% - 12% Defining roles, analytic privileges and data privacy settings
HC300e (SAP Learning Hub only)
SQLScript in models 8% - 12% Implementing custom SQL in calculation views
HC300e (SAP Learning Hub only)
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in
the Certification Hub and can be booked with product code CER006. With CER006 –
SAP Certification in the Cloud, you can take up to six exams attempts of your
choice in one year – from wherever and whenever it suits you! Test dates can be
chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We
define them as "Topic Areas" and they can be found on each exam description. You
can find the number of questions, the duration of the exam, what areas you will
be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for
upcoming releases of the exam. These unscored items are randomly distributed
across the certification topics and are not counted towards the final score. The
total number of items of an examination as advertised in the Training Shop is
never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several
years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification
SAP Education has worked hard together with the Certification & Enablement
Influence Council to enhance the value of certification and improve the exams.
An increasing number of customers and partners are now looking towards
certification as a reliable benchmark to safeguard their investments.
Unfortunately, the increased demand for certification has brought with it a
growing number of people who to try and attain SAP certification through unfair
means. This ongoing issue has prompted SAP Education to place a new focus on
test security. Please take a look at our post to understand what you can do to
help to protect the credibility of your certification status.
Our Certification Test Security Guidelines will help you as test taker to
understand the testing experience. Security Guidelines
QUESTION 1
Which of the following data can be tracked using a change-history-enabled key
figure?
Note: There are 3 correct answers to this question.
A. Key figure type
B. Modified date
C. Scenario ID
D. Reason code
E. Attributes
Answer: B D E
QUESTION 2
Which of the following solutions are feasible when using the time series supply
optimizer?Note:
There are 3 correct answers to this question.
A. Violation of minimum resource utilization
B. Not adhering to maximum transport values
C. Not respecting production capacity
D. Violation of minimum aggregated inventory values
E. Not-fully satisfied demands
Answer: A D E
QUESTION 3
You want to display and edit data in different Units of Measure (UOM).Which of
the following must
you consider before you use the UOM?Note: There are 3 correct answers to this
question.
A. Units of measure are usually not time-dependent.
B. Unit of measure is an attribute of a master data type, such as Product.
C. Units of measure are usually not time-independent.
D. Analytics provide the user with the option to select the target unit of
measure.
E. Conversion to the target unit of measure is handled by SAP IBP Excel UI
Answer: A B D
QUESTION 4
Which pre-processing steps can be used to cleanse historical sales data before
generating a statistical
forecast in SAP IBP?Note: There are 2 correct answers to this question.
Questions and Answers 3
A. Substitute Missing with Mean or Median in Sales History
B. Intermittency Detection and Correction in Sales History
C. Promotion Sales Lift Elimination
D. Bias Detection and Correction in Sales History
Answer: A C
QUESTION 5
You have to be logged on to two separate SAP IBP tenants.What can help you
differentiate the
appearance of their user interfaces?Note: There are 2 correct answers to this
question.
A. Setting a separate theme for the Home page in the Web UI.
B. Add the system name and tenant information from the About section to the Home
page.
C. Defining a different default planning area via the User Preferences.
D. Having a different set of tiles in the Home group of apps.
C_GRCAC_13 SAP Certified Application Associate – SAP Access Control 12.0
Delivery Methods: SAP Certification
Level: Associate
Exam: 80 questions
Cut Score: 64%
Duration: 180 mins
Languages: English
Description The "SAP Certified Application Associate - SAP Access Control 12.0"
certification exam for essentials edition validates that the candidate possesses
core knowledge in the SAP Governance, Risk and Compliance line of business area
required of the consultant profile. This certification proves that the candidate
has an overall understanding and in‐depth technical skills to participate as a
member of an SAP Access Control implementation project team with a focus on SAP
Governance, Risk, and Compliance in a mentored role. This certification exam is
recommended as an entry level qualification. The certificate issued for passing
this exam will be valid for 5 years.
Notes To ensure success, SAP recommends combining education courses and hands-on
experience to prepare for your certification exam as questions will test your
ability to apply the knowledge you have gained in training.
You are not allowed to use any reference materials during the certification test
(no access to online documentation or to any SAP system).
Topic Areas Please see below the list of topics that may be covered within this
certification and the courses that cover them. Its accuracy does not constitute
a legitimate claim; SAP reserves the right to update the exam content (topics,
items, weighting) at any time.
MSMP Workflow > 12% Maintain paths and stages. Customize MSMP workflow. Maintain rules. Generate
versions. Maintain agents. Maintain notification variables and templates.
GRC300 (SAP ACCESS CONTROL 12.0)
User Provisioning > 12% Configure settings to provision users. Configure provisioning and field
mapping. Configure end user personalization form. Create and copy requests for
user access and organizational assignments. Configure parameters for periodic
access review requests. Configure password self-service.
GRC300 (SAP ACCESS CONTROL 12.0)
Access Risk Management > 12% Configure Access Risk Analysis. Maintain risks and critical access rules.
Guide customer to recognize and remediate risks. Create mitigating controls and
assignments based on customer requirements. Configure and monitor audit trails.
GRC300 (SAP ACCESS CONTROL 12.0)
Emergency Access Management > 12% Configure Emergency Access Management settings. Set up SAP Access Control
scheduled jobs. Plan for emergency access. Set up critical firefighting roles
and assignments based on customer requirements. Guide customer on how to monitor
emergency access.
GRC300 (SAP ACCESS CONTROL 12.0)
GRC Configuration Settings 8% - 12% Configure shared SAP Access Control settings. Synchronize objects in the SAP
Access Control repository. Schedule and view background jobs. Activate Business
Configuration (BC) sets. Describe the SAP Governance, Risk and Compliance
portfolio of solutions.
GRC100 (SAP GRC 12.0 SP14)
GRC300 (SAP ACCESS CONTROL 12.0)
Integration Framework 8% - 12% Create and maintain connectors. Configure shared SAP GRC settings.
GRC100 (SAP GRC 12.0 SP14)
GRC300 (SAP ACCESS CONTROL 12.0)
Business Role Management 8% - 12% Configure role methodology. Map roles to authorize access to specific
application functions. Create business roles to group related roles. Perform
Role Mass Maintenance operations. Use role mining to consolidate roles.
GRC300 (SAP ACCESS CONTROL 12.0)
Business Rule Framework 8% - 12% Define SAP Access Control workflow-related BRFplus rules. Create business
rules in the Business Rule Framework (BRF). Create BRFplus Applications for SAP
Access Control.
GRC300 (SAP ACCESS CONTROL 12.0)
Periodic Review < 8% Configure periodic review settings for periodic reviews, User Access Review,
SoD Review, Firefight ID Assignment Review.
GRC300 (SAP ACCESS CONTROL 12.0)
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in
the Certification Hub and can be booked with product code CER006. With CER006 –
SAP Certification in the Cloud, you can take up to six exams attempts of your
choice in one year – from wherever and whenever it suits you! Test dates can be
chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We
define them as "Topic Areas" and they can be found on each exam description. You
can find the number of questions, the duration of the exam, what areas you will
be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for
upcoming releases of the exam. These unscored items are randomly distributed
across the certification topics and are not counted towards the final score. The
total number of items of an examination as advertised in the Training Shop is
never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several
years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification SAP Education has worked hard together with the Certification & Enablement
Influence Council to enhance the value of certification and improve the exams.
An increasing number of customers and partners are now looking towards
certification as a reliable benchmark to safeguard their investments.
Unfortunately, the increased demand for certification has brought with it a
growing number of people who to try and attain SAP certification through unfair
means. This ongoing issue has prompted SAP Education to place a new focus on
test security. Please take a look at our post to understand what you can do to
help to protect the credibility of your certification status.
Our Certification Test Security Guidelines will help you as test taker to
understand the testing experience.
Sample Question QUESTION 1 SAP Governance, Risk and Compliance solutions are organized along 4 key
themes.
Which of the following are key themes?
Note: There are 3 correct answers to this question.
A. Business Integrity Screening
B. Access Governance
C. Cybersecurity and Data Protection
D. Enterprise Risk and Compliance
E. Audit Management
Answer: B, D, E
QUESTION 2 A Firefighter ID can be assigned to a firefighter using which of the
following methods?
A. By assigning access using an access request
B. By maintaining the assignment in the Governance, Risk and Compliance plug-in
on SAP Access Control
C. By assigning a Firefighter Role to the user on the target system
D. By maintaining the assignment in the Governance, Risk and Compliance plug-in
on the target system
Answer: A
QUESTION 3 Business Role Management provides the functionality to improve the role
management process.
Which of the following capabilities does it offer? Note: There are 2 correct
answers to this question.
A. Replacement of the PFCG role management transaction
B. Management of role definition transports
C. Enforcement of consistency in naming conventions
D. Identification of duplicate roles
Answer: C, D
QUESTION 4 You want to configure an approval workflow to require an approval for
updates to a defined function.
How do you enable this capability?
A. Flag the function for approval
B. Set the 1064 Function Maintenance parameter to YES
C. Configure the GRAC_FUNCTION_APPROVER agent
D. Activate the SAP_GRAC_FUNC_APPR MSMP Process ID
Answer: B
QUESTION 5 You want to create a transportable BRFplus Routing Rule for MSMP Process ID
SAP_GRAC_ACCESS_REQUEST
using transaction GRFNMW_DEV_RULES.
What must be done in order for your rule to be transportable?
A. You must assign a package to the Application after you generate the rule.
B. You must assign a package to the Function after you generate the rule.
C. You must assign a package to the Application before you generate the rule.
D. You must assign a package to the Function before you generate the rule.
Answer: C
QUESTION 6 You want to generate a BRFplus Initiator Rule that utilizes an expression of
type Decision Table for the
SAP_GRAC_ACCESS_REQUEST MSMP Process ID.
Which rule types can you use?
Note: There are 2 correct answers to this question.
A. Class Based Rule
B. Function Module Based Rule
C. BRFplus Flat Rule
D. BRFplus Rule
Answer: C, D
Student Feedback
Yes, there are other ways to prepare for your SAP Certified Application
Associate - SAP Access Control 12.0 exam besides using exam dumps or study
guides. Here are some suggestions that may help you prepare effectively:
Official SAP Training: Consider enrolling in an official SAP training program,
which will provide you with in-depth knowledge and hands-on experience with SAP
Access Control 12.0.
SAP Documentation: Familiarize yourself with SAP Access Control 12.0
documentation, including user guides, help manuals, and online resources.
Practice Tests: Take online practice tests that are specifically designed for
the SAP Certified Application Associate - SAP Access Control 12.0 exam. This
will help you gauge your understanding of the subject matter and identify areas
that need improvement.
Real-world experience: Try to gain practical experience by working with SAP
Access Control 12.0 in a real-world setting. This will help you better
understand how the software is used in real-life situations.
Study Groups: Consider joining a study group or online forum where you can
connect with others who are also preparing for the exam. You can share
information and help each other prepare.
Remember, preparation and hard work are key to passing the SAP Certified
Application Associate - SAP Access Control 12.0 exam. Good luck!
Exam ID : HPE6-A75
Exam type : Proctored
Exam duration : 1 hour 30 minutes
Delivery languages : English
Exam Details Ideal candidate The ideal candidate is a professional in Design, Mobility,
Switching, ClearPass and Security.
Exam contents This exam has 60 questions.
Here are types of questions to expect:
Multiple choice (multiple responses) Multiple choice (single response)
Advice to help you take this exam
Complete the training and review all course materials and documents before you
take the exam.
Exam items are based on expected knowledge acquired from job experience, an
expected level of industry standard knowledge, or other prerequisites (events,
supplemental materials, etc.).
Successful completion of the course or study materials alone, does not ensure
you will pass the exam.
Candidates must select and pass three sections. Each section must be passed
independently to pass the exam. Twenty items will deliver for each chosen
section. You will need to score 70% in each of the selected sections in order to
pass the entire exam. The passing score may differ from the new candidate exam.
The questions are specifically selected to support a 70% passing score.
Percentage of Exam
Design 10% Gather and analyze data, and document customer requirements for a
single-site campus environment with less than 1000 employees or subsystems of an
enterprise-wide network.
Given an outline of a customer's needs, determine the information required to
create a solution.
18% Evaluate the requirements for a single-site campus environment with less
than 1000 employees or subsystems of an enterprise-wide network, and select the
wired and wireless networking technologies for the design. Given a scenario, evaluate the customer requirements to identify gaps per a
gap analysis, and select components based on the analysis results.
Given a scenario, translate the business needs of the environment into technical
customer requirements.
31% Plan and design an Aruba solution per the customer requirements for a
single-site campus environment with less than 1000 employees or subsystems of an
enterprise-wide network. Given a scenario, select the appropriate products based on the customer
technical requirements.
Given the customer requirements, design the high-level architecture.
Given a customer scenario, explain how a specific technology or solution would
meet the customer requirements.
33% Produce a detailed design specification document for a single-site campus
environment with less than 1000 employees or subsystems of an enterprise-wide
network. Given a customer scenario, choose the appropriate components that should be
included on the BOM.
Given the customer requirements, determine the component details and document
the high-level design.
Given a customer scenario, determine and document a detailed network management
design.
Given a customer scenario, design and document a detailed network security
solution.
Given a customer scenario, design and document the logical and physical network
solutions.
Given the customer scenario and service level agreements, document the licensing
and maintenance requirements.
8% Recommend the solution to the customer. Given the customer's requirements, explain and justify the recommended
solution.
33% Mobility
20% Integrate and implement Aruba Mobile First architecture components and
explain their uses. Integrate components of the Aruba Mobile First Architecture.
Differentiate between standalone mode and Master Controller Mode (MCM) features
and recommend use cases.
Differentiate the use of packet forwarding modes (tunnel, decrypt-tunnel,
split-tunnel, and bridge).
Differentiate between redundancy methods, and describe the benefits of L2 and L3
clustering.
Explain Remote Access architectures and how to integrate the architectures.
Describe and differentiate advanced licensing features.
20% Configure and validate Aruba WLAN secure employee and guest solutions. • Configure Remote Access with Aruba Solutions such as RAP and VIA.
• Configure and deploy redundant controller solutions based upon a given design.
• Configure a Mesh WLAN.
38% Implement advanced services and security.
• Enable multicast DNS features to support discovery across VLAN boundaries.
• Configure role derivation, and explain and implement advanced role features.
• Configure an AAA server profile for a user or administrative access.
• Implement Mobility Infrastructure hardening features.
• Explain Clarity features and functions.
• Implement Voice WLAN based upon a given design.
• Configure primary zones and data zones to support MultiZone AP.
• Implement mobility (roaming) in an Aruba wireless environment.
• Implement tunneled node to secure ArubaOS switches.
10% Manage and monitor Aruba solutions. • Use AirWave to monitor an Aruba Mobility Master and Mobility Controller.
• Perform maintenance upgrades and operational maintenance.
12% Troubleshoot Aruba WLAN solutions. • Troubleshoot controller communication.
• Troubleshoot the WLAN.
• Troubleshoot Remote Access.
• Troubleshoot issues related to services and security.
• Troubleshoot role-based access, per-port based security and Airmatch.
Switching
15% Plan the wired network solution. Given a scenario with a design and/or customer requirements, determine an
appropriate implementation plan.
43% Install and configure the wired network solution. Install and Configure NetEdit
Given an implementation plan, explain how to physically configure the switches.
Given the implementation plan, explain how to configure Layer 2 technologies.
Given an implementation plan, explain how to configure and validate Layer 3
interfaces, services, routing protocols and overlays.
Explain multicast features and configuration concepts.
Explain Aruba Switch security features and configuration concepts.
Explain QoS Aruba Switch features and configuration concepts.
Explain Aruba solutions integration and configuration concepts.
22% Troubleshoot the wired network solution.
Given a scenario, identify a network failure (IP mismatch, VLAN mismatch,
hardware configuration or failure, port configuration).
Given an action plan to remediate an issue, determine the implications to the
network state.
Given a scenario, determine the cause of the performance problem (QoS issue,
Configuration issue HW and Software, end node).
20% Manage, maintain, optimize, and monitor the wired network solution. Given a scenario, determine a strategy to implement configuration management
(maintenance, auditing, backup, archiving).
Analyze data that represents the operational state of a network and determine
the appropriate action.
ClearPass
5% Intro to ClearPass
25% ClearPass for AAA
6% External Authentication
23% Guest
17% Onboard
6% Endpoint Analysis
8% Posture
5% Operations and Admin Users
5% Clustering and Redundancy
76% Protect and Defend Define security terminology
Describe PKI dependencies
Mitigate threats by using CPDI to identify traffic flows and apply tags and CPPM
to take actions based on tags
Explain methods and benefits of profiling
Explain how Aruba solutions apply to different security vectors
Explain Zero Trust Security in relation to Aruba solutions
Explain WIPS and WIDS, as well as describe the Aruba 9x00 Series
Describe log types and levels and use the CPPM ingress event engine to integrate
with 3rd party logging solutions
Explain dynamic segmentation, including its benefits and use cases
Explain VPN deployment types and IPsec concepts such as protocols, algorithms,
certificate-based authentication with IKE, and reauth intervals
Device hardening
Set up secure authentication and authorization of network infrastructure
managers
Secure L2 and L3 protocols
Secure WLAN
Deploy AAA for WLANs with ClearPass Policy Manager (CPPM)"
Define and apply advanced firewall policies (appRF, PEF, WIPS, WebCC, UTM)
Set up integration between the Aruba infrastructure and CPPM, allowing CPPM to
take action in response to events
Configure rogue AP detection and mitigation
Secure wired AOS-CX
Deploy AAA for wired devices with CPPM
Configure 802.1x Authentication for AP
Deploy dynamic segmentation
Deploy certificate-based authentication for users and devices
Set up integration between the Aruba infrastructure and CPPM, allowing CPPM to
take action in response to events
Secure the WAN
Understand that Aruba SD-Branch automates VPN deployment for the WAN
Design and deploy remote VPN with VIA
Endpoint classification
Deploy and apply endpoint classification to the device
Define endpoint classification methodology using active and passive methods
Define, deploy, and integrate ClearPass and CPDI
23% Analyze
Threat detection
Investigate Central alerts
Interpret packet captures
Recommend action based on the analysis of the Central alerts
Evaluate endpoint posture
Troubleshooting
Deploy and analyze Network Analytic Engine (NAE) scripts for monitoring and
correlation
Perform packet capture on Aruba infrastructure locally and using Central
Endpoint classification
Analyze endpoint classification data to identify risk
Analyze endpoint classification data on CPDI
1% Investigate
Forensics
Explain CPDI capabilities for showing network conversations on supported Aruba
devices
QUESTION 1 A company has AOS-Switches deployed at sites with inexperienced IT staff.
The main office network administrators want to track if configurations change on
branch switches.
What should be set up for this purpose?
A. an SNMP trap
B. an RMON alarm
C. an auto-config server
D. an lP SLA profile
Answer: A
QUESTION 2 A network administrator configures V5F settings on two Aruba 2930F switches.
The switches form two separate VSF fabrics. What should the administrator check?
A. that the domain ID matches on both switches
B. that each switch is assigned a unique VSF priority
C. that the switch with the lower priority has the lower member ID
D. that LLDP MAD is configured on both members
Answer: C
QUESTION 3 What is the purpose of the captive portal URL hash key on an AOS-Switch?
A. It authenticates guest users based on the password the users enter hi the
portal.
B. It encrypts and secures the RADIUS messages that the AOS-Switch sends to
ClearPass.
C. It does not let users alter the URL that redirects them to the portal.
D. It specifies the captive portal URL and conceals the setting in the config.
Answer: C
QUESTION 4 OSPF is configured on an AOS-Switch, and the network administrator sets the
router ID to 10.0.0.1.
The administrator wants to be able to reach the switch at this ID from any
location throughout the
OSPF system. The administrator also needs the router ID to De stable and
available,
even if some links on the switch fail.
What should the administrator do?
A. Make sure that 10.0.0.1 is the IP address on the VLAN with the lowest ID.
B. Configure 10.0.0.1 on a loopback interface, and enable OSPF on that
interface.
C. Configure 10.0.0.1 as a manual OSPF neighbor on each switch in the OSPF
system.
D. Configure 10.0.0.1 as a secondary IP address on the switch 00BM poet.
Exam ID : HPE2-N68
Exam type : Web based
Exam duration : 1 hour 30 minutes
Exam length : 40 questions
Passing score : 70%
Delivery languages : English, Japanese, Korean
Supporting resources : Using HPE Containers, Rev. 21.41
Additional study materials : Using HPE Containers Study Guide
Ideal candidateTypical candidates for this certification are HPE customers,
partners, and employees who configure, implement, support, and use HPE Ezmeral
Runtime Enterprise solutions.
The minimally qualified candidate will have basic industry standard knowledge
and skills related to containers. They will have some familiarity with the HPE
product portfolio.
Exam contents This exam has 40 questions.
Advice to help you take this exam
Complete the training and review all course materials and documents before you
take the exam.
Use HPE Press study guides and additional reference materials; study guides,
practice tests, and HPE books.
Exam items are based on expected knowledge acquired from job experience, an
expected level of industry standard knowledge, or other prerequisites (events,
supplemental materials, etc.).
Successful completion of the course or study materials alone, does not ensure
you will pass the exam.
Read the entire question and consider all options before you answer. If the
question includes an exhibit, study the exhibit and read the question again.
Select the answer that fully responds to the question. If the question asks for
more than one answer, select all correct answers. There is no partial credit.
Exam policies Click here to view exam security and retake policies.
This exam validates that you can describe, recommend, demonstrate, and configure
HPE Ezmeral Runtime Enterprise
solutions.
15% Explain foundational concepts necessary for understanding how the HPE
Ezmeral Runtime Enterprise Platform works 1.1 Explain container and container orchestration technologies
1.2 Explain big data technologies
1.3 Explain basic artificial intelligence (AI) and machine learning (ML)
concepts
33% Explain the HPE Ezmeral Runtime Enterprise model, features, and functions 2.1 Explain the benefits of the HPE Ezmeral Runtime Enterprise Platform
2.2 Identify use cases and deployment options for the HPE Ezmeral Runtime
Enterprise Platform
2.3 Describe the HPE Ezmeral Runtime Enterprise Platform architecture and key
features
21% Perform installation and setup processes 3.1 Plan for a successful installation
3.2 Perform the installation
3.3 Perform key setup tasks
3.4 Set up high availability
31% Configure various environments and demonstrate key capabilities 4.1 Create Kubernetes clusters and demonstrate deploying applications on
them
4.2 Create EPIC clusters and demonstrate creating projects and running jobs on
them
4.3 Monitoring and Alerting
QUESTION 1 What is one way that HPE Ezmeral ML Ops can help companies overcome their
AI/ML challenges?
A. It enforces isolation between notebook environments and training
environments.
B. It provides acceleration for machine learning algorithms to eliminate the
need for CPUs.
C. It provides notebook and training environments with many AI/ML libraries and
frameworks.
D. It provides a custom HPE Ezmeral library for deep learning and neural network
algorithms.
Answer: B
QUESTION 2 A company wants to use Ezmeral Data Fabric to provide storage to Kubernetes
Tenants on HPE
Ezmeral Container Platform. What deployment option should you choose?
A. Enable the embedded Data Fabric during the controller install. Create hybrid
Kubernetes clusters that use Data Fabric and non-Data Fabric nodes.
B. Enable the embedded Data Fabric during the controller install. Also create a
dedicated Data Fabric Kubernetes cluster.
C. Disable the embedded Data Fabric during the controller install. Create a
dedicated Data Fabric Kubernetes cluster.
D. Disable the embedded Data Fabric during the controller install. Create hybrid
Kubernetes clusters that use Data Fabric and non-Data Fabric nodes.
Answer: B
QUESTION 3 What Is a correct consideration for creating a Kubernetes Tenant on Ezmeral
Container Platform?
A. When you select that the Tenant owns the Kubernetes namespace, Tenant Admins
are given elevated access to the Kubernetes cluster.
B. When you set a quota for a resource, containers running on the Tenant are not
allowed to request or use resources beyond that level.
C. You must manually create a namespace for the Tenant on the Kubernetes cluster
before you create the Tenant.
D. When you set a quota for a resource, containers running on the Tenant are
guaranteed up to that level.
Answer: A
QUESTION 4 What is one requirement tor setting up Platform High Availability (HA)?
A. Gateway HA must be configured before you enable Platform HA.
B. The controller and the shadow controller must be on different subnets.
C. The controller and the gateway must be on the same subnet.
D. Any virtual clusters that have been created on EPIC workers must be deleted.
Answer: B
QUESTION 5 For which use case should you enable Istlo on a Kubernetes cluster?
A. Connecting a KubeDirector cluster to external Kubernetes components such as
secrets and config maps
B. Converting stateful applications such as Spark into a form that can run on
Kubernetes
C. Training ML algorithms to perform complex tasks such as clustering andimage
recognition
D. Creating more sophisticated routing rules for services running on the cluster