Exam Description: The Splunk Core Certified Power User exam is the final
step towards completion of the Splunk Core Certified Power User certification.
This next-level certification exam is a 57-minute,
60-question assessment which evaluates a candidate’s knowledge and skills of
field aliases and calculated fields, creating tags and event types, using
macros, creating workflow actions and data
models, and normalizing data with the CIM. Candidates can expect an additional 3
minutes to review the exam agreement, for a total seat time of 60 minutes.
Candidates for this certification must complete the
lecture, hands-on labs, and quizzes that are part of the Splunk Fundamentals 2
course in order to be eligible for the certification exam. Splunk Core Certified
Power User is a required prerequisite to the
Splunk Enterprise Certified Admin certification track.
This course focuses on searching and reporting commands, as well as on the
creation of knowledge objects. Major topics include using transforming commands
and visualizations, filtering and formatting
results, correlating events, creating knowledge objects, using field aliases and
calculated fields, creating tags and event types, using macros, creating
workflow actions and data models, and normalizing data
with the Common Information Model (CIM).
The following content areas are general guidelines for the content to be
included on the exam: * Transforming commands and visualizations
* Filtering and formatting results
* Correlating events
* Knowledge objects
* Fields (field aliases, field extractions, calculated fields)
* Tags and event types
* Macros
* Workflow actions
* Data models
* Splunk Common Information Model (CIM)
The following topics are general guidelines for the content likely to be
included on the exam; however,
other related topics may also appear on any specific delivery of the exam. In
order to better reflect the
contents of the exam and for clarity purposes, the guidelines below may change
at any time without notice.
1.0 Using Transforming Commands for Visualizations 5% 1.1 Use the chart command
1.2 Use the timechart command
2.0 Filtering and Formatting Results 10% 2.1 The eval command
2.2 Use the search and where commands to filter results
2.3 The fillnull command
3.0 Correlating Events 15%
3.1 Identify transactions
3.2 Group events using fields
3.3 Group events using fields and time
3.4 Search with transactions
3.5 Report on transactions
3.6 Determine when to use transactions vs. stats
4.0 Creating and Managing Fields 10% 4.1 Perform regex field extractions using the Field Extractor (FX)
4.2 Perform delimiter field extractions using the FX
5.0 Creating Field Aliases and Calculated Fields 10% 5.1 Describe, create, and use field aliases
5.2 Describe, create, and use calculated fields
6.0 Creating Tags and Event Types 10% 6.1 Create and use tags
6.2 Describe event types and their uses
6.3 Create an event type
7.0 Creating and Using Macros 10% 7.1 Describe macros
7.2 Create and use a basic macro
7.3 Define arguments and variables for a macro
7.4 Add and use arguments with a macro
8.0 Creating and Using Workflow Actions 10% 8.1 Describe the function of GET, POST, and Search workflow actions
8.2 Create a GET workflow action
8.3 Create a POST workflow action
8.4 Create a Search workflow action
9.0 Creating Data Models 10% 9.1 Describe the relationship between data models and pivot
9.2 Identify data model attributes
9.3 Create a data model
10.0 Using the Common Information Model (CIM) Add-On 10% 10.1 Describe the Splunk CIM
10.2 List the knowledge objects included with the Splunk CIM Add-On
10.3 Use the CIM Add-On to normalize data
Sample Questions and Answers
Question: 1
Selected fields are displayed ______each event in the search results.
A. below
B. interesting fields
C. other fields
D. above
Answer: A
Question: 2 Search terms are not case sensitive.
A. True
B. False
Answer: A
Question: 3 These two searches will NOT return the same results. SEARCH 1:login failure
SEARCH 2: "login failure".
A. True
B. False
Answer: A
Question: 4 A space is an implied _____ in a search string.
A. OR
B. AND
C. ()
D. NOT
Answer: B
Question: 5 You can not specify a relative time range, such as 45 seconds ago, for a
search.
A. True
B. False
Answer: B
Students Reviews and Discussion
Bandile Ndlela Voted 2 weeks ago
Hello, with the new version released at 20th september, if this update all
questions?
upvoted 32 times
AGUIDI MAHAMAT Highly 4 months ago - Chad
95% of the questions are valid. Review the answers. Review discussions of why
some answers are inaccurate. This will provide better study and understanding of
content.
upvoted 32 times
Mahendrie Dwarika Most Recent 1 week - South Africa
More than 90% of the question on the exam were from here. Thxs Exam Topics
upvoted 5 times
valisetti ravishankar 3 weeks, 2 days ago - USA
Thank you so much for providing excellent study material. I prepared for my
350-501 exam and aced the exam with 950 marks
upvoted 7 times
Dos Santos Daniel 1 month, 1 week ago - Brazil Passed My Exam on 19th , 91 multiple choice question , 5 new question and 86
question in here.
upvoted 23 times
Course Description This course teaches you how to search and navigate in Splunk, use fields,
get statistics from your data, create reports, dashboards, lookups, and alerts.
Scenario-based examples and hands-on challenges will enable you to create robust
searches, reports, and charts. It will also introduce you to Splunk's datasets
features and Pivot interface.
Course Topics Introduction to Splunk's interface
Basic searching
Using fields in searches
Search fundamentals
Transforming commands
Creating reports and dashboards
Datasets
The Common Information Model (CIM)
Creating and using lookups
Scheduled Reports
Alerts
Using Pivot
Module 1 – Introduction Overview of Buttercup Games Inc.
Module 2 – What is Splunk? Splunk components
Installing Splunk
Getting data into Splunk
Module 3 – Introduction to Splunk's User Interface Understand the uses of Splunk
Define Splunk Apps
Customizing your user settings
Learn basic navigation in Splunk
Module 4 – Basic Searching
Run basic searches
Use autocomplete to help build a search
Set the time range of a search
Identify the contents of search results
Refine searches
Use the timeline
Work with events
Control a search job
Save search results
Module 5 – Using Fields in Searches
Understand fields
Use fields in searches
Use the fields sidebar
Module 6 – Search Language Fundamentals
Review basic search commands and general search practices
Examine the search pipeline
Specify indexes in searches
Use autocomplete and syntax highlighting
Use SPL search commands to perform searches:
Module 7 – Using Basic Transforming Commands
The top command
The rare command
The stats command
Module 8 – Creating Reports and Dashboards
Save a search as a report
Edit reports
Create reports that include visualizations such as charts
and tables
Create a dashboard
Add a report to a dashboard
Edit a dashboard
Module 9 – Datasets and the Common Information Model
Naming conventions
What are datasets?
What is the Common Information Model (CIM)?
Module 10 – Creating and Using Lookups
Describe lookups
Create a lookup file and create a lookup definition
Configure an automatic lookup
Module 12 - Using Pivot
Describe Pivot
Understand the relationship between data models and pivot
Select a data model object
Create a pivot report
Create an instant pivot from a search
Add a pivot report to a dashboard
Professional Google Workspace Administrator A Professional Google Workspace Administrator transforms business objectives
into tangible configurations, policies, and security practices as they relate to
users, content, and integrations. Through their understanding of their
organization's infrastructure, Google Workspace Administrators enable people to
work together, communicate, and access data in a secure and efficient manner.
Operating with an engineering and solutions mindset, they use tools, programming
languages, and APIs to automate workflows. They look for opportunities to
educate end users and increase operational efficiency while advocating for
Google Workspace and the Google toolset.
Related job roles: IT systems administrator, cloud solutions engineer,
collaboration engineer, systems engineer
The Professional Google Workspace Administrator exam assesses your ability
to: Plan and implement Google Workspace authorization and access
Manage user, resource, and shared drive life cycles
Control and configure Google Workspace services
Configure and manage endpoint access
Monitor organizational operations
Advance Google Workspace adoption and collaboration
About this certification exam
Length: 2 hours
Registration fee: $200 (plus tax where applicable)
Languages: English, Japanese
Exam format: 50-60 multiple choice and multiple select questions
Exam Delivery Method: a) Take the online-proctored exam from a remote location. Review the online
testing requirements.
b) Take the onsite-proctored exam at a testing center. Locate a test center near
you.
Prerequisites: None Recommended experience: 3+ years of industry experience including 1+ year
Google Workspace (formerly G Suite) administration experience.
Certification Renewal / Recertification: Candidates must recertify in order to
maintain their certification status. Unless explicitly stated in the detailed
exam descriptions, all Google Cloud certifications are valid for two years from
the date of certification. Recertification is accomplished by retaking the exam
during the recertification eligibility time period and achieving a passing
score. You may attempt recertification starting 60 days prior to your
certification expiration date.
Exam overview 1. Review the exam guide
The exam guide contains a complete list of topics that may be included on the
exam. Review the exam guide to determine if your skills align with the topics on
the exam.
1.2 Configure shared drives
1.3 Manage calendar resources
1.4 Configure and manage Google Groups for Business. Considerations include: ● Configuring Google Groups
● Adding users to groups
● Implications of current Google Workspace APIs to development efforts
● Using Apps Script to automate tasks
2.1 Implement and manage Google Workspace configurations based on corporate
policies. Considerations include: ● Managing company profile settings
● Modifying OU policies
● Managing rollout of new Google functionality to end users
● Troubleshooting Google Workspace services (e.g., performance issues for
services suite, apps for OUs)
● Scanning email with Data Loss Prevention (DLP)
● Managing content compliance rules
● Configuring security and data region
● Monitoring security health check
● Configuring security settings
● Creating security records
● Designing security integration and addressing objections
2.2 Demonstrate how to set up and configure Gmail. Considerations include: ● Enabling email delegation for an OU
● Managing Gmail archives
Section 3: Troubleshooting
3.1 Troubleshoot user reports of mail delivery problems
3.2 Collect log files or reports needed to engage with support
3.3 Classify and mitigate basic email attacks. Considerations Include: ● Configuring attachment compliance
● Configuring blocked senders
● Configuring email allowlist
● Configuring objectionable content
● Configuring phishing settings
● Configuring spam settings
● Managing admin quarantine
● Configuring Secure Transport compliance
● Configuring safety settings
3.4 Troubleshoot workspace access and performance
Section 4: Data access and authentication
4.1 Configure policies for all devices (mobile, desktop, Chrome OS, Meet,
Chrome Browser). Considerations include: ● Company-owned vs. personal devices
● Configuring personal device settings (e.g., password, Android, iOS, advanced,
device approvals, app management, insights
4.2 Configure and implement data governance policies
4.3 Describe how to manage third-party applications. Considerations include: ● Configuring third-party SSO for Google Workspace
● Integrating with third-party for provisioning
● Integrating third-party marketplace apps to specific OUs in Google Workspace
● Granting API access to applications that need access
● Revoking third-party author access
● Removing connected applications and sites
4.4 Configure user authentication. Considerations include: ● Basic user security controls (e.g., password length enforcement and 2-Step
Verification)
● Security aspects of identity, perimeter security, and data protection
Section 5: Support business initiatives
5.1 Use Vault to assist legal teams. Considerations Include: ● Setting retention rules (e.g., Setting retention rules, placing legal
holds, searching your domain's data by user account, OU, date, or keyword,
exporting data for additional processing and review, auditing reports)
● Holding and exporting data
● Running Vault audit reports
5.2 Interpret reports for the business
5.3 Describe how to import and export data
Sample Questions
QUESTION 1 Madeupcorp.com is in the process of migrating from a third-party email
system to Google
Workspace. The VP of Marketing is concerned that her team already administers
the corporate
AdSense, AdWords, and YouTube channels using their @madeupcorp.com email
addresses, but has
not tracked which users have access to which service. You need to ensure that
there is no disruption.
What should you do?
A. Run the Transfer Tool for Unmanaged users.
B. Use a Google Form to survey the Marketing department users.
C. Assure the VP that there is no action required to configure Google Workspace.
D. Contact Google Enterprise Support to identify affected users.
Answer: A
QUESTION 2 Your company has an OU that contains your sales team and an OU that contains
your market
research team. The sales team is often a target of mass email from legitimate
senders, which is
distracting to their job duties. The market research team also receives that
email content, but they
want it because it often contains interesting market analysis or competitive
intelligence. Constant
Contact is often used as the source of these messages. Your company also uses
Constant Contact for
your own mass email marketing. You need to set email controls at the Sales OU
without affecting
your own outgoing email or the market research OU.
What should you do?
A. Create a blocked senders list as the Sales OU that contains the mass email
sender addresses, but bypass this setting for Constant Contact emails.
B. Create a blocked senders list at the root level, and then an approved senders
list at the Market Research OU, both containing the mass email sender addresses.
C. Create a blocked senders list at the Sales OU that contains the mass email
sender addresses.
D. Create an approved senders list at the Market Research OU that contains the
mass email sender addresses.
Answer: C
QUESTION 3 Your organization is part of a highly regulated industry with a very high
turnover. In order to recycle
licenses for new employees and comply with data retention regulations, it has
been determined that
certain Google Workspace data should be stored in a separate backup environment.
How should you store data for this situation?
A. Use routing rules to dual-deliver mail to an on-premises SMTP server and
Google Workspace.
B. Write a script and use Google Workspace APIs to access and download user
data.
C. Use a third-party tool to configure secure backup of Google Workspace data.
D. Train users to use Google Takeout and store their archives locally.
Answer: C
QUESTION 4 Your organization is on Google Workspace Enterprise and allows for external
sharing of Google Drive
files to facilitate collaboration with other Google Workspace customers.
Recently you have had
several incidents of files and folders being broadly shared with external users
and groups. Your chief
security officer needs data on the scope of external sharing and ongoing
alerting so that external
access does not have to be disabled.
What two actions should you take to support the chief security officer's
request? (Choose two.)
A. Review who has viewed files using the Google Drive Activity Dashboard.
B. Create an alert from Drive Audit reports to notify of external file sharing.
C. Review total external sharing in the Aggregate Reports section.
D. Create a custom Dashboard for external sharing in the Security Investigation
Tool.
E. Automatically block external sharing using DLP rules.
Answer: BD
QUESTION 5 Your organization's Sales Department uses a generic user account (sales@company.com)
to manage
requests. With only one employee responsible for managing the departmental
account, you are
tasked with providing the department with the most efficient means to allow
multiple employees
various levels of access and manage requests from a common email address.
What should you do?
A. Configure a Google Group as an email list.
B. Delegate email access to department employees.
C. Configure a Google Group as a collaborative inbox.
D. Configure a Google Group, and set the Access Level to Announcement Only.
Answer: C
QUESTION 6 Your employer, a media and entertainment company, wants to provision Google
Workspace
Enterprise accounts on your domain for several world-famous celebrities.
Leadership is concerned
with ensuring that these VIPs are afforded a high degree of privacy. Only a
small group of senior
employees must be able to look up contact information and initiate collaboration
with the VIPs using
Google Workspace services such as Docs, Chat, and Calendar.
You are responsible for configuring to meet these requirements. What should you
do?
A. In the Users list, find the VIPs and turn off the User setting oeDirectory
Sharing.
B. Create a Group for the VIPs and their handlers, and set the Group Access
Level to Restricted.
C. In Directory Settings, disable Contact Sharing.
D. Create separate Custom Directories for the VIPs and regular employees.
Delivery Methods: SAP Certification
Level: Associate
Exam: 80 questions
Sample Questions: View more
Cut Score: 64%
Duration: 180 mins
Languages: English
Description The "SAP Certified Application Associate - SAP HANA Cloud Modeling"
certification exam verifies that the candidate possesses the required knowledge
in the SAP HANA Cloud QRC 01/2022 for the profile of an SAP HANA Cloud
application consultant. This certificate builds on the basic knowledge gained
through related SAP HANA Cloud training and preferably refined by practical
experience within an SAP HANA Cloud project team, whereby the consultant applies
acquired knowledge in this specialist area practically in projects. Furthermore,
the " SAP Certified Application Associate - SAP HANA Cloud Modeling "
certification exam verifies, that the candidate has the knowledge of
implementing calculation view graphical modeling and managing modeling content
in SAP Business Application Studio required by the profile of an SAP HANA Cloud
application consultant. The certificate issued for passing this exam will be
valid for 5 years.
Notes To ensure success, SAP recommends combining education courses and hands-on
experience to prepare for your certification exam as questions will test your
ability to apply the knowledge you have gained in training.
You are not allowed to use any reference materials during the certification test
(no access to online documentation or to any SAP system).
Topic Areas Please see below the list of topics that may be covered within this
certification and the courses that cover them. Its accuracy does not constitute
a legitimate claim; SAP reserves the right to update the exam content (topics,
items, weighting) at any time.
SAP HANA Cloud modeling basics > 12% Understanding SAP BTP and SAP HANA Cloud concepts and technologies of the
SAP HANA Cloud, SAP HANA database
HC100e (SAP Learning Hub only)
Build calculation views > 12% Creating all types of calculation views using nodes
HC300e (SAP Learning Hub only)
Manage and administer models > 12% Deploying modeling content, administration of calculation views, defining
new projects, namespaces, cross-container access, and working with Git
HC300e (SAP Learning Hub only)
Optimize performance of models > 12% Following modeling best practices and using performance monitoring tools
HC300e (SAP Learning Hub only)
Secure data models 8% - 12% Defining roles, analytic privileges and data privacy settings
HC300e (SAP Learning Hub only)
SQLScript in models 8% - 12% Implementing custom SQL in calculation views
HC300e (SAP Learning Hub only)
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in
the Certification Hub and can be booked with product code CER006. With CER006 –
SAP Certification in the Cloud, you can take up to six exams attempts of your
choice in one year – from wherever and whenever it suits you! Test dates can be
chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We
define them as "Topic Areas" and they can be found on each exam description. You
can find the number of questions, the duration of the exam, what areas you will
be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for
upcoming releases of the exam. These unscored items are randomly distributed
across the certification topics and are not counted towards the final score. The
total number of items of an examination as advertised in the Training Shop is
never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several
years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification
SAP Education has worked hard together with the Certification & Enablement
Influence Council to enhance the value of certification and improve the exams.
An increasing number of customers and partners are now looking towards
certification as a reliable benchmark to safeguard their investments.
Unfortunately, the increased demand for certification has brought with it a
growing number of people who to try and attain SAP certification through unfair
means. This ongoing issue has prompted SAP Education to place a new focus on
test security. Please take a look at our post to understand what you can do to
help to protect the credibility of your certification status.
Our Certification Test Security Guidelines will help you as test taker to
understand the testing experience. Security Guidelines
QUESTION 1
Which of the following data can be tracked using a change-history-enabled key
figure?
Note: There are 3 correct answers to this question.
A. Key figure type
B. Modified date
C. Scenario ID
D. Reason code
E. Attributes
Answer: B D E
QUESTION 2
Which of the following solutions are feasible when using the time series supply
optimizer?Note:
There are 3 correct answers to this question.
A. Violation of minimum resource utilization
B. Not adhering to maximum transport values
C. Not respecting production capacity
D. Violation of minimum aggregated inventory values
E. Not-fully satisfied demands
Answer: A D E
QUESTION 3
You want to display and edit data in different Units of Measure (UOM).Which of
the following must
you consider before you use the UOM?Note: There are 3 correct answers to this
question.
A. Units of measure are usually not time-dependent.
B. Unit of measure is an attribute of a master data type, such as Product.
C. Units of measure are usually not time-independent.
D. Analytics provide the user with the option to select the target unit of
measure.
E. Conversion to the target unit of measure is handled by SAP IBP Excel UI
Answer: A B D
QUESTION 4
Which pre-processing steps can be used to cleanse historical sales data before
generating a statistical
forecast in SAP IBP?Note: There are 2 correct answers to this question.
Questions and Answers 3
A. Substitute Missing with Mean or Median in Sales History
B. Intermittency Detection and Correction in Sales History
C. Promotion Sales Lift Elimination
D. Bias Detection and Correction in Sales History
Answer: A C
QUESTION 5
You have to be logged on to two separate SAP IBP tenants.What can help you
differentiate the
appearance of their user interfaces?Note: There are 2 correct answers to this
question.
A. Setting a separate theme for the Home page in the Web UI.
B. Add the system name and tenant information from the About section to the Home
page.
C. Defining a different default planning area via the User Preferences.
D. Having a different set of tiles in the Home group of apps.
C_GRCAC_13 SAP Certified Application Associate – SAP Access Control 12.0
Delivery Methods: SAP Certification
Level: Associate
Exam: 80 questions
Cut Score: 64%
Duration: 180 mins
Languages: English
Description The "SAP Certified Application Associate - SAP Access Control 12.0"
certification exam for essentials edition validates that the candidate possesses
core knowledge in the SAP Governance, Risk and Compliance line of business area
required of the consultant profile. This certification proves that the candidate
has an overall understanding and in‐depth technical skills to participate as a
member of an SAP Access Control implementation project team with a focus on SAP
Governance, Risk, and Compliance in a mentored role. This certification exam is
recommended as an entry level qualification. The certificate issued for passing
this exam will be valid for 5 years.
Notes To ensure success, SAP recommends combining education courses and hands-on
experience to prepare for your certification exam as questions will test your
ability to apply the knowledge you have gained in training.
You are not allowed to use any reference materials during the certification test
(no access to online documentation or to any SAP system).
Topic Areas Please see below the list of topics that may be covered within this
certification and the courses that cover them. Its accuracy does not constitute
a legitimate claim; SAP reserves the right to update the exam content (topics,
items, weighting) at any time.
MSMP Workflow > 12% Maintain paths and stages. Customize MSMP workflow. Maintain rules. Generate
versions. Maintain agents. Maintain notification variables and templates.
GRC300 (SAP ACCESS CONTROL 12.0)
User Provisioning > 12% Configure settings to provision users. Configure provisioning and field
mapping. Configure end user personalization form. Create and copy requests for
user access and organizational assignments. Configure parameters for periodic
access review requests. Configure password self-service.
GRC300 (SAP ACCESS CONTROL 12.0)
Access Risk Management > 12% Configure Access Risk Analysis. Maintain risks and critical access rules.
Guide customer to recognize and remediate risks. Create mitigating controls and
assignments based on customer requirements. Configure and monitor audit trails.
GRC300 (SAP ACCESS CONTROL 12.0)
Emergency Access Management > 12% Configure Emergency Access Management settings. Set up SAP Access Control
scheduled jobs. Plan for emergency access. Set up critical firefighting roles
and assignments based on customer requirements. Guide customer on how to monitor
emergency access.
GRC300 (SAP ACCESS CONTROL 12.0)
GRC Configuration Settings 8% - 12% Configure shared SAP Access Control settings. Synchronize objects in the SAP
Access Control repository. Schedule and view background jobs. Activate Business
Configuration (BC) sets. Describe the SAP Governance, Risk and Compliance
portfolio of solutions.
GRC100 (SAP GRC 12.0 SP14)
GRC300 (SAP ACCESS CONTROL 12.0)
Integration Framework 8% - 12% Create and maintain connectors. Configure shared SAP GRC settings.
GRC100 (SAP GRC 12.0 SP14)
GRC300 (SAP ACCESS CONTROL 12.0)
Business Role Management 8% - 12% Configure role methodology. Map roles to authorize access to specific
application functions. Create business roles to group related roles. Perform
Role Mass Maintenance operations. Use role mining to consolidate roles.
GRC300 (SAP ACCESS CONTROL 12.0)
Business Rule Framework 8% - 12% Define SAP Access Control workflow-related BRFplus rules. Create business
rules in the Business Rule Framework (BRF). Create BRFplus Applications for SAP
Access Control.
GRC300 (SAP ACCESS CONTROL 12.0)
Periodic Review < 8% Configure periodic review settings for periodic reviews, User Access Review,
SoD Review, Firefight ID Assignment Review.
GRC300 (SAP ACCESS CONTROL 12.0)
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in
the Certification Hub and can be booked with product code CER006. With CER006 –
SAP Certification in the Cloud, you can take up to six exams attempts of your
choice in one year – from wherever and whenever it suits you! Test dates can be
chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We
define them as "Topic Areas" and they can be found on each exam description. You
can find the number of questions, the duration of the exam, what areas you will
be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for
upcoming releases of the exam. These unscored items are randomly distributed
across the certification topics and are not counted towards the final score. The
total number of items of an examination as advertised in the Training Shop is
never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several
years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification SAP Education has worked hard together with the Certification & Enablement
Influence Council to enhance the value of certification and improve the exams.
An increasing number of customers and partners are now looking towards
certification as a reliable benchmark to safeguard their investments.
Unfortunately, the increased demand for certification has brought with it a
growing number of people who to try and attain SAP certification through unfair
means. This ongoing issue has prompted SAP Education to place a new focus on
test security. Please take a look at our post to understand what you can do to
help to protect the credibility of your certification status.
Our Certification Test Security Guidelines will help you as test taker to
understand the testing experience.
Sample Question QUESTION 1 SAP Governance, Risk and Compliance solutions are organized along 4 key
themes.
Which of the following are key themes?
Note: There are 3 correct answers to this question.
A. Business Integrity Screening
B. Access Governance
C. Cybersecurity and Data Protection
D. Enterprise Risk and Compliance
E. Audit Management
Answer: B, D, E
QUESTION 2 A Firefighter ID can be assigned to a firefighter using which of the
following methods?
A. By assigning access using an access request
B. By maintaining the assignment in the Governance, Risk and Compliance plug-in
on SAP Access Control
C. By assigning a Firefighter Role to the user on the target system
D. By maintaining the assignment in the Governance, Risk and Compliance plug-in
on the target system
Answer: A
QUESTION 3 Business Role Management provides the functionality to improve the role
management process.
Which of the following capabilities does it offer? Note: There are 2 correct
answers to this question.
A. Replacement of the PFCG role management transaction
B. Management of role definition transports
C. Enforcement of consistency in naming conventions
D. Identification of duplicate roles
Answer: C, D
QUESTION 4 You want to configure an approval workflow to require an approval for
updates to a defined function.
How do you enable this capability?
A. Flag the function for approval
B. Set the 1064 Function Maintenance parameter to YES
C. Configure the GRAC_FUNCTION_APPROVER agent
D. Activate the SAP_GRAC_FUNC_APPR MSMP Process ID
Answer: B
QUESTION 5 You want to create a transportable BRFplus Routing Rule for MSMP Process ID
SAP_GRAC_ACCESS_REQUEST
using transaction GRFNMW_DEV_RULES.
What must be done in order for your rule to be transportable?
A. You must assign a package to the Application after you generate the rule.
B. You must assign a package to the Function after you generate the rule.
C. You must assign a package to the Application before you generate the rule.
D. You must assign a package to the Function before you generate the rule.
Answer: C
QUESTION 6 You want to generate a BRFplus Initiator Rule that utilizes an expression of
type Decision Table for the
SAP_GRAC_ACCESS_REQUEST MSMP Process ID.
Which rule types can you use?
Note: There are 2 correct answers to this question.
A. Class Based Rule
B. Function Module Based Rule
C. BRFplus Flat Rule
D. BRFplus Rule
Answer: C, D
Student Feedback
Yes, there are other ways to prepare for your SAP Certified Application
Associate - SAP Access Control 12.0 exam besides using exam dumps or study
guides. Here are some suggestions that may help you prepare effectively:
Official SAP Training: Consider enrolling in an official SAP training program,
which will provide you with in-depth knowledge and hands-on experience with SAP
Access Control 12.0.
SAP Documentation: Familiarize yourself with SAP Access Control 12.0
documentation, including user guides, help manuals, and online resources.
Practice Tests: Take online practice tests that are specifically designed for
the SAP Certified Application Associate - SAP Access Control 12.0 exam. This
will help you gauge your understanding of the subject matter and identify areas
that need improvement.
Real-world experience: Try to gain practical experience by working with SAP
Access Control 12.0 in a real-world setting. This will help you better
understand how the software is used in real-life situations.
Study Groups: Consider joining a study group or online forum where you can
connect with others who are also preparing for the exam. You can share
information and help each other prepare.
Remember, preparation and hard work are key to passing the SAP Certified
Application Associate - SAP Access Control 12.0 exam. Good luck!
Exam ID : HPE6-A75
Exam type : Proctored
Exam duration : 1 hour 30 minutes
Delivery languages : English
Exam Details Ideal candidate The ideal candidate is a professional in Design, Mobility,
Switching, ClearPass and Security.
Exam contents This exam has 60 questions.
Here are types of questions to expect:
Multiple choice (multiple responses) Multiple choice (single response)
Advice to help you take this exam
Complete the training and review all course materials and documents before you
take the exam.
Exam items are based on expected knowledge acquired from job experience, an
expected level of industry standard knowledge, or other prerequisites (events,
supplemental materials, etc.).
Successful completion of the course or study materials alone, does not ensure
you will pass the exam.
Candidates must select and pass three sections. Each section must be passed
independently to pass the exam. Twenty items will deliver for each chosen
section. You will need to score 70% in each of the selected sections in order to
pass the entire exam. The passing score may differ from the new candidate exam.
The questions are specifically selected to support a 70% passing score.
Percentage of Exam
Design 10% Gather and analyze data, and document customer requirements for a
single-site campus environment with less than 1000 employees or subsystems of an
enterprise-wide network.
Given an outline of a customer's needs, determine the information required to
create a solution.
18% Evaluate the requirements for a single-site campus environment with less
than 1000 employees or subsystems of an enterprise-wide network, and select the
wired and wireless networking technologies for the design. Given a scenario, evaluate the customer requirements to identify gaps per a
gap analysis, and select components based on the analysis results.
Given a scenario, translate the business needs of the environment into technical
customer requirements.
31% Plan and design an Aruba solution per the customer requirements for a
single-site campus environment with less than 1000 employees or subsystems of an
enterprise-wide network. Given a scenario, select the appropriate products based on the customer
technical requirements.
Given the customer requirements, design the high-level architecture.
Given a customer scenario, explain how a specific technology or solution would
meet the customer requirements.
33% Produce a detailed design specification document for a single-site campus
environment with less than 1000 employees or subsystems of an enterprise-wide
network. Given a customer scenario, choose the appropriate components that should be
included on the BOM.
Given the customer requirements, determine the component details and document
the high-level design.
Given a customer scenario, determine and document a detailed network management
design.
Given a customer scenario, design and document a detailed network security
solution.
Given a customer scenario, design and document the logical and physical network
solutions.
Given the customer scenario and service level agreements, document the licensing
and maintenance requirements.
8% Recommend the solution to the customer. Given the customer's requirements, explain and justify the recommended
solution.
33% Mobility
20% Integrate and implement Aruba Mobile First architecture components and
explain their uses. Integrate components of the Aruba Mobile First Architecture.
Differentiate between standalone mode and Master Controller Mode (MCM) features
and recommend use cases.
Differentiate the use of packet forwarding modes (tunnel, decrypt-tunnel,
split-tunnel, and bridge).
Differentiate between redundancy methods, and describe the benefits of L2 and L3
clustering.
Explain Remote Access architectures and how to integrate the architectures.
Describe and differentiate advanced licensing features.
20% Configure and validate Aruba WLAN secure employee and guest solutions. • Configure Remote Access with Aruba Solutions such as RAP and VIA.
• Configure and deploy redundant controller solutions based upon a given design.
• Configure a Mesh WLAN.
38% Implement advanced services and security.
• Enable multicast DNS features to support discovery across VLAN boundaries.
• Configure role derivation, and explain and implement advanced role features.
• Configure an AAA server profile for a user or administrative access.
• Implement Mobility Infrastructure hardening features.
• Explain Clarity features and functions.
• Implement Voice WLAN based upon a given design.
• Configure primary zones and data zones to support MultiZone AP.
• Implement mobility (roaming) in an Aruba wireless environment.
• Implement tunneled node to secure ArubaOS switches.
10% Manage and monitor Aruba solutions. • Use AirWave to monitor an Aruba Mobility Master and Mobility Controller.
• Perform maintenance upgrades and operational maintenance.
12% Troubleshoot Aruba WLAN solutions. • Troubleshoot controller communication.
• Troubleshoot the WLAN.
• Troubleshoot Remote Access.
• Troubleshoot issues related to services and security.
• Troubleshoot role-based access, per-port based security and Airmatch.
Switching
15% Plan the wired network solution. Given a scenario with a design and/or customer requirements, determine an
appropriate implementation plan.
43% Install and configure the wired network solution. Install and Configure NetEdit
Given an implementation plan, explain how to physically configure the switches.
Given the implementation plan, explain how to configure Layer 2 technologies.
Given an implementation plan, explain how to configure and validate Layer 3
interfaces, services, routing protocols and overlays.
Explain multicast features and configuration concepts.
Explain Aruba Switch security features and configuration concepts.
Explain QoS Aruba Switch features and configuration concepts.
Explain Aruba solutions integration and configuration concepts.
22% Troubleshoot the wired network solution.
Given a scenario, identify a network failure (IP mismatch, VLAN mismatch,
hardware configuration or failure, port configuration).
Given an action plan to remediate an issue, determine the implications to the
network state.
Given a scenario, determine the cause of the performance problem (QoS issue,
Configuration issue HW and Software, end node).
20% Manage, maintain, optimize, and monitor the wired network solution. Given a scenario, determine a strategy to implement configuration management
(maintenance, auditing, backup, archiving).
Analyze data that represents the operational state of a network and determine
the appropriate action.
ClearPass
5% Intro to ClearPass
25% ClearPass for AAA
6% External Authentication
23% Guest
17% Onboard
6% Endpoint Analysis
8% Posture
5% Operations and Admin Users
5% Clustering and Redundancy
76% Protect and Defend Define security terminology
Describe PKI dependencies
Mitigate threats by using CPDI to identify traffic flows and apply tags and CPPM
to take actions based on tags
Explain methods and benefits of profiling
Explain how Aruba solutions apply to different security vectors
Explain Zero Trust Security in relation to Aruba solutions
Explain WIPS and WIDS, as well as describe the Aruba 9x00 Series
Describe log types and levels and use the CPPM ingress event engine to integrate
with 3rd party logging solutions
Explain dynamic segmentation, including its benefits and use cases
Explain VPN deployment types and IPsec concepts such as protocols, algorithms,
certificate-based authentication with IKE, and reauth intervals
Device hardening
Set up secure authentication and authorization of network infrastructure
managers
Secure L2 and L3 protocols
Secure WLAN
Deploy AAA for WLANs with ClearPass Policy Manager (CPPM)"
Define and apply advanced firewall policies (appRF, PEF, WIPS, WebCC, UTM)
Set up integration between the Aruba infrastructure and CPPM, allowing CPPM to
take action in response to events
Configure rogue AP detection and mitigation
Secure wired AOS-CX
Deploy AAA for wired devices with CPPM
Configure 802.1x Authentication for AP
Deploy dynamic segmentation
Deploy certificate-based authentication for users and devices
Set up integration between the Aruba infrastructure and CPPM, allowing CPPM to
take action in response to events
Secure the WAN
Understand that Aruba SD-Branch automates VPN deployment for the WAN
Design and deploy remote VPN with VIA
Endpoint classification
Deploy and apply endpoint classification to the device
Define endpoint classification methodology using active and passive methods
Define, deploy, and integrate ClearPass and CPDI
23% Analyze
Threat detection
Investigate Central alerts
Interpret packet captures
Recommend action based on the analysis of the Central alerts
Evaluate endpoint posture
Troubleshooting
Deploy and analyze Network Analytic Engine (NAE) scripts for monitoring and
correlation
Perform packet capture on Aruba infrastructure locally and using Central
Endpoint classification
Analyze endpoint classification data to identify risk
Analyze endpoint classification data on CPDI
1% Investigate
Forensics
Explain CPDI capabilities for showing network conversations on supported Aruba
devices
QUESTION 1 A company has AOS-Switches deployed at sites with inexperienced IT staff.
The main office network administrators want to track if configurations change on
branch switches.
What should be set up for this purpose?
A. an SNMP trap
B. an RMON alarm
C. an auto-config server
D. an lP SLA profile
Answer: A
QUESTION 2 A network administrator configures V5F settings on two Aruba 2930F switches.
The switches form two separate VSF fabrics. What should the administrator check?
A. that the domain ID matches on both switches
B. that each switch is assigned a unique VSF priority
C. that the switch with the lower priority has the lower member ID
D. that LLDP MAD is configured on both members
Answer: C
QUESTION 3 What is the purpose of the captive portal URL hash key on an AOS-Switch?
A. It authenticates guest users based on the password the users enter hi the
portal.
B. It encrypts and secures the RADIUS messages that the AOS-Switch sends to
ClearPass.
C. It does not let users alter the URL that redirects them to the portal.
D. It specifies the captive portal URL and conceals the setting in the config.
Answer: C
QUESTION 4 OSPF is configured on an AOS-Switch, and the network administrator sets the
router ID to 10.0.0.1.
The administrator wants to be able to reach the switch at this ID from any
location throughout the
OSPF system. The administrator also needs the router ID to De stable and
available,
even if some links on the switch fail.
What should the administrator do?
A. Make sure that 10.0.0.1 is the IP address on the VLAN with the lowest ID.
B. Configure 10.0.0.1 on a loopback interface, and enable OSPF on that
interface.
C. Configure 10.0.0.1 as a manual OSPF neighbor on each switch in the OSPF
system.
D. Configure 10.0.0.1 as a secondary IP address on the switch 00BM poet.
Exam ID : HPE2-N68
Exam type : Web based
Exam duration : 1 hour 30 minutes
Exam length : 40 questions
Passing score : 70%
Delivery languages : English, Japanese, Korean
Supporting resources : Using HPE Containers, Rev. 21.41
Additional study materials : Using HPE Containers Study Guide
Ideal candidateTypical candidates for this certification are HPE customers,
partners, and employees who configure, implement, support, and use HPE Ezmeral
Runtime Enterprise solutions.
The minimally qualified candidate will have basic industry standard knowledge
and skills related to containers. They will have some familiarity with the HPE
product portfolio.
Exam contents This exam has 40 questions.
Advice to help you take this exam
Complete the training and review all course materials and documents before you
take the exam.
Use HPE Press study guides and additional reference materials; study guides,
practice tests, and HPE books.
Exam items are based on expected knowledge acquired from job experience, an
expected level of industry standard knowledge, or other prerequisites (events,
supplemental materials, etc.).
Successful completion of the course or study materials alone, does not ensure
you will pass the exam.
Read the entire question and consider all options before you answer. If the
question includes an exhibit, study the exhibit and read the question again.
Select the answer that fully responds to the question. If the question asks for
more than one answer, select all correct answers. There is no partial credit.
Exam policies Click here to view exam security and retake policies.
This exam validates that you can describe, recommend, demonstrate, and configure
HPE Ezmeral Runtime Enterprise
solutions.
15% Explain foundational concepts necessary for understanding how the HPE
Ezmeral Runtime Enterprise Platform works 1.1 Explain container and container orchestration technologies
1.2 Explain big data technologies
1.3 Explain basic artificial intelligence (AI) and machine learning (ML)
concepts
33% Explain the HPE Ezmeral Runtime Enterprise model, features, and functions 2.1 Explain the benefits of the HPE Ezmeral Runtime Enterprise Platform
2.2 Identify use cases and deployment options for the HPE Ezmeral Runtime
Enterprise Platform
2.3 Describe the HPE Ezmeral Runtime Enterprise Platform architecture and key
features
21% Perform installation and setup processes 3.1 Plan for a successful installation
3.2 Perform the installation
3.3 Perform key setup tasks
3.4 Set up high availability
31% Configure various environments and demonstrate key capabilities 4.1 Create Kubernetes clusters and demonstrate deploying applications on
them
4.2 Create EPIC clusters and demonstrate creating projects and running jobs on
them
4.3 Monitoring and Alerting
QUESTION 1 What is one way that HPE Ezmeral ML Ops can help companies overcome their
AI/ML challenges?
A. It enforces isolation between notebook environments and training
environments.
B. It provides acceleration for machine learning algorithms to eliminate the
need for CPUs.
C. It provides notebook and training environments with many AI/ML libraries and
frameworks.
D. It provides a custom HPE Ezmeral library for deep learning and neural network
algorithms.
Answer: B
QUESTION 2 A company wants to use Ezmeral Data Fabric to provide storage to Kubernetes
Tenants on HPE
Ezmeral Container Platform. What deployment option should you choose?
A. Enable the embedded Data Fabric during the controller install. Create hybrid
Kubernetes clusters that use Data Fabric and non-Data Fabric nodes.
B. Enable the embedded Data Fabric during the controller install. Also create a
dedicated Data Fabric Kubernetes cluster.
C. Disable the embedded Data Fabric during the controller install. Create a
dedicated Data Fabric Kubernetes cluster.
D. Disable the embedded Data Fabric during the controller install. Create hybrid
Kubernetes clusters that use Data Fabric and non-Data Fabric nodes.
Answer: B
QUESTION 3 What Is a correct consideration for creating a Kubernetes Tenant on Ezmeral
Container Platform?
A. When you select that the Tenant owns the Kubernetes namespace, Tenant Admins
are given elevated access to the Kubernetes cluster.
B. When you set a quota for a resource, containers running on the Tenant are not
allowed to request or use resources beyond that level.
C. You must manually create a namespace for the Tenant on the Kubernetes cluster
before you create the Tenant.
D. When you set a quota for a resource, containers running on the Tenant are
guaranteed up to that level.
Answer: A
QUESTION 4 What is one requirement tor setting up Platform High Availability (HA)?
A. Gateway HA must be configured before you enable Platform HA.
B. The controller and the shadow controller must be on different subnets.
C. The controller and the gateway must be on the same subnet.
D. Any virtual clusters that have been created on EPIC workers must be deleted.
Answer: B
QUESTION 5 For which use case should you enable Istlo on a Kubernetes cluster?
A. Connecting a KubeDirector cluster to external Kubernetes components such as
secrets and config maps
B. Converting stateful applications such as Spark into a form that can run on
Kubernetes
C. Training ML algorithms to perform complex tasks such as clustering andimage
recognition
D. Creating more sophisticated routing rules for services running on the cluster
Exam ID : HPE2-W07
Exam type : Web based
Exam duration : 1 hour 15 minutes
Exam length : 50 questions
Passing score : 70%
Delivery languages : Simplified Chinese, Korean, Japanese, German, Castilian
Spanish, Brazilian Portuguese, English
Supporting resources : Selling Aruba Products and Solutions, Rev. 20.41 : Ideal
candidateHPE Aruba channel partner sales professionals
Exam contents This exam has 50 questions.
Advice to help you take this exam
Complete the training and review all course materials and documents before you
take the exam.
Use HPE Press study guides and additional reference materials; study guides,
practice tests, and HPE books.
Exam items are based on expected knowledge acquired from job experience, an
expected level of industry standard knowledge, or other prerequisites (events,
supplemental materials, etc.).
Successful completion of the course or study materials alone, does not ensure
you will pass the exam.
Exam policies Click here to view exam security and retake policies.
This exam validates that you can:
Percentage of Exam Sections/Objectives
7% Industry and Technology Describe the transformation that is occurring at the network edge
Explain why customers need flexibility in the way they consume, manage, and fund
IT services
Explain how the transformation at the edge provides opportunities for customers
to improve their business outcomes
13% Aruba Vision and Strategy
Explain how Aruba’s edge-to-cloud strategy helps customers of all sizes create
and deliver unique experiences, innovate products and services, and drive
efficient operations
Describe how Aruba ESP's 4 attributes of AIOps, Zero Trust Security, Unified
Infrastructure and As-a-Service help enterprise and mid-sized organizations
drive new business outcomes
10% Financial and Consumption Flexibility Demonstrate to your customers that you understand why organizations are
moving toward as-a-Service consumption models
Describe Aruba ESP as-a-Service solutions and the benefits these services offer
Aruba customers and partners
Engage your customers with a value-oriented approach to have more effective
sales conversations
10% Aruba Cloud Solutions Explain the benefits Aruba Cloud Strategy offers mid-market and enterprise
customers
Explain the competitive advantages the Aruba Cloud Strategy gives you as an
Aruba Partner
Explain how Aruba Central features and solutions enable the Aruba Cloud Strategy
10% Aruba AIOps Describe how Aruba AIOps differentiates Aruba in the marketplace
Explain how Aruba AIOps helps organizations redefine outcomes so they can
deliver unique user experiences and innovative products and services
Explain key use cases for Aruba AIOps and position the appropriate solutions for
a particular use case
10% Aruba Zero Trust Security Describe how Aruba Zero Trust Security differentiates Aruba in the
marketplace
Describe how Aruba Zero Trust Security protects organizations from the edge to
the cloud, identifying every user and device connected to the network, and
implementing granular controls
Explain key use cases for Aruba Zero Trust Security and position the appropriate
solutions for a particular use case
13% Aruba Unified Infrastructure—Campus Access Describe how Aruba campus solutions differentiate Aruba in the marketplace
Describe how Aruba’s solutions are built on a single architecture that is
designed to deliver a consistent experience across wired and wireless
Explain key use cases for Aruba Unified Infrastructure and position the
appropriate campus solutions for a particular use case
10% Aruba Unified Infrastructure—Data Center Describe how Aruba Data Center solutions differentiate Aruba in the
marketplace
Describe how Aruba Data Center solutions automate management, monitoring, and
optimization
Explain key use cases for Aruba Unified Infrastructure in the data center and
position solutions for particular use cases
Describe the high-level competitive landscape and explain how Aruba partners can
win with Aruba Data Center solutions
10% Aruba Unified Infrastructure—SD-Branch Describe how Aruba SD-Branch solutions differentiate Aruba in the
marketplace
Describe how Aruba Unified Infrastructure simplifies management and improves
connectivity for distributed networks
Explain key use cases for Aruba Unified Infrastructure and position Aruba
SD-Branch solutions for a particular use case
Describe the high-level competitive landscape and explain how Aruba Partners can
win with Aruba SD-Branch solutions
7% Aruba Small Business Solutions Describe the unique needs of customers in the small business market
Describe Aruba’s Instant On portfolio and how it meets the unique needs of small
businesses
Position the appropriate Aruba solutions for a particular small business use
case
Describe the high-level competitive landscape and explain how you can win with
the Aruba Small Business portfolio
QUESTION 1 A customer asks what you mean when you say that Aruba Zero Trust Security
provides "contextbased" access policies. What should you explain?
A. The solution can give different access rights to the same user based on
additional factors, such as device type, time, and location.
B. The wizard for creating access policies shows different views based on
whether a business user or technical user is creating the policy.
C. The access policies are customized through a CLl, which creates a different
CU "context" per custom access control policy.
D. The solution's access control capabilities depend on the ClearPass Policy
Manager licensing level that the customer chooses.
Answer: D
QUESTION 2 What is one business benefit that Aruba Al insights helps customers to
achieve?
A. Providing location services to improve the user experience
B. Reducing help desk tickets and time spent on troubleshooting issues that can
hamper a business
C. Automatically profiling loT devices for better inventory
D. Enabling BYOD with a self-service portal for device provisioning
Answer: C
QUESTION 3 Where do analysts predict the majority of data will be generated by 2022?
A. The public cloud
B. On-prem data centers
C. Co-located data centers
D. The edge
Answer: A
QUESTION 4 Which two key opportunities does Aruba recommend that you pursue to sell
Aruba Unified Infrastructure in the campus?
A. 25GDE campus edge upgrades and 100GbE core upgrades
B. WI-FI 6 upgrades and transitions to Aruba ESP (Edge Services Platform)
C. Security overhauls and software-defined networking (SON) deployments
D. Firewall integrations and OWE deployments
ITIL® 4 Managing Professional Transition Designed for candidates who have already invested in ITIL v3, the ITIL 4
Managing Professional Transition module provides a straight-forward transition
path across to ITIL 4.
The Transition module enables candidates to gain the up-to-date skills and
knowledge needed to navigate the digital service economy, whilst recognising
their previous achievements. It consists of a mandatory 5-day training and exam
at the end of the course. Successful candidates are awarded the ITIL 4 Managing
Professional designation.
The Transition module covers the key concepts introduced in ITIL 4
Foundation, as well as important elements of the below modules from ITIL 4
Managing Professional: ITIL 4 Specialist Create, Deliver and Support
ITIL 4 Specialist Drive Stakeholder Value
ITIL 4 Specialist High Velocity IT
ITIL 4 Strategist Direct Plan and Improve.
To qualify for the transition module, candidates need to hold ITIL v3 Expert
or a minimum of 17 credits from ITIL v3 qualifications. Important Notice: Accredited training for the ITIL Managing Professional
modules is mandatory to enable full understanding of the core material.
Accredited training can only be purchased as part of a package that includes the
exam. All modules have ITIL 4 Foundation as a pre-requisite.
NOTE: This module in English has been discontinued on 30 September 2022, and
this module in German will be discontinued on 31 March 2023. After that date,
this module will only be available in Japanese. Candidates who want to start
their ITIL 4 journey should first ITIL 4 Foundation.
Find out more about the PeopleCert examination process Take your exam of your comfort of exam or office. Learn more about
PeopleCert Online Proctoring, the secure and stress-free way to sit your exam.
Get the Step-by-Step Guidelines on how to take your online exam with PeopleCert
Online Proctoring here.
What else is included in my exam purchase: 1 month free MyAxelos subscription: MyAxelos is PeopleCert's exclusive
membership programme that helps you prepare for your exam and continuously stay
up to date with the ITIL and ProPath frameworks.
Inside MyAxelos, you will find: Industry news and best practices, articles and white papers by
subject-matter experts
Case studies focusing on industry leaders and best practices
Exam preparation materials, exam guidance videos, and certified expert content
Digital badges to share your achievement with the world
Tools that help you keep your certificate valid
Above all MyAxelos is a thriving and supportive community of industry
professionals ready to provide networking opportunities and insightful career
development advice. Learn more here.
PREREQUISITES BOOKING AN EXAM WHERE PREREQUISITES APPLY
Please ensure that before you book an exam where a prerequisite is required, you
hold verified proof of completion of that prerequisite (i.e. certificate, or
letter from AXELOS or former Examination Institute confirming you hold a current
certification). Your examination results will be withheld until the correct
prerequisite is provided to PeopleCert. If you are unable to provide the
required prerequisite, then you will need to successfully complete the
prerequisite before the higher-level exam result is released.
ITIL® Foundation Certificate in IT Service Management
Training through an Accredited Training Organisation
A minimum of 15 credits
Training through an Accredited Training Organisation
ITIL® Foundation Certificate in IT Service Management
ITIL® Foundation Certificate in IT Service Management
Training through an Accredited Training Organisation
QUESTION 1 An organization's lead times and the flow of tasks across value streams are
being impacted because tasks often sit waiting in queues.
Which technique can be used to overcome this challenge?
A. Clarifying definition of done'
B. Introducing a push system
C. Increasing batch sizes
D. Limiting work-in-progress
Answer: D
QUESTION 2 Which value chain activity ensures that products deliver stakeholder
expectations for quality?
A. Design and transition
B. Engage
C. Obtain/build
D. Plan
Answer: A
QUESTION 3 An organization is undergoing a significant cultural change as a result of
introducing Agile and DevOps practices.
How can managers use Toyota Kata to help employees adjust to these different
ways of working?
A. By encouraging the practicing of routines to unlearn old habits and learn new
ones
B. By creating detailed plans that predetermine how to approach large changes
C. By making hard decisions for the teams and providing step-by-step guidance
D. By encouraging widespread changes that involve the teams starting from
scratch
Answer: A
QUESTION 4 Which statement about user communities is CORRECT?
A. User communities are created by service providers to investigate the cause of
problems
B. Communities set up by users may be recognized and supported by service
providers
C. Informal user communities should be disbanded and merged into official groups
D. Every user community should have at least one super-user
SAP Certified Technology Professional - System Security Architect Sub-solution: Administration
Delivery Methods: SAP Certification
Level: Professional
Exam: 80 questions
Sample Questions: View more
Cut Score: 66%
Duration: 180 mins
Languages: English
Description The "SAP Certified Technology Professional - System Security Architect"
certification exam verifies that the candidate possesses the depth of knowledge
required in the areas of SAP System Security and Authorization. This certificate
proves that the candidate has an advanced understanding within the Technology
Consultant profile and is able to apply these skills practically and provide
guidance in SAP project implementations in the role of a SAP Security Architect.
Furthermore, the holder of this certification is capable to review and evaluate
the security level of complex on-premise, cloud and hybrid system architectures.
Notes To ensure success, SAP recommends combining education courses and hands-on
experience to prepare for your certification exam.
You are not allowed to use any reference materials during the certification test
and there will be no access to online documentation or to any SAP system.
Topic Areas Please see below the list of topics that may be covered within this
certification and the courses that cover them. Its accuracy does not constitute
a legitimate claim; SAP reserves the right to update the exam content (topics,
items, weighting) at any time.
Authorization Concept for SAP S/4HANA > 12% Describe and implement the authorization concept for SAP S/4HANA
ADM945
----- OR -----
TSEC10
Authorization, Security and Scenarios in SAP HANA > 12% Explain authorization, security and scenarios in SAP HANA
HA940 (SAP HANA 2.0 SPS05)
SAP Netweaver Application Server and Infrastructure Security > 12% Describe and implement security in a SAP NetWeaver Application Server and
related infrastructure components
ADM900
ADM960 (SAP NETWEAVER 7.55)
----- OR -----
TSEC10
ADM960 (SAP NETWEAVER 7.55)
Security Monitoring and Security Auditing > 12% Monitor security and troubleshoot security issues using Solution Manager,
security audits, traces and logs.
ADM900
ADM950 (SEE COURSE DETAIL)
ADM960 (SAP NETWEAVER 7.55)
----- OR -----
TSEC10
ADM960 (SAP NETWEAVER 7.55)
Authorization Concept for SAP Business Suite 8% - 12% Describe and implement the authorization concept for SAP Business Suite
ADM940 (SAP S/4HANA 1909)
----- OR -----
TSEC10
Secure an SAP System 8% - 12% Explain how to secure an SAP system and conduct security checks
ADM900
ADM950 (SEE COURSE DETAIL)
ADM960 (SAP NETWEAVER 7.55)
----- OR -----
TSEC10
ADM960 (SAP NETWEAVER 7.55)
SAP Cloud Platform Security 8% - 12% Explain security and scenarios in SAP Cloud platform
SECCL1 (SAP S/4HANA 2020)
Access Governance and Compliance in SAP < 8% Describe the security goals, data privacy goverance, access goverance
solutions and tools in SAP.
ADM900
ADM910 (SAP S/4HANA 1909)
----- OR -----
TSEC10
User Administration and Identity Lifecycle Management in SAP < 8%
Manage users in SAP systems
ADM900
ADM940 (SAP S/4HANA 1909)
ADM910 (SAP S/4HANA 1909)
----- OR -----
TSEC10
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in
the Certification Hub and can be booked with product code CER006. With CER006 –
SAP Certification in the Cloud, you can take up to six exams attempts of your
choice in one year – from wherever and whenever it suits you! Test dates can be
chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We
define them as "Topic Areas" and they can be found on each exam description. You
can find the number of questions, the duration of the exam, what areas you will
be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for
upcoming releases of the exam. These unscored items are randomly distributed
across the certification topics and are not counted towards the final score. The
total number of items of an examination as advertised in the Training Shop is
never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several
years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification
SAP Education has worked hard together with the Certification & Enablement
Influence Council to enhance the value of certification and improve the exams.
An increasing number of customers and partners are now looking towards
certification as a reliable benchmark to safeguard their investments.
Unfortunately, the increased demand for certification has brought with it a
growing number of people who to try and attain SAP certification through unfair
means. This ongoing issue has prompted SAP Education to place a new focus on
test security. Please take a look at our post to understand what you can do to
help to protect the credibility of your certification status.
Our Certification Test Security Guidelines will help you as test taker to
understand the testing experience.
QUESTION 1 User1 grants role 1 to user2. Who can revoke role 1 role from user2?
A. The system OBA user
B. The owner of role 1
C. Only User1
D. Any user with the 'ROLE ADMIN' database role
Answer: D
QUESTION 2 Why should you create multiple dispatchers in SAP Identity Management? Note:
There are 2 correct answers to this question.
A. To accommodate scalability
B. To support fail-over scenarios
C. To handle password provisioning
D. To handle special network access requirements
Answer: A, D
QUESTION 3 What is required when you configure the PFCG role for an end-user on the
front-end server?
Note: There are 2 correct answers to this question.
A. The catalog assignment for the start authorization
B. The S_RFC authorization object for the OData access
C. The Fiori Launchpad designer assignment
D. The group assignment to display it in the Fiori Launchpad
Answer: A, D
QUESTION 4 In your system, you have a program which calls transaction
A. Users with access to this program can still execute transaction A without
explicit authorizations
given to this transaction. How do you prevent the access of users to the
transaction A from within the program?
A. Make sure you do NOT assign transact on A to the authorization object S_TCODE
in the role that you assign to the unauthorized users.
B. Maintain SE93 with authorization objects for transact on A.
C. Maintain the check indicator in table TCDCOUPLES
D. Ensure that transact on A is NOT assigned into the same program authorization
group
Answer: B
QUESTION 5
The SSO authentication using X.509 client certificates is configured. Users
complain that they can't
log in to the back-end system. The trace file shows the following error message:
"HTTP request
[2] Reject untrusted forwarded certificate". What is missing in the
configuration? Note: There are
2 correct answers to this question.
A. On the back-end, the profile parameter icm/HTTPS/verify client must NOT be
set to 0
B. On the web-dispatcher, the SAPSSLS.pse must be signed by a trusted
certification authority
C. On the web-dispatcher, the profile parameter icm/HTTPS/verify_client must be
set to 0
D. The web dispatcher's SAPSSLC.PSE certificate must be added to the trusted
reverse proxies list in
icm/trusted_reverse_proxy_<xx>
SAP Certified Application Associate - Master Data Governance
Sub-solution: Master Data Governance
Delivery Methods: SAP Certification
Level: Associate
Exam: 80 questions
Sample Questions: View more
Cut Score: 59%
Duration: 180 mins
Languages: German, English
Description The SAP Certified Application Associate - SAP Master Data Governance
certification exam validates that the candidate possesses the fundamental and
core knowledge required of the application consultant profile. This
certification proves that the candidate has an overall understanding and
in‐depth technical skills to participate as a member of a project team in a
mentored role. This certification exam is recommended as an entry level
qualification.
Notes
To ensure success, SAP recommends combining education courses and hands-on
experience to prepare for your certification exam as questions will test your
ability to apply the knowledge you have gained in training.
You are not allowed to use any reference materials during the certification test
(no access to online documentation or to any SAP system).
Topic Areas Please see below the list of topics that may be covered within this
certification and the courses that cover them. Its accuracy does not constitute
a legitimate claim; SAP reserves the right to update the exam content (topics,
items, weighting) at any time.
MDG Overview and Architecture > 12% Provide an overview of the SAP Master Data Governance solution and it's
technical components. Describe the SAP Master Data Governance architecture,
execute data modeling and change request capabilities.
MDG100 (SAP S/4HANA 1909)
Consolidation and Mass Processing > 12% Implement SAP Master Data Governance consolidation by defining the usage of
match groups, scoring and best records calculations, and analytics. Define mass
processing scope and processing.
MDG100 (SAP S/4HANA 1909)
Domain Specific Capabilities > 12% Use Financial domain-specifica capabilities to trigger and monitor
replication of financial master data. Describe and apply the Business Partner
Model. Verify and adjust the Material Data Model, configure SAP Master Data
Governance-Material domain specific settings, and define multi-object
processing.
MDG100 (SAP S/4HANA 1909)
MDG Change Request process implementation 8% - 12% Define the Change Request process including workflow setup.
MDG200 (SAP S/4HANA 1909)
Data Quality & Analytics 8% - 12% Implement data validation through configuration of search, activation of
side panel, and analytics.
MDG100 (SAP S/4HANA 1909)
MDG200 (SAP S/4HANA 1909)
Data replication and key mapping 8% - 12% Configure, execute, and monitor data replication.
MDG200 (SAP S/4HANA 1909)
Custom Objects and Solution Extensions 8% - 12% Extend and define your own Data Models, and use Solution Extensions by
Utopia.
MDG200 (SAP S/4HANA 1909)
MDG Project Execution < 8% Activate SAP Master Data Governance and define customizing exchange for
typical MDG landscapes.
MDG200 (SAP S/4HANA 1909)
Data Load and Import < 8% Define data download, upload, and importing.
MDG100 (SAP S/4HANA 1909)
General Information
Exam Preparation All SAP consultant certifications are available as Cloud Certifications in
the Certification Hub and can be booked with product code CER006. With CER006 –
SAP Certification in the Cloud, you can take up to six exams attempts of your
choice in one year – from wherever and whenever it suits you! Test dates can be
chosen and booked individually.
Each specific certification comes with its own set of preparation tactics. We
define them as "Topic Areas" and they can be found on each exam description. You
can find the number of questions, the duration of the exam, what areas you will
be tested on, and recommended course work and content you can reference.
Certification exams might contain unscored items that are being tested for
upcoming releases of the exam. These unscored items are randomly distributed
across the certification topics and are not counted towards the final score. The
total number of items of an examination as advertised in the Training Shop is
never exceeded when unscored items are used.
Please be aware that the professional- level certification also requires several
years of practical on-the-job experience and addresses real-life scenarios.
For more information refer to our SAP Certification FAQs.
Safeguarding the Value of Certification SAP Education has worked hard together with the Certification & Enablement
Influence Council to enhance the value of certification and improve the exams.
An increasing number of customers and partners are now looking towards
certification as a reliable benchmark to safeguard their investments.
Unfortunately, the increased demand for certification has brought with it a
growing number of people who to try and attain SAP certification through unfair
means. This ongoing issue has prompted SAP Education to place a new focus on
test security. Please take a look at our post to understand what you can do to
help to protect the credibility of your certification status.
Our Certification Test Security Guidelines will help you as test taker to
understand the testing experience.
Security Guidelines
QUESTION 1 What are the advantages of HANA-Based Search in MDG?
A. The user can choose their own search provider.
B. Fuzzy search is supported.
C. Duplication detection is based on SAP HANA.
D. None of the above.
Answer: A, B, C
QUESTION 2 What are the configuration options for search providers?
A. ES: Provider for Enterprise Search
B. AD: Provider for address search based on BAS-DES
C. DB: Provider for database search
D. The Fuzzy Search Using Addresses link is not available by default in the work
center in SAP Portal or in SAP NetWeaver Business Client.
E. Free Text: Provider supports free-text search and MDG displays a
corresponding field in the UI
F. Fuzzy: Provider supports error-tolerant search and MDG display
Answer: A, B, C, E, F
QUESTION 3 As the figure, Duplicate Check “ Configuration, shows, in this Customizing
activity,
you configure the duplicate check for an entity type.
On the basis of a data model (for example BP or MM) you define which search mode
the
system must use and which thresholds (in percentages) are to apply, which of the
meets of criteria?
A. Records with a matching score lower than the low threshold are not regarded
as duplicates.
B. Records with a matching score between the defined low and high thresholds are
regarded as potential duplicates.
C. Records with a matching score higher than the high threshold are not allowed
by the system, because they are regarded as duplicates.
D. None of the above.
Answer: A, B, C
QUESTION 4
What are the major enhancements in generic search?
A. The data model and entity type can be selected directly (this can also be
preset by customizing or configuration).
B. For edition-based data, validity time can be used as search criteria, and is
displayed in the result list.
C. The result list is more versatile. For example, you can filter by value, or
personalize it.
D. FPM-based customizing and configuration are available.
E. Their visibility depends on customizing and selected entity type.
Answer: A, B, C, D
QUESTION 5 In detail in the function: Based on the generated BRF + rules, you use
derivatives in MDG applications
to prefix prices based on the current state of Master Data Objects and / or
change request properties.
area This prediction is made possible by what applications:
A. BRF + derivative works
B. To deal with business deviation, complex deviation and cross-unit derivatives
C. Reduction of manual correction work due to “First Time Right†data entry
D. More automation in reconciliation of charts of accounts across multiple
ledgers
500-445 CCECE Cisco Contact Center Enterprise Chat and Email v1.0 (500-445)
Implementing Cisco Contact Center Enterprise Chat and Email
Duration: 90 minutes
Languages: English
Associated certification Advanced Unified Contact Center Enterprise
Specialization
Exam overview This exam tests a candidate's knowledge of deploying and administering Cisco
Enterprise Chat and Email (ECE).
Exam preparation Official Cisco training
Implementing Cisco Contact Center Enterprise Chat and Email (CCECE)
Exam preparation Official Cisco training
Implementing Cisco Contact Center Enterprise Chat and Email (CCECE) Exam Description: Implementing Cisco Contact Center Enterprise Chat and
Email v1.0 (CCECE 500-445) exam is associated with the Advanced Unified Contact
Center Enterprise Specialization requirements for Deployment Engineers. This
exam tests a candidate's knowledge of deploying and administering Cisco
Enterprise Chat and Email (ECE). The course Implementing Cisco Contact Center
Enterprise Chat and Email helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be
included on the exam. However, other related topics may also appear on any
specific delivery of the exam. To better reflect the contents of the exam and
for clarity purposes, the guidelines below may change at any time without
notice.
20% 5.0 ECE Features and Troubleshooting 5.1 Describe ECE Report types
5.2 Explain Agent Single Sign-on for ECE
5.3 Troubleshoot ECE
QUESTION 1
How is Chat Watchdog Interval used?
A. to control the time interval after which a chat activity is tagged as
abandoned if an agent could not accept it
B. to control the time interval after which a chat activity is tagged as
abandoned if it could not get any response from UCCE
C. to control the time interval after which a chat activity is tagged as
abandoned if it could not be routed to UCCE
D. to control the time interval after which a chat activity is tagged as
abandoned if it could not be assigned to an agent
Answer: D
QUESTION 2
What are two specifications for reporting templates? (Choose two.)
A. The availability of templates is controlled by licenses.
B. A user can only create ten reports per template.
C. Only one report can be created per template.
D. Any number of reports can be created from a template.
E. Templates can be deleted.
Answer: A,D
QUESTION 3
What is the limit of concurrent agents per application server?
A. 400
B. 600
C. 1200
D. 1800
Answer: D
QUESTION 4
In which two ways are chats transferred? (Choose two.)
A. Only open chat activities in which the customer has not left the chat session
can be transferred.
B. Chats can be transferred to departments directly.
C. Agents can transfer the chat activities based on the Maximum Task limit
setting.
D. Agents have unlimited transfers of chat activity.
E. Only one chat activity can be transferred at a time.
Answer: A,E
QUESTION 5
Which LDAP URL allows configuration in the properties pane under SSO
configuration?
A. Ldap://idap_server:3269
B. Ldap://idap_server:80
C. Ldap://idap_server:443
D. Ldap://idap_server:3268