AWS Certified Cloud Practitioner

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Lina
L
Lina
Community Contributor
Quizzes Created: 1 | Total Attempts: 506
| Attempts: 506 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. AWS. A company wants to have control over creating and using its own keys for encryption on AWS services. Which of the following can be used for this use-case?

Explanation

Customer managed key (CMK)

An AWS KMS key is a logical representation of a cryptographic key. A KMS key contains metadata, such as the key ID, key spec, key usage, creation date, description, and key state. Most importantly, it contains a reference to the key material that is used when you perform cryptographic operations with the KMS key.

The KMS keys that you create are customer managed keys. Customer managed keys are KMS keys in your AWS account that you create, own, and manage. You have full control over these KMS keys, including establishing and maintaining their key policies, IAM policies, and grants, enabling and disabling them, rotating their cryptographic material, adding tags, creating aliases that refer to the KMS keys, and scheduling the KMS keys for deletion.

Submit
Please wait...
About This Quiz
AWS Certified Cloud Practitioner - Quiz

This AWS Certified Cloud Practitioner quiz assesses knowledge on AWS services for security, integration, and business process management. It is designed for individuals preparing for AWS certification, focusing... see moreon practical scenarios like geographic content restrictions and system integrations. see less

2. AWS. AWS Shield Advanced provides expanded DDoS attack protection for web applications running on which of the following resources? (Select two)

Explanation

Amazon Route 53

AWS Global Accelerator

AWS Shield Standard is activated for all AWS customers, by default. For higher levels of protection against attacks, you can subscribe to AWS Shield Advanced. With Shield Advanced, you also have exclusive access to advanced, real-time metrics and reports for extensive visibility into attacks on your AWS resources. With the assistance of the DRT (DDoS response team), AWS Shield Advanced includes intelligent DDoS attack detection and mitigation for not only for network layer (layer 3) and transport layer (layer 4) attacks but also for application layer (layer 7) attacks.

AWS Shield Advanced provides expanded DDoS attack protection for web applications running on the following resources: Amazon Elastic Compute Cloud, Elastic Load Balancing (ELB), Amazon CloudFront, Amazon Route 53, AWS Global Accelerator.

Submit
3. AWS. Which of the following statements are CORRECT regarding the AWS VPC service? (Select two)

Explanation

A Security Group can have allow rules only

A Network Address Translation gateway (NAT gateway) is managed by AWS

A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. Security groups act at the instance level, not at the subnet level. You can specify allow rules, but not deny rules. You can specify separate rules for inbound and outbound traffic.

Submit
4. AWS. A customer has created a VPC and a subnet within AWS Cloud. Which of the following statements is correct?

Explanation

An Amazon Virtual Private Cloud (Amazon VPC) spans all of the Availability Zones (AZ) in the Region whereas a subnet spans only one Availability Zone (AZ) in the Region

Amazon Virtual Private Cloud (Amazon VPC) is a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including the selection of your IP address range, creation of subnets, and configuration of route tables and network gateways. An Amazon Virtual Private Cloud (Amazon VPC) spans all of the Availability Zones (AZ) in the Region.

A subnet is a range of IP addresses within your Amazon Virtual Private Cloud (Amazon VPC). A subnet spans only one Availability Zone (AZ) in the Region.

Submit
5. AWS. Which of the following AWS services allows a database to have flexible schema and supports document data models?

Explanation

Amazon DynamoDB

Amazon DynamoDB is a NoSQL database that supports key-value and document data models and enables developers to build modern, serverless applications that can start small and scale globally to support petabytes of data and tens of millions of read and write requests per second.

Amazon DynamoDB supports both key-value and document data models. This enables Amazon DynamoDB to have a flexible schema, so each row can have any number of columns at any point in time. This allows you to easily adapt the tables as your business requirements change, without having to redefine the table schema as you would in relational databases.

Submit
6. The ... acts as a central point of information for all interfaces.

Explanation

The Enterprise Services Repository (ESR) is a software component that acts as a central point of information for all interfaces. It stores and manages the definitions of all enterprise services, data types, and message types used in an organization. The ESR allows for the easy sharing and reuse of these definitions across different systems and interfaces. It ensures consistency and standardization in the integration landscape by providing a single source of truth for interface definitions.

Submit
7. The JAVA component SLD Data supplier is deployed and started for the SAP Netweaver AS Java Server

Explanation

The given statement is true because the SLD (System Landscape Directory) Data supplier component in JAVA is deployed and started for the SAP Netweaver AS (Application Server) Java Server. This means that the SLD Data supplier is functioning and providing data to the SLD, which is a central repository for managing system landscapes in SAP environments.

Submit
8. The ico and iflow share the same database?

Explanation

The statement "The ico and iflow share the same database" is true. This means that the ico (Initial Coin Offering) and iflow (a term that could refer to a specific software or system) both use the same database to store and retrieve information. This can be beneficial in terms of data consistency and efficiency, as both entities can access and update the same set of data without the need for duplication or synchronization.

Submit
9. The SuccessFactors (SFSF) adapter supports which message protocols? Note: There are 3 correct answers to this question.

Explanation

The SuccessFactors (SFSF) adapter supports the oData, SOAP, and REST message protocols. These protocols allow for the exchange of data between different systems and applications. oData is a protocol that enables the creation and consumption of RESTful APIs, while SOAP is a protocol for exchanging structured information in web services. REST is an architectural style that uses HTTP methods to access and manipulate resources. These protocols provide flexibility and compatibility for integrating SuccessFactors with other systems.

Submit
10. The enterprise service repository whitin the software components versions store detailed information about the ... of a software component

Explanation

The enterprise service repository within the software components versions store detailed information about the external interfaces of a software component. This means that the repository contains comprehensive documentation and specifications regarding how the software component interacts with external systems or components. It includes information about the protocols, formats, and methods used for communication with external entities. This allows developers and users to understand and utilize the software component's capabilities when integrating it with other systems or components.

Submit
11. AWS.  Which of the following is the MOST cost-effective option to purchase an EC2 Reserved Instance (RI)?

Explanation

Partial upfront payment option with standard 3-years term

You can use Amazon EC2 Reserved Instances (RI) to reserve capacity and receive a discount on your instance usage compared to running On-Demand instances. The discounted usage price is reserved for the duration of your contract, allowing you to predict compute costs over the term of the Reserved Instance (RI).

Please review this pricing comparison for EC2 Reserved Instances (RI): 

Submit
12. AWS. Which service allows you to simplify billing by using a single payment method for all your accounts?

Explanation

The correct answer is One. This means that only one ESR (Enterprise Services Repository) can be configured per SAP PI (Process Integration) instance. This implies that each instance can only have one repository for managing and storing service interfaces, mappings, and other artifacts. Multiple instances may be required for additional repositories or for scalability purposes, but each individual instance can only have one ESR.

Submit
13. AWS. Who can assist with accelerating the migration of legacy contact center infrastructure to AWS? Choose 2

Explanation

SOA architecture, which stands for Service-Oriented Architecture, has been around for more than 10 years. It was introduced as a software design approach in the early 2000s and gained popularity in the following years. This architecture style focuses on creating modular and loosely coupled services that can be easily integrated to build complex applications. Therefore, the correct answer is "More than 10 years ago."

Submit
14. AWS. According to the AWS Shared Responsibility Model, which of the following are responsibilities of the customer for Amazon RDS?

Explanation

The correct answer is 1. Creating a process 2. Creating the process steps, represented by activities 3. Importing the business logic of the process steps (tasks, web services, rules). This sequence of steps follows a top-down approach, starting with the overall process creation, then breaking it down into individual steps, and finally importing the necessary business logic for each step.

Submit
15. AWS. Which of the following statements are true about AWS Lambda? (Select two)

Explanation

The exclusive choice is a decision-making construct that allows for only one option to be selected at a time. This implies that it is a binary decision, where the options are either true or false. The datatype that best represents this binary decision is the Boolean datatype, which consists of the values true and false. Therefore, the correct answer is Boolean.

Submit
16. What is a perspective in NWDS

Explanation

The correct answer explains that a perspective in NWDS is a visual container that contains a set of views and editors. This container is designed to make it easier for developers to implement a specific type of development component.

Submit
17. AWS. Compared to the on-demand instance prices, what is the highest possible discount offered for spot instances?

Explanation

90

Amazon EC2 spot instances let you take advantage of unused EC2 capacity in the AWS cloud. Spot instances are available at up to a 90% discount compared to the on-demand instance prices. You can use spot instances for various stateless, fault-tolerant, or flexible applications such as big data, containerized workloads, CI/CD, web servers, high-performance computing (HPC), and other test & development workloads.

Submit
18. AWS. Which of the following is an AWS database service?

Explanation

Amazon Redshift

Amazon Redshift is a fully-managed petabyte-scale cloud-based data warehouse product designed for large scale data set storage and analysis.

Submit
19. AWS. Which AWS Route 53 routing policy would you use to route traffic to multiple resources and also choose how much traffic is routed to each resource?

Explanation

Weighted routing

Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost-effective way to route end users to Internet applications by translating names like www.example.com into the numeric IP addresses like 192.0.2.1 that computers use to connect to each other.

Weighted routing lets you associate multiple resources with a single domain name (example.com) or subdomain name (acme.example.com) and choose how much traffic is routed to each resource. This can be useful for a variety of purposes, including load balancing and testing new versions of software. To configure weighted routing, you create records that have the same name and type for each of your resources. You assign each record a relative weight that corresponds with how much traffic you want to send to each resource. Amazon Route 53 sends traffic to a resource based on the weight that you assign to the record as a proportion of the total weight for all records in the group.

Submit
20. AWS. Which cost management tool allows you to see the most detailed inframtion about your AWS bill?

Explanation

A boundary event is used to handle exceptional situations that may occur during the runtime of a process flow. It allows for the interruption or diversion of the normal flow of the process when certain conditions are met. This can include things like errors, timeouts, or other unexpected events. By using a boundary event, the process can be adapted and adjusted to handle these exceptional situations and ensure that the flow continues smoothly.

Submit
21. AWS. Which AWS Trusted Advisor real-time guidance recommendations are available for AWS Basic Support and AWS Developer Support customers? Choose 3

Explanation

FCAServerThreadCount is the parameter that allows processing a large amount of concurrent users. By increasing the value of FCAServerThreadCount, the server can allocate more threads to handle incoming user requests simultaneously. This parameter determines the maximum number of threads that the server can create to handle user connections, thus enabling efficient processing of a large number of concurrent users.

Submit
22. AWS. Which of the following usage will always be free even after the 12-month free tier plan has expired?

Explanation

When data is transferred between two systems, the sender is responsible for sending the data out of its system, hence it uses the outbound interface. On the other hand, the receiver is responsible for receiving the data into its system, so it uses the inbound interface. Therefore, the correct answer is "Sender outbound, receiver inbound."

Submit
23. AWS. Which AWS service should be used when you want to run container applications, but want to avoid the operational overhead of scaling, patching, securing, and managing servers?

Explanation

Amazon Elastic Container Service (Amazon ECS) - Fargate launch type

AWS Fargate is a serverless compute engine for containers. It works with both Amazon Elastic Container Service (Amazon ECS) and Amazon Elastic Kubernetes Service (Amazon EKS). AWS Fargate makes it easy for you to focus on building your applications. AWS Fargate removes the need to provision and manage servers, lets you specify and pay for resources per application, and improves security through application isolation by design. AWS Fargate allocates the right amount of compute, eliminating the need to choose instances and scale cluster capacity. You only pay for the resources required to run your containers, so there is no over-provisioning and paying for additional servers. AWS Fargate runs each task or pod in its kernel providing the tasks and pods their own isolated compute environment. This enables your application to have workload isolation and improved security by design.

Submit
24. Which element you use to create a UI Mask

Explanation

Web Dynpro is the correct answer for creating a UI Mask. Web Dynpro is a technology used in SAP systems to create user interfaces. It allows developers to create interactive and customizable web applications. With Web Dynpro, developers can easily create UI Masks by defining the layout, controls, and behavior of the user interface components. This technology provides a powerful and flexible way to design and develop user-friendly interfaces for SAP applications.

Submit
25. Does Parallelism have high memory consumption?

Explanation

Parallelism does have high memory consumption because it involves executing multiple tasks simultaneously, which requires allocating memory for each task. This can lead to increased memory usage compared to sequential execution where only one task is executed at a time.

Submit
26. You can import external XML files into the message mapping as structure templates. Determine whether this statement is true or false.

Explanation

In message mapping, it is possible to import external XML files as structure templates. This allows for easier mapping of data between different systems or formats. By importing the XML files, the structure and elements of the file can be used as a reference for mapping the data in the message. Therefore, the statement is true.

Submit
27. If when you try to import a business system from the sld, the systems are not listed, what you must to do

Explanation

When you try to import a business system from the SLD (System Landscape Directory) and the systems are not listed, clearing the SLD cache can help resolve the issue. Clearing the cache will refresh the data in the SLD and ensure that the systems are listed correctly.

Submit
28. You choose ... on the System Landscape Directory (SLD) initial screen to display the products and the software components along with their version. Choose the correct answer.

Explanation

On the System Landscape Directory (SLD) initial screen, you would choose the "Software Catalog" option to display the products and software components along with their version. The Software Catalog provides a comprehensive list of all the software products and components that are available in the system landscape. It allows users to view and manage the software inventory, including details such as version numbers, release dates, and dependencies. By selecting the Software Catalog, users can easily access and track the various software assets within the system landscape.

Submit
29. Which role is used to enable the user to work on tasks and to execute tasks

Explanation

The correct answer is com.sap-bpem.enduser. This role is used to enable the user to work on tasks and execute tasks in the SAP Business Process Execution Management (BPEM) system. It provides the necessary permissions and access rights for the user to perform their tasks effectively and efficiently.

Submit
30. Which of the following basic atomic data types is not providen in the XML schema for context objects in a BPM process

Explanation

not-available-via-ai

Submit
31. AWS. What are the advantages that AWS Cloud offers over a traditional on-premises IT infrastructure? (Select two)

Explanation

Trade capital expense for variable expense

In a traditional on-premises environment, you have to invest heavily in data centers and servers before you know how you’re going to use them. With Cloud Computing, you can pay only when you consume computing resources, and pay only for how much you consume.

Eliminate guessing on your infrastructure capacity needs

When you make a capacity decision before deploying an application, you often end up either sitting on expensive idle resources or dealing with limited capacity. With Cloud Computing, these problems go away. You can access as much or as little capacity as you need, and scale up and down as required with only a few minutes’ notice. You can Stop guessing capacity.

Submit
32. AWS. Which of the following is a best practice for securing access to your AWS account?

Explanation

The Enterprise Service Repository (ESR) within the software component version stores detailed information about the external interfaces of a software component. This means that the ESR keeps track of the various interfaces that the software component has with external systems or services. These interfaces can include APIs, web services, or any other means of communication between the software component and external entities. By storing this information in the ESR, developers and system administrators can easily access and manage the external interfaces of the software component.

Submit
33. AWS. A data analytics company is running a proprietary batch analytics application on AWS and wants to use a storage service which would be accessed by hundreds of EC2 instances simultaneously to append data to existing files. As a Cloud Practitioner, which AWS service would you suggest for this use-case?

Explanation

Amazon Elastic File System (Amazon EFS)

Amazon EFS is a file storage service for use with Amazon EC2. Amazon EFS provides a file system interface, file system access semantics, and concurrently-accessible storage for up to thousands of Amazon EC2 instances. Amazon EFS uses the Network File System protocol.

Submit
34. AWS. Which AWS Service can be used to mitigate a Distributed Denial of Service (DDoS) attack?

Explanation

AWS Shield

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced.

All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks.

For higher levels of protection against attacks targeting your applications running on Amazon Elastic Compute Cloud (EC2), Elastic Load Balancing (ELB), Amazon CloudFront, AWS Global Accelerator and Amazon Route 53 resources, you can subscribe to AWS Shield Advanced. In addition to the network and transport layer protections that come with Standard, AWS Shield Advanced provides additional detection and mitigation against large and sophisticated DDoS attacks, near real-time visibility into attacks, and integration with AWS WAF, a web application firewall.

Submit
35. AWS. Which of the following options can be used to access and manage all AWS services (Select three)?

Explanation

AWS services can be accessed in three different ways:

AWS Management Console

This is a simple web interface for accessing AWS services.

AWS Command Line Interface (AWS CLI)

You can access AWS services from the command line and automate service management with scripts.

AWS Software Development Kit (SDK)

You can also access via AWS SDK that provides language-specific abstracted APIs for AWS services.

Submit
36. When you use an exclusive gateway must to use a default gate?

Explanation

When using an exclusive gateway, it is necessary to use a default gate. This is because an exclusive gateway is used to create mutually exclusive paths in a process flow, where only one path can be taken based on certain conditions. However, if none of the conditions are met, a default path is required to handle such cases and ensure that the process flow can continue. Therefore, it is true that when using an exclusive gateway, a default gate must be used.

Submit
37. AWS. A unicorn startup is building an analytics application with support for a speech-based interface. The application will accept speech-based input from users and then convey results via speech. As a Cloud Practitioner, which solution would you recommend for the given use-case?

Explanation

Use Amazon Transcribe to convert speech to text for downstream analysis. Then use Amazon Polly to convey the text results via speech

You can use Amazon Transcribe to add speech-to-text capability to your applications. Amazon Transcribe uses a deep learning process called automatic speech recognition (ASR) to convert speech to text quickly and accurately. Amazon Transcribe can be used to transcribe customer service calls, to automate closed captioning and subtitling, and to generate metadata for media assets.

Submit
38. AWS. An intern at an IT company provisioned a Linux based On-demand EC2 instance with per-second billing but terminated it within 30 seconds as he wanted to provision another instance type. What is the duration for which the instance would be charged?

Explanation

60 seconds

There is a one-minute minimum charge for Linux based EC2 instances, so this is the correct option.

Submit
39. AWS. Which of the following is a geographic area containing multiple Availability Zone (AZs)?

Explanation

The PIMON Monitor displays WS messages using the SOAP message protocol and XI messages using the XI message protocol 3.x.

Submit
40. AWS. A retail company has multiple AWS accounts for each of its departments. Which of the following AWS services can be used to set up consolidated billing and a single payment method for these AWS accounts?

Explanation

AWS Organizations

AWS Organizations helps you to centrally manage billing; control access, compliance, and security; and share resources across your AWS accounts. Using AWS Organizations, you can automate account creation, create groups of accounts to reflect your business needs, and apply policies for these groups for governance. You can also simplify billing by setting up a single payment method for all of your AWS accounts. AWS Organizations is available to all AWS customers at no additional charge.

Submit
41. AWS. Which of the following statement is correct for a Security Group and a Network Access Control List (Network ACL)?

Explanation

Security Group acts as a firewall at the instance level whereas Network Access Control List (Network ACL) acts as a firewall at the subnet level

A security group acts as a virtual firewall for your instance to control inbound and outbound traffic. When you launch an instance in a VPC, you can assign up to five security groups to the instance. Security groups act at the instance level, not the subnet level. A network access control list (network ACL) is an optional layer of security for your VPC that acts as a firewall for controlling traffic in and out of one or more subnets (i.e. it works at subnet level).

Submit
42. Which types of patterns can you use to create an Iflow

Explanation

The correct answer includes three types of patterns that can be used to create an Iflow: Message Translator, Point to Point, and Recipient List. These patterns are commonly used in integration scenarios to transform messages, establish direct communication between two endpoints, and route messages to multiple recipients respectively. By using these patterns, developers can design Iflows that efficiently handle data transformation, communication, and distribution in an integration landscape.

Submit
43. Identify the basic interfaces patterns available. Choose the correct answer.

Explanation

The basic interface patterns available are stateless and stateful communications. Stateless communication refers to a type of communication where each request from the client to the server is independent and does not rely on any previous requests. Stateful communication, on the other hand, maintains a session or state between the client and the server, allowing the server to remember information about the client across multiple requests.

Submit
44. You configure the sender RFC adapter to convert RFC calls from a sender to XML messages. What is the purpose of the program ID RFC adapter parameter?

Explanation

The program ID parameter in the sender RFC adapter is used to uniquely identify the RFC sender communication channel in the configured application server Gateway. This allows for proper routing and communication between the sender and receiver interfaces, ensuring that the correct integration processes are correlated and executed.

Submit
45. The aggregator pattern is a statefull filter that is used in cases when a subsequent message process is contingent upon the sucessful processing of multiple input messages

Explanation

The explanation for the given correct answer is that the aggregator pattern is indeed a stateful filter used when the processing of multiple input messages is required for a subsequent message to be processed successfully. This pattern is commonly used in scenarios where data needs to be collected and combined from multiple sources before further processing can take place. The aggregator pattern helps in managing and coordinating the flow of messages, ensuring that all necessary inputs are received and processed before proceeding with the next step.

Submit
46. A web service description language file is an XML to describe service interfaces

Explanation

A web service description language file is indeed an XML file that is used to describe the interfaces of a web service. It provides a standardized way to define the operations, inputs, and outputs of the service, allowing different systems to communicate and interact with each other. This XML file serves as a contract between the service provider and the service consumer, ensuring that both parties understand and agree on the structure and behavior of the web service.

Submit
47. AWS.   Which AWS service can be used to store, manage, and deploy Docker container images?

Explanation

Amazon Elastic Container Registry (Amazon ECR) - Amazon Elastic Container Registry (Amazon ECR) can be used to store, manage, and deploy Docker container images. Amazon Elastic Container Registry (Amazon ECR) eliminates the need to operate your container repositories. You can then pull your docker images from Amazon Elastic Container Registry (Amazon ECR) and run those on Amazon Elastic Container Service (Amazon ECS).

Please see this schematic diagram to understand how Amazon Elastic Container Registry

Submit
48. AWS. Which of the following AWS services is essential for implementing security of resources in AWS Cloud?

Explanation

AWS Identity and Access Management (IAM)

AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM enables security best practices by allowing you to grant unique security credentials to users and groups to specify which AWS service APIs and resources they can access. These features make IAM an important service for the overall security of AWS resources in your account. IAM is secure by default; users have no access to AWS resources until permissions are explicitly granted.

Submit
49. Does business systems require underline Technical systems?

Explanation

Business systems often rely on underlying technical systems to function effectively. These technical systems can include hardware, software, networks, databases, and other technological components. Without these technical systems, businesses may struggle to perform tasks efficiently, communicate with customers and partners, store and analyze data, and automate processes. Therefore, it is true that business systems require underlying technical systems to operate smoothly and achieve their goals.

Submit
50. The COMMIT WORK statement is required in another function module to write data in the database.

Explanation

The COMMIT WORK statement is used in SAP ABAP programming language to save changes made to the database. When a COMMIT WORK statement is executed, it writes data from the current database session to the physical database. In this case, if data needs to be written in the database from another function module, the COMMIT WORK statement is required to ensure that the changes are permanently saved. Therefore, the given answer "True" is correct.

Submit
51. The is a cost-saving option compared to a full installation of SAP Process Integration (Pl).

Explanation

Advanced Adapter Engine Extended (AEX) is a cost-saving option compared to a full installation of SAP Process Integration (Pl). AEX provides advanced adapter engine capabilities and is a more economical choice for organizations that do not require the full functionality of SAP Process Integration. This option allows businesses to save on installation and maintenance costs while still benefiting from the essential features provided by an advanced adapter engine.

Submit
52. WAS. A silicon valley based healthcare startup stores anonymized patient health data on Amazon S3. The CTO further wants to ensure that any sensitive data on S3 is discovered and identified to prevent any sensitive data leaks. As a Cloud Practitioner, which AWS service would you recommend addressing this use-case?

Explanation

Amazon Macie

Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. Macie automatically provides an inventory of Amazon S3 buckets including a list of unencrypted buckets, publicly accessible buckets, and buckets shared with AWS accounts outside those you have defined in AWS Organizations. Then, Macie applies machine learning and pattern matching techniques to the buckets you select to identify and alert you to sensitive data, such as personally identifiable information (PII).

Submit
53. How to Create User-Defined Function for Message Mapping Using NWDS?

Explanation

The correct answer is to create a function library first, then create the User-Defined Function (UDF) within that library. After that, assign the function library to the mapping design, and finally, design the mapping using the UDF. This sequence ensures that the necessary components are created and linked properly for the message mapping process.

Submit
54. How you could access the item being looped?

Explanation

The correct answer is "currentCollectionitem". This is because the variable "currentCollectionitem" is the most logical choice to access the item being looped. It follows a clear naming convention and indicates that it represents the current item in the collection being looped over. The other options, "CurrentItem" and "CurrentColectionPos", do not adhere to a consistent naming convention and may cause confusion.

Submit
55. How does an exception behave when the Remote-Enabled Function Module triggers it?

Explanation

When a Remote-Enabled Function Module triggers an exception, it behaves by displaying a Fault message. This means that when an error or exceptional condition occurs during the execution of the function module, a fault message is generated to indicate the failure. This allows for proper error handling and communication of the issue to the calling program or system.

Submit
56. Can be used default value true, as start condition of bpm?

Explanation

The correct answer is YES because using a default value of true as the start condition of bpm allows the process to automatically start without any additional input or conditions. This can be useful in situations where the process should start immediately or when there are no specific requirements for the start condition. By setting the default value to true, the process will start by default unless a different start condition is explicitly defined.

Submit
57. In a target field mapping, you create rules that define the source fields used to determine the result value for each target field. Determine whether this statement is true or false.

Explanation

In a target field mapping, rules are indeed created to define the source fields used to determine the result value for each target field. Therefore, the statement is true.

Submit
58. When an integration flow is complete. it is deployed to the runtime, where the actual execution of takes place

Explanation

The correct answer is "a process integration". This term refers to the integration of different processes or systems within an organization. When an integration flow is complete, it is deployed to the runtime, where the actual execution of the integrated processes takes place. This ensures that the different processes are seamlessly connected and can communicate with each other effectively.

Submit
59. Enterprise integration patters are design patterns that help in solving recurring problems faced in the integration of enterprise applications?

Explanation

Enterprise integration patterns are indeed design patterns that are specifically designed to address and solve common challenges encountered during the integration of enterprise applications. These patterns provide a set of proven solutions and best practices that can be applied to various integration scenarios, such as message routing, transformation, and synchronization. By following these patterns, organizations can achieve better interoperability, scalability, and maintainability in their integrated systems. Therefore, the statement "True" accurately reflects the nature and purpose of enterprise integration patterns.

Submit
60. What is an intermediate event message used for?

Explanation

An intermediate event message is used to place a pause in a business process. This means that when the intermediate event message is triggered, it interrupts the flow of the process and temporarily halts its progress. This allows for the execution of certain actions or tasks before the process can continue. The intermediate event message serves as a way to control the sequence of events and ensure that specific conditions are met before proceeding with the business process.

Submit
61. AWS. Which AWS support plan provides access to a designated Technical Account Manager (TAM)?

Explanation

AWS Enterprise Support

AWS offers four different support plans to cater to each of its customers - AWS Developer Support, AWS Business Support, AWS Enterprise On-Ramp Support and AWS Enterprise Support plans. A basic support plan is included for all AWS customers.

AWS Enterprise Support provides customers with concierge-like service where the main focus is helping the customer achieve their outcomes and find success in the cloud. With AWS Enterprise Support, you get 24x7 technical support from high-quality engineers, tools and technology to automatically manage the health of your environment, consultative architectural guidance delivered in the context of your applications and use-cases, and a designated Technical Account Manager (TAM) to coordinate access to proactive/preventative programs and AWS subject matter experts.

Submit
62. AWS. As per the AWS Shared Responsibility Model, which of the following is a responsibility of the customer from a security and compliance point of view?

Explanation

Managing patches of the guest operating system on Amazon Elastic Compute Cloud (Amazon EC2)

Security and Compliance is a shared responsibility between AWS and the customer. This shared model can help relieve the customer’s operational burden as AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates.

As per the AWS shared responsibility model, the customer is responsible for security "in" the cloud. Customers that deploy an Amazon EC2 instance are responsible for the management of the guest operating system (including updates and security patches), any application software or utilities installed by the customer on the instances, and the configuration of the AWS-provided firewall (called a security group) on each instance.

Exam Alert:

Please review the Shared Responsibility Model in detail as you can expect multiple questions on

Submit
63. AWS. Which AWS service would you use to send alerts when the costs for your AWS account exceed your budgeted amount?

Explanation

AWS Budgets

AWS Budgets gives the ability to set custom budgets that alert you when your costs or usage exceed (or are forecasted to exceed) your budgeted amount. You can also use AWS Budgets to set reservation utilization or coverage targets and receive alerts when your utilization drops below the threshold you define. Budgets can be created at the monthly, quarterly, or yearly level, and you can customize the start and end dates. You can further refine your budget to track costs associated with multiple dimensions, such as AWS service, linked account, tag, and others. Budget alerts can be sent via email and/or Amazon Simple Notification Service (Amazon SNS) topic.

Submit
64. Your costumer delivers you a highly detailed process information, which approach you must to use to model it in BPM?

Explanation

A top-down approach is the most suitable method to model a highly detailed process information in BPM. This approach involves starting with a broad overview of the process and then breaking it down into smaller, more detailed components. This allows for a systematic and structured analysis of the process, ensuring that all aspects are considered and nothing is overlooked. By starting from the top and gradually drilling down into the details, the modeling process becomes more efficient and accurate.

Submit
65. Your mapping program concatenates 2 source elements in order to create a target element. The target element has the max occurrence property set to "1...unbounded". During test, the 1st source element occurs 2 times, the 2nd source element occurs 4 times.  How many times does the target element appear in the target message?

Explanation

The target element appears 4 times in the target message because the target element is created by concatenating 2 source elements. The 1st source element occurs 2 times and the 2nd source element occurs 4 times, so when they are concatenated, it will result in 4 occurrences of the target element.

Submit
66. The advanced adapter engine is installed as a component of the integration server. It can also be installed noncentrally?

Explanation

The advanced adapter engine can be installed noncentrally when there is a firewall between the business system and the integration server that prevents direct communication. In such cases, the advanced adapter engine can be installed on a separate system to facilitate communication between the business system and the integration server, bypassing the firewall. This allows for seamless integration and data exchange between the two systems despite the presence of a firewall.

Submit
67. AWS. Which resource types are delivered on-demand via cloud computin with pay-as-you-go pricing

Explanation

The software components cannot be nested. This means that one component cannot be contained within another component. Each component functions independently and is not dependent on any other component for its operation. Therefore, the answer is false.

Submit
68. AWS. Which AWS service can be used to provision resources to run big data workloads on Hadoop clusters?

Explanation

Amazon EMR

Amazon EMR is the industry-leading cloud big data platform for processing vast amounts of data using open source tools such as Hadoop, Apache Spark, Apache Hive, Apache HBase, Apache Flink, Apache Hudi, and Presto. Amazon EMR can be used to provision resources to run big data workloads on Hadoop clusters.

Submit
69. AWS. What are the fundamental drivers of cost with AWS Cloud?

Explanation

Compute, Storage and Outbound Data Transfer

There are three fundamental drivers of cost with AWS: compute, storage, and outbound data transfer. In most cases, there is no charge for inbound data transfer or data transfer between other AWS services within the same region. Outbound data transfer is aggregated across services and then charged at the outbound data transfer rate.

Submit
70. Abstract flows are used without specific type and are used when object type doesnt matter

Explanation

Abstract flows are indeed used without a specific type and are employed when the object type does not matter. This means that abstract flows can be used to represent and manipulate data in a generic way, without being tied to a particular object or data structure. This flexibility allows for more versatile and reusable code, as abstract flows can be used with different types of data without needing to modify the flow itself. Therefore, the statement "Abstract flows are used without specific type and are used when object type doesn't matter" is true.

Submit
71. AWS.  Which of the following AWS services has encryption enabled by default?

Explanation

The integration builder is a tool used to create and manage integrations between different systems. In this context, the elements that can be created using the integration builder are the Sender Agreement, Receiver Determination, and Receiver Agreement. The Sender Agreement defines the communication parameters and settings for the sender system, while the Receiver Determination specifies the receiver system based on certain conditions. The Receiver Agreement, on the other hand, defines the communication parameters and settings for the receiver system. Interface Agreement is not mentioned as one of the elements that can be created in the integration builder.

Submit
72. AWS. Which of the following AWS Support plans provide access to only core checks from the AWS Trusted Advisor Best Practice Checks? (Select two)

Explanation

AWS Basic Support

The AWS Basic Support plan only provides access to the following:

Customer Service & Communities - 24x7 access to customer service, documentation, whitepapers, and support forums. AWS Trusted Advisor - Access to the core Trusted Advisor checks and guidance to provision your resources following best practices to increase performance and improve security. AWS Health - Your Account Health Dashboard : A personalized view of the health of your AWS services, and alerts when your resources are impacted.

Submit
73. AWS. Which of the following are characteristics of cloud computing? choose 3

Explanation

Task management provides detailed information about tasks. This involves organizing, tracking, and prioritizing tasks, as well as monitoring their progress and completion. It allows for efficient allocation of resources, time management, and effective collaboration among team members. Task management systems often include features such as task lists, deadlines, reminders, and progress tracking, which help individuals and teams stay organized and on track with their work.

Submit
74. AWS. AWS Compute Optimizer delivers recommendations for which of the following AWS resources? (Select two)

Explanation

Amazon Elastic Compute Cloud (Amazon EC2) instances, Amazon EC2 Auto Scaling groups

Amazon Elastic Block Store (Amazon EBS), AWS Lambda functions

AWS Compute Optimizer helps you identify the optimal AWS resource configurations, such as Amazon EC2 instance types, Amazon EBS volume configurations, and AWS Lambda function memory sizes, using machine learning to analyze historical utilization metrics. AWS Compute Optimizer delivers recommendations for selected types of EC2 instances, EC2 Auto Scaling groups, Amazon EBS volumes, and AWS Lambda functions.

AWS Compute Optimizer calculates an individual performance risk score for each resource dimension of the recommended instance, including CPU, memory, EBS throughput, EBS IOPS, disk throughput, disk throughput, network throughput, and network packets per second (PPS).

AWS Compute Optimizer provides EC2 instance type and size recommendations for EC2 Auto Scaling groups with a fixed group size, meaning desired, minimum, and maximum are all set to the same value and have no scaling policy attached.

AWS Compute Optimizer supports IOPS and throughput recommendations for General Purpose (SSD) (gp3) volumes and IOPS recommendations for Provisioned IOPS (io1 and io2) volumes.

AWS Compute Optimizer helps you optimize two categories of Lambda functions. The first category includes Lambda functions that may be over-provisioned in memory sizes. The second category includes compute-intensive Lambda functions that may benefit from additional CPU power.

Submit
75. AWS. According to the AWS Cloud Adoption Framework (AWS CAF), what are two tasks that a company should perform when planning to migrate to the AWS Cloud and aiming to become more responsive to customer inquiries and feedback as part of their organizational transformation? (Select two)

Explanation

The AWS Cloud Adoption Framework (AWS CAF) leverages AWS experience and best practices to help you digitally transform and accelerate your business outcomes through innovative use of AWS. AWS CAF identifies specific organizational capabilities that underpin successful cloud transformations. These capabilities provide best practice guidance that helps you improve your cloud readiness. AWS CAF groups its capabilities in six perspectives: Business, People, Governance, Platform, Security, and Operations.

Organize your teams around products and value streams

Leverage agile methods to rapidly iterate and evolve

Using the AWS Cloud Adoption Framework (AWS CAF), you can reimagine how your business and technology teams create customer value and meet your strategic intent. Organizing your teams around products and value streams while leveraging agile methods to rapidly iterate and evolve will help you become more responsive and customer centric.

Submit
76. AWS. According to the AWS Shared Responsibility Model, which of the following are responsibilities of AWS? (Select two)

Explanation

According to the AWS Shared Responsibility Model, AWS is responsible for "Security of the Cloud". This includes protecting the infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and facilities that run AWS Cloud services.

Replacing faulty hardware of Amazon EC2 instances - Replacing faulty hardware of Amazon EC2 instances comes under the infrastructure maintenance "of" the cloud. This is the responsibility of AWS.

Operating the infrastructure layer, the operating system and the platform for the Amazon S3 service - For abstracted services, such as Amazon S3 and Amazon DynamoDB, AWS operates the infrastructure layer, the operating system, and platforms, and customers access the endpoints to store and retrieve data.

Submit
77. AWS. The AWS Cloud Adoption Framework (AWS CAF) recommends four iterative and incremental cloud transformation phases. Which cloud transformation journey phase of the AWS Cloud Adoption Framework (AWS CAF) focuses on demonstrating how the cloud will help accelerate your business outcomes?

Explanation

Envision

The Envision phase of the AWS Cloud Adoption Framework (AWS CAF) focuses on demonstrating how the cloud will help accelerate your business outcomes.

Submit
78. The RFC adapter is located on the Java Enterprise Edition (JEE) Engine

Explanation

The RFC adapter is a component that allows communication between the Java Enterprise Edition (JEE) Engine and remote function calls (RFCs) in SAP systems. It is responsible for handling the integration and data exchange between the JEE Engine and the SAP system. Therefore, it is correct to say that the RFC adapter is located on the JEE Engine.

Submit
79. The stateless (XI 3.0-compatible) interface pattern can only be used in connection with process integration

Explanation

The stateless (XI 3.0-compatible) interface pattern refers to a design pattern that is specifically used in process integration. This pattern is designed to handle requests and process them without storing any state information. Therefore, it is true that the stateless interface pattern can only be used in connection with process integration, as it is not suitable for scenarios where state information needs to be stored and maintained.

Submit
80. AWS. Which of the following AWS services should be used to automatically distribute incoming traffic across multiple targets?

Explanation

AWS Elastic Load Balancing (ELB)

Elastic Load Balancing (ELB) is used to automatically distribute your incoming application traffic across all the EC2 instances that you are running. You can use Elastic Load Balancing to manage incoming requests by optimally routing traffic so that no one instance is overwhelmed. Your load balancer acts as a single point of contact for all incoming web traffic to your application. When an instance is added, it needs to register with the load balancer or no traffic is routed to it. When an instance is removed, it must deregister from the load balancer or traffic continues to be routed to it.

Submit
81. AWS. Which cloud deployment model allows you to connect public cloud resources to on-premises infrastructure?

Explanation

The tools used for creating the configuration view for the integrated configuration are the Central Advanced Adapter Engine (AAE), Non-central AAE, and Advanced Adapter Engine Extended (AEX). These tools enable the configuration of adapters and communication channels in the SAP Process Integration (PI) system. The Central AAE is used for centralized configuration in a single system landscape, while the Non-central AAE allows for distributed configuration across multiple systems. The AEX is an additional component that provides enhanced capabilities for adapter configuration. The System Landscape Directory (SLD) is not directly involved in creating the configuration view.

Submit
82. Which perspective are used in NWDS to allow build a BPM?

Explanation

The correct answer is Process Development Perspective and Process Modeling Perspective. These perspectives are used in NWDS (NetWeaver Developer Studio) to enable the building of a Business Process Management (BPM) solution. The Process Development Perspective allows developers to design and develop business processes using tools and features specific to BPM. The Process Modeling Perspective provides a graphical interface for modeling and visualizing business processes, making it easier for business analysts and process designers to collaborate and define the workflow. Both perspectives are essential in creating and managing BPM solutions in NWDS.

Submit
83. Which event allow to introduce a pause into a BPM?

Explanation

Intermediate timer events and intermediate message events both allow for introducing a pause into a Business Process Model (BPM). Intermediate timer events are used to introduce a time delay or wait until a specific time or duration has elapsed. On the other hand, intermediate message events are used to wait for a specific message or signal to be received before proceeding with the BPM. Intermediate start events, however, do not introduce a pause but rather indicate the start of a process or subprocess.

Submit
84. What is the advantage of using message mapping rather XSLT mapping?

Explanation

Message mapping can handle deep structured XML documents faster than XSLT mapping because it is specifically designed for handling complex message structures. XSLT mapping, on the other hand, is more suitable for simple transformations and may struggle with deeply nested XML structures.

Submit
85. Which affirmations are true?

Explanation

The first statement is true because process modeling perspective focuses on creating models that represent the structure and behavior of a process, which is a subset of the broader process development perspective that encompasses all aspects of developing a process. The second statement is also true because process development perspective includes capabilities for designing, implementing, building, and deploying a process. The fourth statement is not mentioned in the question, so its truthfulness cannot be determined.

Submit
86. Which of the following logs provide information about execution times, process outcomes and individual steps?

Explanation

The process log is the correct answer because it provides information about execution times, process outcomes, and individual steps. This log is specifically designed to capture and record details related to the execution of a process, including timestamps, status updates, and any errors or exceptions encountered. It is a valuable resource for troubleshooting and analyzing the performance and effectiveness of a process. The other logs listed, such as the business log, connection log, and J2EE engine log, may provide different types of information but do not specifically focus on execution times, process outcomes, and individual steps.

Submit
87. AWS. A startup wants to migrate its data and applications from the on-premises data center to AWS Cloud. Which of the following options can be used by the startup to help with this migration? (Select two)

Explanation

Utilize AWS Partner Network (APN) to build a custom solution for this infrastructure migration

The AWS Partner Network (APN) is the global partner program for technology and consulting businesses that leverage Amazon Web Services to build solutions and services for customers. The startup can work with experts from APN to build a custom solution for this infrastructure migration.

Use AWS Trusted Advisor to automate the infrastructure migration - AWS Trusted Advisor is an online tool that provides you real-time guidance to help you provision your resources following AWS best practices on cost optimization, security, fault tolerance, service limits, and performance improvement. Trusted Advisor cannot automate the infrastructure migration.

Submit
88. AWS. A big data analytics company is moving its IT infrastructure from an on-premises data center to AWS Cloud. The company has some server-bound software licenses that it wants to use on AWS. As a Cloud Practitioner, which of the following EC2 instance types would you recommend to the company?

Explanation

Dedicated Host

Amazon EC2 Dedicated Hosts allow you to use your eligible software licenses from vendors such as Microsoft and Oracle on Amazon EC2. An Amazon EC2 Dedicated Host is a physical server fully dedicated for your use, so you can help address corporate compliance requirements.

Submit
89. AWS. A financial services company wants to ensure that its AWS account activity meets the governance, compliance and auditing norms. As a Cloud Practitioner, which AWS service would you recommend for this use-case?

Explanation

AWS CloudTrail

You can use CloudTrail to log, monitor and retain account activity related to actions across your AWS infrastructure. CloudTrail provides an event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command-line tools, and other AWS services.

How CloudTrail Works: 

Submit
90. AWS. Which of the following are the storage services offered by the AWS Cloud? (Select two)

Explanation

Amazon Simple Storage Service (Amazon S3)

Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance.

Amazon Elastic File System (Amazon EFS)

Amazon Elastic File System (Amazon EFS) provides a simple, scalable, fully managed elastic NFS file system for use with AWS Cloud services and on-premises resources. It is built to scale on-demand to petabytes without disrupting applications, growing and shrinking automatically as you add and remove files, eliminating the need to provision and manage capacity to accommodate growth.

Submit
91. AWS. What is the primary benefit of deploying an Amazon RDS Multi-AZ database with one standby?

Explanation

Amazon RDS Multi-AZ enhances database availability

Amazon RDS Multi-AZ deployments provide enhanced availability and durability forAmazon Relational Database Service (Amazon RDS) instances, making them a natural fit for production database workloads. When you provision an Amazon RDS Multi-AZ Instance with one standby, Amazon RDS automatically creates a primary DB Instance and synchronously replicates the data to a standby instance in a different Availability Zone (AZ).

In case of an infrastructure failure, Amazon RDS performs an automatic failover to the standby so that you can resume database operations as soon as the failover is complete.

Submit
92. Does the Enterprise Services Bus (ESB) eliminates the point to point connection?

Explanation

The correct answer is True. The Enterprise Services Bus (ESB) is designed to eliminate the need for point-to-point connections between systems. It acts as a central hub that allows different applications and services to communicate with each other through a common interface. By using the ESB, organizations can reduce the complexity and maintenance of multiple connections, as well as improve scalability and flexibility in their system architecture.

Submit
93. What actions can make the role NWA_SUPERADMIN that cannot realice the rol SAP_BPM_SUPERADMIN

Explanation

Enabling access to SAP NWA allows the role NWA_SUPERADMIN to have administrative privileges and access to the SAP NetWeaver Administrator tool. This tool provides advanced monitoring, configuration, and administration capabilities for SAP systems. By granting this access, the NWA_SUPERADMIN role can perform tasks and actions that the SAP_BPM_SUPERADMIN role cannot, such as managing and monitoring processes, assigning new triggers for users, and potentially making changes to the system configuration.

Submit
94. AWS. Access Key ID and Secret Access Key are tied to which of the following AWS Identity and Access Management (AWS IAM) entities?

Explanation

IAM User

Access keys are long-term credentials for an IAM user or the AWS account root user. You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK). Access keys consist of two parts: an access key ID (for example, AKIAIOSFODNN7EXAMPLE) and a secret access key (for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY). As a user name and password, you must use both the access key ID and secret access key together to authenticate your requests. Access Keys are secret, just like a password. You should never share them.

Submit
95. Which are the differences between parallel split and parallel join?

Explanation

The parallel split creates a parallel workflow, meaning that it allows for multiple sequences of actions to be executed simultaneously. On the other hand, the parallel join merges a set of parallel sequences into a single one, combining the results or outputs of those parallel sequences. This allows for the synchronization or consolidation of the parallel processes into a unified outcome.

Submit
96. Which message are displayed within the business logs?

Explanation

The correct answer is WS Messages. Within the business logs, the messages that are displayed are WS Messages.

Submit
97. AWS. A startup wants to set up its IT infrastructure on AWS Cloud. The CTO would like to get an estimate of the monthly AWS bill based on the AWS services that the startup wants to use. As a Cloud Practitioner, which AWS service would you suggest for this use-case?

Explanation

AWS Pricing Calculator

AWS Pricing Calculator lets you explore AWS services and create an estimate for the cost of your use cases on AWS. You can model your solutions before building them, explore the price points and calculations behind your estimate, and find the available instance types and contract terms that meet your needs. This enables you to make informed decisions about using AWS. You can plan your AWS costs and usage or price out setting up a new set of instances and services. AWS Pricing Calculator can provide the estimate of the AWS service usage based on the list of AWS services.

Submit
98. AWS. Which of the following AWS services can be used to connect a company's on-premises environment to a VPC without using the public internet?

Explanation

AWS Direct Connect

AWS Direct Connect is a cloud service solution that makes it easy to establish a dedicated network connection from your premises to AWS. You can use AWS Direct Connect to establish a private virtual interface from your on-premise network directly to your Amazon VPC, providing you with a private, high bandwidth network connection between your network and your VPC. This connection is private and does not go over the public internet. It takes at least a month to establish this physical connection.

Submit
99. Which components belong to SAP PI Integration Server (three answers)

Explanation

The SAP PI Integration Server consists of three components: the Business Process Engine, the Integration Engine, and the Central Advanced Adapter Engine AAE. The Business Process Engine is responsible for executing and monitoring business processes, while the Integration Engine handles the routing and transformation of messages between different systems. The Central Advanced Adapter Engine AAE provides advanced adapters for connecting to various external systems. These three components work together to enable seamless integration and efficient communication within the SAP PI system.

Submit
100. Functionality of Services registry allows to

Explanation

The functionality of Services registry allows users to publish their services, making them available for others to discover and search for. It also enables users to search for services that are already published and discover new services that meet their requirements. The option "Append" is not a valid functionality of Services registry.

Submit
101. What do you need to do before import a technical system into SAP PI SLD

Explanation

Before importing a technical system into SAP PI SLD, it is necessary to register the data supplier in the application system. This is important because registering the data supplier ensures that the necessary information about the technical system is available in the application system. This information is then used during the import process to accurately map and configure the technical system in the SAP PI SLD.

Submit
102. How you could maintain Value Mapping values in SAP PI

Explanation

The correct answer includes three options: RFC Lookup, JDBC Lookup, and Fix Values. These are methods used to maintain Value Mapping values in SAP PI. RFC Lookup allows you to retrieve values from a remote function call, while JDBC Lookup enables you to fetch values from a database table. Fix Values, on the other hand, allows you to manually enter and maintain the values directly in the mapping. These options provide different ways to manage and update value mappings in SAP PI.

Submit
103. AWS. Which AWS service will help you receive alerts when the reservation utilization falls below the defined threshold?

Explanation

AWS Budgets

AWS Budgets gives you the ability to set custom budgets that alert you when your costs or usage exceed (or are forecasted to exceed) your budgeted amount.

You can also use AWS Budgets to set reservation utilization or coverage targets and receive alerts when your utilization drops below the threshold you define. Reservation alerts are supported for Amazon EC2, Amazon RDS, Amazon Redshift, Amazon ElastiCache, and Amazon Elasticsearch reservations.

Submit
104. AWS. What is the easiest way for a customer on the AWS Basic Support plan to increase service limits?

Explanation

In SAP Process Integration (PI) JAVA, there are two types of senders or receivers of a message. This suggests that there are only two categories or entities that can send or receive messages within the SAP PI system.

Submit
105. AWS. Which cost management tool allows you to view costs from the past 12 months, current detailed costs, and forecasts for up to 3 months?

Explanation

The speed button allows you to create various elements in a process model. It can be used to create activities, gateways, events, and artifacts. Activities represent the tasks or actions that need to be performed in the process. Gateways are used to control the flow of the process. Events represent something that happens during the process, such as the start or end of a process. Artifacts are used to provide additional information or documentation about the process. The speed button does not create lanes or pools, which are used for organizing and grouping elements in a process model.

Submit
106. AWS. What foundational capability under the operations perspective is part of the AWS Cloud Adoption Framework (AWS CAF)?

Explanation

Performance and capacity management

The AWS Cloud Adoption Framework (AWS CAF) leverages AWS experience and best practices to help you digitally transform and accelerate your business outcomes through innovative use of AWS. Use the AWS CAF to identify and prioritize transformation opportunities, evaluate and improve your cloud readiness, and iteratively evolve your transformation roadmap.

AWS CAF groups its capabilities in six perspectives: Business, People, Governance, Platform, Security, and Operations. Each perspective comprises a set of capabilities that functionally related stakeholders own or manage in your cloud transformation journey.

Operations perspective helps ensure that your cloud services are delivered at a level that meets the needs of your business. Performance and capacity management under the Operations perspective is part of the AWS Cloud Adoption Framework (AWS CAF)

Submit
107. AWS. Which of the following statement is correct regarding the AWS pricing policy for data transfer charges into or out of an AWS Region?

Explanation

Only outbound data transfer is charged

One of the main benefits of cloud services is the ability it gives you to optimize costs to match your needs, even as those needs change. AWS services do not have complex dependencies or licensing requirements, so you can get exactly what you need to build innovative, cost-effective solutions using the latest technology.

There are three fundamental drivers of cost with AWS: compute, storage, and outbound data transfer. These characteristics vary somewhat, depending on the AWS product and pricing model you choose. Outbound data to the internet from all AWS regions is billed at region-specific, tiered data transfer rates. Inbound data transfer into all AWS regions from the internet is free.

Submit
108. Where you could mantain, discover and manage the developed services?

Explanation

The correct answer is ESR, which stands for Enterprise Services Repository. ESR is a centralized repository where you can maintain, discover, and manage the developed services. It allows you to store and organize service definitions, interface descriptions, and other related artifacts. With ESR, you can easily access and manage the services within your organization, making it a crucial component for service-oriented architecture and enterprise integration.

Submit
109. Which are the characteristics of the perspectives of BPM

Explanation

The correct answer is that Process modeling is a subset of Process Development perspective, and Process Development offers a full set of capabilities for design, implement, build, and deploy a process. This means that process modeling is a part of the larger process development perspective, and process development encompasses a broader range of capabilities for the entire process lifecycle.

Submit
110. Which ways are used to create a BPM project on NWDS

Explanation

The correct answer is a combination of two options: "New project- choose Process -> create Pool -> create Lane" and "Go to process development perspective -> New Project -> create Pool -> Create Lane". These options suggest that in order to create a BPM project on NWDS, one needs to start by creating a new project, then choose the process option, and finally create a pool and a lane within that project. The second option emphasizes the need to go to the process development perspective before creating the pool and lane.

Submit
111. AWS. Which of the following statements are CORRECT regarding the Availability Zone (AZ) specific characteristics of Amazon Elastic Block Store (EBS) and Amazon Elastic File System (Amazon EFS) storage types?

Explanation

EBS volume can be attached to a single instance in the same Availability Zone (AZ) whereas EFS file system can be mounted on instances across multiple Availability Zones (AZ)

Amazon Elastic File System (Amazon EFS) provides a simple, scalable, fully managed elastic NFS file system for use with AWS Cloud services and on-premises resources. It is built to scale on-demand to petabytes without disrupting applications, growing and shrinking automatically as you add and remove files, eliminating the need to provision and manage capacity to accommodate growth.

The service is designed to be highly scalable, highly available, and highly durable. Amazon EFS file systems store data and metadata across multiple Availability Zones (AZ) in an AWS Region. EFS file system can be mounted on instances across multiple Availability Zones (AZ).

Amazon Elastic Block Store (EBS) is an easy to use, high-performance block storage service designed for use with Amazon Elastic Compute Cloud (EC2) for both throughput and transaction-intensive workloads at any scale.

Designed for mission-critical systems, EBS volumes are replicated within an Availability Zone (AZ) and can easily scale to petabytes of data. You can attach an available EBS volume to one instance that is in the same Availability Zone (AZ) as the volume.

Submit
112. AWS. A company wants to improve the resiliency of its flagship application so it wants to move from its traditional database system to a managed AWS NoSQL database service to support active-active configuration in both the East and West US AWS regions. The active-active configuration with cross-region support is the prime criteria for any database solution that the company considers. Which AWS database service is the right fit for this requirement?

Explanation

Amazon DynamoDB with global tables

Amazon DynamoDB is a fully managed, serverless, key-value NoSQL database designed to run high-performance applications at any scale. DynamoDB offers built-in security, continuous backups, automated multi-region replication, in-memory caching, and data export tools.

DynamoDB global tables replicate data automatically across your choice of AWS Regions and automatically scale capacity to accommodate your workloads. With global tables, your globally distributed applications can access data locally in the selected regions to get single-digit millisecond read and write performance. DynamoDB offers active-active cross-region support that is needed for the company.

Submit
113. AWS. A Project Manager, working on AWS for the first time, is confused about how credits are used in AWS. There are two credits available in the manager's account. Credit one is for $100, expires July 2022, and can be used for either Amazon S3 or Amazon EC2. Credit two is for $50, expires December 2022, and can be used only for Amazon EC2. The manager's AWS account has incurred two charges: $1000 for Amazon EC2 and $500 for Amazon S3. What will be the outcome on the overall bill once the credits are used? (Select two)

Explanation

Credit one is applied, which expires in July, to the Amazon EC2 charge which leaves you with a $900 Amazon EC2 charge and a $500 Amazon S3 charge

Then, credit two is applied to the remaining $900 of Amazon EC2 usage

Credits are applied in the following order:

Soonest expiring

Least number of applicable products

Oldest credit

For the given use case, credit one is applied, which expires in July, to the Amazon EC2 charge which leaves you with a $900 Amazon EC2 charge and a $500 Amazon S3 charge. Then, credit two is applied to the remaining $900 of Amazon EC2 usage. You need to pay $850 for Amazon EC2 and $500 for Amazon S3. All your credits are now exhausted.

Submit
114. AWS. A company's flagship application runs on a fleet of Amazon Elastic Compute Cloud (Amazon EC2) instances. As per the new policies, the system administrators are looking for the best way to provide secure shell access to Amazon Elastic Compute Cloud (Amazon EC2) instances without opening new ports or using public IP addresses. Which tool/service will help you achieve this requirement?

Explanation

AWS Systems Manager Session Manager

AWS Systems Manager Session Manager is a fully-managed service that provides you with an interactive browser-based shell and CLI experience. It helps provide secure and auditable instance management without the need to open inbound ports, maintain bastion hosts, and manage SSH keys. AWS Systems Manager Session Manager helps to enable compliance with corporate policies that require controlled access to instances, increase security and auditability of access to the instances while providing simplicity and cross-platform instance access to end-users.

Submit
115. Which are the security profile options of stateless interface pattern?

Explanation

The security profile options of the stateless interface pattern are NO, Low, and High. These options determine the level of security applied to the interface. "NO" indicates that no security measures are implemented, "Low" suggests minimal security measures, and "High" signifies the highest level of security. These options allow for flexibility in choosing the appropriate security profile based on the specific requirements and sensitivity of the interface.

Submit
116. Which kind of quality services are supported by BPM

Explanation

BPM, or Business Process Management, supports both Best Effort and Exactly Once quality services. Best Effort refers to delivering a service without any guarantees or assurances, while Exactly Once ensures that a service is executed only once and not duplicated. BPM can support both of these quality services depending on the specific requirements and needs of the business process being managed.

Submit
117. AWS. Under the AWS Shared Responsibility Model, which of the following is a shared responsibility of both AWS and the customer?

Explanation

Configuration Management

Security and Compliance is a shared responsibility between AWS and the customer. This shared model can help relieve the customer’s operational burden as AWS operates, manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates.

Controls that apply to both the infrastructure layer and customer layers, but in completely separate contexts or perspectives are called shared controls. In a shared control, AWS provides the requirements for the infrastructure and the customer must provide their own control implementation within their use of AWS services. Configuration Management forms a part of shared controls - AWS maintains the configuration of its infrastructure devices, but a customer is responsible for configuring their own guest operating systems, databases, and applications.

Shared Responsibility Model Overview: 

Submit
118. Which is the signature of RFC Function imported in SAP PI

Explanation

The signature of a function module is simply its import/export/tables/exceptions etc definition from SE37. SE37 is the transaction code in SAP PI used to view and maintain function modules. It allows developers to define the input and output parameters, tables, and exceptions for a function module. Therefore, the correct answer is that the signature of a function module is simply its import/export/tables/exceptions etc definition from SE37.

Submit
119. SAP NWDI (Netweaver Developer Infraestructure) provide the following services:

Explanation

SAP NWDI (Netweaver Developer Infrastructure) provides various services for developers. The DTR (Design Time Repository) acts as a central source code administration and versioning system, allowing developers to manage and control their code. The CMS (Change Management System) enables the transport of code from development systems to other systems, ensuring smooth deployment. The CBS (Component Build Services) allows for central building, making it easier for developers to build and compile their components. These services together provide a comprehensive infrastructure for developers to efficiently manage and develop their applications.

Submit
120. AWS. A company uses reserved EC2 instances across multiple units with each unit having its own AWS account. However, some of the units under-utilize their reserved instances while other units need more reserved instances. As a Cloud Practitioner, which of the following would you recommend as the most cost-optimal solution?

Explanation

Use AWS Organizations to manage AWS accounts of all units and then share the reserved EC2 instances amongst all units

AWS Organizations helps you to centrally manage billing; control access, compliance, and security; and share resources across your AWS accounts. Using AWS Organizations, you can automate account creation, create groups of accounts to reflect your business needs, and apply policies for these groups for governance. You can also simplify billing by setting up a single payment method for all of your AWS accounts. AWS Organizations is available to all AWS customers at no additional charge.

Submit
121. AWS. A startup wants to provision an EC2 instance for the lowest possible cost for a long-term duration but needs to make sure that the instance would never be interrupted. As a Cloud Practitioner, which of the following options would you recommend?

Explanation

EC2 Reserved Instance (RI)

An EC2 Reserved Instance (RI) provides you with significant savings (up to 75%) on your Amazon EC2 costs compared to On-Demand Instance pricing. A Reserved Instance (RI) is not a physical instance, but rather a billing discount applied to the use of On-Demand Instances in your account. You can purchase a Reserved Instance (RI) for a one-year or three-year commitment, with the three-year commitment offering a bigger discount. A reserved instance (RI) cannot be interrupted. So this is the correct option.

Submit
122. AWS. Which of the following AWS Support plans provide access to guidance, configuration, and troubleshooting of AWS interoperability with third-party software? (Select two)

Explanation

AWS Enterprise Support

AWS Enterprise Support provides customers with concierge-like service where the main focus is helping the customer achieve their outcomes and find success in the cloud. With Enterprise Support, you get 24x7 technical support from high-quality engineers, tools and technology to automatically manage the health of your environment, consultative architectural guidance delivered in the context of your applications and use-cases, and a designated Technical Account Manager (TAM) to coordinate access to proactive/preventative programs and AWS subject matter experts. You get access to guidance, configuration, and troubleshooting of AWS interoperability with many common operating systems, platforms, and application stack components.

AWS Business Support

You should use AWS Business Support if you have production workloads on AWS and want 24x7 phone, email and chat access to technical support and architectural guidance in the context of your specific use-cases. You get full access to AWS Trusted Advisor Best Practice Checks. You get access to guidance, configuration, and troubleshooting of AWS interoperability with many common operating systems, platforms, and application stack components.

Submit
123. AWS. A social media company wants to protect its web application from common web exploits such as SQL injection and cross-site scripting. Which of the following AWS services can be used to address this use-case?

Explanation

AWS Web Application Firewall (AWS WAF)

AWS Web Application Firewall (AWS WAF) is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS Web Application Firewall (AWS WAF) gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns such as SQL injection or cross-site scripting. You can also use rate-based rules to mitigate the Web layer DDoS attack.

Submit
124. Which rol is focus on the operational process and report to the process owner?

Explanation

The correct answer is Process Manager. The Process Manager is responsible for overseeing the operational process and reporting to the process owner. They are in charge of ensuring that the process is running smoothly and efficiently, and they coordinate and manage the activities of the process participants. The Process Manager plays a key role in implementing and improving the process, and they are accountable for its success.

Submit
125. Does BPM support Message Attachments

Explanation

BPM (Business Process Management) does not inherently support message attachments. BPM systems primarily focus on managing and automating business processes, such as workflow management and task allocation, rather than handling message attachments. While some BPM systems may have the capability to handle attachments as part of a specific process, it is not a fundamental feature of BPM. Therefore, the correct answer is false.

Submit
126. AWS. The DevOps team at an IT company is moving 500 GB of data from an EC2 instance to an S3 bucket in the same region. Which of the following scenario captures the correct charges for this data transfer?

Explanation

The company would not be charged for this data transfer

There are three fundamental drivers of cost with AWS: compute, storage, and outbound data transfer. In most cases, there is no charge for inbound data transfer or data transfer between other AWS services within the same region. Outbound data transfer is aggregated across services and then charged at the outbound data transfer rate.

Per AWS pricing, data transfer between S3 and EC2 instances within the same region is not charged, so there would be no data transfer charge for moving 500 GB of data from an EC2 instance to an S3 bucket in the same region.

Submit
127. AWS. A web application stores all of its data on Amazon S3 buckets. A client has mandated that data be encrypted before sending it to Amazon S3. Which of the following is the right technique for encrypting data as needed by the customer?

Explanation

Enable client-side encryption using AWS encryption SDK

The act of encrypting data before sending it to Amazon S3 is termed as client-side encryption. The AWS encryption SDK is a client-side encryption library that is separate from the language–specific SDKs. You can use this encryption library to more easily implement encryption best practices in Amazon S3. Unlike the Amazon S3 encryption clients in the language–specific AWS SDKs, the AWS encryption SDK is not tied to Amazon S3 and can be used to encrypt or decrypt data to be stored anywhere.

Submit
128. AWS. Which cost management tool gives you the gives you the ability to be alerted when the actual or forecasted cost and usage exceed your desired threshold?

Explanation

X.509 certificates, HTTP with client authentication, and SAP logon tickets are all valid authorizations that can be used for SAP PI. X.509 certificates provide a secure way to authenticate and authorize users, while HTTP with client authentication allows for authentication using HTTP protocols. SAP logon tickets are another form of authorization that can be used to grant access to SAP systems. These different authorization methods provide flexibility and security in managing access to SAP PI.

Submit
129. Which steps are included in Bottom-up approach?

Explanation

The correct answer is 1.Creating and Importing business logic of the process steps (task, web services, rules) 2. Creating a process 3. Creating the process steps, represented by activities. This is the correct order of steps in a bottom-up approach. First, the business logic of the process steps is created and imported, which includes defining tasks, web services, and rules. Then, the process itself is created. Finally, the process steps are created and represented by activities. This approach starts with the detailed implementation of individual steps and gradually builds up to the overall process.

Submit
130. How Do you Search for the PI Message of an Inbound iDoc if You Know the iDoc Number?

Explanation

The correct answer is that the PI message ID can be found in the iDoc Control record. This means that if you know the iDoc number, you can search for the PI message by accessing the iDoc Control record. The PI message ID is stored within this record, allowing you to easily locate the message associated with the iDoc.

Submit
131. Which pattern can be used for services interfaces catergory abstract?

Explanation

The pattern that can be used for services interfaces in the abstract category is the stateless pattern. This pattern ensures that each request from a client is treated as an independent transaction and does not rely on any previous requests or stored information. The stateless (XI 3.0 compatible) option indicates that the stateless pattern is compatible with version 3.0 of the XI software.

Submit
132. Managing the lifecycle of a BPM involves the following phases:

Explanation

The correct answer is the order in which the phases of managing the lifecycle of a BPM occur. The first phase is designing the BPM graphically, which involves creating a visual representation of the business processes. The next phase is modeling, where the designed BPM is converted into a more detailed and structured model. After that, the BPM is executed, meaning it is implemented and put into action. Monitoring is the next phase, where the performance and effectiveness of the BPM are observed and analyzed. Finally, the phase of improvement focuses on continuously improving the modeled business processes based on the monitoring results.

Submit
133. Which of the following logs alow users to search exception IDs and time constraint issues

Explanation

The J2EE engine log allows users to search exception IDs and time constraint issues. This log contains information about the execution of the Java 2 Platform, Enterprise Edition (J2EE) engine, which is responsible for running Java applications in a server environment. By searching this log, users can identify and troubleshoot any exceptions or issues related to time constraints that may have occurred during the execution of the J2EE engine.

Submit
134. How to open a perspective in NWDS?

Explanation

The correct answer options provide different ways to open a perspective in NWDS. The first option suggests choosing the "window" menu, then selecting "open perspective" and choosing the desired perspective from the "Other" option. The second option suggests using the "open perspective" icon to directly open a perspective. The third option suggests using the "last used" icon to open the perspective that was last used.

Submit
135. AWS. An online gaming company wants to block users from certain geographies from accessing its content. Which AWS service can be used to accomplish this task?

Explanation

AWS Web Application Firewall (AWS WAF)

AWS Web Application Firewall (AWS WAF) is a web application firewall that helps protect web applications from attacks by allowing you to configure rules that allow, block, or monitor (count) web requests based on conditions that you define. These conditions include IP addresses, HTTP headers, HTTP body, URI strings, SQL injection, and cross-site scripting. You can use the IP address based match rule to block specific geographies. The accuracy of the IP Address to country lookup database varies by Region. Based on recent tests, AWS mentions that the overall accuracy for the IP address to country mapping is 99.8%.

Submit
136. AWS. An IT company wants to run a log backup process every Monday at 2 AM. The usual runtime of the process is 5 minutes. As a Cloud Practitioner, which AWS services would you recommend to build a serverless solution for this use-case? (Select two)

Explanation

Amazon Eventbridge - Amazon EventBridge is a service that provides real-time access to changes in data in AWS services, your own applications, and software as a service (SaaS) applications without writing code. Amazon EventBridge Scheduler is a serverless task scheduler that simplifies creating, executing, and managing millions of schedules across AWS services without provisioning or managing underlying infrastructure.

Amazon Eventbridge Scheduler: 

 via -  https://aws.amazon.com/eventbridge/

AWS Lambda - AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume. The lambda has a maximum execution time of 15 minutes, so it can be used to run this log backup process.

To build the solution for the given use-case, you can leverage the Amazon EventBridge Scheduler to trigger on a schedule. You can then set the Lambda as the target for this rule.

Submit
137. Which of the following adapters uses polling to retrieve messages from the sender communication component?

Explanation

RFC (Remote Function Call) is the correct answer because it uses polling to retrieve messages from the sender communication component. In polling, the receiver repeatedly checks for new messages from the sender by sending requests at regular intervals. This method allows the receiver to actively retrieve messages when they become available, rather than relying on a push-based notification system. JMS (Java Message Service), iDocs, and SOAP do not use polling as their primary method of retrieving messages from the sender.

Submit
138. What you can make in the ESR WEB UI?

Explanation

In the ESR WEB UI, you can perform various actions such as searching for specific information, subscribing to receive updates or notifications, managing different aspects or settings, and appending or adding additional data or content. These actions allow users to effectively navigate and utilize the ESR WEB UI for their specific needs and requirements.

Submit
139. Which of the following logs help analyze with web services and RFC calls

Explanation

The connection log helps analyze web services and RFC calls. This log provides information about the connections made to the web services and RFCs, including details such as the source and destination of the connection, the time of the connection, and any errors or issues encountered during the connection. By analyzing the connection log, one can identify any issues or bottlenecks in the web services and RFC calls, and take appropriate actions to resolve them.

Submit
140. Does BPM Support Aknowledgements?

Explanation

BPM (Business Process Management) systems do not typically support acknowledgements. BPM systems are designed to automate and streamline business processes, such as workflow management, task assignment, and data integration. While acknowledgements may be a part of certain business processes, BPM systems themselves do not have built-in support for handling acknowledgements.

Submit
141. AWS. Which of the follogin contains 1 or more physically separated data centers

Explanation

It is possible to select multiple users as administrators for a pool. This allows for shared responsibility and access to the pool's settings and management tasks. Multiple administrators can collaborate and make changes to the pool as needed, ensuring efficient management and flexibility in assigning administrative roles.

Submit
142. AWS. The root account should be protected by multi-factor authentication

Explanation

The best practice to associate a user to a pool is to specify a role or a group. This allows for better organization and management of users within the pool. By assigning users to specific roles or groups, it becomes easier to control access rights and permissions. Roles define the user's job or responsibilities, while groups categorize users based on common attributes. Both approaches help streamline the process of associating users to a pool and ensure that they have the appropriate level of access and privileges.

Submit
143. AWS. Which features of AWS reduce your total cost of ownership (TCO)? Choose 3

Explanation

The correct answer explains that the seamless integration between the components of NWDI is achieved by creating and storing Development Components in a central repository. The DTR (Development Component Repository) is used to build an automated Build process using the CBS (Change and Transport System) and the result is then distributed through a defined software logistic process. This ensures that the components are effectively integrated and the changes are properly managed and distributed.

Submit
144. AWS. A company wants a fully managed, flexible, and scalable file storage system, with low latency access, for its Windows-based applications. Which AWS service is the right choice for the company?

Explanation

Amazon FSx for Windows File Server

Amazon FSx for Windows File Server provides fully managed, highly reliable, and scalable file storage that is accessible over the industry-standard Service Message Block (SMB) protocol. It is built on Windows Server, delivering a wide range of administrative features such as user quotas, end-user file restore, and Microsoft Active Directory (AD) integration.

To support a wide spectrum of workloads, Amazon FSx provides high levels of throughput, IOPS and consistent sub-millisecond latencies. Amazon FSx is accessible from Windows, Linux, and macOS compute instances and devices.

For Windows-based applications, Amazon FSx provides fully managed Windows file servers with features and performance optimized for "lift-and-shift" business-critical application workloads including home directories (user shares), media workflows, and ERP applications. It is accessible from Windows and Linux instances via the SMB protocol.

Submit
145. AWS. As per the AWS Shared Responsibility Model, which of the following is a responsibility of AWS from a security and compliance point of view?

Explanation

Edge Location Management

Security and Compliance is a shared responsibility between AWS and the customer. The AWS Shared Responsibility Model can help relieve the customer’s operational burden as AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates.

AWS is responsible for security "of" the cloud. This covers their global infrastructure elements including Regions, Availability Zones (AZ), and Edge Locations.

Submit
146. AWS. A photo sharing web application wants to store thumbnails of user-uploaded images on Amazon Simple Storage Service (Amazon S3). The thumbnails are rarely used but need to be immediately accessible from the web application. The thumbnails can be regenerated easily if they are lost. Which is the most cost-effective way to store these thumbnails on Amazon Simple Storage Service (Amazon S3)?

Explanation

Use Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA) to store the thumbnails

Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA) is for data that is accessed less frequently but requires rapid access when needed. Unlike other S3 Storage Classes which store data in a minimum of three Availability Zones (AZs), Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA) stores data in a single Availability Zone (AZ) and costs 20% less than Amazon S3 Standard-Infrequent Access (S3 Standard-IA). Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA) offers the same high durability, high throughput, and low latency of S3 Standard, with a low per GB storage price and per GB retrieval fee. Although Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA) offers less availability than S3 Standard but that's not an issue for the given use-case since the thumbnails can be regenerated easily.

As the thumbnails are rarely used but need to be rapidly accessed when required, so Amazon S3 One Zone-Infrequent Access (S3 One Zone-IA) is the best choice for this use-case.

Exam Alert:

Please review this detailed comparison on S3 Storage Classes as you can expect a few questions on this aspect of S3: 

Submit
147. AWS. The engineering team at an IT company wants to monitor the CPU utilization for its fleet of Amazon Elastic Compute Cloud (Amazon EC2) instances and send an email to the administrator if the utilization exceeds 80%. As a Cloud Practitioner, which AWS services would you recommend to build this solution? (Select two)

Explanation

Amazon CloudWatch - Amazon CloudWatch is a monitoring and observability service built for DevOps engineers, developers, site reliability engineers (SREs), and IT managers. CloudWatch provides data and actionable insights to monitor applications, respond to system-wide performance changes, optimize resource utilization, and get a unified view of operational health. You can create an CloudWatch alarm that sends an email message using Amazon SNS when the alarm changes state from OK to ALARM. The alarm changes to the ALARM state when the average CPU use of an EC2 instance exceeds a specified threshold for consecutive specified periods.

Amazon Simple Notification Service (SNS) - Amazon Simple Notification Service (SNS) is a highly available, durable, secure, fully managed pub/sub messaging service that enables you to decouple microservices, distributed systems, and serverless applications.

Submit
148. Which elements you could create with a speed button?

Explanation

A speed button is a feature that allows for the quick creation of various elements in a software or application. With a speed button, you can create activities (such as human, automated, or mapping activities) or subprocesses. Additionally, you can create gateways, including exclusive choice, parallel split, and parallel join gateways. Furthermore, you can create artifacts like data objects and annotations, as well as events and interfaces. The speed button provides a convenient and efficient way to create these elements without having to navigate through multiple menus or options.

Submit
149. What are the responsabilities of the process owner?

Explanation

The responsibilities of the process owner include budgeting the necessary resources for developing the process. This means that the process owner is responsible for determining and allocating the financial resources required to design, implement, and improve the process. This includes identifying the costs associated with activities such as research, training, technology, and any other resources needed to successfully develop the process. By budgeting the necessary resources, the process owner ensures that the process can be effectively and efficiently implemented and maintained.

Submit
150. SAP PI AEX is composed from:

Explanation

SAP PI AEX is composed of SAP AS JAVA, which is a fully compliant J2EE server. This means that it supports the Java programming language and can run Java applications. Additionally, SAP NWDS (NetWeaver Developer Studio) is used for Java development for the AS JAVA. This tool allows developers to create and modify Java applications specifically for the AS JAVA environment. Lastly, the Enterprise Service Builder is included in SAP PI AEX, which is a tool used for designing and configuring enterprise services. This allows users to define and manage the services that are used within the SAP PI AEX system.

Submit
151. AWS. The DevOps team at an e-commerce company is trying to debug performance issues for its serverless application built using a microservices architecture. As a Cloud Practitioner, which AWS service would you recommend addressing this use-case?

Explanation

AWS X-Ray

You can use AWS X-Ray to analyze and debug serverless and distributed applications such as those built using a microservices architecture. With X-Ray, you can understand how your application and its underlying services are performing to identify and troubleshoot the root cause of performance issues and errors.

Submit
152. AWS. A cyber forensics team has detected that AWS owned IP-addresses are being used to carry out malicious attacks. As this constitutes prohibited use of AWS services, which of the following is the correct solution to address this issue?

Explanation

Contact AWS Abuse Team

The AWS Abuse team can assist you when AWS resources are used to engage in abusive behavior.

Please see details of the various scenarios that the AWS Abuse team can address: 

 via -  https://aws.amazon.com/premiumsupport/knowledge-center/report-aws-abuse/

Submit
153. Which components are included in SAP PI (3 correct Answers)

Explanation

The components included in SAP PI are the Integration Server, System Landscape Directory, and Configuration and Monitoring. The Integration Server is responsible for the actual integration of systems and processes. The System Landscape Directory is used for managing the system landscape and configuring integration scenarios. The Configuration and Monitoring component is used for configuring and monitoring the integration processes and scenarios.

Submit
154. AWS. Which of the following are correct statements regarding the AWS Global Infrastructure? (Select two)

Explanation

Each AWS Region consists of a minimum of three Availability Zones (AZ)

Each Availability Zone (AZ) consists of one or more discrete data centers

AWS has the concept of a Region, which is a physical location around the world where AWS clusters its data centers. AWS calls each group of logical data centers an Availability Zone (AZ). Each AWS Region consists of a minimum of three, isolated, and physically separate AZs within a geographic area. Each AZ has independent power, cooling, and physical security and is connected via redundant, ultra-low-latency networks.

An Availability Zone (AZ) is one or more discrete data centers with redundant power, networking, and connectivity in an AWS Region. All AZs in an AWS Region are interconnected with high-bandwidth, low-latency networking, over fully redundant, dedicated metro fiber providing high-throughput, low-latency networking between AZs.

Submit
155. AWS. A company needs a storage solution for a project wherein the data is accessed less frequently but needs rapid access when required. Which S3 storage class is the MOST cost-effective for the given use-case?

Explanation

Amazon S3 Standard-Infrequent Access (S3 Standard-IA)

Amazon S3 Standard-Infrequent Access (S3 Standard-IA) is for data that is accessed less frequently, but requires rapid access when needed. S3 Standard-IA offers the high durability, high throughput, and low latency of S3 Standard, with a low per GB storage price and per GB retrieval fee. This combination of low cost and high performance make S3 Standard-IA ideal for long-term storage, backups, and as a data store for disaster recovery files.

Submit
156. AWS. Which of the following is a true statement about edge locations?

Explanation

The given operations that can be performed on the tasks assigned to you are view, claim, release, and complete. The "view" operation allows you to see the details and information of the tasks. "Claim" operation enables you to take ownership of a task and start working on it. "Release" operation allows you to remove yourself as the owner of a task. "Complete" operation signifies that you have finished the task and it is now marked as done. "Cancel" operation is not included in the list of operations that can be performed on the tasks assigned to you.

Submit
157. Does an invited user can complete a task?

Explanation

The given answer is "NO" because an invited user cannot complete a task. An invited user is someone who has been invited to join a platform or system but may not have the necessary permissions or access to perform tasks. They may have limited functionality or restricted capabilities, preventing them from completing tasks. Therefore, the correct answer is "NO."

Submit
158. You can import interfaces with the structures that have not been defined using Web Service Description Language (WSDL), eXtensible Markup Language Schema Definition (XSD), or Data Type Definition (DTD) into the Enterprise Services Repository (ESR). Determine whether this statement is true or false.

Explanation

The statement is false. The Enterprise Services Repository (ESR) is used to store and manage enterprise services and their corresponding definitions, such as WSDL, XSD, and DTD. It does not allow importing interfaces with structures that have not been defined using these languages.

Submit
159. Which are the three groups of flow objects?

Explanation

The three groups of flow objects are events, tasks, and activities. Events represent something that happens at a specific point in time, such as the start or end of a process. Tasks are the individual steps or actions that need to be completed within a process. Activities are a higher-level representation of a process, which can consist of multiple tasks and events. These flow objects help to define the sequence and structure of a process flow.

Submit
160. AWS. Which option is a common stakeholder role for the AWS Cloud Adoption Framework (AWS CAF) platform perspective? (Select two)

Explanation

Engineer

Chief Technology Officer (CTO)

The AWS Cloud Adoption Framework (AWS CAF) leverages AWS experience and best practices to help you digitally transform and accelerate your business outcomes through innovative use of AWS. AWS CAF identifies specific organizational capabilities that underpin successful cloud transformations. These capabilities provide best practice guidance that helps you improve your cloud readiness. AWS CAF groups its capabilities in six perspectives: Business, People, Governance, Platform, Security, and Operations.

The platform perspective focuses on accelerating the delivery of your cloud workloads via an enterprise-grade, scalable, hybrid cloud environment. It comprises seven capabilities shown in the following figure. Common stakeholders include Chief Technology Officer (CTO), technology leaders, architects, and engineers.

Submit
161. AWS. AWS Web Application Firewall (WAF) offers protection from common web exploits at which layer?

Explanation

Layer 7

AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to an Amazon API Gateway API, Amazon CloudFront or an Application Load Balancer. HTTP and HTTPS requests are part of the Application layer, which is layer 7.

Submit
162. AWS.   Which Amazon Route 53 routing policy would you use to improve the performance for your customers by routing the requests to the AWS endpoint that provides the fastest experience?

Explanation

Latency-based routing

Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost-effective way to route end users to Internet applications by translating names like www.example.com into the numeric IP addresses like 192.0.2.1 that computers use to connect to each other.

If your application is hosted in multiple AWS Regions, you can use latency-based routing policy to improve the performance for your users by serving their requests from the AWS Region that provides the lowest latency. To use latency-based routing, you create latency records for your resources in multiple AWS Regions. When Amazon Route 53 receives a DNS query for your domain or subdomain (example.com or acme.example.com), it determines which AWS Regions you've created latency records for, determines which region gives the user the lowest latency, and then selects a latency record for that region. Amazon Route 53 responds with the value from the selected record, such as the IP address for a web server.

Submit
163. Which of the following are potential uses of the Advances Adapter Engine Extended (AEX)?

Explanation

The Advances Adapter Engine Extended (AEX) can be used for controlling the routing of message exchange between applications, monitoring the exchange of messages between the involved systems, and managing the various versions of the services provided by the ESB.

Submit
164. AWS. Which type of cloud computing does Amazon Elastic Compute Cloud (EC2) represent?

Explanation

Infrastructure as a Service (IaaS)

Cloud Computing can be broadly divided into three types - Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS).

IaaS contains the basic building blocks for cloud IT. It typically provides access to networking features, computers (virtual or on dedicated hardware), and data storage space. IaaS gives the highest level of flexibility and management control over IT resources.

EC2 gives you full control over managing the underlying OS, virtual network configurations, storage, data and applications. So EC2 is an example of an IaaS service.

Submit
165. AWS. Which of the following entities applies patches to the underlying OS for Amazon Aurora?

Explanation

The AWS Product Team automatically

Amazon Aurora is a MySQL and PostgreSQL-compatible relational database built for the cloud. Amazon Aurora is fully managed by Amazon Relational Database Service (RDS), which automates time-consuming administration tasks like hardware provisioning, database setup, patching, and backups. The AWS Product team is responsible for applying patches to the underlying OS for AWS Aurora.

Submit
166. BRM consists of three components; select the items

Explanation

The correct answer is a list of the three components that make up BRM: Rules Composer, Rules Manager, and Rules Engine. These components work together to create, manage, and execute rules within a business rules management system. The Rules Composer is responsible for designing and creating the rules, the Rules Manager is in charge of organizing and maintaining the rules, and the Rules Engine executes the rules in real-time.

Submit
167. Which are the perspectives in the NWDS designed for BPM:

Explanation

The perspectives in the NWDS designed for BPM are Process Modeling and Process Development. These perspectives are specifically tailored for creating and managing business processes within the BPM framework. The Process Modeling perspective allows users to design and model business processes using various tools and features. The Process Development perspective, on the other hand, focuses on developing and implementing these modeled processes by providing tools for coding, testing, and deploying the processes. These perspectives work together to provide a comprehensive environment for BPM activities.

Submit
168. Which relationship do you define in both sender agreement and receiver agreement?

Explanation

In both the sender agreement and receiver agreement, the relationship that is defined is between the service interface and the communication channel. This means that the agreement specifies how the service interface will interact with the communication channel, ensuring proper communication between the sender and receiver components.

Submit
169. Which are the other names that receive the BPM perspectives in NWDS

Explanation

The different perspectives in NWDS that receive the BPM perspectives are the Process modeling perspective as Sketch view and the Process development perspective as developer view. These perspectives allow users to model and develop processes in different ways, with the Sketch view providing a visual representation of the process and the developer view offering a more technical approach to process development.

Submit
170. AWS. Which of the following AWS services support VPC Endpoint Gateway for a private connection from a VPC? (Select two)

Explanation

Amazon Simple Storage Service (Amazon S3)

Amazon DynamoDB

A VPC endpoint enables you to privately connect your VPC to supported AWS services and VPC endpoint services powered by AWS PrivateLink without requiring an internet gateway, NAT device, VPN connection, or AWS Direct Connect connection. Instances in your VPC do not require public IP addresses to communicate with resources in the service. Traffic between your VPC and the other service does not leave the Amazon network.

There are two types of VPC endpoints: interface endpoints and gateway endpoints.

An interface endpoint is an elastic network interface with a private IP address from the IP address range of your subnet that serves as an entry point for traffic destined to a supported service. Interface endpoints are powered by AWS PrivateLink, a technology that enables you to privately access services by using private IP addresses.

A gateway endpoint is a gateway that you specify as a target for a route in your route table for traffic destined to a supported AWS service. The following AWS services are supported:

Amazon Simple Storage Service (Amazon S3)

Amazon DynamoDB

Exam Alert:

You may see a question around this concept in the exam. Just remember that only Amazon S3 and Amazon DynamoDB support VPC gateway endpoint. All other services that support VPC Endpoints use a VPC interface endpoint (note that Amazon S3 supports the VPC interface endpoint as well).

Submit
171. AWS. A multi-national company has just moved its infrastructure from its on-premises data center to AWS Cloud. As part of the shared responsibility model, AWS is responsible for which of the following?

Explanation

Physical and Environmental controls

As part of the shared responsibility model, Physical and Environmental controls are part of the inherited controls and hence these are the responsibility of AWS.

Submit
172. AWS. Which service allows you to select and deploy operating system and software patches automaticvally across large groups of Amanzon EC2 instances?

Explanation

The correct answer is Design Time Repository, Central Build Services, Change Management Service. These elements are provided by SAP to manage large projects. The Design Time Repository is used to store and manage development objects. Central Build Services is used for continuous integration and automated build processes. Change Management Service is used to track and manage changes made to the project. These three elements work together to provide a comprehensive solution for managing large projects in SAP.

Submit
173. AWS. Which tool will help you review your workloads against current AWS best practices for cost optimization, security, and performance improvement and then obtain advice to architect them better?

Explanation

AWS Trusted Advisor

AWS Trusted Advisor is an online tool that provides you real-time guidance to help you provision your resources following AWS best practices on cost optimization, security, fault tolerance, service limits, and performance improvement. Whether establishing new workflows, developing applications, or as part of ongoing improvement, recommendations provided by Trusted Advisor regularly help keep your solutions provisioned optimally. All AWS customers get access to the seven core Trusted Advisor checks to help increase the security and performance of the AWS environment.

Submit
174. What Are the Different Types of User-Defined Functions?

Explanation

The correct answer includes four different types of user-defined functions: Single Value, All Values in Context, All Values in Queue, and Single context. These types are used to define different behaviors and functionalities for user-defined functions. The Single Value type returns a single value as the result of the function. The All Values in Context type returns all the values in the current context. The All Values in Queue type returns all the values in the queue. The Single context type returns a single context value.

Submit
175. Which are the three ways to create an start event?

Explanation

The three ways to create a start event are WSDL Abstract (ESR), WSDL Concrete (Ws Provider), and WSDL self create. These methods involve using different types of WSDL files to define the start event in a system. WSDL Abstract (ESR) refers to using an abstract WSDL file from the Enterprise Service Repository, WSDL Concrete (Ws Provider) involves using a concrete WSDL file from a web service provider, and WSDL self create means creating a WSDL file manually. These methods provide flexibility in creating start events depending on the specific requirements of the system.

Submit
176. AWS. Which of the following is a recommended way to provide programmatic access to AWS resources?

Explanation

Use Access Key ID and Secret Access Key to access AWS resources programmatically

Access keys are long-term credentials for an IAM user or the AWS account root user. You can use access keys to sign programmatic requests to the AWS CLI or AWS API (directly or using the AWS SDK). Access keys consist of two parts: an access key ID and a secret access key. As a user name and password, you must use both the access key ID and secret access key together to authenticate your requests. When you create an access key pair, save the access key ID and secret access key in a secure location. The secret access key is available only at the time you create it. If you lose your secret access key, you must delete the access key and create a new one.

Submit
177. AWS. Which AWS Support plan provides architectural guidance contextual to your specific use-cases?

Explanation

AWS Business Support

You should use AWS Business Support if you have production workloads on AWS and want 24x7 phone, email and chat access to technical support and architectural guidance in the context of your specific use-cases. You get full access to AWS Trusted Advisor Best Practice Checks. You also get access to Infrastructure Event Management for an additional fee.

Submit
178. AWS. Which of the following is a serverless AWS service?

Explanation

AWS Lambda

AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume. With Lambda, you can run code for virtually any type of application or backend service - all with zero administration. Just upload your code and Lambda takes care of everything required to run and scale your code with high availability.

Submit
179. AWS. Which tool/service will help you access AWS services using programming language-specific APIs?

Explanation

AWS Software Developer Kit (SDK)

SDKs take the complexity out of coding by providing language-specific APIs for AWS services. For example, the AWS SDK for JavaScript simplifies the use of AWS Services by providing a set of libraries that are consistent and familiar for JavaScript developers. It provides support for API lifecycle considerations such as credential management, retries, data marshaling, serialization, and deserialization. AWS SDKs are offered in several programming languages to make it simple for developers working on different programming and scripting languages. So, AWS SDK can help with using AWS services from within an application using language-specific APIs.

Submit
180. AWS. Which service gives a personalized view of the status of the AWS services that are part of your Cloud architecture so that you can quickly assess the impact on your business when AWS service(s) are experiencing issues?

Explanation

AWS Health - Your Account Health Dashboard

AWS Health - Your Account Health Dashboard provides alerts and remediation guidance when AWS is experiencing events that may impact you.

With AWS Health - Your Account Health Dashboard, alerts are triggered by changes in the health of your AWS resources, giving you event visibility, and guidance to help quickly diagnose and resolve issues.

You can check on this page  https://phd.aws.amazon.com/phd/home to get current status information.

Submit
181. AWS. An organization has a complex IT architecture involving a lot of system dependencies and it wants to track the history of changes to each resource. Which AWS service will help the organization track the history of configuration changes for all the resources?

Explanation

AWS Config

AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. Think resource-specific history, audit, and compliance; think Config.

With AWS Config, you can do the following: 1. Evaluate your AWS resource configurations for desired settings. 2. Get a snapshot of the current configurations of the supported resources that are associated with your AWS account. 3. Retrieve configurations of one or more resources that exist in your account. 4. Retrieve historical configurations of one or more resources. 5. Receive a notification whenever a resource is created, modified, or deleted. 6.View relationships between resources. For example, you might want to find all resources that use a particular security group.

Submit
182. Which of the following logs contains information about BPM processes and task

Explanation

The correct answer is the Business log. The Business log contains information about BPM (Business Process Management) processes and tasks. This log captures data related to the execution of business processes, including process instances, tasks, and their statuses. It provides insights into the flow and performance of business processes, allowing for monitoring, analysis, and troubleshooting of BPM processes and tasks.

Submit
183. AWS. A company wants to move to AWS cloud and release new features with quick iterations by utilizing relevant AWS services whenever required. Which of the following characteristics of AWS Cloud does it want to leverage?

Explanation

Agility

In the world of cloud computing, "Agility" refers to the ability to rapidly develop, test and launch software applications that drive business growth Another way to explain "Agility" - AWS provides a massive global cloud infrastructure that allows you to quickly innovate, experiment and iterate. Instead of waiting weeks or months for hardware, you can instantly deploy new applications. This ability is called Agility.

Submit
184. AWS. Which AWS services can be used to decouple components of a microservices based application on AWS Cloud? (Select two)

Explanation

Amazon Simple Queue Service (SQS)

Amazon Simple Queue Service (SQS) is a fully managed message queuing service that enables you to decouple and scale microservices, distributed systems, and serverless applications. Using SQS, you can send, store, and receive messages between software components at any volume, without losing messages or requiring other services to be available.

Amazon Simple Notification Service (SNS)

Amazon Simple Notification Service (SNS) is a highly available, durable, secure, fully managed pub/sub messaging service that enables you to decouple microservices, distributed systems, and serverless applications. Using Amazon SNS topics, your publisher systems can fan-out messages to a large number of subscriber endpoints for parallel processing, including Amazon SQS queues, AWS Lambda functions, and HTTP/S webhooks. Additionally, SNS can be used to fan out notifications to end users using mobile push, SMS, and email.

Therefore, both SNS and SQS can be used to decouple components of a microservices-based application.

Please review this reference architecture for building a decoupled order processing system using SNS and SQS: 

Submit
185. AWS. A company is using a message broker service on its on-premises application and wants to move this messaging functionality to AWS Cloud. Which of the following AWS services is the right choice to move the existing functionality easily?

Explanation

Amazon MQ

Amazon MQ is a managed message broker service for Apache ActiveMQ and RabbitMQ that makes it easy to set up and operate message brokers on AWS. Amazon MQ reduces your operational responsibilities by managing the provisioning, setup, and maintenance of message brokers for you. Because Amazon MQ connects to your current applications with industry-standard APIs and protocols, you can easily migrate to AWS without having to rewrite code.

If you're using messaging with existing applications, and want to move the messaging functionality to the cloud quickly and easily, AWS recommends you consider Amazon MQ. It supports industry-standard APIs and protocols so you can switch from any standards-based message broker to Amazon MQ without rewriting the messaging code in your applications. If you are building brand new applications in the cloud, AWS recommends you consider Amazon SQS and Amazon SNS.

Submit
186. Which elements are used to design the User Interface

Explanation

Visual Composer, Web Dynpro, and JSP/Servlet are all elements that can be used to design the User Interface. Visual Composer is a tool that allows for drag-and-drop creation of UI components. Web Dynpro is a framework used to develop user interfaces for web applications. JSP/Servlet is a technology that allows for the creation of dynamic web content and is commonly used for building UI components. Java Beans are not typically used for designing UI, but rather for encapsulating and managing data within an application.

Submit
187. Which methods can be used to construct services interfaces?

Explanation

The methods that can be used to construct service interfaces are through messages types / data types, through RFC or IDOC messages as counterparts for an RFC or IDOC, and through external WSDL, XSD, and DT. These methods involve defining the structure and format of the messages that will be exchanged between the service provider and consumer. Messages types / data types define the structure of the data being exchanged, RFC or IDOC messages provide a standardized format for integration with SAP systems, and external WSDL, XSD, and DT allow for interoperability with other systems by defining the interface using industry-standard formats.

Submit
188. Which are the objects for process development and process modeling perspective?

Explanation

From a process development and process modeling perspective, the objects include abstract events, activities, and gateways. Abstract events represent triggers or signals that initiate or interrupt a process. Activities are the tasks or actions that need to be performed within the process. Gateways are used to control the flow of the process and make decisions based on certain conditions. These objects are essential for designing and optimizing processes in order to achieve efficient and effective outcomes.

Submit
189. For processing a request ______  must be available on Process Integration (Pl)

Explanation

Technical routing must be available on Process Integration (Pl) server for processing a request. Technical routing is a mechanism used in Process Integration to determine the appropriate receiver system for a message based on predefined rules and conditions. It ensures that the message is directed to the correct destination system for further processing. Without technical routing, the system would not be able to determine the correct path for the request, leading to processing errors or failures.

Submit
190. AWS. Which service provides the easiest way to set up and govern a secure, multi-account AWS enviroment?

Explanation

The correct answer suggests that using AEX helps to close the gap between the dual stack and the JAVA environment. Additionally, it states that IDoc and HTTP have been redeveloped to run on the AAE (Advanced Adapter Engine). This implies that AEX provides a solution for integrating and running IDoc and HTTP protocols on the AAE, further enhancing its functionality and compatibility.

Submit
191. Which of the following adapters run over Java Stack

Explanation

The correct answer is that the RFC adapter, SAP Business Connector adapter, file/FTP adapter, JDBC adapter, JMS adapter, SOAP adapter, Marketplace Adapter, Mail adapter, RNIF adapter, and CIDX adapter all run over the Java Stack.

Submit
192. AWS. Which AWS service enables users to find, buy, and immediately start using software solutions in their AWS environment?

Explanation

AWS Marketplace

AWS Marketplace is a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on AWS. AWS Marketplace includes thousands of software listings from popular categories such as security, networking, storage, machine learning, IoT, business intelligence, database, and DevOps. You can use AWS Marketplace as a buyer (subscriber) or as a seller (provider), or both. Anyone with an AWS account can use AWS Marketplace as a consumer and can register to become a seller.

Submit
193. The BPM components

Explanation

The correct answer includes four BPM components: Process Composer, Process Server, Process Desk, and Process Context. Process Composer is a tool used to design and model business processes. Process Server is responsible for executing and managing the processes. Process Desk is a user interface that allows users to interact with and monitor the processes. Process Context provides the necessary context and information for the processes to run effectively. Together, these components form a comprehensive BPM system that enables efficient process management and automation.

Submit
194. AWS. Multi-AZ deployment is an example of which of the following?

Explanation

High Availability

A system that is available is capable of delivering the designed functionality at a given point in time. Highly available systems are those that can withstand some measure of degradation while still remaining available. On AWS Cloud, you can run instances for an application in a multi-AZ deployment to achieve High Availability.

Submit
195. How is controlled a looping activity?

Explanation

A looping activity is controlled by a bound list in the process context. This means that the loop is executed based on a predefined list of items or data in the overall process. The loop will continue until all the items in the list have been processed. The process context refers to the larger context or environment in which the loop is being executed. By having a bound list in the process context, the looping activity can be controlled and managed effectively.

Submit
196. What happen when an iflow is deployed?

Explanation

When an iflow is deployed, a receiver agreement is created. This agreement defines the communication parameters between the sender and receiver systems, such as the message format, protocol, and endpoint information. Additionally, an integrated configuration is created, which specifies the routing and mapping rules for the iflow. This configuration ensures that the correct data is sent to the correct destination system.

Submit
197. AWS.   Which of the following is CORRECT regarding removing an AWS account from AWS Organizations?

Explanation

The AWS account must be able to operate as a standalone account. Only then it can be removed from AWS organizations

You can remove an account from your organization only if the account has the information that is required for it to operate as a standalone account. For each account that you want to make standalone, you must accept the AWS Customer Agreement, choose a support plan, provide and verify the required contact information, and provide a current payment method. AWS uses the payment method to charge for any billable (not AWS Free Tier) AWS activity that occurs while the account isn't attached to an organization.

Submit
198. You need to migrate a SAP PI 7.1 system, which ways you could offer

Explanation

The correct answer suggests three possible ways to migrate a SAP PI 7.1 system. One option is to install an AEX stand-alone system. Another option is to migrate to SAP PI 7.40. The third option is to migrate to SAP PI 7.50 with dual usage. These options provide different paths for migrating the system, allowing for flexibility and the ability to choose the most suitable approach based on specific requirements and considerations.

Submit
199. You have an scenario where system A and System B have an integration using an Iflow, which component is in charge of this communication at runtime

Explanation

The integration engine is responsible for the communication between system A and system B at runtime. It is the component that handles the integration process, ensuring that data and messages are exchanged correctly and efficiently between the two systems. The integration engine is designed to handle the complexities of integrating different systems and ensures smooth communication between them.

Submit
200. Can referenced subflows read through the context of the outer process?

Explanation

Referenced subflows cannot directly read through the context of the outer process. When a subflow is referenced, it runs independently and has its own context. It cannot access or modify the variables or data of the outer process unless they are explicitly passed as input or output parameters. Therefore, the correct answer is false.

Submit
View My Results

Quiz Review Timeline (Updated): Oct 29, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 29, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 08, 2019
    Quiz Created by
    Lina
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
AWS. A company wants to have control over creating and using its...
AWS. AWS Shield Advanced provides expanded DDoS attack protection...
AWS. Which of the following statements are CORRECT regarding the...
AWS. A customer has created a VPC and a subnet within AWS Cloud....
AWS. Which of the following AWS services allows a database to...
The ... acts as a central point of information for all interfaces.
The JAVA component SLD Data supplier is deployed and started for the...
The ico and iflow share the same database?
The SuccessFactors (SFSF) adapter supports which message protocols?...
The enterprise service repository whitin the software components...
AWS.  ...
AWS. Which service allows you to simplify billing by using a single...
AWS. Who can assist with accelerating the migration of legacy contact...
AWS. According to the AWS Shared Responsibility Model, which of...
AWS. Which of the following statements are true about AWS Lambda?...
What is a perspective in NWDS
AWS. Compared to the on-demand instance prices, what is the...
AWS. Which of the following is an AWS database service?
AWS. Which AWS Route 53 routing policy would you use to route...
AWS. Which cost management tool allows you to see the most detailed...
AWS. Which AWS Trusted Advisor real-time guidance recommendations are...
AWS. Which of the following usage will always be free even after the...
AWS. Which AWS service should be used when you want to run...
Which element you use to create a UI Mask
Does Parallelism have high memory consumption?
You can import external XML files into the message mapping as...
If when you try to import a business system from the sld, the systems...
You choose ... on the System Landscape Directory (SLD) initial screen...
Which role is used to enable the user to work on tasks and to execute...
Which of the following basic atomic data types is not providen in the...
AWS. What are the advantages that AWS Cloud offers over a...
AWS. Which of the following is a best practice for securing access to...
AWS. A data analytics company is running a proprietary batch...
AWS. Which AWS Service can be used to mitigate a Distributed...
AWS. Which of the following options can be used to access and...
When you use an exclusive gateway must to use a default gate?
AWS. A unicorn startup is building an analytics application with...
AWS. An intern at an IT company provisioned a Linux based...
AWS. Which of the following is a geographic area containing multiple...
AWS. A retail company has multiple AWS accounts for each of its...
AWS. Which of the following statement is correct for a Security...
Which types of patterns can you use to create an Iflow
Identify the basic interfaces patterns available. Choose the correct...
You configure the sender RFC adapter to convert RFC calls from a...
The aggregator pattern is a statefull filter that is used in cases...
A web service description language file is an XML to describe service...
AWS.   ...
AWS. Which of the following AWS services is essential for...
Does business systems require underline Technical systems?
The COMMIT WORK statement is required in another function module to...
The is a cost-saving option compared to a full installation of SAP...
WAS. A silicon valley based healthcare startup stores anonymized...
How to Create User-Defined Function for Message Mapping Using NWDS?
How you could access the item being looped?
How does an exception behave when the Remote-Enabled Function Module...
Can be used default value true, as start condition of bpm?
In a target field mapping, you create rules that define the source...
When an integration flow is complete. it is deployed to the runtime,...
Enterprise integration patters are design patterns that help in...
What is an intermediate event message used for?
AWS. Which AWS support plan provides access to a designated...
AWS. As per the AWS Shared Responsibility Model, which of the...
AWS. Which AWS service would you use to send alerts when the...
Your costumer delivers you a highly detailed process information,...
Your mapping program concatenates 2 source elements in order to create...
The advanced adapter engine is installed as a component of the...
AWS. Which resource types are delivered on-demand via cloud computin...
AWS. Which AWS service can be used to provision resources to run...
AWS. What are the fundamental drivers of cost with AWS Cloud?
Abstract flows are used without specific type and are used when object...
AWS.  ...
AWS. Which of the following AWS Support plans provide access to...
AWS. Which of the following are characteristics of cloud computing?...
AWS. AWS Compute Optimizer delivers recommendations for which of...
AWS. According to the AWS Cloud Adoption Framework (AWS CAF),...
AWS. According to the AWS Shared Responsibility Model, which of...
AWS. The AWS Cloud Adoption Framework (AWS CAF) recommends four...
The RFC adapter is located on the Java Enterprise Edition (JEE) Engine
The stateless (XI 3.0-compatible) interface pattern can only be used...
AWS. Which of the following AWS services should be used to...
AWS. Which cloud deployment model allows you to connect public cloud...
Which perspective are used in NWDS to allow build a BPM?
Which event allow to introduce a pause into a BPM?
What is the advantage of using message mapping rather XSLT mapping?
Which affirmations are true?
Which of the following logs provide information about execution times,...
AWS. A startup wants to migrate its data and applications from the...
AWS. A big data analytics company is moving its IT infrastructure...
AWS. A financial services company wants to ensure that its AWS...
AWS. Which of the following are the storage services offered by...
AWS. What is the primary benefit of deploying an Amazon RDS...
Does the Enterprise Services Bus (ESB) eliminates the point to point...
What actions can make the role NWA_SUPERADMIN that cannot realice the...
AWS. Access Key ID and Secret Access Key are tied to which of the...
Which are the differences between parallel split and parallel join?
Which message are displayed within the business logs?
AWS. A startup wants to set up its IT infrastructure on AWS...
AWS. Which of the following AWS services can be used to connect a...
Which components belong to SAP PI Integration Server (three answers)
Functionality of Services registry allows to
What do you need to do before import a technical system into SAP PI...
How you could maintain Value Mapping values in SAP PI
AWS. Which AWS service will help you receive alerts when the...
AWS. What is the easiest way for a customer on the AWS Basic Support...
AWS. Which cost management tool allows you to view costs from the past...
AWS. What foundational capability under the operations...
AWS. Which of the following statement is correct regarding the...
Where you could mantain, discover and manage the developed services?
Which are the characteristics of the perspectives of BPM
Which ways are used to create a BPM project on NWDS
AWS. Which of the following statements are CORRECT regarding the...
AWS. A company wants to improve the resiliency of its flagship...
AWS. A Project Manager, working on AWS for the first time, is...
AWS. A company's flagship application runs on a fleet of...
Which are the security profile options of stateless interface pattern?
Which kind of quality services are supported by BPM
AWS. Under the AWS Shared Responsibility Model, which of the...
Which is the signature of RFC Function imported in SAP PI
SAP NWDI (Netweaver Developer Infraestructure) provide the following...
AWS. A company uses reserved EC2 instances across multiple units with...
AWS. A startup wants to provision an EC2 instance for the lowest...
AWS. Which of the following AWS Support plans provide access to...
AWS. A social media company wants to protect its web application...
Which rol is focus on the operational process and report to the...
Does BPM support Message Attachments
AWS. The DevOps team at an IT company is moving 500 GB of data...
AWS. A web application stores all of its data on Amazon S3...
AWS. Which cost management tool gives you the gives you the ability to...
Which steps are included in Bottom-up approach?
How Do you Search for the PI Message of an Inbound iDoc if You Know...
Which pattern can be used for services interfaces catergory abstract?
Managing the lifecycle of a BPM involves the following phases:
Which of the following logs alow users to search exception IDs and...
How to open a perspective in NWDS?
AWS. An online gaming company wants to block users from certain...
AWS. An IT company wants to run a log backup process every Monday...
Which of the following adapters uses polling to retrieve messages from...
What you can make in the ESR WEB UI?
Which of the following logs help analyze with web services and RFC...
Does BPM Support Aknowledgements?
AWS. Which of the follogin contains 1 or more physically separated...
AWS. The root account should be protected by multi-factor...
AWS. Which features of AWS reduce your total cost of ownership (TCO)?...
AWS. A company wants a fully managed, flexible, and scalable file...
AWS. As per the AWS Shared Responsibility Model, which of the...
AWS. A photo sharing web application wants to store thumbnails of...
AWS. The engineering team at an IT company wants to monitor the...
Which elements you could create with a speed button?
What are the responsabilities of the process owner?
SAP PI AEX is composed from:
AWS. The DevOps team at an e-commerce company is trying to debug...
AWS. A cyber forensics team has detected that AWS owned...
Which components are included in SAP PI (3 correct Answers)
AWS. Which of the following are correct statements regarding the...
AWS. A company needs a storage solution for a project wherein the...
AWS. Which of the following is a true statement about edge locations?
Does an invited user can complete a task?
You can import interfaces with the structures that have not been...
Which are the three groups of flow objects?
AWS. Which option is a common stakeholder role for the AWS Cloud...
AWS. AWS Web Application Firewall (WAF) offers protection from...
AWS.   ...
Which of the following are potential uses of the Advances Adapter...
AWS. Which type of cloud computing does Amazon Elastic Compute...
AWS. Which of the following entities applies patches to the...
BRM consists of three components; select the items
Which are the perspectives in the NWDS designed for BPM:
Which relationship do you define in both sender agreement and receiver...
Which are the other names that receive the BPM perspectives in NWDS
AWS. Which of the following AWS services support VPC Endpoint...
AWS. A multi-national company has just moved its infrastructure...
AWS. Which service allows you to select and deploy operating system...
AWS. Which tool will help you review your workloads against...
What Are the Different Types of User-Defined Functions?
Which are the three ways to create an start event?
AWS. Which of the following is a recommended way to provide...
AWS. Which AWS Support plan provides architectural guidance...
AWS. Which of the following is a serverless AWS service?
AWS. Which tool/service will help you access AWS services using...
AWS. Which service gives a personalized view of the status of the...
AWS. An organization has a complex IT architecture involving a...
Which of the following logs contains information about BPM processes...
AWS. A company wants to move to AWS cloud and release new...
AWS. Which AWS services can be used to decouple components of a...
AWS. A company is using a message broker service on its...
Which elements are used to design the User Interface
Which methods can be used to construct services interfaces?
Which are the objects for process development and process modeling...
For processing a request ______  must be available on Process...
AWS. Which service provides the easiest way to set up and govern a...
Which of the following adapters run over Java Stack
AWS. Which AWS service enables users to find, buy, and...
The BPM components
AWS. Multi-AZ deployment is an example of which of the following?
How is controlled a looping activity?
What happen when an iflow is deployed?
AWS.   ...
You need to migrate a SAP PI 7.1 system, which ways you could offer
You have an scenario where system A and System B have an integration...
Can referenced subflows read through the context of the outer process?
Alert!

Advertisement