You need to configure the BCS model to access data. What should you do?
A. Import the BCS model and enter the required account by using the Set Object Permissions command.
B. Create an external content type and enter the target application ID in the Secure Store Application ID field.
C. Create an external content type and choose the Connect with user’s identity option.
D. Create an external content type and choose the Connect with impersonated custom identity option. Enter the target application friendly name of the Secure Store target application.
You need to configure SharePoint for the appropriate protection of merger documents. What should you do?
A. Configure Information Rights Management.
B. Configure Web Part security.
C. Configure document library permissions.
D. Configure document conversions.
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains 20 virtualization hosts.
Each host contains 20 virtual machines.
You need to configure the network fabric.
The solution must prevent the virtual machines from connecting to a VLAN.
What should you do from the Network Site properties?
A. set the VLAN ID to 0.
B. set the VLAN ID to 10.
C. set the IP subnet to FD4A::/32.
D. set the IP subnet to 192.168.1.0/20.
You need to recommend a solution to resolve the monitoring issue for the Hyper-V hosts. Which performance object should you recommend?
A. Hyper-V Hypervisor Logical Processor
C. Hyper-V Hypervisor Root Virtual Processor
D. Hyper-V Hypervisor Virtual Processor
You work as a senior administrator at Realbraindumps.com. The Realbraindumps network consists of a single domain named Realbraindumps.com. Realbraindumps.com makes use of System Center 2012 Configuration Manager in their environment. You are currently analyzing the Dcmagent.log file. Which of the following are recorded in this log?
A. Information regarding configuration item task scheduling.
B. Details regarding the process of remediation and compliance for compliance settings, software updates, and application management.
C. Information regarding reporting policy platform results into state messages for configuration items.
D. High-level information regarding the evaluation, conflict reporting, and remediation of configuration items and applications.
E. Information regarding reading configuration item synclets from Windows Management Instrumentation (WMI).
You plan to have an expert speaker address the students about a recent historical event. Which two possible ICT resources should you recommend that the students use to create an accurate record of the speaker’s statements? (Each correct answer presents a complete solution. Choose two.)
This item is part of a case study. To view the case study information, click on the Case Study button below.
A. the digital voice recorder
B. the LMS
C. an Internet connection
D. a digital camera
E. a video camera
F. the flatbed scanner
G. the printers
You have received an email from a person you met at a conference you recently attended. The email mentions that their organization might be interested in the services provided by your organization. You need to create a record for this person in Microsoft Dynamics 365 to be later set to the qualified status by your organization. Which record type can be used to accomplish this goal?
You need to recommend a solution to migrate the Listings database to the cloud. What should you recommend?
A. Stage the Listings database on an Azure virtual machine prior to the outage. During the outage, perform a data import from the main office by using SQL Server Management Studio.
B. Implement log-shipping between the main office and an Azure virtual machine prior to the migration date. During the planned outage, perform a final log backup, restore the backup to the secondary, and then switch the secondary to the primary role.
C. Run a full backup during the outage and restore the backup to the Azure virtual machine.
D. Implement merge replication between the main office and the Azure virtual machine.
You have two similar cases. One case is named Case1 and the other is named Case2 Each case has a different parent case. You attempt to merge Case1 into Case2. What is the result to the merge process?
A. Case1 is merged into Case2 Activities and notes are combined under Case2.
B. The cases will not merge. Both cases will become child cases of the parent for Case2
C. The cases will not merge. Each case will remain parented to their original records.
D. Case1 is merged into Case2 Activities and notes are combined under Case1.
You are an administrator for an organization that uses Microsoft Dynamics 365. Your mobile users are often in areas where they do not have Internet access, but they still need to be able to access and edit records through the Dynamics 365 app for mobile phones. What should you do?
A. Instruct users to view the needed records prior to entering an area with no Internet access so they can view them through the recent records cache.
B. Allow users to use Microsoft Dynamics 365 for Outlook, and instruct users on how to configure the offline filters.
C. Enable the enhanced offline experience in Settings > Mobile Offline in Microsoft Dynamics 365 and adjust the Organization data download filter on each of the needed entities.
D. In the entity settings under Outlook & Mobile, configure the Organization data download filter for each of the needed entities.