Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A marketer is using Adobe Real-Time CDP and wants to exclude potential customers who have already made a purchase in the last 30 days from being targeted in an upcoming holiday discount campaign. What criterion would the marketer use to create the audience segment for the campaign?

A.

Segment all profiles who have not completed a purchase in last 30 days

B.

Segment all profiles who have an order delivery status as pending

C.

Segment all profiles who have completed a purchase in last 30 days

D.

Segment all profiles who have viewed a product in last 30 days

A data architect is building an XDM Experience Event Schema for loading event data from the Adobe Experience Platform (AEP) Web SDK. The data is intended to be used in the Real-Time customer profile and requires a primary identity to be present in the schema. The architect wants to be able to store both ambiguous and authenticated web data.

Does the data architect need to select a field as a primary identity?

A.

Yes, the architect will select a field from the schema and mark it as primary.

B.

Yes, the architect will select the identity map and mark it as primary.

C.

No, the primary identity will already be in the identity map.

D.

No, a field on the schema will automatically be marked.

A data engineer encounters persistent ingestion failures for a batch ingestion in the Adobe Real-Time CDP. To troubleshoot and resolve the issue, what two steps would the data engineer take? (Choose two.)

A.

Review the Failed Ingestion Records in Source connection UI

B.

Consult the Adobe Developer Console for error logs

C.

Review the data in the Batch Preview Service

D.

Enable the 'Error Reporting' function in the Profile tab

E.

Enable Error diagnostic on the Source Connector settings

A financial services customer wishes to suppress people from active credit card campaigns as soon as they submit an application for the associated credit card name. The business's goal is to optimize ad spend by suppressing people quickly who convert and use the savings to help funnel more money back into their acquisition strategies. The current data model that IT has provided from their data warehouse looks like the following:

It is assumed that each application submit contains an offer that is always associated to a credit card name. Assuming all applications are streamed into the Real-Time Customer Profile, in which two ways could a developer model the application submit event to ensure the real-time suppression requirement is supported? (Choose two.)

A.

Application Submit is modeled as an XDM Individual Profile class-based schema

B.

Offer is de-normalized back into the Application Submit schema

C.

Offer is modeled as an object within the Application Submit schema

D.

Application Submit is modeled as an XDM Experience Event class-based schema

A company has completed their implementation of Adobe Experience Platform (AEP) and is successfully onboarding data and profiles, but they are struggling with managing data across their services. What tool would best aid the company in inspecting, manipulating, and analyzing dataset data in AEP Data Lake?

A.

Data Compliance Settings

B.

Adobe Query Service

C.

Data Governance API

D.

Data Usage Labeling and Enforcement (DULE)

A data analyst is trying to apply a series of complex conditions to filter audiences in Adobe Real-Time CDP for a client's online sale event. What would be the two recommended courses of action in terms of segment creation in this situation? (Choose two.)

A.

Use Rule-Based Segments for complex conditions

B.

Use Audience Export Segments for real-time personalization

C.

Use Computed Attributes for streaming use-cases

D.

Use Batch Evaluation Segments for complex expressions and longer look back windows

A customer needs to access profile data using /access/entities endpoint. What parameters are required to retrieve profile information?

A.

Data ingested TimeStamp field

B.

Entity Identity and Entity ID Namespace

C.

Profile Name and DOB field

A data architect is tasked with maintaining synchronization between Edge and Adobe Real-Time CDP profiles in a dynamic data environment. The developer needs to determine the frequency and extent of the synchronization between Edge and Adobe Real-Time CDP profiles. What is the primary factor that should be used to complete this task?

A.

Profile qualification as part of an Edge audience

B.

The rate of data change and ingestion from the source systems

C.

The volume of customer interactions

D.

The size of the data objects

A media company uses Adobe Experience Platform to process large quantities of media consumption data. This data was previously stored in a relational database management system (RDBMS) but has been migrated to the Adobe Real-Time CDP's NoSQL data model for improved scalability and performance. The data set includes information such as user ID, media content ID, play duration, pause durations, and timestamps of each interaction. Which combination of Experience Data Model (XDM) schemas should be used to efficiently capture and retrieve this data with the Adobe Real-Time CDP's NoSQL data model, considering the real-time analytics needs?

A.

An XDM Individual Profile schema for user ID, media content ID and an XDM Experience Event schema for play duration, pause durations, and timestamps

B.

An XDM Experience Event schema for user ID, media content ID and an XDM Individual Profile schema for play duration, pause durations, and timestamps

C.

Two XDM schemas, one for user ID and media content ID, the other for play duration, pause durations, and timestamps

D.

An XDM Individual Profile schema for user ID and an XDM Experience Event schema for media consumption data

A system admin is looking to implement attribute-based access control (ABAC) in their Adobe Real-Time CDP (RTCDP) to support unique data access requirements for various user groups within the organization. Which method represents the most efficient way to set up ABAC in RTCDP?

A.

Creating Individual policies for each user group

B.

Distributing data in different databases based on the requirement of the user group

C.

Regularly updating user roles and permissions based on changing needs

D.

Applying custom labels to data attributes and tying them to access groups with relevant policies