Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When should URI Segments be used in Transaction Detection rules?

A.

When identifying business transactions using particular parts of the SMTP request

B.

When the application uses message-oriented technologies

C.

When the application is a Web-Oriented Technology

D.

When the agent names the business transaction for the Web service name plus the operation name

Developers and operations personnel complain the Controller tracks many irrelevant Java classes and methods. How does a Performance Analyst exclude this unhelpful information?

A.

Configuration > Baselines and create a new dynamic baseline

B.

Edit the mbeans-server.xml file to delete the irrelevant methods

C.

Configuration > Instrumentation > Call Graph Settings and exclude irrelevant packages

D.

Edit the controller-info.xml file to exclude irrelevant methods

A Performance Analyst needs to send a summary report of specific events every two hours. Which feature can enable this automated report summary?

A.

Email Templates

B.

HTTP Request Templates

C.

Email Digests

D.

Email / SMS Configuration

A Performance Analyst has opened a database collector view. Which tab should be clicked on next to find slow queries?

A.

Schemas

B.

Queries

C.

Live View

D.

Object Browser

Which two statements are correct about creating Information Points? (Choose two.)

A.

A wildcard can be used to select multiple methods for an Information Point.

B.

A wildcard can be used to select multiple classes for an Information Point.

C.

An Information Point can be created on the same class and method as a Custom Exit Point.

D.

An Information Point can be created on a class and method that is executed before the Business Transaction entry point.

Which built-in scheduled report Includes load, response time, and error graphs?

A.

Dashboard Report

B.

All Application Summary

C.

Application Health Report

D.

User Experience: Browser Apps

What are two examples of backend calls? (Choose two.)

A.

a request coming from a browser

B.

a tier-to-tier request

C.

an asynchronous request

D.

a remote services call

What are two options tor sharing snapshot details from the snapshot window? (Choose two.)

A.

Custom Report

B.

Custom Dashboard

C.

Download PDF

D.

Copy to Clipboard

E.

Export

Which two functions does the Business Transaction Discovery Feature allow a user to perform? (Choose two.)

A.

Identify servers on which to install an AppDynamics application agent

B.

Identify new Business transactions in the Business Transaction Dashboard

C.

Identify PHP Business Transactions and preview them

D.

Identify potential Business Transactions and preview them

E.

Identify entry points from uninstrumented code