New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are Kubernetes deployments used for?

A.

To create databases

B.

To configure network policies

C.

To manage Pods directly

D.

To roll out application updates with zero downtime

To expose a data model to an application, which of the following must be defined?

A.

Service model entities

B.

Associations

C.

Aspects

D.

Data model entity

Which file is used to define the structure and components of a multitarget application (MTA) in SAP BTP?

A.

mta.yaml

B.

mta.json

C.

mtad.yaml

D.

manifest.json

What are some purposes of OData in CAP-based applications?

Note:There are 2 correct answers to this question.

A.

To perform CRUD operations using HTTP verbs

B.

To create user interfaces for applications

C.

To define request and response headers, status codes

D.

To provide real-time analytics

What features does the SAP Cloud SDK provide as part of enterprise-specific adaptations of open-source frameworks?

Note:There are 2 correct answers to this question.

A.

Tightly coupled integration

B.

Multi-tenant persistence

C.

Feature toggling

D.

Code samples

Which services in SAP BTP can be used to store and retrieve technical information about target external systems?

A.

Connectivity Service

B.

Destination Service

C.

Core Data Service

Why should you use SAP Fiori annotations in CAP projects?

A.

To facilitate real-time data synchronization

B.

To enable automatic database schema migration

C.

To improve frontend loading time

D.

To enrich the service with UI-specific instructions

You develop an application using the Cloud Foundry environment. What are some steps to restrict access to this application?

Note:There are 2 correct answers to this question.

A.

Set the Scopes element to the required scope name in the xs-app.json file.

B.

Set the role-name attribute of the Security-role element in the web.xml file to the required role template name.

C.

Define the role template name in the role-templates element of the xs-security.json file.

D.

Set the Scopes element to the required scope name in the xs-security.json file.