Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What usage statistics can you monitor with SAP Mobile Platform reporting? Note: There are 2 correct answers to this question.

A.

Registrations

B.

Applications

C.

Network

D.

Logging

In the Management Cockpit, you can export a native application configuration in a ZIP file. Which information is included in this ZIP file? Note: There are 3 correct answers to this question.

A.

The passwords for the native application.

B.

A folder that includes all information related to the application.

C.

A folder that includes the application ID.

D.

A folder that includes the complete security profile.

E.

The name of the security profile.

Which authentication providers can you select to configure an application security profile? Note: There are 2 correct answers to this question.

A.

X.509 User Certificate

B.

Anonymous endpoint

C.

HTTPS connection credentials

D.

Kerberos

You are configuring a Security Profile with Kerberos as the authentication provider. How do you use Kerberos to ensure successful authentication?

A.

Kerberos must be used with another authentication provider and placed anywhere other than first in the stack of providers in the profile.

B.

Kerberos must be the only authentication provider configured.

C.

Kerberos must be used with another authentication provider and placed last in the stack of providers in the profile.

D.

Kerberos must be used with another authentication provider and placed first in the stack of providers in the profile.