New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

SAP C_CPE_2409 - SAP Certified Associate - Backend Developer - SAP Cloud Application Programming Model

Page: 2 / 2
Total 60 questions

Which of the following modules are available in the Kyma project?

Note: There are 3 correct answers to this question.

A.

Serverless

B.

Data Warehouse

C.

Telemetry

D.

Storage

E.

API Gateway

What are the benefits of using Side-by-Side Extensibility?

Note:There are 3 correct answers to this question.

A.

It can be implemented in the same software stack as the extended application.

B.

It integrates with other cloud/non-cloud solutions when using SAP Business Technology Platform Integration services.

C.

It uses a complete development platform for creating extension applications.

D.

It provides support for hybrid scenarios.

When creating a CI/CD job, what does defining Source Control Management (SCM) credentials enable?

A.

Retrieving your project from SCM when its build is triggered

B.

Managing your SCM credentials

C.

Modifying your project source code automatically

You have set up the scopes and attributes that are needed to protect your application in the Cloud Foundry environment, but a user is unable to access your application. What might be the reason?

A.

Roles aren't assigned to the client application.

B.

Role collections aren't assigned to the user.

C.

Roles aren't assigned to the user.

D.

Role collections aren't assigned to the client application.

You develop an application using the Cloud Foundry environment. What are some steps to restrict access to this application?

Note:There are 2 correct answers to this question.

A.

Set the Scopes element to the required scope name in the xs-app.json file.

B.

Set the role-name attribute of the Security-role element in the web.xml file to the required role template name.

C.

Define the role template name in the role-templates element of the xs-security.json file.

D.

Set the Scopes element to the required scope name in the xs-security.json file.

Which command is used to create a Pod in Kubernetes from a YAML file?

A.

kubectl run .yaml

B.

kubectl get pod

C.

kubectl apply

D.

kubectl create -f

Which CAP feature allows real-time data synchronization and communication between different parts of an application or with external systems?

A.

Database Connectivity

B.

Service Connectivity

C.

Service Extensibility

D.

Message Queues and Event Brokers

To expose a data model to an application, which of the following must be defined?

A.

Service model entities

B.

Associations

C.

Aspects

D.

Data model entity