Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You are validating a JWT and want to be sure you use the correct public key.

What do you need to check?

A.

The public key hash is the same as the signature hash of the JWT.

B.

The expiration time of the JWT lies within the expiration time defined in the public key.

C.

The issuer of the public key is the same as the issuer in the JWT header.

D.

The keyID of the public key is the same as the keyID in the JWT header.

Full Access
Question # 5

What can you configure in Sites-> Site Settings?

Note: There are 2 correct answers to this question.

A.

Email templates

B.

Custom API domain

C.

Default Web and mobile screen-sets

D.

CNAME

Full Access
Question # 6

You are editing a dataflow.

Which actions can you perform?

Note: There are 2 correct answers to this question.

A.

Use a datasource.lookup component to check if a record exists in the site.

B.

Add a component responsible for starting the schedule of the dataflow.

C.

Add multiple Next steps to a component.

D.

Preview the schema in a datasource component.

Full Access
Question # 7

Which of the following is a valid JavaScript parameter event?

A.

onLogout

B.

onLogin

C.

onConnectionAdded

D.

onSubmit

Full Access
Question # 8

You want a dataflow to run regularly.

What are the two best-practice options to configure this?

Note: There are 2 correct answers to this question.

A.

Use the dataflow scheduler of the Console and add a schedule.

B.

Use the idx.setDataflow endpoint via an API call.

C.

Use extensions and schedule the dataflow using an extension endpoint.

D.

Use the idx.createScheduling endpoint via an API call.

Full Access
Question # 9

What features do webhooks support?

Note: There are 2 correct answers to this question.

A.

Notifications can contain multiple events.

B.

Events are ordered per UID.

C.

Custom data fields can be added to the payload.

D.

Notifications are sent in a synchronous way.

Full Access
Question # 10

How can you get the public certificate that is required to validate a JSON Web Token?

A.

By downloading the certificate from the SAP Customer Data Cloud console

B.

By calling the endpoint accounts.getJWTPublicCertificate

C.

By requesting the certificate from the SAP Customer Data Cloud support team

D.

By calling the endpoint accounts.getJWTPublicKey

Full Access
Question # 11

Which of the following are OpenID Connect terminology?

Note: There are 2 correct answers to this question.

A.

Metadata

B.

Claims

C.

Scope

D.

Assertion

Full Access
Question # 12

Which capabilities does the UI Builder provide? Note: There are 3 correct answers to this question.

A.

Drag-and-drop visual editing

B.

Policy editor

C.

Language translation support

D.

Hosted page editor

E.

Field mapping

Full Access
Question # 13

You are setting up a new marketing campaign and want to make sure all subscriptions are subscribe.

How would you do this?

A.

Check the required flag for the subscription.

B.

Activate Email verification in the subscription.

C.

Activate Double opt-in in the subscription.

D.

Set the Reconsent cut-off date of the subscription to today.

Full Access
Question # 14

Which of the following components can be added to dataflows? Note: There are 3 correct answers

to this question.

A.

Datasource

B.

Datatarget

C.

File

D.

Social

E.

Field

Full Access
Question # 15

You want to export accounts using dataflows and need to ensure the First Name and Last Name

fields are formatted in lowercase. How does SAP recommend you do this?

A.

Use the field.rename component.

B.

Use a custom transformation inside the record.evaluate component.

C.

Use the toLowerCase function in the Select parameter of the datasource.read.gigya.account

component.

D.

Use the field.flatten component.

Full Access
Question # 16

Which of the following actions would trigger an update to the consent vault?

A.

A user opts out of a newsletter.

B.

A user connects their account to their social media network account.

C.

A user executes a login but is taken to the Registration Completion screen.

D.

A user updates their email address and contact details.

Full Access
Question # 17

Which properties can you set in the field of a schema? Note: There are 3 correct answers to this

question.

A.

The field's name

B.

Whether the field is hidden

C.

Whether the field is encrypted

D.

Whether the field is compressed

E.

The field's type

Full Access
Question # 18

You are implementing a website that will allow users to log in using their existing company

credentials by initiating an OIDC flow. How would you configure your website and SAP Customer

Data Cloud?

A.

SAP Customer Data Cloud as the IdP, and the website as the SP

B.

SAP Customer Data Cloud as the SP, and the website as the OP

C.

SAP Customer Data Cloud as the RP, and the website as the OP

D.

SAP Customer Data Cloud as the RP, and the website as the IdP

Full Access
Question # 19

Which of the following can you use to explore released APIs?

A.

SAP Integration Suite

B.

SAP Business Accelerator Hub

C.

SAP Application Interface Framework

Full Access
Question # 20

What data is required to perform a JWT validation? Note: There are 3 correct answers to this

question.

A.

Signature

B.

header

C.

LoginId

D.

signatureKey

E.

payload

Full Access
Question # 21

You want to utilize SSO across domains.

What is a best practice to overcome browsers that block third-party cookies?

A.

Use a site group and enable SSO.

B.

Use an SSO segment.

C.

Use a hosted page for the parent site.

D.

Use a centralized hosted login.

Full Access
Question # 22

You are implementing SAP CIAM for B2B on a customer's website. You want to launch the Delegated

Administration console. Which endpoint and parameter are required to open the Delegate Admin

function?

A.

openDelegatedAdminLogin and email

B.

openDelegatedAdminLogin and UID

C.

organizationContext and orgID

D.

openDelegatedAdminLogin and orgID

Full Access
Question # 23

Which email verification settings can you define inside the Customer Identity policies of the SAP

Customer Data Cloud console? Note: There are 2 correct answers to this question.

A.

Whether code verification is used

B.

Verification link expiration time

C.

Verification email sender address

D.

Whether users are automatically logged in upon verifying their password

Full Access
Question # 24

Which features can be overridden at child level when using site groups?

Note: There are 3 correct answers to this question.

A.

Login identifier

B.

Default login and registration screen-set

C.

Data schema

D.

New User Welcome email template

E.

Web SDK configuration

Full Access