Microsoft Microsoft Certifications PL-600 Questions & Answers
Question 11:
You are implementing a model-driven app for a national chain of retail stores.
You have the following requirements:
Store employees must be able to view data for their store only. Regional managers must be able to view data for all stores in a region. The reporting team must be able to view all data across all stores.
You need to configure system security.
Which three security methods should you use? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A. Account hierarchy
B. Azure AD security group
C. Manager hierarchy
D. Security roles
E. Owner teams
Correct Answer: CDE
Explanation:
* Store employees must be able to view data for their store only.
(D) Security roles Dataverse uses role-based security to group together a collection of privileges. These security roles can be associated directly to users, or they can be associated with Dataverse teams and business units. Users can then be associated with the team, and therefore all users associated with the team will benefit from the role. A key concept of Dataverse security to understand is all privilege grants are accumulative with the greatest amount of access prevailing. If you gave broad organization level read access to all contact records, you can't go back and hide a single record.
* Regional managers must be able to view data for all stores in a region.
(C) Manager hierarchy
Hierarchy security to control access The hierarchy security model is an extension to the existing security models that use business units, security roles, sharing, and teams. It can be used in conjunction with all other existing security models. The hierarchy security offers a more granular access to records for an organization and helps to bring the maintenance costs down. For example, in complex scenarios, you can start with creating several business units and then add the hierarchy security. This will achieve a more granular access to data with far less maintenance costs that a large number of business units may require.
Manager hierarchy and Position hierarchy security models Two security models can be used for hierarchies, the Manager hierarchy and the Position hierarchy. With the Manager hierarchy, a manager must be within the same business unit as the report, or in the parent business unit of the report's business unit, to have access to the report's data. The Position hierarchy allows data access across business units. If you are a financial organization, you may prefer the Manager hierarchy model, to prevent managers’ accessing data outside of their business units.
* The reporting team must be able to view all data across all stores.
(E) Owner teams
With owner teams or access teams, you can easily share business objects and collaborate with the users across business units in Microsoft Dataverse. A team belongs to one business unit, but it can include users from other business units. A user can be associated with more than one team.
An owner team owns rows and has security roles assigned to the team. The team's privileges are defined by these security roles. In addition to privileges provided by the team, team members have the privileges defined by their individual security roles and by the roles from other teams in which they are members. A team has full access rights on the records that the team owns.
You design integration with an external data source that uses sequential integer values as primary keys for the records contained in it. Data synchronization will occur in Microsoft Dataverse so users can access data.
Data within Microsoft Dataverse must be accurate against the data in the external data source.
You need to ensure that the data from the external data source does not create duplicated rows in Microsoft Dataverse.
Which two features should you use?
Each correct answer presents part of the solution.
A company uses a Microsoft Excel sheet to manage its loan application process.
The company wants to optimize the process.
You need to discover inefficiencies in the process.
Solution: Upload the activity data stored in the Excel sheet to the process advisor feature. Use task mining to discover inefficiencies in the process.
Does the solution meet the goal?
A. Yes
B. No
Correct Answer: B
Explanation:
We need to record the actions as well.
Correct solution: Record the actions required to complete the loan application process in the process advisor feature. Use task mining to discover inefficiencies in the process.
Note:
Task mining is a technology that enables organizations to capture detailed steps for tasks performed on users' desktops, either independently or collaboratively with colleagues.
By analyzing recorded user actions, task mining allows organizations to gain insights into how they perform tasks, identify common mistakes made during task performance, and pinpoint tasks that can be automated, all of which can help
optimize their business processes.
Task mining is a powerful tool for streamlining workflows, identifying inefficiencies and bottlenecks in workflows, reducing costs, and fostering a culture of continuous improvement where employees are encouraged to optimize their work
A company uses a Microsoft Excel sheet to manage its loan application process.
The company wants to optimize the process.
You need to discover inefficiencies in the process.
Solution: Record the actions required to complete the loan application process in the process advisor feature. Use task mining to discover inefficiencies in the process.
Does the solution meet the goal?
A. Yes
B. No
Correct Answer: A
Explanation:
Task mining is a technology that enables organizations to capture detailed steps for tasks performed on users' desktops, either independently or collaboratively with colleagues.
By analyzing recorded user actions, task mining allows organizations to gain insights into how they perform tasks, identify common mistakes made during task performance, and pinpoint tasks that can be automated, all of which can help
optimize their business processes.
Task mining is a powerful tool for streamlining workflows, identifying inefficiencies and bottlenecks in workflows, reducing costs, and fostering a culture of continuous improvement where employees are encouraged to optimize their work
A company uses a Microsoft Excel sheet to manage its loan application process.
The company wants to optimize the process.
You need to discover inefficiencies in the process.
Solution: Record the actions required to complete the loan application process in the process advisor feature. Use process mining to discover inefficiencies in the process.
Does the solution meet the goal?
A. Yes
B. No
Correct Answer: B
Explanation:
Instead use task mining.
Correct solution: Record the actions required to complete the loan application process in the process advisor feature. Use task mining to discover inefficiencies in the process.
Note:
Task mining is a technology that enables organizations to capture detailed steps for tasks performed on users' desktops, either independently or collaboratively with colleagues.
By analyzing recorded user actions, task mining allows organizations to gain insights into how they perform tasks, identify common mistakes made during task performance, and pinpoint tasks that can be automated, all of which can help
optimize their business processes.
Task mining is a powerful tool for streamlining workflows, identifying inefficiencies and bottlenecks in workflows, reducing costs, and fostering a culture of continuous improvement where employees are encouraged to optimize their work
A company uses a Microsoft Excel sheet to manage its loan application process.
The company wants to optimize the process.
You need to discover inefficiencies in the process.
Solution: Upload the activity data stored in the Excel sheet to the process advisor feature. Use process mining to discover inefficiencies in the process.
Does the solution meet the goal?
A. Yes
B. No
Correct Answer: B
Explanation:
Instead use task mining.
Correct solution: Record the actions required to complete the loan application process in the process advisor feature. Use task mining to discover inefficiencies in the process.
Note:
Task mining is a technology that enables organizations to capture detailed steps for tasks performed on users' desktops, either independently or collaboratively with colleagues.
By analyzing recorded user actions, task mining allows organizations to gain insights into how they perform tasks, identify common mistakes made during task performance, and pinpoint tasks that can be automated, all of which can help
optimize their business processes.
Task mining is a powerful tool for streamlining workflows, identifying inefficiencies and bottlenecks in workflows, reducing costs, and fostering a culture of continuous improvement where employees are encouraged to optimize their work
A company plans to use Microsoft Power Platform. The company gathers business requirements about data.
You need to identify the functional requirements.
Which two requirements about data should you gather? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. Delete in bulk after seven years.
B. Go through a specified approval process.
C. Remain compliant.
D. Retain for 10 years.
E. Store in Microsoft Dataverse.
Correct Answer: AB
Explanation:
Identify functional requirements
Requirements are commonly referred to as either functional or non-functional. Functional requirements describe what the solution needs to do or its behaviors, and non-functional requirements commonly describe non-behavior aspects of the
solution such as performance requirements.
Each functional requirement should clearly capture the who, what, and why of the requirement. If the requirement is too large, it should be divided into smaller parts.
Example functional requirements
The following scenarios describe simple examples of functional requirements:
As a sales user, I need to be able to close an opportunity as lost and then capture why it was lost so that we can improve our sales tactics in the future.
As a sales manager, I need to be able to approve a discount on a quote so that I can reduce the total price and give a discount to the customer.
As a staff accountant, I want to be prevented from closing a batch that has pending items so that I do not have to reopen it later.
Incorrect:
Examples of common non-functional requirement types include:
You are designing a Microsoft Power Platform solution.
The solution requires Microsoft Power Platform components and custom coding.
You need to describe the benefits of using Microsoft AppSource.
Which are three benefits of AppSource? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. App uptime of at least 99.9 percent
B. Azure Active Directory federated single sign-on (AAD federated SSO)
C. Microsoft standardized license agreement and privacy policy
D. Reduced coding efforts because anyone can publish in AppSource
E. Free trial before committing to any additional costs
Correct Answer: CDE
C: Terms and conditions
The software vendor defines the price, end-user license agreement, and privacy policies. Every offer on AppSource includes links to the publisher's license agreement and privacy policy.
You are designing a Microsoft Power Platform solution that will include multiple applications.
You have the following requirements:
Support agents managing cases.
Project managers reviewing and updating their projects.
Stock managers managing warehouses.
New site visitors self-registering.
Employees tracking time entries.
Which three requirements can you meet by implementing role-based applications? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
A. New site visitors self-registering.
B. Support agents managing cases.
C. Stock managers managing warehouses.
D. Project managers reviewing and updating their projects.
E. Staff tracking time entries.
Correct Answer: BCE
Question 20:
A company has an expense approval process that allows expenses to be submitted in multiple currencies.
An accountant converts the expense amount to USD as part of the approval process.
You need to automate the conversion by using the RESTful API.
What should you do?
A. Create a desktop flow. Use an Invoke web service action to get the currency conversion rate.
B. Create a desktop flow. Use an Azure action to get the currency conversion rate.
C. Create a cloud flow. Use the Microsoft Graph API to get the currency conversion rate.
D. Create a cloud flow and a custom connector. Install a data gateway. Use the custom connector to get the currency conversion rate by using the data gateway.
Correct Answer: C
Explanation:
Microsoft Graph is a RESTful web API that enables you to access Microsoft Cloud service resources. After you register your app and get authentication tokens for a user or service, you can make requests to the Microsoft Graph API.
Microsoft 365 core services: Bookings, Calendar, Delve, Excel, Microsoft 365 compliance eDiscovery, Microsoft Search, OneDrive, OneNote, Outlook/Exchange, People (Outlook contacts), Planner, SharePoint, Teams, To Do, Viva Insights
Enterprise Mobility + Security services: Advanced Threat Analytics, Advanced Threat Protection, Azure Active Directory, Identity Manager, and Intune
Windows services: activities, devices, notifications, Universal Print
Dynamics 365 Business Central services.
Incorrect:
Not D: The on-premises data gateway acts as a bridge. It provides quick and secure data transfer between on-premises data, which is data that isn't in the cloud, and several Microsoft cloud services. These services include Power BI, Power
Apps, Power Automate, Azure Analysis Services, and Azure Logic Apps.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Microsoft exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PL-600 exam preparations and Microsoft certification application, do not hesitate to visit our Vcedump.com to find your solutions here.