Independence Day Special Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 1b2718643m

C_PO_7521 Exam Dumps - SAP Certified Technology Associate - SAP Process Orchestration

Question # 4

Which of the security authentication methods can be configured in the SOA Manager communication profiles? Note: There are 3 correct answers to this question.

A.

X.509 Client Certificate

B.

SAML Assertion

C.

Security Tokens

D.

SAP Logon Ticket

E.

X.509 Server Certificate

Full Access
Question # 5

Which of the following BPMN 2.0 elements belong to the Gateways?

Choose the correct answers.

A.

Parallel Join

B.

Exclusive Choice

C.

Inclusive Choice

Full Access
Question # 6

What provides detailedinformation about tasks?

Choose the correct answer.

A.

Process Management

B.

Process Repository

C.

Process Visualization

D.

Task Management

Full Access
Question # 7

Which features are supported by iFlows?

Note: There are 2 correct answers to this question.

A.

They represent an integration scenario using a graphical model.

B.

They canbe created in the Swing client as well as in Eclipse.

C.

They separate design time and configuration time.

D.

They generate an Integrated Configuration.

Full Access
Question # 8

Enterprise Integration Patterns (EIP) are design patterns that help in solving recurring problems faced in the integration of enterprise applications.

Determine whether this statement is true of false.

A.

True

B.

False

Full Access
Question # 9

Which tab page contains the SET FLAT File conversion option?

Choose the correct answer.

A.

RFC Parameters

B.

Module

C.

Optional Parameters

D.

Advanced

Full Access
Question # 10

Parameters defined in the Signature tab page are always export parameters.

Determine whether this statement is true or false.

A.

True

B.

False

Full Access
Question # 11

Which of the following logs provides information about execution times, process outcomes, and individual step?

Choose the correctanswer.

A.

Business log

B.

Connection log

C.

J2EE Engine log

D.

Process log

Full Access
Question # 12

You need to assign an XSLT Mapping program in your Operation Mapping.

Which activities must you perform first?

Note: There are 2 correct answers to this question.

A.

Import the XSLT archive into a message mapping.

B.

Unzip the XSLT archive before assigninginto the imported archive.

C.

Import the XSLT archive into the imported archive.

D.

Create an imported archive.

Full Access
Question # 13

What is the main purpose of the public part of a development component (DC)? Note: There are 2 correct answers to this question.

A.

Compile the DC

B.

Activate the DC

C.

Pack the DC

D.

Deploy the DC

Full Access
Question # 14

Which runtime constant is associated with the sender interface name?

Choose the correct answer.

A.

$SenderService

B.

$Interface

C.

SInterface Namespace

D.

$Receiver Name

Full Access
Question # 15

Which tools can you use to create objects in the ESR? Note: There are 2 correct answers to this question.

A.

SAP NWDS (Eclipse) - SAP PI Designer Perspective

B.

SAPNWDS (Eclipse) - SAP PI Administration Perspective

C.

SAP NWDS (Eclipse) - SAP PI Runtime Perspective

D.

Enterprise Services Builder

Full Access
Question # 16

What is the behavior of a pool in a business process model? Note: There are 2 correct answers to this question.

A.

Asequence flow can cross lanes within its pool.

B.

A pool acts as a container for the sequence flow between activities.

C.

Business processes can be modeled in several pools.

D.

A sequence flow can go outside the boundaries of a pool.

Full Access
Question # 17

You are working in the Integration Directory and have created several objects required for an interface, Which object can you use to logically group them together?

A.

Party

B.

Service definition

C.

Process integration scenario

D.

Configuration scenario

Full Access
Question # 18

The central Advanced Adapter Engine(AAE) is used because of large data volumes or for load balancing.

Determine whether this statement is true or false.

A.

True

B.

False

Full Access
Question # 19

Which of the following Source Structure elements and Target Structure elements have a 1:1 cardinality?

A.

Element is obligatory

B.

Element which mustexist

C.

Element can occur more than once

D.

Element persists of different types

Full Access
Question # 20

You can import interfaces with the structures that have not been defined using Web Service Description Language (WSDL), extensible Markup Language Schema Definition (XSD), or Data Type Definition (DTD) into the Enterprise Services Repository (ESR).

Determine whether this statement is true or false.

A.

True

B.

False

Full Access
Question # 21

You are using the SAP NetWeaver Administrator application to view all running BPM processes in the Processes and Tasks tab.

What actions can be taken on a running BPM process?

Note: There are 3 correct answers to this question.

A.

Reprocess

B.

Delete

C.

Suspend

D.

Resume

E.

Cancel

Full Access
Question # 22

Which of the following logs provides information about execution times, process outcomes, and individual step?

Choose the correct answer.

A.

Business log

B.

Connection log

C.

J2EE Engine log

D.

Process log

Full Access
Question # 23

Identify the basic interfaces patterns available.

Choose the correct answer.

A.

Stateless and stateful communications

B.

Stateful and Tentative Update &Confirm/Compensate (TUCC)

C.

Stateless and Tentative Update & Confirm/Compensate (TUCC)

Full Access
Question # 24

What is the purpose of data objects in a BPM process?

A.

Define the decision evaluation order in a process flow.

B.

Define the start condition for a message start event.

C.

Define the data mapping to transform source context data.

D.

Define the input and output data for a process activity.

Full Access
Question # 25

Which of the following work areas are included in operation management?

Choose the correct answer.

A.

Java Naming and Directory Interface (JNDI) browser

B.

Data archiving cockpit

C.

Java class loader viewer

Full Access
Question # 26

SAP NWDS (Eclipse) uses different perspectives.

What are valid characteristics of the Process Development and the Process Modeling perspective?

Note: There are 2 correctanswers to this question.

A.

The Process Development perspective offers a full set of capabilities for designing, implementing, and deploying a process.

B.

The Process Modeling perspective offers a full set of capabilities for designing, implementing, anddeploying a process.

C.

The Process Development perspective is a subset of the Process Modeling perspective.

D.

The Process Modeling perspective is a subset of the Process Development perspective.

Full Access
Question # 27

Which objects are assigned to an iFlow?

Note: There are 2 correct answers to thisquestion.

A.

Imported Archive

B.

Communication Channel

C.

Operation Mapping

D.

XSLT Mapping

Full Access
Question # 28

Application Resources shows the defaut source of metadata for the IDoc types.

Determine whether this statement is true or false.

A.

True

B.

False

Full Access
Question # 29

Target structures arecreated by the mapping program only during the execution of the mapping.

Determine whether this statement is true or false.

A.

True

B.

False

Full Access
Question # 30

The Java component SLD data supplier is deployed and started for the SAP NetWeaver AS Java server. Determine whether this statement is true or false.

A.

True

B.

False

Full Access
Question # 31

The SuccessFactors (SFSF) adapter supports which message protocols?

Note:There are 3 correct answers to this question.

A.

EDI

B.

SFTP

C.

OData

D.

DSOAP

E.

EREST

Full Access
Question # 32

Which standard conversion functions can you use in the graphical mapping tool? Note: There are 3 correct answers to this question.

A.

OData Lookup

B.

RFC Lookup

C.

Fixvalues

D.

JDBC Lookup

E.

SOAP Lookup

Full Access
Question # 33

During debugging of an integration process, which of the following logs allows you to searchfor exception IDs?

Please choose the correct answer.

A.

Process log

B.

Business log

C.

J2EE Engine log

D.

Connection log

Full Access