Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

C_CPE_14 Questions and Answers

Question # 6

What information does the SAP Destination service provide to your applications to connect to a remote service or system?

A.

Connectivity proxy information for the target resource

B.

Semantic information about the target resource

C.

Technical information about the target resource

Full Access
Question # 7

How many event handlers can you register for one event phase?

A.

exactly one

B.

exactly three

C.

multiple

Full Access
Question # 8

How many administrators can be assigned to a global account?

A.

0-1

B.

0-n

C.

1-n

Full Access
Question # 9

JSON is based on which programming language? Choose the correct answer.

A.

Julia

B.

Java

C.

JavaScript

D.

JCL

Full Access
Question # 10

Your CAP project contains an entity called Books. You want to extend the Books entity with the managed

aspect. You have already imported the aspect from the '(^sap/cds/common1 package (see attached

graphic). Which is a valid way to extend the entity with the aspect?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 11

How do you add authorization and trust management to your CAP project? Choose the correct answer.

A.

cds add security

B.

cds add uaa

C.

cds add xsuaa

Full Access
Question # 12

You initialize a new CAP project with initial project structure using a generator in SAP Business Application Studio. What are some of the default elements being created? Note: There are 2 to choose.

A.

file package.json

B.

folder /approuter

C.

folder /app

D.

file manifest.yml

Full Access
Question # 13

During application development, what are some principles of dealing with application errors? Note: There are 2 to choose.

A.

Hide errors and continue silently

B.

Use as many try/catch blocks as possible

C.

Use try/catch blocks sparingly

D.

Log unexpected errors

Full Access
Question # 14

What is a "main line" in a source control management system used for? Choose the correct answer.

A.

To make developers' contributions transparent and avoid clashes.

B.

To enable a reporting line for the project manager.

C.

To automate deployment.

Full Access
Question # 15

What kind of request does the webhook send? Choose the correct answer.

A.

POST

B.

PUT

C.

GET

Full Access
Question # 16

After what period of time does GitHub remove unused personal access tokens? Choose the correct answer.

A.

28 days

B.

1 month

C.

1 year

D.

100 days

Full Access
Question # 17

Which of the following statements apply to Continuous Delivery? Choose the correct answers.

A.

Code changes are pushed to a remote source code management system.

B.

The trigger for deployment to a productive system is a human decision.

C.

Software is ready for deployment to a productive system all the time.

D.

Feedback from a productive system gets quickly integrated into teams' backlog.

E.

Deployment to a productive system is triggered automatically.

Full Access
Question # 18

Which of the following are capabilities of the SAP Cloud Connector? Note: There are 2 to choose.

A.

Connect an SAP S/4HANA Cloud system with the SAP BTP

B.

Connecting an SAP S/4HANA system with the SAP BTP

C.

Providing control over cloud to cloud connections

D.

Providing control over cloud to on-premise connections

Full Access
Question # 19

Which dev space type in SAP Business Application Studio do you need when you want to create a CAP project?

A.

SAP Fiori

B.

Basic

C.

SAP Mobile Application

D.

Full Stack Cloud Application

Full Access
Question # 20

Which tools can you use to manage the SAP BTP, Cloud Foundry environment? Choose the correct answers.

A.

SAP BTP cockpit

B.

DCF CLI

C.

Eclipse

D.

SAP Business Application Studio

Full Access
Question # 21

What are the two structures JSON is built on? Choose the correct answers.

A.

Collections of name/value pairs

B.

Collections of value/value pairs

C.

Ordered list of values

D.

Unordered list of strings

Full Access