1.
A company is developing a canvas app to monitor and analyze customer visits to their retail stores. Information regarding customer visits is kept on-site at each retail store. The app must present data on customer visits as soon as users open it. You need to guarantee that the data is accessible for the app's use. Which tool would you employ?
2.
Select true of false: Is virtual table data stored in Dataverse?
3.
As a customer service manager, what type of data source would you utilize to implement a Power Apps portal enabling customers to submit cases?
4.
A prominent retail company has adopted Power Apps, Microsoft Flow, and the Dataverse. The board of directors seeks insights into the technology's value for users and wishes to measure and report its usage. What tool would you recommend for assessing software usage in this scenario?
5.
The company presently does not adhere to standard Application Lifecycle Management (ALM) practices by segregating testing, development, and production phases. Power Apps are utilized by the company for accounting and sales procedures. The company necessitates employing only one login account per user and ensuring that development and testing activities do not affect production. You need to introduce a solution that fulfills these requirements. Which approach should you opt for?
6.
True or False: Can you integrate Dynamics 365 & SharePoint using out-of-the-box capabilities & without using any custom code?
7.
Select the correct area where you can configure SharePoint document library in Dynamics 365 CE?
8.
Which application should users install to ensure they can access data from mobile devices if the company is utilizing Dynamics 365 Sales and the browser-based app Sales Hub?
9.
Choose the appropriate scope within the Business Rules of a Model-Driven App.
10.
A company employs the Power Platform. Your task is to guarantee that users are unable to share customer data with others and cannot access data sources without explicit permissions granted by you. You need to propose solutions to fulfill the company's security needs. Which two types of policies should you suggest as part of the solution?