ExamGecko
Home Home / Microsoft / PL-100

Microsoft PL-100 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

You have a solution that contains a Power Automate flow, an environment variable, and a model-driven app.

Which three steps should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Question 91
Correct answer: Question 91

Explanation:

Step 1: Adjust the version number.

Step 2: Select the managed solution.

Managed Solution: A managed solution is a finalized solution that can be distributed and installed. They are created by exporting an unmanaged solution by setting restrictions to prevent any further customizations. The whole point of Managed is locking down the Component states so they cannot be edited. Deleting the Managed Solution will remove all its customisations as well as data contained. Managed Solutions become read only once deployed so they cannot be manipulated.

Step 3: Publish all changes.

Reference:

https://powerusers.microsoft.com/t5/Power-Apps-Pro-Dev-ISV/Managed-vs-Unmanaged/td-p/495685

DRAG DROP

You create a custom field on the Account entity.

Members of TeamA must have full access to the field. Members of TeamB must have no access to the field.

You need to configure security.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.


Question 92
Correct answer: Question 92

Explanation:

Step 1: Enable field security for the field

Step 2: Create a field security profile and set all the permissions for the custom attribute to Yes.

Step 3: Add TeamA to the field security profile.

Note: Field-level security is available for the default fields on most out-of-box entities, custom fields, and custom fields on custom entities. Field-level security is managed by the security profiles. To implement field-level security, a system administrator performs the following tasks.

1. Enable field security on one or more fields for a given entity.

2. Associate one more existing security profiles, or create one or more new security profiles to grant the appropriate access to specific users or teams.

HOTSPOT

A company uses two SQL Server environments and two Common Data Service environments.

The company policy states that only specific administrators can create environments. SQL Server and Common Data Service groups must be distinct.

You need to assign security access.

What should you assign? To answer, select the appropriate options in the answer area.

NOTE: Each correct selection is worth one point.


Question 93
Correct answer: Question 93

Explanation:

Box 1: System Administrator and Environment Security group

Security model for the databases

When a database is created, the users who have environment roles assigned to them, will continue to maintain those privileges. Users with Environment Admin role are now assigned to System Administrator role. Users with Environment Maker continue to possess the same role.

Box 2: Environment Admin

The Environment Admin role can perform all administrative actions on an environment, including the following:

Add or remove a user from either the Environment Admin or Environment Maker role.

Box 3: Environment Maker

Environment Maker: Can create new resources associated with an environment, including apps, connections, custom APIs, gateways, and flows using Microsoft Power Automate. However, this role doesn't have any privileges to access data within an environment. More information:

Box 4: System Customizer

System Customizer: Has full permission to customize the environment. However, users with this role can only view records for environment entities that they create.

Reference:

https://docs.microsoft.com/en-us/power-platform/admin/database-security

DRAG DROP

A company has the following divisions: wholesale and retail.

The manufacturer wants to create a single Power BI report to allow users to view data from a Microsoft SQL Server database.

You need to ensure that each user sees data only for the team to which the user is assigned.

How should you secure the report?

To answer, drag the appropriate options to the correct action. Each option may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.


Question 94
Correct answer: Question 94

Explanation:

Box 1: Power BI Desktop

You can define roles and rules within Power BI Desktop. When you publish to Power BI, it also publishes the role definitions.

To define security roles, follow these steps.

1. Import data into your Power BI Desktop report, or configure a DirectQuery connection.

2. From the Modeling tab, select Manage Roles.

3. From the Manage roles window, select Create.

4. Etc.

Box 2: Power BI Service

After you save your report in Power BI Report Server, you manage security and add or remove members on the server. 1. In Power BI Desktop, save the report to Power BI Report Server. You need to use the version of Power BI Desktop for Power BI Report Server. 2. In Power BI Report Service, select the ellipsis (…) next to the report.

3. Select Manage > Row-level security.

On the Row-level security page, you add members to a role you created in Power BI Desktop.

Reference:

https://docs.microsoft.com/en-us/power-bi/create-reports/desktop-rls

HOTSPOT

A production line app maker at a manufacturing company creates a canvas app that looks for available inventory in a SQL database. The production line workers use the inventory app across all work centers.

The production line workers report the following app issues from the shop floor:

The app reports a delegation warning.

Voice command functionality is unreliable.

You have minimal information about the issues. You are not allowed to enter the production facility.

You need to troubleshoot the issues.

How should you troubleshoot the issues? To answer, select the appropriate options in the answer area.


Question 95
Correct answer: Question 95

Explanation:

Box 1: Check the number of items in the collection

If the data in your data source exceeds 500 records and a function can't be delegated, Power Apps might not be able to retrieve all of the data, and your app may have wrong results.

Note: Delegation is where the expressiveness of Power Apps formulas meets the need to minimize data moving over the network. In short, Power Apps will delegate the processing of data to the data source, rather than moving the data to the app for processing locally.

Box 2: Use the Advanced Tools/Monitor feature

Monitor is available by default for all canvas apps. Using Monitor, you can trace events as they occur in a canvas app during the authoring experience in Power Apps Studio, or you can use Monitor to debug the published version of a canvas app.

Example: Consider the scenario where an app has been deployed, and the initial version of the app experiences performance degradation. The app also intermittently generates errors with no clear pattern. Loading data in the app succeeds most of the time, but fails sometimes.

When you check Monitor, you see data operations as expected. However, you also see several responses that have HTTP status code 429, indicating that there have been too many requests in a specific timeframe.

Reference:

https://docs.microsoft.com/en-us/powerapps/maker/canvas-apps/delegation-overview

https://docs.microsoft.com/en-us/powerapps/maker/monitor-canvasapps

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are developing a model-driven app that uses a Common Data Service database. App users will have a variety of different security roles.

Development and testing must be performed using production data. Multiple testers must be used at each testing stage.

You need to provision and configure new environments for development and testing.

Solution:

Provision sandbox environments named S1 and S2.

Copy the production environment to both S1 and S2.

Use S1 for development and S2 for testing.

Does the solution meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: A

Explanation:

A sandbox environment is any non-production environment of Microsoft Dataverse. Isolated from production, a sandbox environment is the place to safely develop and test application changes with low risk.

Reference:

https://docs.microsoft.com/en-us/power-platform/admin/environments-overview

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are developing a model-driven app that uses a Common Data Service database. App users will have a variety of different security roles.

Development and testing must be performed using production data. Multiple testers must be used at each testing stage.

You need to provision and configure new environments for development and testing.

Solution:

Provision a trial environment named T1 and a sandbox environment named S1.

Copy the production environment to T1 and S1.

Use T1 for development and S1 for testing.

Use T1 for development and S1 for testing.

Does the solution meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Using trial environments, companies and customers can try out new features and solutions.

Do not use a trial environment for development.

A sandbox environment is any non-production environment of Microsoft Dataverse. Isolated from production, a sandbox environment is the place to safely develop and test application changes with low risk.

Reference:

https://docs.microsoft.com/en-us/power-platform/admin/trial-environments

https://docs.microsoft.com/en-us/power-platform/admin/sandbox-environments

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.

You are developing a model-driven app that uses a Common Data Service database. App users will have a variety of different security roles.

Development and testing must be performed using production data. Multiple testers must be used at each testing stage.

You need to provision and configure new environments for development and testing.

Solution:

Provision production environments named P1 and P2.

Copy the current production environment to P1 and P2.

Use P1 for development and P2 for testing.

Does the solution meet the goal?

A.

Yes

A.

Yes

Answers
B.

No

B.

No

Answers
Suggested answer: B

Explanation:

Production: This is intended to be used for permanent work in an organization.

Don't use production environment for development and testing.

Reference:

https://docs.microsoft.com/en-us/power-platform/admin/environments-overview


You have a Power Platform solution that uses Common Data Service.

You need to secure all fields that support field-level security.

Which field can you secure?

A.

createdon

A.

createdon

Answers
B.

accountid

B.

accountid

Answers
C.

owninguser

C.

owninguser

Answers
D.

description

D.

description

Answers
Suggested answer: D

Explanation:

Which fields can be secured?

Although most attributes can be secured, there are system attributes, such as IDs, timestamps, and record tracking attributes, that can't. Below are a few examples of attributes that can't be enabled for field security.

ownerid, processid, stageid, accountid, contactid

createdby, modifiedby, OwningTeam, OwningUser

createdon, EntityImage_Timestamp, modifiedon, OnHoldTime, overriddencreatedon

statecode, statuscode

Reference:

https://docs.microsoft.com/en-us/power-platform/admin/field-level-security

A company is onboarding new workers to the Microsoft Power Platform.

A user reports an access issue with a Power Apps app. The user provides no additional information about the access issue.

You need to troubleshoot the app and data security configurations for the user.

Which tool should you use?

A.

Azure AD Security review

A.

Azure AD Security review

Answers
B.

User information page

B.

User information page

Answers
C.

Accessibility checker

C.

Accessibility checker

Answers
D.

Run diagnostics

D.

Run diagnostics

Answers
Suggested answer: D

Explanation:

User access diagnostic tool in the Power Platform admin center:

Several factors influence user access in a Microsoft Dataverse environment. To help administrators with diagnosing user access to an environment and reasons for access or no access, the new “Run diagnostics” feature in the Power Platform admin center provides basic access diagnostics for individual users in the environment. The feature helps to detect potential causes to user sign-in and other issues and suggests potential mitigations.

Reference:

https://docs.microsoft.com/en-us/power-platform/admin/troubleshooting-user-needs-read-write-access-organization

Total 271 questions
Go to page: of 28