|Exam Name||:||Development, Extensions and Deployment for Microsoft Dynamics 365 for Finance and Operations|
|Questions and Answers||:||90 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||MB6-894 Brain Dump|
|Get Full Version||:||Pass4sure MB6-894 Full Version|
What is an example of a best practice for creating base enumerations?
Use base enumerations when there is a variable number of user-defined outcomes.
Value of zero should be used as the default value for base enumerations.
Avoid accessing a constant by using an enumerator.
Avoid assigning labels to enumerations that have a default value.
You are an Independent Software Vendor (ISV) developer. You are working on a new solution that will support multiple languages and regions, and you need to use labels. Which two best practices should you follow when using the labels? Each correct answer presents a complete solution.
Use descriptive text for the label file ID.
Use labels for elements and artifacts.
Use the name of the model for of the label file name.
Use a new label ID for every element or artifact.
Section: Develop new elements by using Application Explorer (20-25%) Explanation Explanation/Reference:
You should use labels for every user-facing element or artifact in Dynamics 365 for
Finance and Operations.
For multi-language label files, you should ensure that labels contain appropriate translations of the activity or item that they describe.
You should also use labels when programming for all external strings. You should create a label file with the same name as the associated model.
Employees who use a Cloud point-of-sale (POS) at a store report that the product information is not current. There is no Retail Store Scale Unit deployed at the store, and you suspect that the scheduler job that updates product information has failed.
Which two actions can you take to check the status of the scheduler job? Each correct answer presents a complete solution.
In Event Viewer, look at the Commerce-RetailServer event log for an event that references the job.
In Lifecycle Services (LCS), look in Environment monitoring, and search Activity for the batch job that includes the scheduler job.
In Retails Headquarters, look at the history of the distribution schedule that includes the scheduler job.
In the Cloud POS, look at the Database connection status screen for the job.
Section: Develop and extend retail components (15-20%) Explanation Explanation/Reference:
Retail distribution jobs uses the commerce data exchange async server and the retail scheduler.
The components of messages, environments, and jobs are all collected and surfaced up to LCS to provide a one-stop overview of diagnostics and monitoring.
Related Lesson: About Lifecycle Services
You are working for a client in a new Microsoft Dynamics 365 for Finance and Operations environment. The client requests that custom fields be added to the
SalesTable table. You need to add them in a way to minimize the cost of maintenance and upgrading. What should you do to add the custom fields?
Create a new package in the ApplicationSuite model.
Create a new model that overlayers the ApplicationSuite model.
Create a new extension model that references the ApplicationSuite model.
Create a new project in the ApplicationSuite model.
Section: Understand the architecture and development environment (20-25%) Explanation Explanation/Reference:
Microsoft's best practice recommendation is to use extension objects and models wherever we can.
You want to install an Application Metadata hotfix in your Microsoft Dynamics 365 for Finance and Operations development environment. You find and download the hotfix zip file from Lifecycle Services (LCS) and extract the hotfix package form the file. Which command-line utility should you use to prepare the installation of the hotfix package?
You are working in a Microsoft Dynamics 365 for Finance and Operations environment that has a Dock site and a Plant site. The Dock site contains one warehouse, and the
Plant site contains three warehouses. You want to create a new security role. When users assigned to this security role view the InventLocation form, they should only be able to view the warehouse that is in the Dock site. Which security framework should you use to accomplish this goal?
OAuth 2.0 Authorization
Table Permissions Framework
Record-Level Security Framework
Extensible Data Security Framework
Section: Manage the User Interface and Security for Developers (20-25%) Explanation Explanation/Reference: Data security
Authorization is used to grant access to elements of the program. By contrast, data security is used to deny access to tables, fields, and rows in the database.
Use the extensible data security framework to control access to transactional data by assigning data security policies to security roles. Data security policies can restrict access to data, based on either the effective date or user data, such as the sales territory or organization.
Record-level security, which was a mechanism for securing data in Dynamics AX 2012
and earlier versions, is obsolete. Extensible data security is the recommended mechanism for securing or filtering data in the program.
Additionally, the Table Permissions Framework helps protect some data. Data security for specific tables is enforced by Application Object Server (AOS).
Your company is having issues with indexes. You research the problem and find that, regardless of index type (primary, clustered, or non-clustered), you do not get the expected performance improvements. To resolve the issue, what should you ensure about the columns of the index?
They have the Allow Duplicates property set to No.
They are arranged from the most granular to the least granular.
They are arranged from the least granular to the most granular.
They are sorted in a different order, based on category.
You are writing an X++ method to delete a SalesLine record. You need to ensure that the call to the delete() method succeeds.
Which two criteria must be met to accomplish this goal? Each correct answer presents part of the solution.
The record to delete must have been read from the database using the forupdate keyword in a select statement.
The dispose() method must be called after the delete() method is called.
The delete() method must be called inside a transaction by using the ttsbegin and ttscommit statements.
The record to delete must be locked first by calling the selectLocked() method.