Professional Documents
Culture Documents
Dynatrace Exam
Dynatrace Exam
A. You can use single users session property access multiple applications
B. User session properties can be used in USQL queries
C. User session properties are available for web and mobile applications
D. User session properties are retrospective.
Answer: B, C
Question :2
When analyzing a service flow or distributed trace, what is the processing time calculated as?
A. The time between the start time and the end time of the transaction
B. The time between when the client triggers the request and receives the response
C. The total time is takes the CPU to execute code.
D. The sum of the time taken by all asynchronous executions occurring during the transaction
Answer: A
Question: 3
Answer: C
Question: 4
A. A defined group that provides an extra layer of contextual information about your network monitoring
data
B. A defined group that allows you to perform bulk operations across multiple networks monitored by
Dynatrace
C. An entity that represents your network structure and is used to efficiently route traffic for OneAgent and
active gates.
D. An information-partitioning mechanism used for filter data for specific teams.
Answer: C
Question: 5
A. 35 days
B. 10 days
C. 5 years
D. 30 days
Answer: c
Question: 6
When can you configure in Dynatrace to automatically name new or existing service ?
Answer: C
Question: 7
Answer: B
Question: 8
Answer: C
Question: 9
How can you show the location of the users with private IP addresses on the world map?
Answer: A
Question: 10
Answer: D
Question: 11
You want to separate entities in your monitored environment, such as host, service and web applications , and
ensure only authorized users can view the data for their group of entities, how can you do this?
Answer: B
Question:12
You are reviewing a live user session but there is no user experience score why is that?
A. A problem has occurred during this user session and therefor, a user experience score cannot be
calculated for the session.
B. The key performance metric for this particular user has been sent to something other than the user
experience score.
C. The user experience score is only calculated for active user sessions if the session is live but not active, the
score will no longer be available.
D. Live user sessions may still register new user actions and the user experience score isn’t calculated until
the session ends.
Answer: D
Question: 13
To define specific settings for a performance metric for a user actions, what do you need to do?
A. Mark the action as a key request and edit the performance metric settings.
B. Mark the action as a key user action and edit the key performance metric settings.
C. This can only be set for Applications not for Individual user actions
D. Edit the Application settings, select the actions to customize, and set the performance metric values you
want to apply to the selected actions
Answer: B
Question: 14
A. Buffering and compression of oneAgent messages and delivery to the Dynatrace cluster
B. Detection of external services, such as database services for collection of performance data
C. Act as entry points for sealed networks
D. Authentication of OneAgent requests
Answer: B
Question: 15
Enabling extra support for additional JavaScript frameworks helps add detail to which type of user action?
Answer: B
Question: 16
Mobile users in North America have complained that sometimes your app is slow. You suspect it is 3rd party
requests taking too long. What information is provided by Dynatrace to help you look into this?
A. Discover who the individual users are. When you know this you can use Dynatrace tracking of each user
session to track down what might be slow in each session and see if it is the 3rd party requests
B. For mobile apps, Dynatrace tracks Top Providers that displays the HITTP domains with the largest number
of outgoing requests It includes request time and error rate that you can review to see which ones are
taking the most time or have the most errors
C. Dynatrace provides the service flow for the 3rd party requests that you can follow to see where in the
provider's content there may be errors or slowdown occurring
D. Information about 3rd party providers is not available in Dynatrace
Answer: B
Question: 17
If you see an Unexpected low traffic or an Unexpected high traffic problem, what bas Dynatrace detected?
A. A deviation between the actual and what the predicted application traffic
B. The predicted future traffic appears to be less than the current application traffic.
C. A drop in the number of unique application users from the previous time frame
D. Aglobal application outage
Answer: D
Question:18
How long does an application need to run before traffic spike and dop alerts are raised?
Answer: D
Question: 19
In this image, which entities might be displayed as affected by a problem with an impact level of
INFRASTRUCTURE? Select all that apply.
A. Processes
B. Hosts
C. Data centers
D. Applications
E. Services
Answer: B, C
Question: 20
Why does a Dynatrace Managed environment need to be able to communicate with Dynatrace Mission Control?
A. Mission Control is responsible for processing usage and billing information and Dynatrace cluster health.
B. Mission Control bundles the agent traffic and reduces the network overhead.
C. Mission Control provides the Dynatrace Al analysis for your managed data.
D. Mission Control provides permissions to Management zones.
Answer: A
Question: 21
What options are available for changing the auto-detected name of a host? Select al that apply.
Answer: A,B, D
Question: 22
Can a user action be both a conversion goal and a key user action?
A. No
B. Only in mobile applications
C. Only in Dynatrace managed.
D. Yes
Answer: A
Question: 23
Answer: A
Question: 24
What settings can be used to customize the synthetic device used for a Synthetic Click path Select all that apply
A. Input lag
B. Bandwidh
C. Network interference
D. O/S version
E. Screen orientation
F. Device type
G. Screen Size
Answer: B, F, G
Question: 25
You only want to monitor PHP on a single host, how can you do this?
A. Disable PHP Global monitoring then edit the host settings to enable PHP monitoring on that host
B. Disable PHP Global monitoring then edit the PHP Process group settings to add the Host to the Host group list
C. Disable PHP Global monitoring and then modify the OneAgentRuntine config and add Pr to the NoMonitor line
D. On the PHP Technology page, deselect any hosts where you do not want to monta PP.
Answer: B
Question: 26
A. Unexpected
B. Slowdown
C. Resource
D. Avallabiity
E. Enror
Answer: A
Question: 27
If a problem encompasses multiple events with different severity levels how is the inital problem severity
determined?
A. The problem severity level has the same severity level as the event with the highest severity level
B. The problem severity level is independent of the event sevenity level
C. The problem severity level has the same severity level as the event with the lowest sevenity level
D. Event severity levels are averaged together providing the problem sevenity level
Answer: A
Question: 28
How does Dynatrace use the CVSS when determining the Davis security score of a vulnerability?
A. Dynatrace determines how often your application is actually accessed by users and adjusts the Attack vector by
how much the application is used. This is the DSS
B. Dynatrace directly uses the CVSS score of the vulnerability once it is determined by NIST
C. Dynatrace uses the CVSS score as a base score. The score maybe lowvered depending on the public exposure
of the impacted service and the involvement of sensitive data assets in your environment
D. Dynatrace uses the CVSS score as a base score. The score may be ralsed or lowvered depending on what is
found in your environment and how it relates to the vulnerabifty
Answer: C
Question: 29
Which of the following actions can you perform from the Cluster Management Console? Select all that apply.
Answer: A, B, D, E
Question: 30
How does the Dynatrace approach to application performance provide accurate thresholds for alerting?
A. Dynatrace uses multi-dimensional baselining that calculates detailed response times based on user action,
geolocation, browser, and operating system. Alerts activate based on these response time baselines instead of
the application as a whole, which could lead to over-alerting
B. Dynatrace calculates application performance response times by creating synthetic monitors that calculate the
optimal response time of the application. Alerts are then raised application traffic response time goes over the
calculated response time thresholds
C. Dynatrace uses standard values as thresholds for application performance based on assumed ideal conditions
and the geolocations of your users. Once you are familiar with the alerts that are raised you can adjust the
sensitivity of the anomaly detection by adjusting the default values
D. Dynatrace uses static thresholds based on resource contentions like CPU spikes memory and disk usage When
these thresholds are exceeded Dynatrace Al assumes the application must he slowing down and raises alerts.
Answer: A
Question: 31
A. Service-level backtrace
B. Smartscape
C. Service flow
D. Distributed trace
Answer: A
Question: 32
how does Dynatrace perform evaluations for slowly degrading response-time degradations?
A. Evaluations are based on the slowest 10% of all requests during the degradation.
B. Evaluations are based on the number of users impacted by the response-time degradation The sliding time-
frame for evaluation is Increased by 5 minutes for every 500 users affected
C. Evaluations are performed based on 15-minute time interval’s.
D. Evaluations are performed based on sliding S-minute time Intervals.
Answer: C
Question: 33
What options are available for Instrumenting an Android application? Select al that apply
Question: 34
When configuring request attributes, what does the Request attribute contains confidential data checkbox do?
A. sensitive values or data In the request attribute are masked and therefore hidden from unauthorized access
B. The entire request attribute will be hidden If It contains sensitive information
C. Request attributes with sensitive values or data are flagged and authorized users can unlock the data with a
password.
D. Sensitive values or data in the request attribute are removed.
Answer: A
Question: 35
Answer: C
Question: 36
A. Using all alerts in the last 2 hours, an Al engine uses the causation model to determine which infrastructure
component raised the most alerts, ad sets that component as the root cause
B. An Al engine analyzes dependencies between components and builds a model which is used to determine the
components most likely causing a problem.
C. The component that raised the first alert in a series of alerts is considered the root cause Alerts are considered
to be in a series when each alert occurs within a 5-minute time frame of the last alert
D. If an alert has been raised in the last 24 hours the alert's component is considered the root cause
Answer: B
Question: 37
when viewing a host page, how can you tell which tags were created manually and which were created
via the oneagentctl ?
A. Tags created via oneagentctl are prefixed with the {environment} string.
B. Manually created tags are prefixed with the {manual} string.
C. You cannot tell the difference between the tags.
D. The tags are displayed in different sections on the page.
Answer: B
Question: 38
What happens when a user session is initiated, and the user clears their browser cookies before
resuming their interactions with the application?
Question: 39
when considering Dynatrace network monitoring which of the following are the network consumers
within your Dynatrace environment for which you can view network-related metrics?
Question: 40
When considering user experience analysis in Dynatrace, which of the following are used as key
performance metrics? select all that apply.
A. Visually complete
B. DOM Interactive
C. DOM Content loaded
D. Load event total time
E. Speed index
Answer: A, B, E
Question: 41
A. They are detected when your monitored services or applications make unknown requests.
B. Dynatrace sees the performance data from the external services.
C. They are detected when they send or receive requests from your monitored services and
applications.
D. External services are not detected.
Answer: C
Question: 42
how can you assign a host to a host group? select all that apply
Question: 43
In a single- URL browser monitor, how can you ensure that a certain page element is loaded?
Question: 44
A. A group of processes which perform the same task, regardless of technology type and which may be
running across multiple hosts.
B. A group of processes belonging to the same technology, performing various tasks on multiple hosts
C. A group of processes belonging to the same technology that perform the same task across multiple
hosts.
D. A group of the same services running across multiple hosts.
Answer: C
Question: 45
A. Metadata is detected during startup or discovery of a monitored entity. Tags are created
manually, imported from external sources, or via rules.
B. Tags and metadata are added manually to entities as needed.
C. Both tags and metadata can be added manually and created via rules in Dynatrace
D. Tags are detected during startup or discovery of a monitored entity. Metadata is created
manually or via rules.
Answer: A
Question: 46
Which of the following are considered by Dynatrace when identifying and naming Web request services?
Select all that apply.
A. Web application ID
B. Web server name
C. Database requests
D. Context root
E. IP address
Answer: A, B, D
Question: 47
What are the problem detection and alerting options for creating a Maintenance Window? Select all that
apply.
Question: 48
After Dynatrace creates the default application, what do you use to customize how applications are
grouped?
Question: 49
Question: 50
What can you do to check the availability of internal applications or resources that are inaccessible from
outside your network? Select all that apply.
A. Create a Browser clickpath on a Dynatrace managed node that can communicate with Mission
Control.
B. Create an HTTP Monitor on an Environment ActiveGate with a private synthetic location.
C. Create a Browser Monitor to simulate an internal user session which is executed by synthetic
Control.
D. Create a Browser Monitor on a Cluster ActiveGate with a private synthetic location.
Answer: B, C
Question: 51
What type of thresholds does Dynatrace use for problem detection? Select all that apply.
A. Static thresholds
B. Automated baselines
C. User experience score
D. Synthetic performance thresholds
Answer: A, B
Question: 52
Why might there be an 'Opaque service' In your environment? Select all that apply.
A. Services have been aggregated because they are of the same process group and perform identical
functions across separate cluster nodes.
B. Code-level visibility Isn't possible because the services have external dependencies.
C. The service technology is supported by Dynatrace, but code-level visibility isn't available.
D. The service technology is unrecognized or unsupported.
Answer: C, D
Question: 53
Which dimensions are used for Application baselining? Select all that apply.
A. Tags
B. User action
C. Service method
D. Conversions
E. Browser
F. Geolocation
G. Operating system
Answer: B, C, E, F, G
Question: 54
How can Real User Monitoring be configured if you have no access to the host? Select all that apply.
A. OneAgent plugin
B. Browser Extension
C. Agentless monitoring
D. Monitoring would not be possible.
Answer: B, C
Question: 55
A. It recommends the hosts to which you should deploy application security based on accessibility to
sensitive data.
B. It recommends changes to your real user monitoring and log monitoring configurations to reduce
the possibility of capturing sensitive or PHVPII data.
C. It is the part of the Al engine that calculates the Davis Security Score
D. It recommends the fixes that would most improve the overall security of your environment.
Answer: D
Question: 56
When Dynatrace detects an application running on a host, what is used to capture and group the
application monitoring data?
What do Response time hotspots on the Services page indicate? Select all that apply.
Question: 58
A. 72 hours
B. 24 hours
C. 2 hours
D. 48 hours
Answer: A
Question: 59
How can a specific user be identified in Real User Monitoring by their username or email address?
Question: 60
Why would a live user session NOT display a user experience score?
A. The user experience score is not calculated until the session has ended.
B. The user session is a synthetic monitor.
C. A key performance metric hasn't been configured for the actions used in the session.
D. The user session has not been active for long enough for the score to be calculated.
Answer: A
Question: 61
After activating a synthetic browser monitor, why should you wait 24 hours before adjusting the performance
thresholds?
Answer: C
Question: 62
Answer: B
Question: 63
By default, how often does Dynatrace auto-discover, analyze, and store log files?
A. Every 15 minutes
B. Every 2 hours
C. Every 24 hours
D. Every 60 seconds
Answer: D
Question: 64
How can you track which users in an application have successfully completed a checkout?
Answer: A
Question: 65
In the Smartscape shown, what do the dotted lines with directional arrows Indicate?
A. That the easyTravel Frontend Service communicates with these services but has not called them in the last 2
hours
B. That these services call the easyTravel Frontend Service, but they have not called It in the last 2 hours
C. That these services are currently actively communicating with the easyiravel Frontend Service
D. That these services haven't made or recelved any calls from the easyTravel Frontend services In
the last 72 hours
Answer: B
Question: 66
You have created user action naming rules to generate consistent and readable user actions so they are grouped
logically for monitoring and analysis. What other feature in Dynatrace does this for you automatically?
A. Page groups
B. Applications
C. Pages
D. Real user monitoring
Answer: A
Question: 67
A. The Frontend Availability SLO is green as the error budget is still healthy, but the waring icon is displayed
because Davis has detected a problem that could soon affect the SLO
B. The Error budget has been exceeded for the Frontend Availability SLO and Davis is Indicating this by displaying
the warning Icon on the dashboard tile.
C. Davis Is displaying a warning Icon because the Frontend Availability SLO status has dropped below 100%
D. The Frontend Availability SLO Is green as the error budget is still healthy but the warming icon Is shown
Indicating that the Error budget is about to be exceeded
Answer: A
Question: 68
You have researched a vulnerability in your environment and have determined you don't need to address it. What
can you do to remove it from your vulnerabilities list?
Answer: C
Question: 69
A. 10 minutes
B. 3 minutes
C. 15 minutes
D. 5 minutes
Answer: D
Question: 70
Dynatrace treats databases as external services, what does this mean when referring to how databases are
monitored?
Answer: D