Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

Question: 1

Which of the following statements about user session properties is true?

A. You can use single users session property access multiple applications
B. User session properties can be used in USQL queries
C. User session properties are available for web and mobile applications
D. User session properties are retrospective.

Answer: B, C

Question :2

When analyzing a service flow or distributed trace, what is the processing time calculated as?

A. The time between the start time and the end time of the transaction
B. The time between when the client triggers the request and receives the response
C. The total time is takes the CPU to execute code.
D. The sum of the time taken by all asynchronous executions occurring during the transaction

Answer: A

Question: 3

When you need to use the RUM browser extension?

A. Any time you want to track real user monitoring data


B. It is required to record a browser clickpath
C. When you want real user monitoring but don’t have access to the underlying application server or the HTML
page source
D. When you want real user monitoring and have access the application server but don’t have access to the HTML
page source.

Answer: C

Question: 4

When is a Network Zone in Dynatrace?

A. A defined group that provides an extra layer of contextual information about your network monitoring
data
B. A defined group that allows you to perform bulk operations across multiple networks monitored by
Dynatrace
C. An entity that represents your network structure and is used to efficiently route traffic for OneAgent and
active gates.
D. An information-partitioning mechanism used for filter data for specific teams.

Answer: C

Question: 5

How long does Dynatrace keep timeseries metrics?

A. 35 days
B. 10 days
C. 5 years
D. 30 days

Answer: c

Question: 6
When can you configure in Dynatrace to automatically name new or existing service ?

A. Service merging rules


B. Service detection rules
C. Service naming rules
D. Service group naming Rules

Answer: C

Question: 7

How does OneAgent provide real user monitoring?

A. It inject parameters into the URLs which trace user traffic


B. It inject JavaScript tag into the HTML of each application page that is rendered by your web servers.
C. It monitor the processes running on each host and collects performance metrics about user traffic
D. It track the user cookies in the browser.

Answer: B

Question: 8

When does Dynatrace raise a memory saturation error event?

A. When memory usage increases to 100% on windows or linux.


B. When CPU usage raises above the defined critical threshold
C. When both memory usage and memory page fault rates increase over the specified parameters
D. When memory page faults increase over 100% of the established baseline.

Answer: C

Question: 9

How can you show the location of the users with private IP addresses on the world map?

A. By mapping IP address to locations in the web & mobile monitoring settings


B. You can manually place the user locations on the world map
C. By recording the detection rules on the IP detection page.
D. By configuring the geolocation breakdown table.

Answer: A

Question: 10

A host availability statue is showing offline. What does this indicate?

A. That a maintenance window is currently in effect


B. That OneAgent is not running on the host because it was stopped or uninstalled.
C. That the host was shutdown gracefully
D. That the host is unexpectedly unavailable

Answer: D

Question: 11

You want to separate entities in your monitored environment, such as host, service and web applications , and
ensure only authorized users can view the data for their group of entities, how can you do this?

A. Create host groups


B. Create management zones
C. Create users entity rules in the cluster management console
D. Create entity detection rules

Answer: B

Question:12
You are reviewing a live user session but there is no user experience score why is that?

A. A problem has occurred during this user session and therefor, a user experience score cannot be
calculated for the session.
B. The key performance metric for this particular user has been sent to something other than the user
experience score.
C. The user experience score is only calculated for active user sessions if the session is live but not active, the
score will no longer be available.
D. Live user sessions may still register new user actions and the user experience score isn’t calculated until
the session ends.

Answer: D

Question: 13

To define specific settings for a performance metric for a user actions, what do you need to do?

A. Mark the action as a key request and edit the performance metric settings.
B. Mark the action as a key user action and edit the key performance metric settings.
C. This can only be set for Applications not for Individual user actions
D. Edit the Application settings, select the actions to customize, and set the performance metric values you
want to apply to the selected actions

Answer: B

Question: 14

Which of the following is NOT a function of an ActiveGate?

A. Buffering and compression of oneAgent messages and delivery to the Dynatrace cluster
B. Detection of external services, such as database services for collection of performance data
C. Act as entry points for sealed networks
D. Authentication of OneAgent requests

Answer: B

Question: 15

Enabling extra support for additional JavaScript frameworks helps add detail to which type of user action?

A. All user action types


B. XHR Action
C. Exit Action
D. Load Action

Answer: B

Question: 16

Mobile users in North America have complained that sometimes your app is slow. You suspect it is 3rd party
requests taking too long. What information is provided by Dynatrace to help you look into this?

A. Discover who the individual users are. When you know this you can use Dynatrace tracking of each user
session to track down what might be slow in each session and see if it is the 3rd party requests
B. For mobile apps, Dynatrace tracks Top Providers that displays the HITTP domains with the largest number
of outgoing requests It includes request time and error rate that you can review to see which ones are
taking the most time or have the most errors
C. Dynatrace provides the service flow for the 3rd party requests that you can follow to see where in the
provider's content there may be errors or slowdown occurring
D. Information about 3rd party providers is not available in Dynatrace

Answer: B

Question: 17

If you see an Unexpected low traffic or an Unexpected high traffic problem, what bas Dynatrace detected?
A. A deviation between the actual and what the predicted application traffic
B. The predicted future traffic appears to be less than the current application traffic.
C. A drop in the number of unique application users from the previous time frame
D. Aglobal application outage

Answer: D

Question:18

How long does an application need to run before traffic spike and dop alerts are raised?

A. For one full day


B. For at least 20% in the past week
C. For at least 20% in the last day
D. For one full week

Answer: D

Question: 19

In this image, which entities might be displayed as affected by a problem with an impact level of
INFRASTRUCTURE? Select all that apply.

A. Processes

B. Hosts

C. Data centers

D. Applications

E. Services

Answer: B, C

Question: 20

Why does a Dynatrace Managed environment need to be able to communicate with Dynatrace Mission Control?

A. Mission Control is responsible for processing usage and billing information and Dynatrace cluster health.
B. Mission Control bundles the agent traffic and reduces the network overhead.
C. Mission Control provides the Dynatrace Al analysis for your managed data.
D. Mission Control provides permissions to Management zones.

Answer: A

Question: 21

What options are available for changing the auto-detected name of a host? Select al that apply.

A. Create a host naming rule


B. By using the oneagentctl
C. Create a host detection rule
D. Change the host name in the host settings

Answer: A,B, D

Question: 22

Can a user action be both a conversion goal and a key user action?

A. No
B. Only in mobile applications
C. Only in Dynatrace managed.
D. Yes

Answer: A

Question: 23

Where do you manage and invite users in Dynatrace Managed?

A. Cluster Management Console (CMC)


B. Mission Control (MC
C. NAM Console
D. Cluster ActiveGate

Answer: A

Question: 24

What settings can be used to customize the synthetic device used for a Synthetic Click path Select all that apply

A. Input lag
B. Bandwidh
C. Network interference
D. O/S version
E. Screen orientation
F. Device type
G. Screen Size

Answer: B, F, G

Question: 25

You only want to monitor PHP on a single host, how can you do this?

A. Disable PHP Global monitoring then edit the host settings to enable PHP monitoring on that host
B. Disable PHP Global monitoring then edit the PHP Process group settings to add the Host to the Host group list
C. Disable PHP Global monitoring and then modify the OneAgentRuntine config and add Pr to the NoMonitor line
D. On the PHP Technology page, deselect any hosts where you do not want to monta PP.

Answer: B

Question: 26

Which of the following is NOT an event type?

A. Unexpected
B. Slowdown
C. Resource
D. Avallabiity
E. Enror

Answer: A

Question: 27

If a problem encompasses multiple events with different severity levels how is the inital problem severity
determined?

A. The problem severity level has the same severity level as the event with the highest severity level
B. The problem severity level is independent of the event sevenity level
C. The problem severity level has the same severity level as the event with the lowest sevenity level
D. Event severity levels are averaged together providing the problem sevenity level

Answer: A

Question: 28

How does Dynatrace use the CVSS when determining the Davis security score of a vulnerability?

A. Dynatrace determines how often your application is actually accessed by users and adjusts the Attack vector by
how much the application is used. This is the DSS
B. Dynatrace directly uses the CVSS score of the vulnerability once it is determined by NIST
C. Dynatrace uses the CVSS score as a base score. The score maybe lowvered depending on the public exposure
of the impacted service and the involvement of sensitive data assets in your environment
D. Dynatrace uses the CVSS score as a base score. The score may be ralsed or lowvered depending on what is
found in your environment and how it relates to the vulnerabifty

Answer: C

Question: 29

Which of the following actions can you perform from the Cluster Management Console? Select all that apply.

A. Add cluster nodes


B. Installa Cluster ActiveGate
C. Install an Environment ActiveGate
D. Create user accounts and groups
E. Add new environments
F. Deploy OneAgent

Answer: A, B, D, E
Question: 30

How does the Dynatrace approach to application performance provide accurate thresholds for alerting?

A. Dynatrace uses multi-dimensional baselining that calculates detailed response times based on user action,
geolocation, browser, and operating system. Alerts activate based on these response time baselines instead of
the application as a whole, which could lead to over-alerting

B. Dynatrace calculates application performance response times by creating synthetic monitors that calculate the
optimal response time of the application. Alerts are then raised application traffic response time goes over the
calculated response time thresholds
C. Dynatrace uses standard values as thresholds for application performance based on assumed ideal conditions
and the geolocations of your users. Once you are familiar with the alerts that are raised you can adjust the
sensitivity of the anomaly detection by adjusting the default values

D. Dynatrace uses static thresholds based on resource contentions like CPU spikes memory and disk usage When
these thresholds are exceeded Dynatrace Al assumes the application must he slowing down and raises alerts.

Answer: A

Question: 31

What is pictured in the Image shown?

A. Service-level backtrace
B. Smartscape
C. Service flow
D. Distributed trace

Answer: A

Question: 32

how does Dynatrace perform evaluations for slowly degrading response-time degradations?

A. Evaluations are based on the slowest 10% of all requests during the degradation.
B. Evaluations are based on the number of users impacted by the response-time degradation The sliding time-
frame for evaluation is Increased by 5 minutes for every 500 users affected
C. Evaluations are performed based on 15-minute time interval’s.
D. Evaluations are performed based on sliding S-minute time Intervals.

Answer: C

Question: 33

What options are available for Instrumenting an Android application? Select al that apply

A. Via Gradle plugin


B. Via.msi
C. Via CocoaPods
D. Via OneAgent SDK
Answer: A, D

Question: 34

When configuring request attributes, what does the Request attribute contains confidential data checkbox do?

A. sensitive values or data In the request attribute are masked and therefore hidden from unauthorized access
B. The entire request attribute will be hidden If It contains sensitive information
C. Request attributes with sensitive values or data are flagged and authorized users can unlock the data with a
password.
D. Sensitive values or data in the request attribute are removed.

Answer: A

Question: 35

Why is it a best practice to use an ActiveGate with ALL Dynatrace installations?

A. It is actually a required part of the Dynatrace Installation


B. The ActiveGate is used to load balance Dynatrace installations with up to 10 agents.
C. Network overhead can be considerably reduced when the ActiveGate bundles the agent traffic.
D. An ActiveGate provides the authentication gateway for Dynatrace

Answer: C

Question: 36

How does Dynatrace determine the root cause of a problem?

A. Using all alerts in the last 2 hours, an Al engine uses the causation model to determine which infrastructure
component raised the most alerts, ad sets that component as the root cause
B. An Al engine analyzes dependencies between components and builds a model which is used to determine the
components most likely causing a problem.
C. The component that raised the first alert in a series of alerts is considered the root cause Alerts are considered
to be in a series when each alert occurs within a 5-minute time frame of the last alert
D. If an alert has been raised in the last 24 hours the alert's component is considered the root cause

Answer: B

Question: 37

when viewing a host page, how can you tell which tags were created manually and which were created
via the oneagentctl ?

A. Tags created via oneagentctl are prefixed with the {environment} string.
B. Manually created tags are prefixed with the {manual} string.
C. You cannot tell the difference between the tags.
D. The tags are displayed in different sections on the page.
Answer: B

Question: 38

What happens when a user session is initiated, and the user clears their browser cookies before
resuming their interactions with the application?

A. A second user session is initiated.


B. Each user action will be added to separate user sessions.
C. The same user session is continued, with the break highlighted.
D. The same user session is continued as is.
Answer: B

Question: 39

when considering Dynatrace network monitoring which of the following are the network consumers
within your Dynatrace environment for which you can view network-related metrics?

A. Applications, network interfaces, and services


B. Hosts, interfaces, and processes
C. Traffic, retransmissions, and connectivity
D. Process Groups, process, and databases.
Answer: B

Question: 40

When considering user experience analysis in Dynatrace, which of the following are used as key
performance metrics? select all that apply.

A. Visually complete
B. DOM Interactive
C. DOM Content loaded
D. Load event total time
E. Speed index
Answer: A, B, E

Question: 41

How does Dynatrace detect external services like unmonitored hosts?

A. They are detected when your monitored services or applications make unknown requests.
B. Dynatrace sees the performance data from the external services.
C. They are detected when they send or receive requests from your monitored services and
applications.
D. External services are not detected.
Answer: C

Question: 42

how can you assign a host to a host group? select all that apply

A. via the management zones API


B. During One Agent installation
C. By using the one agent command-line tool
D. By running a bulk action to modify the host group
E. By editing the field in the host settings
Answer: B, C, D

Question: 43
In a single- URL browser monitor, how can you ensure that a certain page element is loaded?

A. By editing your singe-URL browser monitor in script mode


B. By creating a content validation rule
C. By selecting a keep performance metric for the monitor
D. By ensuring it is part of the click path
Answer: B

Question: 44

what is a process group?

A. A group of processes which perform the same task, regardless of technology type and which may be
running across multiple hosts.
B. A group of processes belonging to the same technology, performing various tasks on multiple hosts
C. A group of processes belonging to the same technology that perform the same task across multiple
hosts.
D. A group of the same services running across multiple hosts.
Answer: C

Question: 45

Within Dynatrace, where do tags and metadata come from?

A. Metadata is detected during startup or discovery of a monitored entity. Tags are created
manually, imported from external sources, or via rules.
B. Tags and metadata are added manually to entities as needed.
C. Both tags and metadata can be added manually and created via rules in Dynatrace
D. Tags are detected during startup or discovery of a monitored entity. Metadata is created
manually or via rules.
Answer: A

Question: 46

Which of the following are considered by Dynatrace when identifying and naming Web request services?
Select all that apply.

A. Web application ID
B. Web server name
C. Database requests
D. Context root
E. IP address
Answer: A, B, D

Question: 47

What are the problem detection and alerting options for creating a Maintenance Window? Select all that
apply.

A. Disable notification but alert on resolution.


B. Disable problem detection during maintenance.
C. Detect problems but don't alert.
D. Detect problems and alert.
E. Detect problems and create a log.
Answer: B, C, D

Question: 48

After Dynatrace creates the default application, what do you use to customize how applications are
grouped?

A. Application grouping rules


B. Application detection rules
C. Service naming rules
D. Process group detection rules
Answer: D

Question: 49

How can you add rich text and links to a dashboard?

A. This is not available on dashboards.


B. With a Header tile
C. With a RichText tile
D. With a Markdown tile
Answer: C

Question: 50

What can you do to check the availability of internal applications or resources that are inaccessible from
outside your network? Select all that apply.

A. Create a Browser clickpath on a Dynatrace managed node that can communicate with Mission
Control.
B. Create an HTTP Monitor on an Environment ActiveGate with a private synthetic location.
C. Create a Browser Monitor to simulate an internal user session which is executed by synthetic
Control.
D. Create a Browser Monitor on a Cluster ActiveGate with a private synthetic location.
Answer: B, C

Question: 51

What type of thresholds does Dynatrace use for problem detection? Select all that apply.

A. Static thresholds
B. Automated baselines
C. User experience score
D. Synthetic performance thresholds
Answer: A, B

Question: 52
Why might there be an 'Opaque service' In your environment? Select all that apply.

A. Services have been aggregated because they are of the same process group and perform identical
functions across separate cluster nodes.
B. Code-level visibility Isn't possible because the services have external dependencies.
C. The service technology is supported by Dynatrace, but code-level visibility isn't available.
D. The service technology is unrecognized or unsupported.
Answer: C, D

Question: 53

Which dimensions are used for Application baselining? Select all that apply.

A. Tags
B. User action
C. Service method
D. Conversions
E. Browser
F. Geolocation
G. Operating system
Answer: B, C, E, F, G

Question: 54

How can Real User Monitoring be configured if you have no access to the host? Select all that apply.

A. OneAgent plugin
B. Browser Extension
C. Agentless monitoring
D. Monitoring would not be possible.
Answer: B, C

Question: 55

What does the Davis Security Advisor do?

A. It recommends the hosts to which you should deploy application security based on accessibility to
sensitive data.
B. It recommends changes to your real user monitoring and log monitoring configurations to reduce
the possibility of capturing sensitive or PHVPII data.
C. It is the part of the Al engine that calculates the Davis Security Score
D. It recommends the fixes that would most improve the overall security of your environment.
Answer: D

Question: 56

When Dynatrace detects an application running on a host, what is used to capture and group the
application monitoring data?

A. The application name is detected and used to define an application.


B. A default application used as a "catch all."
C. A new dashboard focused on your application.
D. You must first define an application for the data to be captured and grouped.
Answer: A
Question: 57

What do Response time hotspots on the Services page indicate? Select all that apply.

A. The activities consuming the most time for each service.


B. The services making the most requests.
C. The services making the most database requests.
D. The activities utilizing the most resources for each service.
Answer: A, D

Question: 58

What is the timeframe used when viewing Smartscape?

A. 72 hours
B. 24 hours
C. 2 hours
D. 48 hours
Answer: A

Question: 59

How can a specific user be identified in Real User Monitoring by their username or email address?

A. By configuring a user tag


B. By creating custom user actions to track specific behaviors
C. User actions are anonymous and can't be tracked.
D. By setting request attribute rules to catch user actions
Answer: A

Question: 60

Why would a live user session NOT display a user experience score?

A. The user experience score is not calculated until the session has ended.
B. The user session is a synthetic monitor.
C. A key performance metric hasn't been configured for the actions used in the session.
D. The user session has not been active for long enough for the score to be calculated.
Answer: A

Question: 61

After activating a synthetic browser monitor, why should you wait 24 hours before adjusting the performance
thresholds?

A. You need 24 hours to ensure.the monitor is working as expected


B. Performance thresholds are not editable until 24 hours after activation
C. The performance data Is averaged over 24 hours and can then be used as a reference point
D. Locations are not fully configured for 24 hours and you need to edit performance thresholds for each.

Answer: C

Question: 62

What is the difference between Apdex and User experience scores?


A. User experience determines the experience for each user action. These scores are averaged across a user
session to determine the Apdex, or Application Experience score.
B. Both metrics provide insight Into the user experience. Apdex is calculated for user actions and at the
application level. User experience is session-based
C. User experience is based on conversion goal success rate. This metric Is used to calculate the Apdex for
the application.
D. Apdex is used to determine If a single user Is satisfied with the application. User experience score is an
overall average of user satisfaction for the application.

Answer: B

Question: 63

By default, how often does Dynatrace auto-discover, analyze, and store log files?

A. Every 15 minutes
B. Every 2 hours
C. Every 24 hours
D. Every 60 seconds

Answer: D

Question: 64

How can you track which users in an application have successfully completed a checkout?

A. By setting a conversion goal


B. By setting a user tagging rule
C. By editing your content capture settings
D. By uploading a source map file

Answer: A

Question: 65

In the Smartscape shown, what do the dotted lines with directional arrows Indicate?
A. That the easyTravel Frontend Service communicates with these services but has not called them in the last 2
hours
B. That these services call the easyTravel Frontend Service, but they have not called It in the last 2 hours
C. That these services are currently actively communicating with the easyiravel Frontend Service
D. That these services haven't made or recelved any calls from the easyTravel Frontend services In
the last 72 hours

Answer: B

Question: 66

You have created user action naming rules to generate consistent and readable user actions so they are grouped
logically for monitoring and analysis. What other feature in Dynatrace does this for you automatically?

A. Page groups
B. Applications
C. Pages
D. Real user monitoring

Answer: A

Question: 67

What information is indicated by this dashboard tile?

A. The Frontend Availability SLO is green as the error budget is still healthy, but the waring icon is displayed
because Davis has detected a problem that could soon affect the SLO
B. The Error budget has been exceeded for the Frontend Availability SLO and Davis is Indicating this by displaying
the warning Icon on the dashboard tile.
C. Davis Is displaying a warning Icon because the Frontend Availability SLO status has dropped below 100%
D. The Frontend Availability SLO Is green as the error budget is still healthy but the warming icon Is shown
Indicating that the Error budget is about to be exceeded

Answer: A

Question: 68

You have researched a vulnerability in your environment and have determined you don't need to address it. What
can you do to remove it from your vulnerabilities list?

A. Delete the problem from the list


B. Create a security monitoring rule and add the vulnerability ID to the exclude list
C. Mute the security problem.
D. Disable tracking in the vulnerabilities settings

Answer: C

Question: 69

What is the hardcoded timeout for a browser monitor clickpath?

A. 10 minutes
B. 3 minutes
C. 15 minutes
D. 5 minutes

Answer: D

Question: 70

Dynatrace treats databases as external services, what does this mean when referring to how databases are
monitored?

A. Database calls cannot be monitored because they are external services


B. Response time and failure rate of database queries cannot be tracked.
C. Even though database processes are not monitored, OneAgent Is required on the database host to capture
Incoming requests.
D. Dynatrace monitors calls to databases, rather than the databases processes themselves.

Answer: D

You might also like