A & VERSION B (2 LATEST VERSIONS) ACTUAL EXAM
300 QUESTIONS AND CORRECT DETAILED ANSWERS
WITH RATIONALES (VERIFIED ANSWERS) | AGRADE ||
BRAND NEW!!
For a key request, how long is detailed code-level data available?
A. 10 days
B. Forever
C: 35 days
D: 5 years - ANSWER: C: 35 days
How does Dynatrace perform evaluations for rapidly increasing response-time
degradations?
A. Evaluations are based on the slowest 10s of all requests during the degradation.
B. Evaluations are performed based on sliding 15-minute time intervals.
Evaluations are based on the number of users impacted by the response-time
degradation.
C. The sliding time-frame for evaluation is increased by 5 minutes for every 500 users
affected.
D. Evaluations are performed based on 5-minute time intervals. - ANSWER: D.
Evaluations are performed based on 5-minute time intervals.
What can you do to change how process groups are detected? Select all that apply.
A. Define key process attributes.
B. You cannot change how process groups are detected.
C. Create simple and advanced process group detection rules.
D. Enable or disable Process group detection options (flags).
E. Configure OneAgent to detect additional processes via the setup process wizard. -
ANSWER: C. Create simple and advanced process group detection rules.
D. Enable or disable Process group detection options (flags).
Why is it important to include Dynatrace network monitoring metrics as part of a
performance analysis?
A. Analysis of network monitoring metrics often results in the discovery of
application errors from an unrelated process which is hoarding network resources.
B. It is not important to include, because it is enough to know that a process has
sufficient server resources and is responding in a timely manner.
C. Dynatrace network monitoring provides detailed information about user network
speeds to determine their connectivity to a monitored application.
D. The network is part of your application's underlying infrastructure. As well,
network performance can be a root cause for an application problem. - ANSWER: A.
Analysis of network monitoring metrics often results in the discovery of application
errors from an unrelated process which is hoarding network resources.
, What is USQL in Dynatrace?
A. Universal Structured Query Language for running statements across any detected
databases
B. User Sessions Query Language for running queries against user session data
C. Unified SQL for searching for text patterns in log files
D. The Dynatrace version of SQL Server - ANSWER: B. User Sessions Query Language
for running queries against user session data
What is the purpose of Request Attributes?
A. To pull captured data from requests that provide key values and enable enhanced
filtering of requests using these values.
B. To pull unique meta data from custom services.
C. To pull captured session data from user sessions.
D. To pull information on code level method executions. - ANSWER: A. To pull
captured data from requests that provide key values and enable enhanced filtering
of requests using these values.
What is one way that you can disable OneAgent on a specific host?
A. In the Monitoring Overview settings, you can add the host name to an Excluded
Hosts list.
B. Restart your applications after editing the AgentRuntime.config file on the host
and setting the Exclude flag to 'True'.
C. You can create a Host Exclusion Rule when deploying Dynatrace.
D. You can disable monitoring in the Host settings. - ANSWER: D. You can disable
monitoring in the Host settings.
You want to ensure that certain content is loading on a web page for users in
Europe. How can vou check this?
A. Create a Browser Monitor with a location in Europe and a content validation rule
that passes if the website content contains the elements you are concerned with.
B. Any monitor running from a location in Europe will generate a problem report if
all elements do not load.
D. Create a Browser Monitor with a location in Europe and a content validation rule
that fails if the website content contains the elements vou are concerned with.
D. Create a Browser Clickpath with 3 location in Europe that ends with a Validation
event for the page element. - ANSWER: A. Create a Browser Monitor with a location
in Europe and a content validation rule that passes if the website content contains
the elements you are concerned with.
Why would you adjust performance thresholds for different key user actions?
A. To ensure problems are only raised for the most important user actions.
B. This is a requirement when a key user action is created.
C. The acceptable performance for an action can vary based on user expectations or
the time needed to perform its function.
D. Marking an action as a key user action is the only way to change performance
thresholds within your application. - ANSWER: D. Marking an action as a key user
action is the only way to change performance thresholds within your application.