You are implementing a model-driven app for a national chain of retail stores. You have the following requirements:
* Store employees must be able to view data for their store only.
* Regional managers must be able to view data for all stores in a region.
* The reporting team must be able to view all data across all stores.
You need to configure system security.
Which three security methods should you use? Each correct answer presents part of the solution.
NOTE: Each correct selection is worth one point.
A company uses Microsoft Power Platform with assets that include solution files, flat files, custom code, HTML files, and dat
a.
You need to use application lifecycle management (ALM) to deploy the assets to Microsoft Dataverse.
Which tool should you use?
You are a Microsoft Power Platform architect designing a solution.
You must use a custom connector to integrate Power Automate with a data source.
You need to authenticate the connector with the data source.
Which three authentication methods can you use? Each correct answer presents a complete solution.
NOTE: Each correct selection is worth one point.
You are implementing a customer service solution that uses Power Automate flows to automate business processes.
A flow sends order status update emails to customers. Customers report not receiving order status update emails during peak order times.
You need to troubleshoot the issue by examining flow executions.
What should you use?
Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it. As a result, these questions will not appear in the review screen.
A company uses a Microsoft Power Platform application.
Employees report that they are unable to open the application.
You need to ensure that the employees can access the application.
Solution: Add the employees to a security group and assign the security group to a Microsoft Teams team.
Does the solution meet the goal?