QUESTION 11
You need to install Microsoft Dynamics AX 2012 on a mix of 32-bit and 64-bit client computers. What should you do?
A. Create a single configuration file in a shared directory on any available server, and specify the configuration file for each client.
B. Create a separate configuration file for each operating system in a shared directory on the Application Object Server (AOS), and specify the appropriate configuration file for each client computer.
C. Create a separate configuration file for each operating system in the bin directory in the Microsoft Dynamics AX DVD shared folder, and specify the appropriate configuration file for each client computer.
D. Create a separate configuration file for each operating system at the same level as the Setup.exe file in the Microsoft Dynamics AX DVD shared folder, and specify the appropriate configuration file for each client computer.
Answer: C
QUESTION 12
Which of the following is a function of the Windows Server Group Policy feature when installing clients for Microsoft Dynamics AX 2012?
A. Setting up the Microsoft Dynamics AX application user permissions.
B. Deploying multiple Microsoft Dynamics AX Windows clients at one time.
C. Allowing the Setup wizard to run in silent mode, without passing parameter information.
D. Creating a batch file to install Microsoft Dynamics AX Windows clients with a shared configuration.
Answer: B
QUESTION 13
In Microsoft Dynamics AX 2012, which database objects does the Synchronize Database portion of the Initialization Checklist synchronize to the Application Object Tree (AOT)?
A. Tables and views
B. Tables and indexes
C. Indexes and views
D. Indexes and permissions
Answer: B
QUESTION 14
When initializing Microsoft Dynamics AX 2012, which task enables or disables the system-wide application functionality provided by the license?
A. Compile application
B. Configure application functionality
C. Generate CIL
D. Modify data types
Answer: B
QUESTION 15
Which of the following statements about Microsoft Dynamics AX 2012 data security policies are true? (Choose all that apply.)
A. Data security policies cannot be used to restrict access to an individual database.
B. Data security policies can be applied to security roles to control access to transactional data.
C. Data security policies can be used to control access to transactional data based on a query.
D. Data security policies can be used to control access to transactional data based on user data.
E. Data security policies can be used to control access to transactional data based on an effective date.
Answer: EDB
http://www.passleader.com/mb6-872.html
QUESTION 16
Which of the following statements about the Table Permissions Framework (TPF) in Microsoft Dynamics AX 2012 is true?
A. TPF can be used to grant a user access to database tables.
B. TPF can be used to deny a user access to individual fields.
C. TPF can be used to deny a user access to database records based on a query.
D. TPF can be used to deny a user access to database records based on an effective date.
Answer: B
QUESTION 17
Which of the following statements describes how users can view and edit data for multiple companies in Microsoft Dynamics AX 2012?
A. A user may view and edit data for a company other than the one that he or she is currently logged on to.
B. A user may not view or edit data for a company other than the one that he or she is currently logged on to.
C. A user may view data for a company other than the one that he or she is currently logged on to, but can edit data only for the current company.
D. A user may view or edit data for a table that contains a DataAreaID column only when they are logged on to the company associated with the DataAreaID value.
Answer: A
QUESTION 18
Which authentication type allows the use of Windows Live ID as an authentication form for users of Enterprise Portal for Microsoft Dynamics AX 2012?
A. HTTP Basic Authentication
B. HTTP Digest Authentication
C. Kerberos Authentication
D. Pluggable Authentication
Answer: D
QUESTION 19
Which of the following statements about Active Directory groups and Microsoft Dynamics AX 2012 is true?
A. You can apply Microsoft Dynamics AX 2012 security roles directly to AD groups.
B. When you import AD group members into Microsoft Dynamics AX 2012, you must assign a profile at the same time.
C. When you link an AD group with Microsoft Dynamics AX 2012, the AD group members are automatically granted full application permissions.
D. After you link an AD group with Microsoft Dynamics AX 2012, if a member is removed from the AD group, his or her access to Microsoft Dynamics AX 2012 is not automatically removed.
Answer: A
QUESTION 20
Which form of pluggable authentication allows users to access Enterprise Portal for Microsoft Dynamics AX 2012 by authenticating against a custom database?
A. Active Directory Federation Services
B. Custom Security Token Services
C. Forms-based Authentication
D. Windows Live ID
Answer: C
Easily Pass MB6-872 Exam With Passleader New Microsoft MB6-872 Brain Dumps