MB6-704 - Microsoft Dynamics AX 2012 R3 CU8 Development Introduction
Go back to
You are developing X++ code to update multiple records as a single transaction. The records are located in several tables. You need to ensure that if an update of one of the records falls, none of the records update. What should you use?
Tts begin and tts commit
What can you prevent an object from accessing by using a display method authorization?
Data from forms
You are developing X++ code to retrieve data from a table named Table l. You need to use a select statement to retrieve only records from Table l that have related records in a table named Table2. Which type of join should you use?
You have a table named Vend Table that contains a field named Main Contact Worker. Main Contact Worker is the reference Recid. Many records in the Vend Table table have the same value for Main Contact Worker. Users frequently search for data in the Vend Table table based on the Main Contact Worker field. You need to ensure that when the users create queries that include the Main Contact Worker field in the where clause, the query results are returned in the least amount of time possible. What should you create in Vend Table?
A surrogate key that is used as the primary index
You enable a feature for a Dynamics AX instance. What should you use?
A configuration key
You create a duty to maintain customer master information. You need to identify to which elements you can add the duty. Which two elements should you identify? Each correct answer presents a complete solution.
You have a Dynamics AX deployment that contains three legal entities. You need to search for records across all three legal entities. What should you create?
A select statement that uses the cross Company keyword
You need to identify how the Application Object Server (AOS) implements Code Access Secu- rity to prevent secured APIs from being invoked by untrusted code. Which three verifications are performed by the AOS? Each correct answer presents part of the solution.
That the assert is executed in trusted code and saved in the Application Object Tree (AOT)
That the assert is executed on the same tier as the secured class
That the assert modifies the client only invocations of the secured class
You need to explicitly request permission to invoke a secured class. Which two methods should you use? Each correct answer presents part of the solution.
You make changes to the security configuration of a role. You need to ensure that the changes appear in the Application Object Tree (AOT) immediately. What should you select from the Caches menu?
A table named Table 1 has a string field named Account Num. You have an instance of Table l named tablel. You need to print the value of Account Num to the info log. Which code segment should you use?
Info (tablel. Account Num);
A developer writes code by using X++. You need to identify whether the code violates best practices. Which tool should you use?
The X++ compiler
You need to identify which elements the Reverse engineer tool will provide for a data model. Which three elements should you identify? Each correct answer presents part of the solution.
You have two tables named Table l and Table2. There is a relationship between the tables. You need to display data from both tables in a form. How should you create the data source for the form?
Add both tables to a query and use the query as the data source.
You need to store the preferred method of correspondence in a table named Dir Person Table. The solution must meet the following requirements: The table must have a field that stores the preferred method of correspondence. The field must have values of Mail, E-mail, or Unknown. The text representing the preferred method of correspondence values on forms must be localized to the language used by the user. The values in the database must not be localized. How should you create the field in Dir Person Table?
Create an extended data type (EDT) used to store the preferred method of correspondence. The EDT must extend from the string. Use the EDT to create the field in Dir Person Table.
You need to replace a value from a specific position of a container Which function should you use?
You create a privilege to maintain vendor information. To which two elements can you add the privilege? Each correct answer presents a complete solu- tion.
You are creating an extensible data security (XDS) policy. You need to return the data from the primary table that will be used to filter the data in a con- strained table. What should you use?
A policy query
You need to develop X++ code to fetch data from a database by using a query object. Which class should you use to perform the fetch operation?
You need to add a duty to the Accounts receivable manager role. What are two possible menus or nodes that can be used to achieve this goal? Each correct answer presents a complete solution.
The Security node in the Application Object Tree (AOT)
The Setup menu from the System administration module
You have a Dynamics AX development environment. You need to delete the data in a specific table manually. What should you use?
The Table Browser
You have a table that contains invoices. You need to create a Fact Box that displays the number of invoices in the table. Which type of Fact Box should you use?
You have a class named Classl. You need to identify all of the classes that extend Classl. Which tool should you use?
The Type hierarchy browser
Which three types of components can be customized by using the Morph X development envi- ronment? Each correct answer presents a complete solution.
Dynamics AX security roles
Dynamics AX client forms
Dynamics AX tables
You need to provide a user from Active Directory with access to Dynamics AX. The user will access Dynamics AX by using the Dynamics AX client. The user will be an internal user. In addition to the users functional role, which two roles should you assign to the user? Each cor- rect answer presents part of the solution.
Which statement accurately describes a model in Dynamic AX?
A model can group elements only at a specific layer.
You are writing logic to fetch data from a database. The logic will use a select statement. You need to identify which keyword to use to fetch a single record from the database. Which keyword should you use?
You need to create a new extensible data security (XDS) policy. What should you use?
You need to display data on a new form. What should you do?
Add a data source and create a design.
You are developing a solution by using X++. The solution updates multiple records. You need to ensure that if the solution attempts to modify records that currently are being edited by a user, the operation will be retried. Which type of exception should you handle?
You are developing a class named Class l that performs several calculations. One of the methods in Class l is named method 1. Other developers will create classes that inherit from Class l. You need to ensure that method l is available to Class l and to all of the classes that inherit Class
You need to add a menu item to a list page. To which pane should you add the menu item?
You need to add a conditional statement into a query object. Which class should you use?
You need to develop a solution to process accounts receivable. The solution must halt the process and display a message if the process starts before the last day of the month. The process must resume once the user acknowledges the message. Which communication statement should you use?
Box: warning ("This process should only be started on the last day of the month");
You need to identify which permission can be set only on a form that has date effective data. Which permission should you identify?
You have a class named Class l that has a public method named methodl. For method1, you plan to create an event handler that is defined in the Application Object Tree (AOT). For the event handler, you need to develop code that runs after method l executes. What should you use to define the code for the event handler?
A static method on a class
You need to assign the Accounts receivable manager role to a user. From where should you assign the role to the user?
The Security node in the Application Object Tree (AOT)
Which elements can contain X++ methods?