0% found this document useful (0 votes)
12 views

SC - Dynatrace AssociateNote4

Exam note 4
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

SC - Dynatrace AssociateNote4

Exam note 4
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

How does Dynatrace handle network

monitoring overhead?
A. Dynatrace monitors the overhead
generated by network monitoring and if it
exceeds 2% of available CPU, network
monitoring is paused.
B. Dynatrace monitors the overhead
generated by network monitoring and if it
exceeds 5% of available CPU, network
monitoring is reduced to only error
reporting. This prevents unnecessary traffic.
C. The traffic overhead generated by
network monitoring is negligible and varies
based on the analvzed traffic volume. so
there is no need to monitor the effect
Dynatrace has on network performance.
D. Dynatrace monitors the overhead
generated by network monitoring, and if it
exceeds 5% of available CPU, network
monitoring is paused.

How does Dynatrace identify an individual


user even across multiple anonymous
sessions?
A. A special JS tag is injected that tracks a
user's static IP address.
B. The OneAgent SDK is planted on the
user's device to enable persistent user
tracking.
C. The user's MAC address is scraped from
their device.
D. A persistent cookie is planted in the
user's browser.

What is the data retention period for RUM


Session Replay data in Dynatrace SaaS?
A. Fixed at 10 days
B. Fixed at 35 days
C. Configurable up to 60 days
D. Configurable up to 35 days

Which metrics are used to calculate overall


Network Connectivity metrics, that is, the
percentage of connections that have been
successfully established? Select all that
apply.
A. The number of times Network
monitoring overhead increases over 5% of
available CPU
B. The total number of connection attempts
C. The number of TCP connection timeout
errors
D. The number of TCP connection refused
errors

Which ports are used for OneAgent traffic


to a Managed Dynatrace node?
A. 8443 or 443
B. 80 or 8080
C. 9200 or 9300
D. 5701-5711
What is the purpose of Management
Zones?
A. To segregate requests into specific
security groups that only specified users
have access to.
B. To split cluster data coming back to the
cluster into specific tenants that only the
correct teams have access to.
C. To create unique zones of access for
users based on specified entities such as
applications or hosts
D. To separate tenants so the can onlv
communicate with specific OneAgents.

When would Agentless Real User


Monitoring be used in a Dynatrace
environment?
A. Agentless RUM should be used only
when you want to enable deep services
monitoring.
B. If a page in a web application uses
JavaScript and you wish to enable real user
monitoring, vou will need to use Agentless
RUM in order to generate the correct
JavaScript tags in the correct locations
C. Agentless RUM should be used only
when the Dynatrace OneAgent cannot be
installed on a host.
D. Agentless RUM is required in order to
enable real user monitoring on a virtual
host.

When creating a synthetic clickpath


monitor, why should incognito mode be
enabled?
A. Clickpath monitors are executed on an
Environment ActiveGate and require
incognito mode to be activated for
playback during executions.
B. To ensure a clean and consistent browser
state across all synthetic locations during
recording and playback.
C. It's required for privacy reasons, such as
GDPR.
D. Incognito mode is needed for manually
editing the clickpath script, otherwise you
need to rerecord the clickpath to make
changes.

How long is Real User monitoring data for


User Sessions stored?
A. 90 davs
B. 10 days
C. 4 weeks
D. 35 days
What options are available for adjusting
anomaly detection for database services?
Select all that apply.
A. Adjusting detection of increases in
failure rate
B: Enabling detection of high garbage
collection activity
C. Enabling detection of slow disks
D. Detecting service load drops or spikes
E. Adjusting detection of response time
degradations

Which statements about ActiveGates are


true? Select all that apply.
A. The ActiveGate bundles the OneAgent
traffic.
B. There cannot be more than one Cluster
ActiveGate installed in a monitored
environment.
C. For VMware monitoring, an Environment
ActiveGate is required when using
Dynatrace Saas.
D. An Environment ActiveGate is required
to allow OneAgent to send data to the
Dynatrace server.
E. By using an ActiveGate, firewall settings
can be simplified as only the host running
the ActiveGate needs to be connected to
the Dynatrace Server.

What are server-side services?


A. Instances of executed computer
programs. They may be containers that host
services.
B. Host-centric services associated with a
single machine in your environment.
C. A set of processes that perform the
same function across multiple hosts.
D. Services that process requests like web
requests, web service calls, and messaging,
and can span multiple machines.

Which three concepts does Dynatrace


consider when identifying and naming web
request services?
A. Virtual host, Server block. Site
B. Web application ID, Virtual Directory,
WSDL
C. WSDL, Properties, Tags
D. Web server name, Context root, Web
application ID

What are advantages of making a request a


"Key Request"? Select all that apply.
A. You can pin the request to a dashboard.
B. You can create custom alerting
thresholds for that specific request.
C. Historical data is retained for longer
than 10 days.
D. Code level data can be retained for up
to 10 days.

You might also like