10/239 questions · Unlock full access
Q1

A financial services company is using SAP Event Mesh to broadcast real-time trade confirmations. A downstream auditing application needs to consume every message exactly once, even if the application is temporarily offline. A separate market data application needs to receive all messages but can tolerate occasional loss. Which configuration should be used?

Q2

During a security audit of an API Proxy in SAP API Management, a consultant observes that a 'Verify API Key' policy is attached to the ProxyEndpoint Preflow. However, a requirement states that a specific resource path, `/public/status`, should be accessible without an API key, while all other paths must be secured. How can this be achieved without creating a separate API Proxy?

Q3

A developer is building an integration flow that processes a batch of sales orders from an SFTP server. The source file is a large XML containing thousands of ` ` elements. The flow must process each order individually, call an external OData service to enrich it with customer data, and then send it to a target system. To optimize performance and memory usage, which combination of iFlow steps is most appropriate?

Q4

When defining an integration strategy for a company adopting a 'Clean Core' approach for their SAP S/4HANA Cloud system, which of the following activities is considered a direct violation of this principle?

Q5Multiple answers

A company wants to expose a single, unified API for its customers that aggregates data from three different backend microservices. They need to enforce a single API key for authentication, apply a consistent rate limit, and transform the three backend responses into one consolidated JSON payload. Which two SAP Integration Suite capabilities are best suited for this task? (Select TWO)

Q6

True or False: In SAP Event Mesh, a single queue can be configured to subscribe to multiple different topics.

Q7

**Case Study** A global logistics company, ShipFast, is modernizing its integration landscape by moving from a legacy SAP PI/PO system to SAP Integration Suite. A critical interface involves processing large EDI 850 Purchase Order files from their partners, which are delivered via SFTP. These files can contain up to 10,000 individual line items. The current business process requires that each incoming EDI 850 file is first validated against a schema. If validation fails, the entire file must be moved to an error directory and a high-priority alert sent to the support team. If validation succeeds, each line item must be processed individually. For each line item, the integration flow must look up the product's current stock level from an on-premise S/4HANA system via an OData API. If stock is insufficient for a particular line item, that specific item must be logged to a data store for later review, but processing of other items in the same file should continue. All successfully validated and enriched line items must be aggregated and sent as a single XML message to an internal order management system via an HTTPS call. The key non-functional requirements are high throughput, minimal memory footprint on the Cloud Integration runtime, and detailed error logging for failed line items. The S/4HANA system has a strict rate limit on its OData API, allowing only 100 requests per minute. Which integration flow design best meets all the requirements of ShipFast?

Q8

An integration developer needs to store a value, such as a transaction counter, that must persist and be accessible across multiple, independent executions of the same integration flow. Which iFlow component should be used for this purpose?

Q9Multiple answers

An architect is designing a solution where events from an SAP S/4HANA system must trigger workflows in multiple, independent subscribing applications. Some subscribers might be temporarily unavailable and must not lose any events. The solution must ensure that the S/4HANA system is not tightly coupled to the subscribers. Which components should be used to build this solution? (Select THREE)

Q10

A developer needs to apply a sequence of three policies to an API Proxy in SAP API Management: 1. Quota, 2. Spike Arrest, 3. Verify API Key. To ensure the most efficient processing and to avoid unnecessary policy execution for unauthorized requests, what is the optimal order and location for attaching these policies?