Which two techniques can you use to move an entire model? Each correct answer presents a complete solution.
A. Use the Microsoft Dynamics AX 2012 Management Shell cmdlets to import and export.
B. Use the standard Windows features to copy the application object (AOD) files.
C. Use the AxUtil.exe to import and export.
D. Use the Import and Export tool in the Development Workspace to move an XPO file
Answer: A, C
You are using the Record Level Security Wizard to restrict access to specific Sales records.
You need to implement record-level security.
What should you do?
A. Specify the duty and table to filter and the query to use.
B. Specify the role and table to filter and the query to us
C. Specify the user, table, and form to filter.
D. Specify the record and form to filter and the query to use.
Which statement about Microsoft Dynamics AX 2012 security authentication is true?
A. Microsoft Dynamics AX 2012 can use authentication providers other than Active Directory.
B. You can configure Microsoft Dynamics AX 2012 to apply data security before authenticating users.
C. Microsoft Dynamics AX 2012 can only use Active Directory authentication.
D. You can configure Microsoft Dynamics AX 2012 to apply security role authorization before authenticating users.
You need to use an .rdl file to retrieve a data source for a Microsoft Dynamics AX 2012 report. Which three data sources can you use? Each correct answer presents a complete solution.
A. Microsoft Dynamics data extensions
B. Report Data Provider (RDP) classes
C. Microsoft Dynamics Server query web services
D. External data sources
E. Microsoft Dynamics AX queries
Which two security elements should you add to the security role? Each correct answer presents a complete solution.
A. role center
D. process cycle
You need to allow a user access to Microsoft Dynamics AX 2012. Which two actions should you perform? Each correct answer presents part of the solution.
A. Set up a segregation of duties.
B. Ensure that the user is enabled.
C. Assign at least one role to the user.
D. Develop a security hierarchy.
E. Authorize data security.
Search Words: MB6-705 Exam Training real exam questions answers practice test braindumps, free Q&A online dumps download and free MB6-705 Exam Training discount coupon code available.