1. Where should the Business logic be executed with correctly designed objects?
( ) The Client
(•) The Application Object Server
( ) The Database Server
( ) Stored Procedures on the SQL Server
2. What three items control security within Microsoft Dynamics AX 2009?
( ) Security Keys, Domains and Companies
( ) User Group Permissions, Security Keys, and Layers
(•) License Keys, Configuration Keys and Security Keys
( ) Base Package Keys, X++ Keys, and MorphX Keys
3. Label file ID's that should not be used due to the risk of being overwritten when applying service packs include:
( ) SYS, MBS, USR
( ) SYS, LOS, DIS
(•) GLP, HFX, SL1, SYS
( ) SYP, LOP, DIP, SLP
( ) The Client
(•) The Application Object Server
( ) The Database Server
( ) Stored Procedures on the SQL Server
2. What three items control security within Microsoft Dynamics AX 2009?
( ) Security Keys, Domains and Companies
( ) User Group Permissions, Security Keys, and Layers
(•) License Keys, Configuration Keys and Security Keys
( ) Base Package Keys, X++ Keys, and MorphX Keys
3. Label file ID's that should not be used due to the risk of being overwritten when applying service packs include:
( ) SYS, MBS, USR
( ) SYS, LOS, DIS
(•) GLP, HFX, SL1, SYS
( ) SYP, LOP, DIP, SLP