You are configuring a Security Profile with Kerberos as the authentication provider. How do you use Kerberos to ensure successful authentication?
Which Server side security stores does SAP Mobile Platform 3.0 maintain? there are 2 correct answers.
You are creating the OSGi Bundle for the JDBC driver used to connect to a back-end database. Which authentication types can be configured?
Note: There are 2 correct answers to this question.
Which attributes used as filters can you use to troubleshoot application issues on the main logs screen? Note: There are 3 correct answers to this question.
In the Management Cockpit, you can export a native application configuration in a ZIP file. Which information is included in this ZIP file? Note: There are 3 correct answers to this question.
If an application is intended for use as an anonymous access application what credentials are required to access the backend data provided for the app?