Microsoft PL-400 Exam (page: 11)
Microsoft Power Platform Developer
Updated on: 15-Dec-2025

Viewing Page 11 of 80

DRAG DROP (Drag and Drop is not supported)
You are developing a Power Platform app for a school. The school plans to use the app to gather information about classes and students.
You must design a plug-in for the app. You must store data about students in the Contacts table and store data about classes in a custom table.
You need to select the stage in the event pipeline for each function.

Which stages should you use? To answer, drag the appropriate plug-in stages to the correct functions. Each plug-in stage may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.

NOTE: Each correct selection is worth one point.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box 1: PreValidation
For the initial operation, this stage will occur before the main system operation.
This provides an opportunity to include logic to cancel the operation before the database transaction.

Box 2: PreOperation
Occurs before the main system operation and within the database transaction.
If you want to change any values for an entity included in the message, you should do it here.
Avoid cancelling an operation here. Canceling will trigger a rollback of the transaction and have significant performance impact.

Box 3: PostOperation
Occurs after the main system operation and within the database transaction.
Use this stage to modify any properties of the message before it is returned to the caller.


Reference:

https://docs.microsoft.com/en-us/powerapps/developer/data-platform/event-framework



The communication department for a company plans to add a publicly accessible survey page to the company's public website.
You must add the new survey page to the company's public website and capture data from the page to a Common Data Service environment.
Explicit user credentials must not be required to write survey data to Common Data Service.
You need to implement authentication.
Which authentication mechanism should you implement?

  1. ADFS
  2. Azure AD Conditional Access
  3. OAuth 2.0
  4. Client secret

Answer(s): C

Explanation:

The OAuth 2.0 client credentials grant flow permits a web service (confidential client) to use its own credentials, instead of impersonating a user, to authenticate when calling another web service.
Note: OAuth is the preferred means to authenticate because it provides access to both the OData RESTful web services (Web API and OData global Discovery service) as well as to the SOAP web services (Organization service and Discovery service).
OAuth is also required to support:
-Azure Active Directory configurations for conditional access, such as Two-factor Authentication (2FA)
-Use of client secrets to enable server-to-server authentication scenarios.
-Cross-Origin Resource Sharing (CORS) to connect a Single-page Application (SPA)


Reference:

https://docs.microsoft.com/en-us/power-platform/admin/wp-security https://docs.microsoft.com/en-us/powerapps/developer/data-platform/authentication



DRAG DROP (Drag and Drop is not supported)
A company uses Dynamics 365 Sales.
Sales commission must be calculated when an order is placed. You create an Azure Function to perform the calculation. The Azure Function has an HTTP trigger.
You need to configure the Plug-in Registration tool to send data to the Azure Function when an order is placed. You open the Plug-in Registration tool and connect to Dynamics 365 Sales.

Which three actions should you perform in sequence? To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Step 1:SelectRegister New Web Hook.
Configure Dynamics 365 Sales to Call Your Webhook in Azure Functions
1. Open the Plug-in Registration Tool and connect to your organization.
2. Select Register->Register New Web Hook



Step 2: Enter the endpoint URL



Step 3: Register a New Step for Create of SalesOrder.
Register a new webhook, and then tie that webhook to an event in Dynamics 365 Sales. Select your newly registered webhook, right-click it, and then choose
"Register New Step."
Note that the webhook here is set to execute whenever a change to an account record is detected within Dynamics 365 Sales.


Reference:

https://docs.microsoft.com/en-us/powerapps/developer/common-data-service/tutorial-write-plug-in



The communication department for a company plans to add a publicly accessible survey page to the company's public website.
You must add the new survey page to the company's public website and capture data from the page to a Common Data Service environment.
Explicit user credentials must not be required to write survey data to Common Data Service.
You need to implement authentication.
Which authentication mechanism should you implement?

  1. Microsoft 365
  2. X.509 certificate
  3. OAuth 2.0
  4. Claims-based

Answer(s): C

Explanation:

OAuth is the preferred means to authenticate because it provides access to both the OData RESTful web services (Web API and OData global Discovery service) as well as to the SOAP web services (Organization service and Discovery service).
OAuth is also required to support:
-Azure Active Directory configurations for conditional access, such as Two-factor Authentication (2FA)
-Use of client secrets to enable server-to-server authentication scenarios.
-Cross-Origin Resource Sharing (CORS) to connect a Single-page Application (SPA)
Incorrect Answers:
A: Using Microsoft 365 authentication does not require that your register your applications as OAuth does. You must simply provide a User Principal Name (UPN) and password for a valid user.


Reference:

https://docs.microsoft.com/en-us/powerapps/developer/data-platform/authentication



DRAG DROP (Drag and Drop is not supported)
You are a Power Platform developer.
Users report several access issues.
You need to resolve the user access issues.

What should you use? To answer, drag the appropriate security options to the correct scenarios. Each security option may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Box 1: Conditional access
You can limit access to users with block access by location to reduce unauthorized access. By using Conditional Access policies, you can apply the right access controls when needed to help keep your organization secure and stay out of your user's way when not needed. Conditional Access analyses signals such as user, device, and location to automate decisions and enforce organizational access policies for resources.

Box 2: DLP policy
DLP policies enforce rules for which connectors can be used together by classifying connectors as either Business or Non-Business. If you put a connector in the
Business group, it can only be used with other connectors from that group in any given app or flow. Sometimes you might want to block the usage of certain connectors altogether by classifying them as Blocked.

Box 3: Exfiltration blocking
Email exfiltration controls for connectors
Microsoft Exchange enables admins to disable email autoforwards and autoreplies to remote domains for external recipients. Exchange does this by using message-type headers, such as Auto Forward received from Outlook and Outlook on web clients.


Reference:

https://docs.microsoft.com/en-us/power-platform/admin/restrict-access-online-trusted-ip-rules https://docs.microsoft.com/en-us/power-platform/admin/wp-data-loss-prevention https://docs.microsoft.com/en-us/power-platform/admin/block-forwarded-email-from-power-automate



Viewing Page 11 of 80



Share your comments for Microsoft PL-400 exam with other users:

Chiranthaka 9/20/2023 11:15:00 AM

very useful.
Anonymous


Jeya 9/13/2023 7:50:00 AM

its very useful
INDIA


Chiranthaka 9/20/2023 11:22:00 AM

very useful!
Anonymous