Knowledge check

Completed

Choose the best response for each of the questions below. Then select Check your answers.

Check your knowledge

1.

When an app or workflow creates a connection to a data source, the connector typically requires some form of authentication. Each type of authentication has different levels of security associated with it. It's important to understand what information and rights authors share with users who run their applications. Which of the following methods of authentication provides limited security because it doesn't rely on end-user authentication?

2.

As Lucerne Publishing's Enterprise Administrator, Holly Spencer is interested in having Lucerne's users create canvas apps. Which of the following controls should they use to display records from a table of data?

3.

As Lucerne Publishing's Enterprise Administrator, Holly Spencer is interested in building an app for a Test Drive solution. Holly has discovered that this process is similar to building an app in Power Apps, with one exception. What is that exception?