New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Certified Education Cloud Consultant (ED-Con-101) Exam - Topic 9 Question 47 Discussion

Actual exam question for Salesforce's Salesforce Certified Education Cloud Consultant (ED-Con-101) exam
Question #: 47
Topic #: 9
[All Salesforce Certified Education Cloud Consultant (ED-Con-101) Questions]

A consultant is enabling Course Connections for the first time in the Education Data Architecture.

What should the consultant do first?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Fannie
4 months ago
Not sure about that, isn't there more to consider?
upvoted 0 times
...
Karon
4 months ago
Agreed, backfill is the way to go!
upvoted 0 times
...
Lucia
4 months ago
Wait, do we really need to disable enrollments? Sounds odd.
upvoted 0 times
...
Tijuana
4 months ago
I think setting up the schedule is more important.
upvoted 0 times
...
Clement
4 months ago
Definitely need to run the backfill first!
upvoted 0 times
...
Jennie
5 months ago
Setting record types for Course Connections sounds familiar, but I can't recall if that comes before or after the backfill.
upvoted 0 times
...
Danica
5 months ago
I feel like disabling course enrollments could be important, but it seems like it might not be the very first thing to do.
upvoted 0 times
...
Lovetta
5 months ago
I remember a practice question where we had to run a backfill first, so maybe that's the right answer here?
upvoted 0 times
...
Detra
5 months ago
I think the first step might be to set up the Course Offering Schedule, but I'm not entirely sure.
upvoted 0 times
...
Levi
5 months ago
This seems straightforward to me. The customer wants to provide independent storage access, so the answer has to be NPIV. That's the Fibre Channel feature that allows you to assign unique IDs to virtual servers, which is exactly what they need here. I'm confident that's the right choice.
upvoted 0 times
...
Felix
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully. Maybe the Source or Classification fields could also be used to distinguish security events?
upvoted 0 times
...
Shawna
5 months ago
Integrity for sure. That's the key property that ensures the information hasn't been tampered with and can be trusted as accurate. The other options don't really fit the description given in the question.
upvoted 0 times
...
Esteban
5 months ago
This looks like a networking configuration question. I'll need to carefully review the information provided about the access point and CPE settings to determine which protocols will pass between the two devices.
upvoted 0 times
...

Save Cancel