Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CRT-550 Questions and Answers

Question # 6

Which three statements about Send Log Data is correct?

A.

Uses Measures, filters and programs

B.

Accessed using query

C.

Can be viewed in standard report

D.

Can be stored for periods of time

E.

Added to a standard view

Full Access
Question # 7

A large retail company has selected Marketing Cloud and has asked to be fully migrated from their existing platform in three weeks. They have communicated the following:

* They currently have 3 million customers.

* They email customers twice a week with no known deliverability issues.

* Their contract includes one Sender Authentication Package (SAP).

What response articulates proper IP warming?

Choose 2 answers

A.

IP ramp-up takes four to six weeks to be able to fully send to all 3 million customers.

B.

IP ramp-up can be accelerated by migrating to pre-warmed IP addresses.

C.

IP ramp-up is important to establish a positive sender reputation.

D.

IP ramp-up can be bypassed, given their historical lack of deliverability issues.

Full Access
Question # 8

A customer needs to compare the engagement across three creative versions, and then send a follow-up email for those contacts who did not engage with any of the test versions.

Which sequence of activities would best accomplish this?

A.

Engagement Split > Send email > Wait > Random Split > Send email

B.

Random Split > Send email > Join > Decision Split > Wait > Send email

C.

Random Split > Send email > Wait > Engagement Split > Join > Send email

D.

Decision Split > Send email > Engagement Split > Send email

Full Access
Question # 9

Northern Trail Outfitters (NTO) has decided to use Journey builder to launch event-driven lifecycle marketing programs. This includes personalized interactions with customers with the goal of increasing purchase frequency.

What two pieces of information would help NTO achieve this objective?

Choose 2 answers:

A.

Last purchase date

B.

Products purchased from a competitor

C.

Number of items per order

D.

Channel preference of customers

Full Access
Question # 10

When joining a data extension in Contact Builder, in which scenario should a consultant mark the Use as Root checkbox?

A.

Supplemental data for an interaction in Journey Builder.

B.

Database of record other than All Subscribers.

C.

One-to- Many Relationship to the Contact Record.

D.

Data for both Email and MobileConnect sends.

Full Access
Question # 11

NTO wants to import files at certain standard times, but occasionally a file will be dropped on a Friday if the 30th of the month falls on a weekend.

What is the flow?

A.

Triggered Import - user initiated send (not scheduled)

Full Access
Question # 12

As part of their brand guidelines, Northern Trail Outfitters (NTO) uses a custom brand font for all print marketing materials. NTO wants to use their custom brand font in email as well.

What is the recommended best practice for font usage in email?

A.

Use a web-safe font for text that closely matches the brand's custom font.

B.

Build an email as one image, with all text saved in the brand font.

C.

Edit an email's HTML to list the custom brand font in the style tag's font-family property.

D.

Build an email using multiple images, with all text saved in the brand font.

Full Access
Question # 13

A consultant is configuring Marketing Cloud Connect in Marketing Cloud. The customer requires that integrated users only have access to Sales Cloud data visible to them in their Salesforce account.

How would the consultant ensure that this requirement is met?

A.

Check the Scope by User box in Marketing Cloud.

B.

Create a User in Sales Cloud with a System Administrator Profile.

C.

Ensure that the User has the correct profile in Marketing Cloud.

D.

Ensure that the User is assigned as System Administrator in Sales Cloud.

Full Access
Question # 14

What are data extension data retention policies?

A.

Settings to "soft" delete all data in a Data Extension so there is no data loss.

B.

Settings to control when a data extension creates a back-up of the data it contains.

C.

Settings to define when a data extension or the data within the data extension is deleted.

D.

Settings to prevent users from deleting a Data Extension created by another user.

Full Access