Podcast
Questions and Answers
Which configurations are required when using a Pega Web Mashup? (Choose two.)
Which configurations are required when using a Pega Web Mashup? (Choose two.)
During rule resolution, which instance of EnterTimeOffDates will be chosen for the class TGB-HR-SelfService-Work-TimeOff?
During rule resolution, which instance of EnterTimeOffDates will be chosen for the class TGB-HR-SelfService-Work-TimeOff?
What is the first step in creating a branched ruleset?
What is the first step in creating a branched ruleset?
In which scenario would you leverage the standard IACAuthentication service?
In which scenario would you leverage the standard IACAuthentication service?
Signup and view all the answers
What does configuring a node-level data page achieve in Pega applications?
What does configuring a node-level data page achieve in Pega applications?
Signup and view all the answers
When copying rules from one ruleset to another during branching, what should be ensured?
When copying rules from one ruleset to another during branching, what should be ensured?
Signup and view all the answers
What is a necessary requirement for rules to be accessed from an external system?
What is a necessary requirement for rules to be accessed from an external system?
Signup and view all the answers
What two steps, when performed together, ensure that patients can read, but not edit, cases?
What two steps, when performed together, ensure that patients can read, but not edit, cases?
Signup and view all the answers
Which two statements regarding Pega Web Mashup are valid?
Which two statements regarding Pega Web Mashup are valid?
Signup and view all the answers
Which option is NOT a part of the ruleset list order from highest to lowest in Pega?
Which option is NOT a part of the ruleset list order from highest to lowest in Pega?
Signup and view all the answers
What type of mobile app is best suited for tracking parcels collected from remote areas with no internet access?
What type of mobile app is best suited for tracking parcels collected from remote areas with no internet access?
Signup and view all the answers
Which statements describe the role of the cache manifest in a mobile app?
Which statements describe the role of the cache manifest in a mobile app?
Signup and view all the answers
Which statement regarding managing encrypted data in Pega Platform is true?
Which statement regarding managing encrypted data in Pega Platform is true?
Signup and view all the answers
When updating a system of record using a SOAP connector, what should happen if the system is unavailable?
When updating a system of record using a SOAP connector, what should happen if the system is unavailable?
Signup and view all the answers
What does configuring an access control policy condition to test if the user is a patient achieve?
What does configuring an access control policy condition to test if the user is a patient achieve?
Signup and view all the answers
Which three options do you consider when deciding to use post-processing actions on a flow action?
Which three options do you consider when deciding to use post-processing actions on a flow action?
Signup and view all the answers
Which action can be utilized regarding flow actions applied to TRB-HRApps-Work-Feedback?
Which action can be utilized regarding flow actions applied to TRB-HRApps-Work-Feedback?
Signup and view all the answers
Which option best describes the function of a mashup channel ID parameter in Pega Web Mashup?
Which option best describes the function of a mashup channel ID parameter in Pega Web Mashup?
Signup and view all the answers
What is a benefit of using property-level encryption in the Pega Platform?
What is a benefit of using property-level encryption in the Pega Platform?
Signup and view all the answers
In what scenario would a signed app be primarily used?
In what scenario would a signed app be primarily used?
Signup and view all the answers
Which mobile features can be leveraged by using Pega Mobile Client?
Which mobile features can be leveraged by using Pega Mobile Client?
Signup and view all the answers
Which feature is NOT recommended for external portal worklists in Pega Web Mashup?
Which feature is NOT recommended for external portal worklists in Pega Web Mashup?
Signup and view all the answers
When managing flow actions in Pega, which factors are critical?
When managing flow actions in Pega, which factors are critical?
Signup and view all the answers
Which statements reflect true capabilities of mobile apps utilizing the cache manifest?
Which statements reflect true capabilities of mobile apps utilizing the cache manifest?
Signup and view all the answers
Which statements accurately describe the function of guardrail scores?
Which statements accurately describe the function of guardrail scores?
Signup and view all the answers
Which two configurations are necessary for enabling offline support?
Which two configurations are necessary for enabling offline support?
Signup and view all the answers
What describes the purpose of controlling access to an attachment category?
What describes the purpose of controlling access to an attachment category?
Signup and view all the answers
Which statements are true regarding the role of user actions in managing attachments?
Which statements are true regarding the role of user actions in managing attachments?
Signup and view all the answers
Which configurations are essential for effective guardrail management?
Which configurations are essential for effective guardrail management?
Signup and view all the answers
What are the implications of assigning access groups for offline processing?
What are the implications of assigning access groups for offline processing?
Signup and view all the answers
What do the configurations for attachment category access achieve?
What do the configurations for attachment category access achieve?
Signup and view all the answers
What is achieved by monitoring the guardrail scores of an application?
What is achieved by monitoring the guardrail scores of an application?
Signup and view all the answers
Which two design configurations limit the need for horizontal scrolling when an application is used on a mobile device?
Which two design configurations limit the need for horizontal scrolling when an application is used on a mobile device?
Signup and view all the answers
Which two tasks are used to ensure that only HR Managers have read access to a candidate's reference letter attachment?
Which two tasks are used to ensure that only HR Managers have read access to a candidate's reference letter attachment?
Signup and view all the answers
Which two methods are most effective for exposing your application to an external system?
Which two methods are most effective for exposing your application to an external system?
Signup and view all the answers
What is the best approach to manage and display tabular data in mobile applications?
What is the best approach to manage and display tabular data in mobile applications?
Signup and view all the answers
Which two options should be configured to ensure efficient access management in applications?
Which two options should be configured to ensure efficient access management in applications?
Signup and view all the answers
Which two configurations are critical for setting up access groups in an application?
Which two configurations are critical for setting up access groups in an application?
Signup and view all the answers
Which two strategies are recommended for enhancing the usability of forms on mobile devices?
Which two strategies are recommended for enhancing the usability of forms on mobile devices?
Signup and view all the answers
What are two critical elements in the Enterprise Class Structure (ECS) for organizing application rules?
What are two critical elements in the Enterprise Class Structure (ECS) for organizing application rules?
Signup and view all the answers
Study Notes
Pega Web Mashup Configurations
- Configure application permissions by specifying trusted domains in the application rule.
- Add access groups for rules that need access from an external system.
- Leverage standard authentication service (IACAuthentication) for updated security access.
Rule Resolution and Classes
- Rule resolution prioritizes the highest ordered ruleset from the list: SelfService:01-01, TGB-HR:01-01, TGB:01-01.
- The chosen instance for Apply to: class TGB-HR-SelfService-Work-TimeOff is EnterTimeOffDates from the rules cache, specifically the version with SelfService:01-01-02.
Mobile Application Approaches
- A mashup enables users to view worklists and interact with items in external portals.
- No access to Dev Studio for full system configuration through typical mashups.
Guardrail Scores
- The Application Guardrails page indicates rules with severe or moderate guardrail warnings.
- Scores do not count Pega Platform core rules or unjustified warnings, with compliance scores above 90 indicating readiness for distribution.
Offline Support Requirements
- Access groups need to be set up explicitly for offline access.
- Appropriate case types must be configured for offline processing.
Access Control for Attachments
- Configure conditions like "IsCurrentStageTesting" to manage attachment visibility based on rules.
- Attribute-based access control may restrict access or create separate categories for specific user roles (e.g., HR Managers).
Application Exposure to External Systems
- Create connectors linked to data pages to interact with external databases.
- Leverage Pega API to expose application functionality effectively.
Designing for Mobile Devices
- Set widths for layouts in percentages to accommodate different screen sizes and minimize horizontal scrolling.
- Importance settings in repeating dynamic layouts can enhance usability and navigation on mobile devices.
Handling System of Record Unavailability
- Plan retry mechanisms with defined intervals and potential administrator notifications for failures during SOAP connector operations.
Cache Manifest Role in Mobile Apps
- It provides access to static resources and ensures continued interaction with applications while offline.
Management of Encrypted Data
- Properties marked as encrypted cannot be used in report filter conditions, guaranteeing data protection during processing.
- Each organization can have custom encryption keys for its encrypted properties.
Considerations for Post-processing Actions
- Address the effects of flow action reloading on system performance.
- Security settings and timing of commits are critical for maintaining integrity and usability in flow actions.
Leveraging Pega Mobile Client Features
- Utilize mobile device capabilities to enhance application functionalities, such as accessing device storage or location services.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on configuring Pega Web Mashups with this quiz. It covers topics like application permissions and data page configurations. See how well you understand this aspect of Pega development and security.