Pega Web Mashup Quiz
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which configurations are required when using a Pega Web Mashup? (Choose two.)

  • Utilize the standard authentication service IACAuthentication.
  • Use a node-level data page for holding user interface designs.
  • Specify a list of trusted domains for application permissions. (correct)
  • Create an access group for application rules to be accessed externally. (correct)
  • During rule resolution, which instance of EnterTimeOffDates will be chosen for the class TGB-HR-SelfService-Work-TimeOff?

  • TGB-HR-SelfService-Work-TimeOff.EnterTimeOffDates(SelfService:01-01-01)
  • TGB-HR-SelfService-Work-TimeOff.EnterTimeOffDates(SelfService:01-01-02) (correct)
  • TGB-HR-SelfService-Work.EnterTimeOffDates(SelfService:01-01-01)
  • TGB.EnterTimeOffDates(TGB:01-01-02)
  • What is the first step in creating a branched ruleset?

  • Define the rules that need to be modified.
  • Copy the existing rules into the new ruleset.
  • Create a new ruleset within the application. (correct)
  • Set permissions for the new ruleset.
  • In which scenario would you leverage the standard IACAuthentication service?

    <p>When developing a mobile application with external services.</p> Signup and view all the answers

    What does configuring a node-level data page achieve in Pega applications?

    <p>Holds security access information for integration with external systems.</p> Signup and view all the answers

    When copying rules from one ruleset to another during branching, what should be ensured?

    <p>Only affected rules relevant to the changes are included.</p> Signup and view all the answers

    What is a necessary requirement for rules to be accessed from an external system?

    <p>An access group must be defined for the needed rules.</p> Signup and view all the answers

    What two steps, when performed together, ensure that patients can read, but not edit, cases?

    <p>Configure an Access Role to Object rule with the open case action set to 5.</p> Signup and view all the answers

    Which two statements regarding Pega Web Mashup are valid?

    <p>A user can view their worklist in an external portal and select items on which to take action.</p> Signup and view all the answers

    Which option is NOT a part of the ruleset list order from highest to lowest in Pega?

    <p>EnterTimeOffDates:01-01</p> Signup and view all the answers

    What type of mobile app is best suited for tracking parcels collected from remote areas with no internet access?

    <p>Native app</p> Signup and view all the answers

    Which statements describe the role of the cache manifest in a mobile app?

    <p>Enables users to continue interacting with mobile apps while offline.</p> Signup and view all the answers

    Which statement regarding managing encrypted data in Pega Platform is true?

    <p>Encrypted properties cannot be referenced using filter conditions in reports.</p> Signup and view all the answers

    When updating a system of record using a SOAP connector, what should happen if the system is unavailable?

    <p>Retry after an hour and notify an administrator if still unavailable.</p> Signup and view all the answers

    What does configuring an access control policy condition to test if the user is a patient achieve?

    <p>It verifies user identity for appropriate case access.</p> Signup and view all the answers

    Which three options do you consider when deciding to use post-processing actions on a flow action?

    <p>The effect if the flow action is reloaded.</p> Signup and view all the answers

    Which action can be utilized regarding flow actions applied to TRB-HRApps-Work-Feedback?

    <p>Save an additional new version and mark it as 'Not available'.</p> Signup and view all the answers

    Which option best describes the function of a mashup channel ID parameter in Pega Web Mashup?

    <p>It verifies the authenticity of mashup requests.</p> Signup and view all the answers

    What is a benefit of using property-level encryption in the Pega Platform?

    <p>It ensures encrypted properties cannot be filtered in reports.</p> Signup and view all the answers

    In what scenario would a signed app be primarily used?

    <p>For distributing apps across public app stores.</p> Signup and view all the answers

    Which mobile features can be leveraged by using Pega Mobile Client?

    <p>Access to camera functionalities for image capturing.</p> Signup and view all the answers

    Which feature is NOT recommended for external portal worklists in Pega Web Mashup?

    <p>Creating new cases directly from the portal.</p> Signup and view all the answers

    When managing flow actions in Pega, which factors are critical?

    <p>Establishing the time it takes for post-processing actions.</p> Signup and view all the answers

    Which statements reflect true capabilities of mobile apps utilizing the cache manifest?

    <p>They can allow offline access to certain features.</p> Signup and view all the answers

    Which statements accurately describe the function of guardrail scores?

    <p>A weighted compliance score above 90 signifies that an application is ready for general distribution.</p> Signup and view all the answers

    Which two configurations are necessary for enabling offline support?

    <p>Appropriate case types configured for offline processing.</p> Signup and view all the answers

    What describes the purpose of controlling access to an attachment category?

    <p>Configure a Visible when condition called 'IsDocumentPrivate' to allow users to view an attachment if the rule returns false.</p> Signup and view all the answers

    Which statements are true regarding the role of user actions in managing attachments?

    <p>Configure a privilege called 'DeleteOwn' to allow users to delete their own attachments.</p> Signup and view all the answers

    Which configurations are essential for effective guardrail management?

    <p>A defined process for addressing unjustified guardrail warnings.</p> Signup and view all the answers

    What are the implications of assigning access groups for offline processing?

    <p>Access groups must be configured to ensure correct offline capabilities.</p> Signup and view all the answers

    What do the configurations for attachment category access achieve?

    <p>They prevent any access to documents when conditions are not met.</p> Signup and view all the answers

    What is achieved by monitoring the guardrail scores of an application?

    <p>Compression of application data for performance optimization.</p> Signup and view all the answers

    Which two design configurations limit the need for horizontal scrolling when an application is used on a mobile device?

    <p>Set the importance for columns in repeating dynamic layouts.</p> Signup and view all the answers

    Which two tasks are used to ensure that only HR Managers have read access to a candidate's reference letter attachment?

    <p>Define a separate Attachment Category for HR Managers.</p> Signup and view all the answers

    Which two methods are most effective for exposing your application to an external system?

    <p>Create a connector linked to a data page.</p> Signup and view all the answers

    What is the best approach to manage and display tabular data in mobile applications?

    <p>Use grid layouts rather than repeated dynamic layouts.</p> Signup and view all the answers

    Which two options should be configured to ensure efficient access management in applications?

    <p>Configure attribute-based access control on all attachments.</p> Signup and view all the answers

    Which two configurations are critical for setting up access groups in an application?

    <p>Add the access groups to the application record.</p> Signup and view all the answers

    Which two strategies are recommended for enhancing the usability of forms on mobile devices?

    <p>Limit text fields to a width of 200 pixels.</p> Signup and view all the answers

    What are two critical elements in the Enterprise Class Structure (ECS) for organizing application rules?

    <p>Creating a clear relationship between classes and rules.</p> Signup and view all the answers

    Study Notes

    Pega Web Mashup Configurations

    • Configure application permissions by specifying trusted domains in the application rule.
    • Add access groups for rules that need access from an external system.
    • Leverage standard authentication service (IACAuthentication) for updated security access.

    Rule Resolution and Classes

    • Rule resolution prioritizes the highest ordered ruleset from the list: SelfService:01-01, TGB-HR:01-01, TGB:01-01.
    • The chosen instance for Apply to: class TGB-HR-SelfService-Work-TimeOff is EnterTimeOffDates from the rules cache, specifically the version with SelfService:01-01-02.

    Mobile Application Approaches

    • A mashup enables users to view worklists and interact with items in external portals.
    • No access to Dev Studio for full system configuration through typical mashups.

    Guardrail Scores

    • The Application Guardrails page indicates rules with severe or moderate guardrail warnings.
    • Scores do not count Pega Platform core rules or unjustified warnings, with compliance scores above 90 indicating readiness for distribution.

    Offline Support Requirements

    • Access groups need to be set up explicitly for offline access.
    • Appropriate case types must be configured for offline processing.

    Access Control for Attachments

    • Configure conditions like "IsCurrentStageTesting" to manage attachment visibility based on rules.
    • Attribute-based access control may restrict access or create separate categories for specific user roles (e.g., HR Managers).

    Application Exposure to External Systems

    • Create connectors linked to data pages to interact with external databases.
    • Leverage Pega API to expose application functionality effectively.

    Designing for Mobile Devices

    • Set widths for layouts in percentages to accommodate different screen sizes and minimize horizontal scrolling.
    • Importance settings in repeating dynamic layouts can enhance usability and navigation on mobile devices.

    Handling System of Record Unavailability

    • Plan retry mechanisms with defined intervals and potential administrator notifications for failures during SOAP connector operations.

    Cache Manifest Role in Mobile Apps

    • It provides access to static resources and ensures continued interaction with applications while offline.

    Management of Encrypted Data

    • Properties marked as encrypted cannot be used in report filter conditions, guaranteeing data protection during processing.
    • Each organization can have custom encryption keys for its encrypted properties.

    Considerations for Post-processing Actions

    • Address the effects of flow action reloading on system performance.
    • Security settings and timing of commits are critical for maintaining integrity and usability in flow actions.

    Leveraging Pega Mobile Client Features

    • Utilize mobile device capabilities to enhance application functionalities, such as accessing device storage or location services.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on configuring Pega Web Mashups with this quiz. It covers topics like application permissions and data page configurations. See how well you understand this aspect of Pega development and security.

    Use Quizgecko on...
    Browser
    Browser