CSSA Text Q_A.pdf
Document Details
Uploaded by RedeemingFlute
Tags
Related
- 2- Software Development Life Cycle (SDLC) and Development Approaches.pdf
- Computer Grade 11: Computational Thinking PDF
- Software Development 500 PDF
- Software Processes & Development Life-Cycles PDF
- Computer Science Algorithms and Problem Solving 2015 PDF
- SY Bsc Computer Science CS-232 Software Engineering Past Paper 2019 PDF
Full Transcript
1. 🤖 A report needs to list the user ID of the manager of the operator who creates a time-off case. The report provides information from the MyCo-HR-SelfService-Work-TimeOff and Data-Admin-Operator-ID classes. Which two options in...
1. 🤖 A report needs to list the user ID of the manager of the operator who creates a time-off case. The report provides information from the MyCo-HR-SelfService-Work-TimeOff and Data-Admin-Operator-ID classes. Which two options independently satisfy the business outcome? (choose 2) A. Add the operator ID to the report definition as a parameter. B. Configure a class join on the report definition to join operator information to each case. C. Use an association rule to join operator information to each case. D. Specify both classes in the Pages & Classes tab on the report definition. B and C 2. 🤖 When designing reports with multiple data sources, in which two ways is an association rule different from a class join? (choose 2) A. A class join is required to add a filter condition to your report. B. Anyone with the appropriate permissions can use associations when creating reports in the User portal. C. Class joins are unique to each report. Associations are reusable in any report. D. You can join multiple classes with class joins, while you cannot join multiple classes with associations. B and C 3. 🤖 What is the difference between using the Call and Branch methods in an activity step to invoke other activities? (choose 1) A. Call returns to the originating activity, while Branch skips the remainder of the originating activity. B. Branch overrides the security restrictions of the called activity allowing you to easily test code; it will not run in production. C. Call provides more robust debugging capability than Branch, while Branch provides better run-time performance. D. Branch creates a new thread to allow asynchronous processing, while Call runs in the thread from it was invoked. A 4. 🤖 Which two best practices for creating a mobile app on Pega Platform guarantee a consistent user experience? (choose 2) A. Apply both responsive and adaptive user interface designs to optimize the display of the app. B. Incorporate Android emulators during the development and production phases. C. Use multiple unlocked rulesets when developing a mobile app. D. Decide early in the development process if the mobile app supports offline mode. A and D 5. 🤖 (AD)A music production company’s application contains the following classes: UPlusMusic-Production-Work UPlusMusic-Production-Work-Studio UPlusMusic-Production-Work-Brand UPlusMusic-Production-Work-Studio-Recording UPlusMusic-Production-Work-Studio-Editing UPlusMusic-Production-Work-Studio-Marketing UPlusMusic-Production-Work-Studio-Distribution A requirement states that users with the guest role can edit objects related to recording but not editing work. At which position in the class hierarchy do you configure an Access of Role to Object (ARO) record to satisfy this requirement? A. UPlusMusic-Production-Work-Studio B. UPlusMusic-Production-Work-Studio-Editing C. UPlusMusic-Production-Work D. UPlusMusic-Production-Work-Studio-Recording D 6. 🤖 (AD)You are preparing to create a new major version of an application ruleset with multiple minor and patch versions. How do you create the new ruleset version? A. Lock and roll the existing ruleset versions to the new version. B. Skim the relevant ruleset versions to copy the highest versions of the existing rules to the new version. C. Merge the existing rules in the relevant ruleset versions to the new version. D. Create a new application ruleset by using appropriate version number. B 7. 🤖 In MLP2, the business asks you to create a mobile app for an existing Pega Platform application. Which two of the following actions are required to create the mobile app? (choose 2) A. Set up push notifications for developers. B. Configure the mobile application access in Dev Studio. C. Configure access to the Pega Mobile Build Server. D. Create a certificate set. C and D 8. 🤖 What three ways can a developer designate a rule as a relevant record? (choose 3) A. Create the rule in App Studio. B. Add the rule to a production ruleset. C. Create the rule in Dev Studio. D. Add the rule on the Application Inventory landing page. E. Mark the rule as a relevant record. A, D and E 9. 🤖 In which scenario is a Declare OnChange rule appropriate? A. When a user updates their address, the active case is suspended until the address can be confirmed. B. During a nightly backup process, only updated fields are backed up. C. When a developer changes a view, the change is checked into a development branch. D. When a manager approves a case, the case is routed back to the appropriate caseworker. A 10. 🤖 Consider the following requirement:An auditing policy explicitly requires that employees cannot see the contents of complaints made against themselves. Which security solution do you use to satisfy the requirement? A. Access Control Policy. B. Access Deny. C. Access of Role to Object. D. Access When. A 11. 🤖 (AD)You want to create a new minor version of an application ruleset to add a new feature to your application. The new feature will be made available to users in a phased rollout. How do you update the application to add the new ruleset version? A. Skim the existing ruleset and update the existing application version. B. Create a branch ruleset and a new application, and add the branch ruleset to the application. C. Lock and roll the existing ruleset, and update the existing application version. D. Create new application version and add the new ruleset version as a production ruleset. C 12. 🤖 In the Answer area, drag each mobile application solution on the left to the correct scenario. SDK Application.--- Globobank wants to build a mobile app of its pega Platform application to embed in its mobile app. Signed Application.--- Metrobank wants to build a mobile app for distribution on Android and iOS app stores. Unsigned application.--- Localbank wants to build a mobile app for a Pega Platform application, but developer certificates cannot be distributed to app developers. 13. 🤖 When designing reports with multiple data sources, in which two ways is an association rule different from a class join? (choose 2) A. A class join is required to add a filter condition to your report. B. Anyone with the appropriate permissions can use associations when creating reports in the User portal. C. Class joins are unique to each report. Associations are reusable in any report. D. You can join multiple classes with class joins, while you cannot join multiple classes with associations. B and C 14. 🤖 (AD)The MyCoSelfService ruleset contains the following instances of the same rule. The only differences between the instances are the circumstance settings and ruleset version. All ruleset versions are in the ruleset list. Ruleset Version Circumstance 01-01-01 None 01-01-02.country=japan.country=australia 01-01-03 None; base rule checked 01-01-04.country=japan 01-02-01 none Assuming users can access all the ruleset versions, which ruleset version is chosen by rule resolution when.country=australia? A. 01-02-01 B. 01-01-01 C. 01-01-02 D. 01-01-03 A 15. 🤖 Which three approaches are valid for improving activity security? (choose three) A. Select the activity type to limit which rule types can call the activity. B. Limit the activity to calling activities of the same apply to class. C. Configure the activity to require authentication to prevent unauthorized use. D. Configure the activity to restrict individual parameters to authorized users. E. Apply a privilege to the activity to restrict the activity to authorized users. A, C and E 16. An application contains the class group MyCo-HR-SelfService-Work. There are two classes derived from Work-class: MyCo-HR-SelfService-Work-TimeOff MyCo-HR-SelfService-Work-Expense If a report is created in the MyCo-HR-SelfService-Work class group, what instances will the report return? A. Instances of MyCo-HR-SelfService-Work-TimeOff and MyCo-HR-SelfService-Work-Expense, unless they are stored in different database table. B. Only instan ces of MyCo-HR-SelfService-Work. C. Instances of all Work-derived classes. D. Instances of MyCo-HR-SelfService-Work-TimeOff and MyCo-HR-SelfService-Work-TimeOff A 17. 🤖 Which requirement is supported by attribute-based access control (ABAC)? A. Managers can reschedule but not delete appointments. B. Personal identifying information in the Work-Banking- class is restricted. C. Agents who are assigned the Top Secret clearance level can delete reports. D. Customers have view access to all attachments on a case. B 18. 🤖 A budgeting application uses a job scheduler to automatically email customers once a week with a breakdown of their weekly expenses. Due to the international usage of the application, stakeholders require peak performance at all hours. Which solution addresses this performance concern? A. Dedicate and classify a node for the job scheduler. B. Ensure customers use a common access group. C. Configure the job scheduler to run at off-hours. D. Limit the number of operators who access the application. A 19. 🤖 Which configuration controls the access to an attachment category? A. Configure the when rule IsCurrentStage Testing to allow users to view an attachment if the rule returns as true. B. Configure a connector that grants permission to a user to delete an attachment if they are the creator. C. Configure a visible when rule, IsDocumentPrivate, to allow users to view an attachment if the rule returns as false. D. Configure client-based access control on the class where the attachment exists to restrict access to the attachment. A 20. 🤖An application contains a flow action with the Apply to class of TRB-HRApps-Work-Feedback in a locked ruleset, HRApps: 01-01-01. There is a higher unlocked ruleset. In the Answer area, select the appropriate settings on a saved copy of the flow action that prevents the application from using the rule in HRApps: 01-01-01. Ruleset version: HRApps: 01-02-01 Applies to: TRB-HRApps-Work-Feedback Availability: Withdrawn 21. 🤖 In an online shopping application, you enable class-level encryption for the entire case type and optimize First Name, Last Name, Social Security number (SSN), Total Cart, and Account Number properties for reporting. To secure sensitive data, how do you enable property-level encryption for SSN and Account Number? A. Create a propertyEncrypt data transform, and then add the properties. B. Create a TextEncrypted property type, and then add the properties. C. Update the class-level encryption to enable property-level encryption. D. Create a propertyEncrypt access control policy, and then add the properties. D 22. 🤖 (AD)An application includes the following set of circumstanced instances of a decision table: Class Ruleset Version Circumstance MyCo-Account AccountManage 01-01-01 None Manage-Work-Accou ntOpen MyCo-Account AccountManage 01-01-05 Status “Silver” Manage-Work-Accou ntOpen MyCo-Account AccountManage 01-01-15 Status “Gold” Manage-Work-Accou Status=’Silver” ntOpen Status=”Platinum” You update the application and increment the Account Manage ruleset version to 01-02-01. As part of this update, the circumstance.Status=”Silver” is no longer needed by the application. How do you implement this change? A. Create a new version of the circumstanced decision table in Account Manage: 01-02-01 and set the availability of the rule to Withdrawn. B. Do nothing. Rule resolution does not consider rules in a lower minor version of a ruleset. C. Create a new version of the circumstanced decision table in Account Manage: 01-02-01 and set the availability of the rule to Blocked. D. Create a new version of the circumstanced decision table in Account Manage: 01-02-01 and select the Base rule option. A 23. 🤖 Which statement regarding managing encrypted data in Pega Platform is true? A. Each organization uses a custom key to encrypt its data. B. Property level encryption is a time efficient method to encrypt data. C. Class-level encryption will encrypt individual properties. D. To decrypt dats, apply the same key used during encryption. A 24. 🤖 In the Answer Area, drag each log name on the left to its intended purpose on the right. Log Name Answer Area Pega Contains warnings, errors, and information messages about internal operations. Alert Security Contains messages about URL tampering attempts. Alert Contains performance-related messages 25. 🤖 (AD)You perform a major skim on the ruleset ABC:02-02 to ABC:03-01. In the Answer area, select the ruleset versions that the skim operation uses. Ruleset version Does the skim operation to the ruleset version? 01-01-01 NO 02-01-01 NO 01-02-01 NO 02-01-05 YES 26. 🤖 An application includes three case types. A business requirement states that members of the App:Users access role cannot run reports for one of the case types. Which configuration can you apply to satisfy this requirement? A. Use an Access When record to verify that the user role has access to the Run reports action. B. Use an Access When record to verify that the case type has access to the Run reports action. C. Use the Access Manager and set the Run reports action for the case type to No Access for the user role. D. Use an automation to verify that a user does not have access to the App:Users access role before running the report. C 27. 🤖 A requirement states that the Manager role cannot open a purchase request during the Audit stage. How do you configure the case stage to satisfy this requirement? A. Apply a Privilege record. B. Apply an Access When record. C. Apply an Access Deny record. D. Apply a When record. B 28. 🤖 A chemical supplier processes thousands of online orders each day. The supplier provides a material safety data sheet (MSDS) for each of the 100+ cleaning products in stock. When buyers select an item to order, the application displays the MSDS. The MSDS rarely changes. Which of the following options ensures the MSDS is up to date when an order is created? A. Configure a keyed data page that allows multiple pages for each key. B. Created a data page that contains the MSDS for each cleaning product. C. Create a parameterized data page that loads a new MSDS for each product. D. Create a keyed data page with the MSDS for each cleaning product. A 29. 🤖 (AD)The ruleset list for an application consists of the following rulesets, ordered from highest to lowest: SelfService: 01-01 TGB-HR: 01-01 TGB:01-01 A rule with an Apply to: class of TGB-HR-SelfService-Work-TimeOff references a rule named ConfirmationRequest. The four instances of Confirmation Request in the rules cache are shown in the following table. Apply to: Ruleset: Version Availability TGB-HR-SelfService-Work SelfService: 01-01-01 Available TGB-HR-SelfService-Work-Ti SelfService: 01-01-01 Available meOff TGB-HR-SelfService-Work-Ti SelfService: 01-01-02 Withdrawn meOff TGB TGB: 01-01-02 Available Which is chosen during rule resolution? A. TGB.ConfirmationRequest (TGB:01-01-02) B. TGB-HR-SelfService-Work.ConfirmationRequest (SelfService:01-01-01) C. TGB-HR-SelfService-Work-TimeOff.ConfirmationRequest (SelfService:01-01-01) D. TGB-HR-SelfService-Work-TimeOff.ConfirmationRequest (SelfService:01-01-02) B 30. 🤖 A data page is used to retrieve data from an external system. If an error occurs, you want to display a message to the user and send an email to the system administrator. How do you implement this requirement? A. Reuse the out-of-the-box Connection Problem error handling flow on the Service tab for the connector..000. B. Configure an activity’s input source as the error message and the output as an email. C. Configure an error handling process that displays the error message and sends an email. D. Create an error handler data transform that adds an error message to the data page and sends an email. D. 31. 🤖 Drag the application integration methods on the left to the appropriate use cases on the right. Answer Use case CUSTOM API Frequent blood donors contact information is e third-party marketing firm to provide the donor incentives and reminders. PEGA API Each night, the list of expired items in a food d warehouse is sent to a work group to pull item shelves. CUSTOM API A third-party benefits provider receives a list fr client of employees with qualifying life events, marriage or adoption. PEGA API A company identifies customers who are >90 c on invoices. The customer data is sent to the c department for. 32. 🤖 MyCo insurance company completes the development phase of its application and decides to start the testing phase of the application in a testing environment. To migrate the application, the development team created an instance of the Rule Admin Product class, that includes the application and data instances to migrate.nWhich two components does the Rule-Admin-Product instance include by default when you generate an archive file? A. Pega Platform rules B. Checked-out rules C. Checked-in rules D. MyCo-class instances. C and D 33. 🤖 Place the steps in the order in which a service process a request. A. Inbound request received. B. Map inbound data. C. Request processing. D. Map outbound data. E. System returns a response. A,B,C,D,E 34. 🤖 In which two scenarios is it a Pega best practice to use Pega Web Mashup over a Pega API integration? A. Minimal resources are assigned to update Pega Platform for each new release. B. The application is built on Pega Platform version 8.2 using UI Kit. C. Users are expected to create cases, open assignments, and manage data privacy. D. Developers have access to only App Studio when configuring the integration. C and D 35. 🤖 (CM)A fitness organization wants to ensure data is entered correctly into an online form when users apply for, or update their membership information. Which scenario requires an edit validate rule? A. New members must be at least 18 years of age at the time they sign up for membership. B. The first and last name are required on the form, but a middle name or initial is optional. C. The account or card number must be entered in the correct format for the payment type. D. The credit card that they enter for payment must be valid at the time of the membership payment date. C 36. 🤖 (CM)Which three options do a standard you consider when deciding to use post-processing actions on a flow action? A. The sequence in which the system runs different actions. B. The potential reuse of the flow action. C. The effect if the flow action is reloaded. D. The security setting for the flow action. E. The timing ofthe commit for the flow action. A,B,C 37. 🤖 A global application with infrastructure nodes located throughout the world requires certain operations to start executing at midnight GMT. Select two possible designs for this use case. A. Use the Queue-For-Processing method in an activity and design a standard queue processor. B. Use the Queue-For-Processing method in an activity and design a dedicated queue processor. C. Use the Run in background step in the case life cycle and design a standard queue processor. D. Use the Run in background step in the case life cycle and design a dedicated queue processor. B and D 38. 🤖 You have identified an activity that does not perform well. You need to find out exactly which steps in the activity are causing the poor performance. Which tool allows you to identify the cause of the performance issue? A. Database Trace. B. Performance Analyzer (PAL). C. Performance profiler. D. Tracer. C 39. 🤖 The Static Assembler is used to address rules assembly issues due to which cause? A. The application record lists several branch rulesets. B. The server is managing a large number of rules caches. C. Access groups contain multiple production rulesets. D. A new application is migrated to the production system. D 40. 🤖 Drag the name of the Pega Platform log file appender from the left to the matching use case on the right. Pega Platform log file Use case ALERTSECURITY Identify over attempts to bypass the system security features on a node through URL tampering. ALERT log View performance related alerts triggered when an operation exceeds the specified performance PEGA log View warnings, errors, and information messages about internal operations. 41. 🤖 Which two statements about keyed data pages are true? (Choose Two). A. A keyed data page can be any structure except a list. B. A keyed data page can have multiple keys. C. A keyed data page can return multiple embedded pages. D. A keyed data page supports editable data pages only. B and C 42. 🤖 Which two statements are true about configuring Pega Web Mashup? (Choose Two). A. Use the Integration wizard to generate mashup code for use in other systems. B. Add a list of trusted domains to the application that contains the mashup. C. Keep the original names of default actions in the mashup code to prevent security risks. D. Use action objects to transfer data between gadgets in a mashup. A and D 43. 🤖 (AD)Drag the enterprise Class Structure (ECS) layers on the left to the appropriate classes and associated rules on the right. Implementation.-- Icons and control formatting unique to a specific line of business. Division.-- Assets customized for a specific application. Organization.-- Access to enterprise data in external systems. 44. 🤖 In which two scenarios is it a Pega best practice to use Pega Web Mashup over a Pega API integration? (Choose two). A. Minimal resources are assigned to update Pega Platform for each new release. B. The application is built on Pega Platform version 8.2 using UI Kit. C. Users are expected to create cases, open assignments, and manage data privacy. D. Developers have access to only App Studio when configuring the integration. C and D 45. 🤖 A city resident can report potholes to the Department of Transportation by logging in to a mobile Pega Platform application that utilizes the Pega API. Which two Pega API interactions do you use to facilitate this? (Choose Two). A. Access the related case type to report using Get/casetypes. B. Log into the application using PUT/authenticate. C. Submit the report using POST/cases D. Update the report using GET/cases. A and C 46. 🤖 (CM)A fitness organization wants to ensure data is entered correctly into an online form when users apply for, or update their membership information. Which scenario requires an edit validate rule? ® A. New members must be at least 18 years of age at the time they sign up for membership. B. The first and last name are required on the form, but a middle name or initial is optional. C. The account or card number must be entered in the correct format for the payment type. D. The credit card that they enter for payment must be valid at the time of the membership payment date. C 47. 🤖 Which statement is true about services? A. Services may process outbound requests. B. Services may use a listener that runs in the background. C. Services require a REST connector to function. D. Services return all data in XML format. B 48. 🤖 A Pega Platform application has just been integrated with an external data source. Which of the following tests do you perform to ensure that the integration passes data as expected? A. Performance test. B. Scenario Test C. Unit Test. D. Automation Test. C 49. 🤖 Which two statements about Application Settings are true? (Choose two) A. You edit Application Settings on the D_pxGetApplicationSettingValue data page. B. Application Settings can have a Value type of text, boolean, enumerated list or class. C. Application Settings require updating integration rules and data instances for each environment. D. Using categories, a developer can group related Application Settings. B and D 50. 🤖 (AD)Which two statements about guardrails are true? (Choose 2) A. A product owner creates all the guardrails for the application design. B. Pega Platform performs guardrail examination when a rule is checked out. C. A guardrail warning indicates the severity of an error. D. Each rule may have multiple guardrail warnings. C and D. 51. 🤖 In which of the following situations would you configure Application Settings? A. A SOAP connector returns simulated data in the development environment. B. Two SOAP connectors execute in parallel to improve performance. C. The credentials for a REST service differ between development and production environments. D. The thresholds for a SLA are set to hours instead of days on a testing environment. C 52. 🤖You are integrating two Pega Web Mashups into a client’s mortgage loan financing page. What do you configure to successfully embed both mashups? A. Run the mashups on the same thread. B. Load both mashups simultaneously. C. Define identical URLs for each mashup. D. Identify unique names for each mashup. D 53. 🤖 Drag the name of the Pega Platform log file appender from the left to the matching use case on the right. Log file Use Case ALERTSECURITY Identify overt attempts to bypass the system security features on a node through URL tampering ALERT log View performance related alerts triggered when an operation exceeds the specified performance threshold. PEGA log View warnings, errors, and information messages about internal operations. 54. 🤖 (AD)A hospital uses a Patient visit case type to track Emergency Room (ER) visits. The case type can create Lab analysis and Diagnostic imaging child cases. While the child cases are active, the attending doctor must be able to update the Patient visit case with notes. Which two configurations, when performed together, allow a doctor to update the parent case while staff work on the respective child cases? (Choose 2)) A. Configure the Patient visit case type to allow one user. B. Configure the Patient visit case type to allow multiple users. C. Configure the Lab analysis and Diagnostic imaging case types to allow other users to open the parent case type. D. Configure the Lab analysis and Diagnostic imaging case types to allow one user. A and C 55. 🤖 The Static Assembler is used to address rules assembly issues due to which cause? ® A. The application record lists several branch rulesets. B. The server is managing a large number of rules caches. C. Access groups contain multiple production rulesets D. A new application is migrated to the production system. D 56. 🤖 (CM)On which type of rule you can configure edit validate rule? A. Activities. B. Properties. C. Flow action. D. Case type. B 57. Which statement describes the appropriate use of the Purge/Archive wizard to address application performance? A. Delete any properties exposed in table columns from the BLOB. B. Delete stored SQL procedures that have been updated. C. Remove old cases from the respective database table. D. Remove unused rules caches maintained on the system. C 58. Consider the following requirement: Car dealers cannot modify orders in the Fulfillment stage. Which security solution do you use to satisfy the requirement? A. Access group. B. Access Deny C. Access of Role to Object. D. Access When. D 59. Which configuration controls the access to an attachment category? A. Configure a visible when rule, IsDocumentPrivate to allow users to view an attachment if the rule returns as false. B. Configure the privilege DeleteOwn, and then assign it to a user so that a user can delete their own attachments. C. Configure client-based access control on the class where the attachment exists to restrict access to the Attachment. D. Configure a when rule to allow users to delete an attachment if the rule returns as false. B 60. A user reports that an application takes five seconds to complete a step and present the next step in a process. Which tool allows you to gather and analyze performance data for the form submission? A. Performance Analyzer (PAL) B. Database Trace C. Tracer D. Performance Profiler A 61. An application includes three case types. A business requirement states that members of the App:Users access role cannot run reports for one of the case types. Which configuration can you apply to satisfy this requirement? A. Use an automation to verify that the user does not have the App:Users access role. B. Use an Access Deny record to set the Run reports action to No Access. C. Use an Access When record to verify that the user role has access to the Run reports action. D. Use an Access When record to verify that the case type has access to the Run reports action. B 62. (AD)A music production company’s application contains the following classes: UPlusMusic-Production-Work UPlusMusic-Production-Work-studio UPlusMusic-Production-Work-Brand UPlusMusic-Production-Work-Studio-Recording UPlusMusic-Production-Work-Studio-Editing UPlusMusic-Production-Work-Brand-Marketing UPlusMusic-Production-Work-Brand-Distribution A requirement states that users assigned the Manager role can edit objects related to only studio work. At which position in the class hierarchy do you configure an Access of Role to Object (ARO) record to satisfy this requirement? A. UPlusMusic-Production-Work B. UPlusMusic-Production-Work-Studio-Editing C. UPlusMusic-Production-Work-studio D. UPlusMusic-Production-Work-Brand-Marketing C 63. 🤖 In an online shopping application, you enable class-level encryption for the entire case type and optimize First Name, Last Name, Social Security number (SSN), Total Cart, and Account Number properties for reporting. To secure sensitive data, how do you enable property-level encryption for SSN and Account Number? A. Create a PropertyEncrypt data transform, and then add the properties. B. Create a TextEncrypted property type, and then add the properties. C. Create a PropertyEncrypt access control policy, and then add the properties. D. Update the class-level encryption to enable property-level encryption. C 64. Which two options do you consider when creating a pre-processing data transform? (Choose 2) A. The effect if the flow action is reloaded. B. The potential reuse of the flow action. C. The timing of the commit for the flow action. D. The security setting for the data transform. A and B 65. 🤖 Which statement about managing encrypted data in Pega Platform is true? A. Each organization uses a custom key to encrypt its data. B. Encryption policies apply to Work- and Data- classes only. C. Property level encryption is a time-efficient method to encrypt data. D. Filter conditions cannot reference encrypted properties in reports. A 66. Which three items are generated and displayed in the compliance score of an application? (Choose three) A. Pega Platform core rules used in the application. B. Percentage of complaint rules in the application. C. Unweighted compliance score. D. Rules with unjustified warnings in the application. E. Rules with warnings in the application. B, D and E 67. 🤖 (CM)You have a requirement to associate users in different units to the same work queue. How do you implement this requirement? A. Associate the users to a common unit. Then associate a work queue to the common unit. B. Associate the users to a common work queue. Then associate the work queue to the appropriate units. C. Associate the users to a common work group. Then associate a work queue to the work group. D. Associate the users to a common work group. Then associate the work group to the appropriate units. C 68. (AD)A hospital uses a Patient visit case type to track Emergency Room (ER) visits. The case type can create Lab analysis and Diagnostic imaging child cases. While the child cases are active, the doctor must be able to update the Patient visit case with notes. In the Answer Area, select the three configurations that allow a doctor to update the parent case while staff perform assignments on their respective child cases. Case Answer Patient Visit Allow one user Lab analysis Allow other users to open the parent case Diagnostic imaging Allow other users to open the parent case 69. 🤖 (CM)Operator A is in Unit A and Operator B is in Unit B. You want both operators to be able to perform work that is routed to either Unit A or Unit B. Which configuration supports this requirement? A. On each operator’s record, associate the operator with the same work group. B. On each unit record, associate both operators with each unit. C. On the work group record, associate the operators with the work group. D. On each operator’s record, associate the operator with both units. A 70. (CM)The company wants you to configure a service level agreement (SLA) that begins at the start of the next business day, to ensure timely processing of the following assignments: - Product inquiry assignment - a customer submits product inquiries - Review assignment - a customer service representative (CSR) reviews the inquiry and replies to the customer Which two configurations, when performed together, meet the requirement to delay SLA Processing? A. Set the assignment Ready field to Timed delay. B. Set the Assignment Ready field to Dynamically defined on a property. C. Create the SLA on the Product inquiry assignment. D. Create the SLA on the Review assignment. B and D 71. A requirement states that the Manager role cannot open a purchase request during the Audit stage. How do you configure the case stage to satisfy this requirement? A. Apply an Access When record. B. Apply an Access Deny record. C. Apply a When record. D. Apply a Privilege Record. A 72. (CM)Items selected by a user need to be copied to a page list property when the user submits the form. How do you copy the items? A. Add a data transform to the flow action as a pre-processing action. B. Add a data transform to the flow action as a post-processing action. C. Create a declare expression with the page list property as the target. D. Create a validate rule to copy the selected items. B 73. Which requirement is supported by attribute-based access control (ABAC)? A. Bakers with a rating of 4 or better can add recipes to the database. B. Personal identifying information in the Work-Baking-Class is restricted. C. Customers have view access to all attachments on a case. D. Managers can reschedule but not delete appointments. A 74. Which three types of information can represent an attribute in attribute-based access control (ABAC)? (Choose 3) A. Numerical value. B. Boolean C. List of strings. D. Single string. E. Property. A, C and D 75. In the Answer Area, drag each log name on the left to its intended purpose on the right. Log Name Purpose Alert Contains performance-related messages Pega Contains warnings, errors, and information messages about internal operations AlertSecurity Contains messages about URL tampering attempts 76. 🤖 Which two best practices for creating a mobile app on Pega Platform guarantee a consistent user experience? (Choose 2) ® A. Use multiple unlocked rulesets when developing a mobile app. B. Incorporate Android emulators during the development and production phases. C. Decide early in the development process if the mobile app supports offline mode. D. Apply both responsive and adaptive user interface designs to optimize the display of the app. C and D 77. 🤖 A city resident can report potholes to the Department of Transportation by logging in to a mobile Pega Platform application that utilizes the Pega API. Which two Pega API interactions do you use to facilitate this? (Choose 2) A. Submit the report using POST/cases B. Access the related case type to report using GET/casetypes C. Update the report using Get/cases D. Log into the application using PUT/authenticate A and B 78. 🤖 In which of the following situations would you configure Application Settings? ® A. The thresholds for a SLA are set to hours instead of days on a testing environment. B. The credentials for a REST service differ between development and production environments. C. A SOAP connector returns simulated data in the development environment. D. Two SOAP connectors execute in parallel to improve performance. B 79. 🤖 An application contains the class group MyCo-HR-SelfService-Work. There are two classes derived from Work-class: MyCo-HR-SelfService-Work-TimeOff, MyCo-HR-SelfService-Work-Expense. If a report is created in the MyCo-HR-SelfService-Work class group, what instances will the report return? A. Instances of MyCo-HR-SelfService-Work-TimeOff and MyCo-HR-SelfService-Work-Expense, unless they are stored in different database tables. B. Instances of MyCo-HR-SelfService-Work-TimeOff and MyCo-HR-SelfService-Work-Expense C. Instances of all Work- derived classes D. Only instances of MyCo-HR-Selfservice-Work A 80. Which statement is true about connectors? A. Connectors can be referenced from Data Transforms. B. Connectors establish a link to a service on another system. C. Connectors use a listener that runs in the background. D. Connectors require a REST service to function. B 81. A Data Page is used to retrieve data from an external system. If an error occurs, you want to display a message to the user and send an email to the system administrator. How do you implement this requirement? A. Configure an error handling process that displays the error message and sends an email. B. Configure an activity’s input source as the error message and the output as an email. C. Reuse the out-of-the-box Connection Problem error handling flow on the Service tab for the connector. D. Create an error handler data transform that dds an error message to the data page and send an email. D 82. 🤖 (CM)Which two configurations are required when adding a Split for Each shape to your case life cycle? (Choose 2) A. Define when the parent process resumes processing. B. Enable users to get back to the subprocess after the case moves forward. C. Enter a rule that stores the audit note that you want to include in the subprocess. D. Enter the Page List or Page Group property that is the basis of the split. A and D 83. A Chemical supplier processes thousands of online orders each day. The supplier provides a material safety data sheet (MSDS) for each of the 100+ cleaning products in stock. When buyers select an item to order, the application displays the MSDS. The MSDS rarely changes. Which of the following options ensures the MSDS is up to date when an order is created? ® A. Create a Data Page that contains the MSDS for each cleaning product. B. Create a parameterized Data Page that loads a new MSDS for each product. C. Create a keyed Data Page with the MSDS for each cleaning product. D. Configure a keyed Data Page that allows multiple pages for each key. D 84. When designing reports with multiple data sources, in which two ways is an association rule different from a class join? (Choose 2) A. A class join is required to add a filter condition to your report B. Anyone with the appropriate permissions can use associations when creating reports in the User portal. C. You can join multiple classes with class joins, while you cannot join multiple classes with associations. D. Class joins are unique to each report. Associations are reusable in any report. B and D 85. (CM)A fitness organization wants to ensure that data is entered correctly into an online form when sers apply for, or update their membership information. What scenario requires an Edit Validate Rule? A. The first and last name are required on the form, but a middle name or initial is optional. B. Existing members must enter their membership number in the correct format, M-######-0#. C. New members can get 20% discount, if they enter the Coupon Code SAVE. D. New members must be at least 18 years of age at the time they sign up for membership. B 86. 🤖 (AD)In which of the following situations do you use branches? A. Development team A is working on application 02.01.01 and development team B is working on application 02.02.02. B. Development team A and development team B are both working on application 02.01.01 at the same time. C. Development team A is working in the development environment and the Quality assurance (QA) team is testing in the QA environment. D. Development team A in India and development team B in the UK are working different applications in different time zones. B 87. Which two configurations do you implement when using a Pega Web mashup? (Choose 2) A. Configure a node-level data page to hold security access information about the external system. B. Configure the applications permissions by specifying a list of trusted domains in the application rule. C. Add an access group for the application rules that need to be accessed from the external system. D. Leverage the standard authentication service IACAuthentication and update the authentication activities. B and D 88. Select the three Pega best practices for developing activities. (Choose 3) A. Only use activities to support queue processing and interfaces. B. Activities should have fewer than 25 steps. C. To prevent performance problems, limit activities to three calls. D. Only use custom Java steps when absolutely necessary. Only use activities when other rule types cannot meet requirements. E. Only use activities when other rule types cannot meet requirements. B, D and E 89. A developer has identified resource-intensive queue processors as the source of performance issues that application users are experiencing. Which two actions do you perform to resolve the performance issues? (Choose 2) A. Configure the application nodes with node types. B. Associate the queue processors with the appropriate node types. C. Select the Include in background processing option on the application rule. D. Configure the queue processors to run multiple times a day. B and C 90. 🤖 (AD)MyCo insurance company completes the development phase of its application and decides to start the testing phase of the application in a testing environment. To migrate the application, the development team created an instance of the Rule-Admin-Product class that includes the application instances to migrate. Which two components does the Rule-Admin-Product instance include by default when you generate an archive file? (Choose 2) A. Checked-in rules B. Checked-out rules C. Data-class instances D. MyCo-class instances A and D 91. (AD)Drag the Enterprise Class Structure (ECS) layers on the left to the appropriate rules on the right. ECS layer Rule Implementation An email confirmation that is unique to mortgage applications, rather than applicable to all account openings. Division A service-level rule that defines an expected response time for approvals throughout a line of business Organization A property that defines a standard customer account number that is used throughout an organization 92. Which two rule types can you mark as a relevant record? (Choose 2) A. Property B. Skin C. Report D. Section A and D 93. 🤖 (CM)On which type of rule can you configure edit validate rules? A. Properties B. Flow actions C. Case types D. Activities A 94. In which two scenarios is it a Pega best practice to use Pega Web Mashup over Pega API integration? (Choose 2) A. Users are expected to create cases, open assignments, and manage data privacy. B. Developers have access to only App Studio when configuring the integration. C. The application is built on Pega Platform version 8.2 using UI Kit. D. Minimal resources are assigned to update Pega Platform for each new release. A and B 95. (AD)You are working on an update to an application which only affects some rules for a certain case type. For migration to a production system, the customer wants the updated rules released as a new patch version of the application ruleset. How do you create the new ruleset version? A. Skim the relevant rulesets to copy the highest versions of the existing rules to the new version. B. Merge the existing rules in the relevant rulesets to the new version. C. Lock the current ruleset and then roll (increment) the ruleset version. D. Create a branched ruleset and then copy the affected rules into the new branched ruleset. C 96. (AD)Teams X and Y work on different enhancements in the same ruleset. The release date for each enhancement is uncertain. Which two options, when performed together, allow each team to keep its work separate? (Choose 2) A. Create access groups for each of the teams. B. Create a branch ruleset for each team. C. Create a new ruleset version for one of the teams. D. Apply privileges to the rules each team configures. A and B 97. A medium-size toymaker wants to fulfill orders received during the peak season in december and process the orders in batches multiple times a day. How do you implement this use case? A. Create scheduled jobs, one for each run, that can process accumulated orders. B. Create one scheduled job and set its run schedule to multiple times a day. C. Create a queue processor that can process orders received by the company. D. Create batches of orders and send each batch for processing when it gets full. B 98. 🤖 (AD)An application contains five instances of the same rule. The only differences between the instances are the circumstance settings and ruleset version. All the rulesets are in the same ruleset list. Which ruleset version is chosen by rule resolution when.Country = Japan? A. MyCoSelfService:01-01-02 B. MyCoSelfService:01-01-03 C. MyCoSelfService:01-01-04 D. MyCoSelfService:01-02-01 C 99. In which scenario is a Declare OnChange rule appropriate? A. When a user updates their address, the active case is suspended until the address can be confirmed. B. When a developer changes a view, the change is checked into a development branch. C. During a nightly backup process, only updated fields are backed up. D. When a manager approves a case, the case is routed back to the appropriate caseworker. A 100. 🤖(AD)The ruleset list for an application consists of the following rulesets, ordered from highest to lowest SelfService: 01-01 TGB-HR: 01-01 TGB:01-01 A rule with an Apply to: class of TGB-HR-SelfService-Work-TimeOff references a rule named EnterTimeOffDates. The four instances of Enter TimeOffDates in the rules cache are shown in the following table. Which instance of Enter TimeOffDates is chosen during rule resolution? A. TGB-HR-SelfService-Work.EnterTimeOffDates (SelfService:01-01-01) B. TGB-HR-SelfService-Work-TimeOff.EnterTimeOffDates (SelfService: 01-01-02) C. TGB.EnterTimeOffDates (TGB:01-01-02) D. TGB-HR-SelfService-Work-TimeOff.EnterTimeOffDates (SelfService: 01-01-01) B 101. (AD)The AccountManage ruleset contains the following versions of a service level named ReviewAccountChange: The application is being updated with a new patch version of the AccountManage ruleset. As part of the update, the service level is no longer specialized for AccountOpen cases. In the updated ruleset, the circumstancing in the class group applies to all case types. Which option do you use to reset the circumstancing for the AccountOpen case type? A. Copy the non-circumstanced rule to the AccountOpen class and select the base rule option. B. Make the circumstanced rules in the AccountOpen class unavailable. C. Withdraw the circumstanced rules in the AccountOpen class. D. Block the circumstanced rules in the AccountOpen class. C 102. 🤖 You are integrating two Pega Web Mashups into a client’s mortgage loan Financing Page. What do you configure to successfully embed both mashups? A. Identify unique names for each mashup. B. Load both mashups simultaneously. C. Run the mashups on the same thread. D. Define identical URLs for each mashup. A 103. What is the difference between using the Call and Branch methods in an activity step to invoke other activities? A. Branch creates a new thread to allow asynchronous processing, while Call runs in the thread from it was invoked. B. Branch overrides the security restrictions of the called activity allowing you to easily test code; it will not run in production. C. Call provides more robust debugging capability than Branch, while Branch provides better run-time performance. D. Call returns to the originating activity, while Branch skips the remainder of the originating activity. D 104. (AD)An application contains a rule with an Apply to: class of TGB-HRApps-Work-Review in a locked ruleset. There is a higher unlocked ruleset. How do you prevent the application from using the rule in TGB-HRApps-Work-Review? A. Save a new version of the rule, applied to TGB-HRApps-Work-Review, and set the availability of the rule to Withdrawn. B. Save a new version of the rule, applied to TGB, and set the availability of the rule to Final. C. Save a new version of the rule, applied to TGB-HRApps-Work-Review, and set the availability of the rule to Not available. D. Save a new version of the rule, applied to TGB-HRApps-Work-Review, and set the availability of the rule to Blocked. A 105. (AD)You perform a major skim on the ruleset ABC:02-02 to ABC:03-01. In the Answer area, select the ruleset versions that the skim operation uses. Ruleset version Does the skim operation use the ruleset version? 01-01-01 NO 02-01-01 NO 02-02-01 NO 02-01-05 YES 106. 🤖 (AD)You want to create a new minor version of an application ruleset to add a new feature to your application. The new feature will be made available to users in a phased rollout. How do you update the application to add the new ruleset version? A. Skim the existing ruleset and update the existing application version. B. Create a branch ruleset and a new application, and add the branch ruleset to the application. C. Lock and roll the existing ruleset, and create a new application version. D. Create a new application version and add the new ruleset version as a production ruleset. C 107. (AD)Your application contains the following versions of a service level named ReviewAccountChange: Class Ruleset & Version Circumstanced MyCo-AccountManage-Wo AccountManage 01-01-01 None rk MyCo-AccountManage-Wo AccountManage 01-01-05.Status= “Silver” rk MyCo-AccountManage-Wo AccountManage 01-01-05.Status = “Gold” rk MyCo-AccountManage-Wo AccountManage 01-01-05.Status = “Platinum” rk MyCo-AccountManage-Wo AccountManage 01-01-05.Status= “Silver” rk-AccountOpen MyCo-AccountManage-Wo AccountManage 01-01-05.Status = “Gold” rk-AccountOpen MyCo-AccountManage-Wo AccountManage 01-01-05.Status = “Platinum” rk-AccountOpen The application is being updated with a new patch version of the Account Manage ruleset. As part of the update, the service level is no longer specialized for AccountOpen Case type in the current ruleset, the circumstancing in the class group applies to all case types. Which one of can you use to reset the circumstancing for the AccountOpen case type? A. Block the circumstanced rules in the AccountOpen class. B. Copy the non-circumstanced rule to the AccountOpen class and select the base rule option. C. Withdraw the circumstanced rules in the AccountOpen class. D. Make the circumstanced rules in the AccountOpen class unavailable. C 108. You are analyzing application performance and notice one or more data transforms exceeding preferred performance parameters. Which of the following performance tools do you use to help troubleshoot the issue? A. PegaRules Log Analyzer B. Performance Analyzer C. Database Trace D. Performance Profiler D 109. (AD)Which three items are generated and displayed in the compliance score of an application? (Choose three) A. Unweighted compliance score B. Percentage of compliant rules in the application C. Rules with unjustified warnings in the application D. Pega platform core rules used in the application. E. Rules with warnings in the application B, C and E 110. Which statement describes the appropriate use of the Purge/Archive wizard to address application performance. A. Delete stored SQL procedures that have been updated. B. Delete any properties exposed in table columns from the BLOB. C. Remove unused rules caches maintained on the system. D. Remove old cases from the respective database table. D 111. (AD)Which three statements about guardrails are true? (Choose three) A. A guardrail warning indicates the severity of an error. B. A product owner creates all the guardrail for the application design. C. Each rule may have multiple guardrail warnings. D. Pega platform performs guardrail examination when a rule is saved. E. Pega platform performs guardrail examination when a rule is checked out. A, C and D 112. (CM)Which three options do you consider when deciding to use pre/post-processing actions on a flow action? (Choose 3) A. The security setting for the flow action. B. The timing of the commit for the flow action. C. The effect if the flow action is reloaded. D. The sequence in which the system runs different actions. E. The potential reuse of the flow action. C, D and E 113. A user reports that an application takes five seconds to complete a step and present the next step in a process. Which tool allows you to gather and analyze performance data for the form submission? ® A. Performance Profiler B. Performance Analyzer (PAL) C. Tracer D. Database Trace B 114. Which two statements about building mobile applications with pega platform are true? (Choose two) A. Pega platform allows the same certificate set to build and distribute IOS and Android applications. B. Pega Mobile Build Server requires HTTPS access. C. The containing application determines the layout and appearance of SDK applications. D. Pega Mobile Client License is configured in Dev Studio by using your Android or IOS developer certificates. B and C. 115. A developer has identified resource-intensive queue processors as the source of performance issues that application users are experiencing. Which two actions do you perform to resolve the performance issues? (Choose 2) A. Associate the queue processors with the appropriate node types. B. Select the Include background processing option on the application rule. C. Configure the application nodes with node types. D. Configure the Queue processors to run multiple times a day. A and B 116. A courier company wants a mobile app to scan and track the parcels collected from remote areas with no internet access. Which Mobile app do you develop to fulfill the Requirement? A. SDK app. B. Native app. C. Unsigned app. D. Signed app. B 117. 🤖 Which two data elements can be used as an attribute for an access control policy? (Choose 2) A. Appointment date. B. Encrypted bank account number. C. Number of dependents. D. Password string. C and D 118. Which statement is true about connectors? ® A. Connectors can be referenced from data transforms B. Connectors require a REST service to a function. C. Connectors establish a link to a service on another system. D. Connectors use a listener that runs in the background. C 119. Consider the following requirement: Managers at a car and motorcycle dealership have access to all inventory data in the Data-Inventory-class. Motorcycle sales people only have access to motorcycle inventory data in the Data-Inventory-Motorcycle class. Which security solution do you use to satisfy the requirement for the motorcycle sales people? A. Access When B. Access Deny C. Access Control Policy D. Access of Role to Object D 120. (AD)A music production company’s application contains the following classes: UPlusMusic-Production-Work UPlusMusic-Production-Work-studio UPlusMusic-Production-Work-Brand UPlusMusic-Production-Work-Studio-Recording UPlusMusic-Production-Work-Studio-Editing UPlusMusic-Production-Work-Brand-Marketing UPlusMusic-Production-Work-Brand-Distribution A requirement states that users assigned the Director role can edit any class related to studio or brand work. At which position in the class hierarchy do you configure an Access of Role to Object (ARO) record to satisfy this requirement? A. UPlusMusic-Production-Work B. UPlusMusic-Production-Work-Brand C. UPlusMusic-Production-Work-Studio D. UPlusMusic-Production-Work-Brand-Distribution A 121. Which three types of information can represent an attribute in Attribute based access control (ABAC)? (Choose 3) A. Single String B. List of Strings C. Boolean D. Numerical value E. Property A, B and D 122. A requirement states that the Users role cannot open a purchase request during the Audit stage of the case life cycle. How do you configure the case stage to satisfy this requirement? A. Apply an Access When Record. B. Apply a When record. C. Apply a Privilege Record. D. Apply an Access Deny Record. A 123. An application includes three case types. A business requirements states that members of the App:Users access role are not allowed to run reports for one of the case types. Which two configurations can you apply to satisfy this requirement? (Choose two) A. Use an Access When record to test for the case type to the Run reports action in the Access Manager. B. Use the Access Manager and set the Run reports action for the case type to No Access for the user role. C. Use an Access When record to test for the user role to the Run reports action in the Access Manager. D. Use an Access Deny Record and set the Run reports action to No Access. B AND D 124. (AD)The following example shows the ruleset list for the logged in operator. What is stored in the Admin@MyCoruleset? Admin@MyCo: Purchasing:01-01 PurchasingInt:01-01 MyCo:01-01 MyCoInt:01-01 Supplier:01-01 Customer:01-01 A. Preferences for the operator B. Rules checked out by the operator C. Rules delegated to the operator D. Rules recently opened by the operator B 125. How do you ensure that only a manager can run specific flow action? A. Add a privilege to the flow action form, then add the privilege to a role assigned to the access group for managers. B. Add a validate rule to the flow action form to determine whether the user is a manager. C. Add an Access When condition to the flow action to determine whether the user is a manager. D. Add a pre-processing activity to the flow action form to determine whether the user is a manager. A 126. (AD)In which situation do you configure branched rulesets? A. One team creates a new patch for an application while another team creates a new major version of the application. B. You need to delegate rules to process owners from the business. C. Multiple teams need to work on the same application version. D. A team needs to work on the next version of an application while preparing to migrate the current version. C 127. Which two configurations can you use to include access groups into your Product rule? A. Add the access group to the product record in the Individual instances to include section B. Associate the access groups included in the app C. Export the access groups using the access manager D. Add the access groups to the application record A,B 128. What are three valid ways to exchange data through a Pega Web Mashup? (Choose three.) A. Use an SQL call to exchange data between the mashup and hosting web page. B. Use the data-pega-event-onpagedata attribute to configure the default value for the gadget. C. Use a queue processor to pass updated attributes to the gadget on the hosting web page. D. Use an action object configured as a script to perform additional actions on a web mashup gadget. E. Use the Javascript function doAction() to set or read data values through the hosting web page. B,D,E 129. Which action can a Declare OnChange rule perform when a specified property changes? A. Suspend the current work object B. Execute a data transform C. Update an activity D. Specify which flow action to run A 130. You are updating a system of record using a SOAP connector. If the system of record is unavailable, you want to retry after an hour. If it is still unavailable after an hour, a notification should be sent to a system administrator. How do you implement this requirement? A. Implement the logic in the data page's response data transform. B. Implement the logic in the connector's error handler flow. C. Customize the standard pxErrorHandlingTemplate data transform. D. Use a transition condition in the activity step invoking the connector. B 131. Application Settings allow you to____________. A. simulate data in an environment for testing purposes B. automate the application migration process C. execute connectors in parallel to improve performance D. store references to an external system connected to an application D 132. 🤖 If a customer reports an issue with their order, an Investigation case is created. All investigation cases are higher priority than other case types. What configuration supports this requirement? A. Create a service-level agreement (SLA) rule and ensure that the assignment is ready immediately. B. Create a service-level agreement (SLA) rule and increase the initial urgency. C. Increase the initial urgency on the case type settings. D. Configure an optional action to enable manual changes to case urgency. A 133. 🤖 An assignment service-level agreement (SLA) is configured with the following details: Initial urgency: 20 Assignment ready: Timed delay of 1 hour Goal: 5 hours and increase urgency by 10 Deadline: 8 hours and increase urgency by 20 Passed deadline: 2 hours, increase urgency by 20, and limit events to 5 Assuming no other urgency adjustments, what is the assignment urgency 16 hours after the case reaches the assignment? A. 100 B. 90 C. 130 D. 70 A 134. As a best practice, in which situation do you use a keyed data page? A. A user selects an emoji from a short list that updates often. B. A user selects a replacement part from a long list that seldom changes. C. A user selects a delivery option from a short list that rarely changes. D. A user selects an image from a long list that updates often. B 135. Una que preguntaba sobre Organizations y las respuestas eran mas o menos: A- Work queue can have multiple organizations. B- Access groups can have multiple managers No me acuerdo las otras From Pega mission Question 1 You create a report that uses data from two classes. Which of the following reporting requirements requires the use of a subreport? Responses A. Columns to display are: Operator Name, Operator Division, and Count of Purchase Requests created by the operator. Filter the results by unresolved status. B. Columns to display are: Operator Name, Last updated Case ID, Last updated Case Status, and Update Date. C. Columns to display are: Operator Name, Operator Division, Count of Purchase Requests created. D. Columns to display are: Manager, Name, and Count of operators that report to each manager. Filter by Managers with more than five direct reports Question 2 Which three of the following statements about activities are true? (Choose Three) Responses Limit your activities to fewer than 25 steps. When an activity rule is appropriate, use the standard activities whenever possible. You can not call an activity, from an activity. Use the Log-Message method in the activity to add a message to the PEGA log. Question 3 Which two of the following are prerequisites for creating a branch rule for parallel development? (Choose Two) Responses 1 Create a team application. 2 Save a copy of the original rule into the base ruleset. 3 Circumstance the original rule. 4 Create an access group that references the team application. Add developers to the access group. Question 4 The PEGA appender records system events such as errors, while the ALERT appender records events that affect performance. Question 5 The reason you want to run a process immediately before you take performance readings is ____________. Responses 1. to ensure that there are no bugs in the system 2. to allow the rules to assemble 3. to ensure that you know which buttons to click so you can test quickly 4. to train the system which process you are going to measure Question 6 Which of the following options is a reason to have a Declare OnChange rule suspend all processing on a work item? Responses 1. When an unexpected business exception occurs. 2. To test that the Tracer returns a result. 3. To replace a declare expression. 4. When you have performance issues. Question 7 In a rental application, prospective tenants must attach a bank statement from the past three months. You want to ensure that members of the Rental Agency work queue can view the attachment, but no one can delete attachments. What two configuration settings, when used in combination on the attachment category, achieve this behavior? (Choose Two) response - correct Responses 1 Add the Always when rule and select the Delete any action. 2 Add the RentalAgencyWorkQueue privilege and select the View action. 3 Add the RentalAgencyWorkQueue privilege and select the Edit action. 4 Add the Never when rule and select the Delete any action. Question 8 Which of the following JVM arguments can be used to assign a node type to a node? Responses -DNodeType=setenv.bat -TypeNode=Search -NodeType=BackgroundProcessing -DNodeType=BackgroundProcessing Question 9 Which are two principles of General Data Protection Regulation (GDPR)? (Choose Two) response - correct Responses 1 Ensure data integrity and confidentiality 2 Process data transparently 3 Maximize personal data collection 4 Share personal data without restriction Question 10 Which three of the following represent Pega PlatformTM logging levels? (Choose Three) response - correct Responses 1Trace 2 Comment 3 Warn 4 Fatal 5 Alert Question 11 A user reports that your application requires more than 10 seconds to load and display the contents of a form. The performance threshold for displaying the contents of a form is one second. Which option allows you to determine the cause of the performance issue experienced by the user? Responses The PEGA log The Tracer tool The Clipboard tool The My Alerts display Question 12 Log files capture notification of events. Each log is managed by an appender. To download a log file, you need administrative credentials for the application server that hosts Pega Platform. Question 13 What is the purpose of the Enterprise Class Structure (ECS)? Responses ECS documents industry or enterprise standards that applications must contain. ECS is used to alter the performance of the Pega Platform. ECS references single-value properties and complex properties. ECS provides a structure supporting rule reuse. Question 14 Creating Declare OnChange rules to run an activity automatically when the value of a specified property changes, is a form of automatic forward chaining. Question 15 You want to restrict access to a specific flow action to certain users. Which two steps must you perform? (Choose Two) response - correct Responses 1 Add the privilege to a user role that is available to the users’ access group. 2 Override the Access Deny record to the flow action. 3 Add the privilege to the flow action record. 4 Add the privilege to the users’ access group. Question 16 A Declare OnChange activity can call or branch to other activities, but only if they have an activity type of _______. Responses Assign OnChange Rule Connect Activity Question 17 An application for a retail company runs an activity nightly to identify and discount aged inventory. For each aged item, the activity discounts the unit price by 20 percent, then rounds the price down to end in $0.97. If the price already ends in $0.97, the item is already discounted and is skipped. Using the Obj-Browse method, the first step generates a list of items that expire within one week. The PageName parameter provided to the Obj-Browse method is DiscountItems. The second step updates the unit price property of each qualifying item. Which step page is best for the iteration in step two? Responses DiscountItems DiscountItems.pxResults pyWorkPage No Step page is necessary Question 18 Which report requires joining classes? Responses A list of all cases created by the operator along with the work status of each case A list of all child cases showing the work urgency of their parent case A list of all worklist assignments grouped by the operator who is performing the action A list of flow actions and average turnaround time, categorized by Performer Question 19 A claims framework contains two rulesets, ClaimsFW and ClaimsFWInt. An application built on the framework also contains two rulesets, Claims and ClaimsInt. Which statement is false if all the rulesets are configured as Application Validation? Responses Rules in Claims can reference rules in ClaimsFW Rules in ClaimsInt can reference rules in Claims Rules in ClaimsFW can reference rules in Claims Rules in ClaimsFWInt can reference rules in ClaimsFW Question 20 Which layer of the Enterprise Class Structure (ECS) contains generalized assets that are then extended by specific implementations? Responses Division Implementation Organization Framework Question 21 Which of the following options can you use along with system alerts to determine if your application performance needs optimization? Responses Performance Analyzer (PAL) Database Trace Performance Profiler Live UI tool Question 22 The PegaRULES Log Analyzer (PLA) is a standalone web application available from the Marketplace on Pega Community. Responses True False Question 23 Which performance tool do you run to determine which specific step executed by your requestor session that is causing a problem? Responses The Performance Profiler tool The Performance Analyzer (PAL) The Database Trace tool The PegaRULES Log Analyzer (PLA) Question 24 The lock and roll versioning method ______________ and ____________________. (Choose Two) response - correct Responses 1 minimizes the rule data that is carried to a higher version of your application 2 is used for small changes or patches 3 filters out rules that are unavailable for rule resolution 4 ensures older versions of application rulesets are preserved unchanged Question 25 Standard queues are used for simple queue management. Dedicated queues can be used when the task is delayed for processing. Question 26 Which performance tool do you run to examine a query made to the database? Responses The Performance Analyzer (PAL) The Database Trace tool The Performance Profiler tool The PegaRULES Log Analyzer (PLA) Question 27 You want to configure a Pega Web Mashup gadget to use the value of an element from the host page as the value of a gadget attribute or an action parameter. Which of the following options is the correct syntax? Responses 1. data-pega-parameters="{Customer:'[page/id/Account]', Level:'gold'}" 2. [page/function/token], where , token , is a string that has meaning to the function 3. data-pega-parameters="{Customer:'[page/id/Account]'}", where the Document Object Model (DOM) element is named "Account" 4. [gadget/gadgetName/property] where gadgetName is the name of the mashup, and property is the name of a property that is used in a Pega application Question 28 Which description is most accurate for skimming and lock and roll versioning options? Responses 1. Pega provides a skimming wizard but not a lock and roll wizard. 2. Skimming is most efficient for major and minor updates. Lock and roll is most useful for patches. 3. Skimming carries blocked rules forward. Lock and roll does not carry blocked rules forward. 4. Skimming saves checked out rules. Lock and roll does not save checked out rules. Question 29 Which requirement do you implement with an access control policy? Responses Only a customer service representative can view an unmasked account number. Only a specialized appraiser can provide an appraisal of art for a homeowner’s insurance policy. Only a manager can authorize a refund exceeding USD1000. Only an administrator can delete a duplicate address change request. Question 30 How do you make a relevant record unavailable in App Studio? Responses 1. Remove the relevant record designation from the record itself. 2. Mark the relevant record as unavailable from the record itself. 3. Remove the relevant record designation from the Relevant Records landing page. 4. Mark the relevant record as inactive from the Relevant Records landing page. Question 31 Question 31 Question 32 Question 33 Question 34 Question 35 Question 36 Question 37 Question 38 Question 39 Question 40 Question 41 Question 42 Question 43 Question 44 Question 45 Question 46 Question 47 Application Development (AD)You are preparing to create a new major version of an application ruleset in which there are multiple minor and patch versions. How do you create the new ruleset version? A. Use the Ruleset Maintenance wizard to merge the existing rules in the relevant ruleset versions to the new version. B. Use the Ruleset Maintenance wizard to skim the relevant ruleset versions to copy the highest version of existing rules to the new ruleset version. C. Create a new application ruleset using the appropriate version number, then copy the highest version of existing rules into the new ruleset version. D. Use the Application Structure landing page to lock and roll the existing ruleset versions to the new version. The following example shows the ruleset list for the logged-in operator. What is stored in the Admin@MyCo ruleset? A. Preferences for the operator B. Rules recently opened by the operator C. Rules delegated to the operator D. Rules checked out by the operator An application has the following application rulesets: Expenses:02-01 TGB:02-01 TGBCatalog:02-01 A rule with an Apply to: class of TGB-Expenses-Work-Reimbursement references a rule named PopulateLineltems. The six instances of PopulateLineltems in the rules cache are shown in the following table. Which rule is chosen by Rule Resolution? A. TGB-Expenses.PopulateLineltems (TGBCatalog:02-01-05) B. TGB-Expenses-Work.PopulateLineltems (TGBCatalog:02-01-05) C. TGB-Expenses-Work.PopulateLineltems (Expenses:02-01-05) D. TGB-Expenses-Work.PopulateLineltems (TGBCatalog:02-01-03) E. TGB-Expenses-Work.PopulateLineltems (Expenses:02-01-03) F. TGB-Expenses.PopulateLineltems (Expenses:02-01-03) Several development teams work on different enhancements. The release date for each enhancement is uncertain. Which two options allow each team to keep its work separate? (Choose two.) A. Set up branch ruleset for each team. B. Create a new application for each team. C. Create a new ruleset version for each team. D. Create a production ruleset for each team. A global application with infrastructure nodes located throughout the world requires certain operations to start executing at midnight GMT. Select two possible designs for this use case. (Choose two.) A. Use the Run in background step in the case life cycle and design a dedicated queue processor. B. Use the Queue-For-Processing method in an activity and design a standard queue processor. C. Use the Queue-For-Processing method in an activity and design a dedicated queue processor. D. Use the Run in background step in the case life cycle and design a standard queue processor. Which two rule types can you mark as a relevant record? (Choose two.) ® A. Property B. Decision table C. Skin D. Section The customer, a medium size toy maker, wants to fulfill orders received during the peak season in December and process them in batches multiple times a day. How do you implement this use case? A. Create a queue processor that can process orders received by the company. B. Create one scheduled job and select its run schedule as multiple times a day. C. Create batches of orders and send each batch for processing when it gets full. D. Create scheduled jobs, one for each run, that can process accumulated orders. The ruleset list for an application consists of the following rulesets, ordered from highest to lowest: SelfService:01-01 TGB-HR:01-01 TGB:01-01 A rule with an Apply to: class of TGB-HR-SelfService-Work-TimeOff references a rule named ConfirmationRequest. The four instances of ConfirmationRequest in the rules cache are shown in the following table. ® Which is chosen during rule resolution? A. TGB-HR-SelfService-Work.ConfirmationRequest (SelfService:01-01-01) B. TGB.ConfirmationRequest (TGB:01-01-02) C. TGB-HR-SelfService-Work-TimeOff.ConfirmationRequest (SelfService:01-01-02) D. TGB-HR-SelfService-Work-TimeOff.ConfirmationRequest (SelfService:01-01-01) What is the difference between using the Call and Branch methods in an activity step to invoke other activities? A. Branch overrides the security restrictions of the called activity allowing you to easily test code; it will not run in production. B. Branch creates a new thread to allow asynchronous processing, while Call runs in the thread from it was invoked. C. Call provides more robust debugging capability than Branch, while Branch provides better run-time performance. D. Call returns to the originating activity, while Branch skips the remainder of the originating activity. Case Management A flow action calls a pre-processing data transform to initiate values. There are several flow actions available for the assignment. You want to make sure that the values are only initiated once for each flow action. How do you implement a solution? A. Do nothing. The pre-processing data transform is only called once for each assignment. B. Make sure that the flow action does not have the highest likelihood since it will always be invoked. C. Configure the data transform as post-processing instead of pre-processing. D. Add logic to the pre-processing data transform to test if values were already initiated. You want operators in two separate units to be able to perform work routed to either unit. Which configuration supports this requirement? A. On each operator’s record, associate the operator with both units. B. On each operator’s record, associate the operator with the same work group. C. On the work group record, associate the operators with the work group. D. On each unit record, associate both operators with each unit. Items selected by a user need to be copied to a page list property when the user submits the form. How do you copy the items? A. Create a validate rule to copy the selected items. B. Create a declare expression with the page list property as the target. C. Add a data transform to the flow action as a pre-processing action. D. Add a data transform to the flow action as a post-processing action. A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director. In order to allow the three physicians to review the orders in parallel, how would you configure the process? A. Add a Split Join shape, add a list of physicians, and call the surgical procedure request process. B. Add a Split For Each shape, add a list of physicians, and call the evaluation process. C. Add a Split Join shape, add a list of physicians, and call the evaluation process. D. Add a cascading approvals shape that is called by the evaluation subprocess. A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director. How do you configure the process so that the request can continue to be processed if only two of the three physicians approve the order? A. Use an Any join condition. B. Use a Some join condition. C. Use a decision table. D. Use a validate rule. Data and Integration User Experience Reporting Performance You are analyzing application performance and notice one or more data transforms exceeding preferred performance parameters. Which of the following performance tools do you use to help troubleshoot the issue? A. PegaRULES Log Analyzer B. Database Trace C. Performance Profiler D. Performance Analyzer You have identified an activity that does not perform well. You need to find out exactly what steps are causing the problem. Which tool do you use? A. Pega Log Analyzer (PLA) B. Performance Profiler C. Database Trace D. Performance Analyzer (PAL) You are troubleshooting a performance issue with a user interaction that exceeds the maximum time of five seconds. The elapsed time shown in the performance report indicates a total of two seconds. Which tool do you use to determine what is adding the additional three seconds to the performance measure? A. Performance Profiler B. Database Trace C. Log Analyzer D. System Management Application In which two situations do you use the PegaRULES Log Analyzer to analyze application performance? (Choose two.) A. During User Acceptance Testing B. Throughout the application development life cycle C. Before migrating an application to a testing system D. After the application is deployed to a production system Your application is deployed to the cloud. A data source outside your application populates a data page by using your data access pattern configuration. You receive complaints that the system takes a long time to fetch data each time the case worker accesses information for a different customer. Which approach solves this performance issue? A. Move to local installation because network traffic in cloud deployment is often slow. B. Change snapshot data access method to reference pattern data access method. C. Fetch only the targeted data from the database each time data is needed so access is faster. D. Access data page with a predefined key so that, once loaded, data access is faster. Security Mobility