Question 1Question Show
Which user type would exclusively use App Studio? Answer
Question 2Question Which of the following statements are true about Specialization layers? Answer
Question 3Question Which two of the following statements are true related to Predictive Diagnostic Cloud (PDC) and Autonomic Event Services (AES)? Answer
Question 4Question Which two of the following statements are true about building an implementation-only application? Answer
Question 5Question When App Studio is used, in which schema is a data type table created? Answer
Question 6Question What are two methods you can use to generate mashup code in Pega Platform? Answer
Question 7Question In which two of the following ways can App Studio accelerate projects? Answer
Question 8Question What are two options you can use to monitor the status of nodes in the cluster of Pega Platform? Answer
Question 9Question Which two statements are true about the component applications? Answer
Question 10Question Which two of the following are the best practices for using multiple built-on applications? Answer
Question 11Question If you need to extend an existing application for a new division, which of the following options do you recommend? Answer
Question 12Question Which two of the following options are reasons to version an application? Answer
Question 13Question Which three of the following items make sense to be packaged as components? Answer
Question 14Question What two reasons justify using subcases when designing a case hierarchy? Answer
Question 15Question In a scenario where you need to specialize rules for a particular region, which two of the following options can be? Answer
Question 16Question The initial behavior of the case type is always the same. The case type must ultimately change based on the type of data instance it is associated with. The data instance's type is not known when the case is created. How do you implement this scenario? Answer
Question 17Question When specializing a case using class inheritance, which two of the following options are correct? Answer
Question 18Question Which two of the following statements are true regarding circumstanced case type rules? Answer
Question 19Question In which three of the following ways can an application be specialized? Answer
Question 20Question Which two of the following statements are true about component applications? Answer
Question 21Question At a certain point in its life cycle, a case is required to capture the list of data instances viewed by the user from which one was selected. The data instance would be classified as reference data, values associated to a unique key rarely, if ever, changing. What is the best way to implement this requirement in Pega taking into consideration performance and extensibility? Answer
Question 22Question Which two statements are true with regards to industry foundation data model? Answer
Question 23Question Greenfield Data Modeling follows the three-level approach. What is the order of applying this three-level approach? Answer
Question 24Question What are the two ways to minimize or avoid data integrity issues? Answer
Question 25Question What are two key benefits of using a Pega industry foundation data model? Answer
Question 26Question What are three different ways to accommodate temporal data? Answer
Question 27Question How is polymorphism implemented when defining a data relationship field type during data modelling? Answer
Question 28Question Which of the following is true about data classes? Answer
Question 29Question Which of the following statements best describes data model design? Answer
Question 30Question What is the primary difference between push routing and pull routing? Answer
Question 31Question After deploying a flow change to production which affects in flight cases, which three activities can be used to avoid orphaned assignments? Answer
Question 32Question A Low code developer can select which tow of the following participants that are associated to user account within the application? Answer
Question 33Question Which of the following techniques is the most recommended for handling changes to processes when there are existing open cases in production? Answer
Question 34Question A case is routed to a work queue after creation in a Fraud application. The fraud analyst picks-up the work using GetNextWork functionality. If the fraud analyst cannot complete the assignment, the analyst clicks Cancel so that another fraud analyst can work on the assignment. Which item can be configured to implement the above requirement? Answer
Question 35Question An existing process uses an integrator shape to exchange data with an external system. Which of the following flows is used to send email correspondence for exception that occur with the integrator shape? Answer
Question 36Question What are the three ways that you change the Get Next Work priorization without customizing the GetNextWork and GetNextWorkCriteria rules? Answer
Question 37Question Which three of the following options are flow-related assignment properties that can be used to identify assignments for cases in flight? Answer
Question 38Question A process with three assignments exists in production. After redesign, one of the assignments is removed. After the deployment, in flight cases should use the old assignment for processing Which one of the following approaches can be used for the above requirement? Answer
Question 39Question Which two of the following routing activities leverage the @pickBalancedOperator() function? Answer
Question 40Question You need to automate a claim adjudication process in which files containing claims are parsed, verified, adjudicated. Claims which pass those initial steps are automatically created for further processing. A single file containing up to 1,000 claims is received daily before 5:00 PM. Claim verification is simple and takes a few milliseconds, but claim adjudication might take up to five minutes. Which two design options best fit for this solution? Answer
Question 41Question What are the two reasons why you tune some of the Pega out-of-the-box default agents in a production environment? Answer
Question 42Question In which situation do you consider calling external services asynchronously? Answer
Question 43Question In which two scenarios the access group context can be changed for Queue Processors? Answer
Question 44Question By default, queue processors run in the security context of which requestor type? Answer
Question 45Question ABC Company is a distributor of discount wines and uses Pega Platform for order tracking. There are up to 100 orders per day, with up to 40 different line items in each order specifying the product and quantity. There are up to 5,000 varieties of wines that continuously change over time as new wines are added to and dropped from the list. ABC Company want to extend the functionality of the order tracking application to determine recent hot-selling items by recording the top 10 items ordered by volume each day. This information is populated in a table and used to ease historical reporting. Select a design solution to support this Answer
Question 46Question In asynchronous service processing, which rule decides the queuing and dequeuing option? Answer
Question 47Question When integrating with multiple independent services with long response times, which option can improve user experience? Answer
Question 48Question As part of an underwriting process, the application must generate a risk factor for a loan and insert the risk factor into the Loan case. The risk factor generation is an intensive calculation that requires several minutes to run. The calculation slows down the environment. You want to have all risk factor calculations run automatically between the hours of 10:00 PM and 6:00 AM to avoid the slowdown during daytime working hours. Which two design options best fit for this solution? Answer
Question 49Question Which two of the following actions need to be configured for a job scheduler activity? Answer
Question 50Question Which three statements are true regarding attribute-based access control (ABAC)? Answer
Question 51Question Which two of the following security risks can be identified by the Rule security analyzer? Answer
Question 52Question Which access is granted if there are several dependent access roles defined for a dependent access role? Answer
Question 53Question Select the best practices that can help minimize security vulnerabilities in the custom HTML rule Answer
Question 54Question What are the supported Rule Security Mode settings on the access group which helps enforce a deny first policy? Answer
Question 55Question Which three of the following application rule properties can you use within an access when rule to restrict access between applications hosted in the same database and sharing the same work and assignment table? Answer
Question 56Question By default, Queue Processors run in the security context of the which requestor type? Answer
Question 57Question Which authorization model do you use to implement the data privacy requirements of the European Union's General Data Protection Regulation (GDPR) and similar regulations? Answer
Question 58Question Select three best practices that can protect against the cross-site scripting (XSS) attacks Answer
Question 59Question Select the four authentication protocols supported by Pega Answer
Question 60Question XYZ Corp orders office supplies through multiple suppiers. XYZ Corp wants to see detail about the least expensive line items purchased through each supplier. XYZ has Order cases that have LineItem subcases. LineItem detail is stored in a separate table. Which of the following approaches should be used as part of the solution? Answer
Question 61
Question A report must have a list of all operators with the following columns: Operator Last Name, Operator First Name, Count of Assignments. What report is best suited for this requirement? Answer
Question 62Question Which of the following statements is true about reports database in Pega? Answer
Question 63Question Which JOIN condition is the most efficient in a report definition? Answer
Question 64Question What are two issues that can result if large data sets are generated by a report and sent to another user? Answer
Question 65Question Which of the following is a benefit of table partitioning? Answer
Question 66Question Which of the following best describes the function of BIX? Answer
Question 67Question Which column can be removed from Declare Index tables to improve performance? Answer
Question 68Question Which of the following setups most likely requires the use of a subreport? Answer
Question 69Question Which report definition data access method should be used to include Work Parties? Answer
Question 70Question Design teams are primarily responsible for user experience Question 71Question Good UX design can save a company money because it helps define and scope a team's work Question 72Question While designing an application for large set of users working across regions on a large set of data, which three of the following points have to taken into consideration to improve the user experience? Answer
Question 73Question Business-to-Consumer (B2C) apps tend to focus on a specific business process Question 74Question For which three conditions are client-side expressions better than the server-side expressions? Answer
Question 75Question When do you perform usability testing? Answer
Question 76Question Usability testing is a method for determining how easy an application is performed by the Answer
Question 77Question While the user is busy reading a screen or completing another task, the application can perform required tasks in another requestor session, apart from the user's requestor session. Which two tasks can improve the user experience? Answer
Question 78Question Autocomplete controls negatively impact the user experience if Answer
Question 79Question According to Nielsen, at what stage does iterative design first become a part of company culture? Answer
Question 80Question Which two of the following items are consistent with branch development? Answer
Question 81Question What are the four developer activities in DevOps Release pipeline? Answer
Question 82Question Which two of the following items are normally performed when implementing a custom guardrail warning? Answer
Question 83Question Which load testing tool do you recommend to the client? Answer
Question 84Question Which two of the following tools can be used to determine how to best address rule conflicts? Answer
Question 85
Question Which two of the following items best describe technical debt? Answer
Question 86Question What are the three end-user activities in a DevOps Release pipeline? Answer
Question 87Question What two benefits do you receive by running appropriate tests at each stage of a release pipeline? Answer
Question 88Question Which statement is true about Guardrail wanings? Answer
Question 89Question In which two situations do you typically use rule check-in approval? Answer
Which two scenarios describe the appropriate use of an approve reject step?Which scenario describes the appropriate use of an Approve/Reject step? Employees must periodically submit self-evaluations to their reporting managers. If the manager decides that the candidate evaluation is sufficient, the case continues.
Which two use cases are supported by the Test Coverage Tool choose two?You can generate two types of test coverage reports: User-level test coverage reports identify which executable rules in your currently included applications are covered and not covered by tests. Application-level coverage reports contain test coverage results from multiple users.
Which two of the following statements are true about PEGA robotic automation RPA choose two?Which two of the following statements are true about Pega Robotic Automation (RPA)? - Allows for integration with a system of record that does not support an API. - Opens and updates information by using the system of record's user interface.
Which two of the following methods can configure the transition from one stage in a case life cycle to the next?Other stage transition options include waiting for a user action and case resolution. With the Waiting for a user action option, when all stage processes are complete, the case worker receives the option to complete the stage.
|