Uploaded by omar hassan

Pega Platform Exam Questions: Performance & Security

advertisement
1. Which statement describes the appropriate use of the
Purge/Archive wizard to address application performance?
a. Delete any properties exposed in table columns from the BLOB
b. Delete stored SQL procedures that have been updated
c. Remove old cases from the respective database table
d. Remove unused rules caches maintained on the system
2. Consider the following requirement: Car dealers cannot modify
orders in the Fulfillment stage.
a. Access group
b. Access Deny
c. Access of Role to Object
d. Access When
3. Which configuration controls the access to an attachment
category?
a. Configure a visible when rule, IsDocumentPrivate to allow users
to view an attachment if the rule returns as false
b. Configure the privilege DeleteOwn, and then assign it to a user so
that a user can delete their own attachments
c. Configure client-based access control on the class where the
attachment exists to restrict access to the attachment
d. Configure a when rule to allow users to delete an attachment if the
rule returns as false
4. A user reports that an application takes five seconds to complete a
step and present the next step in a process. Which tool allows you
to gather and analyze performance data for the form submission?
a. Performance Analyzer (PAL)
b. Database Trace
c. Tracer
d. Performance Profiler
5. An application includes three case types. A business requirements
states that members of the App: Users access role cannot run
reports for one of the case types. Which configuration can you
apply to satisfy this requirement?
a. Use an automation to verify that the user doesn’t have the
App:Users access role
b. Use an Access Deny record to set the Run reports action to No
Access
c. Use an Access When record to verify that the user role has access
to the Run reports action
d. Use an Access When record to verify that the case type has access
to the Run reports action
e. Use the Access Manager and set the Run reports action for the
case type to No Access for the user role. (if option B is not
available)
6. A music production company’s application contains the following
classes:
UPlusMusic-Production-Work
UPlusMusic-Production-Work-Studio
UPlusMusic-Production-Work-Brand
UPlusMusic-Production-Work-Studio-Recording
UPlusMusic-Production-Work-Studio-Editing
UPlusMusic-Production-Work-Brand-Marketing
UPlusMusic-Production-Work-Brand-Distribution
A requirement states that users assigned the Manager role can
edit objects related to only studio work. At which position in the
class hierarchy do you configure an Access of Role to Object
(ARO) record to satisfy this requirement?
a. UPlusMusic-Production-Work
b. UPlusMusic-Production-Work-Studio
c. UPlusMusic-Production-Work-Studio-Editing
d. UPlusMusic-Production-Work-Brand-Marketing
7. A requirement states that users with the Guest role can edit objects
related to recording but not editing work. At which position in the
class hierarchy do you configure an Access of Role to Object (ARO)
record to satisfy this requirement?
a. UPlusMusic-Production-Work-Studio
b. UPlusMusic-Production-Work
c. UPlusMusic-Production-Work-Studio-Editing
d. UPlusMusic-Production-Work-Brand-Recording
8. In an online shopping application, you enable class-level encryption
for the entire case type and optimize First Name, Last Name, Social
Security Number (SSN), Total Cart, and Account Number properties
for reporting.
To secure sensitive data, how do you enable property-level
encryption for SSN and Account Number?
a. Create a PropertyEncrypt data transform, and then add the
properties
b. Create a TextEncrypted property type, and then add the properties
c. Create a PropertyEncrypt access control policy, and then add the
properties
d. Update the class-level encryption to enable property-level
encryption
9. Which two options do you consider when creating a pre-processing
data transform?(Choose two)
a. The effect if the flow action is reloaded
b. The potential reuse of the flow action
c. The timing of the commit for the flow action
d. The security setting for the data transform
10. Which statement about managing encrypted data in Pega
Platform is true?
a. Each organization uses a custom key to encrypt its data
b. Encryption policies apply to Work- and Data- classes only
c. Property-level encryption is a time-efficient method to encrypt
data
d. Filter conditions cannot reference encrypted properties in reports
11. Which three items are generated and displayed in the
compliance score of an application? (Choose Three)
a. Pega Platform core rules used in the application
b. Percentage of compliant rules in the application
c. Rules with unjustified warnings in the application
d. Rules with warning in the application
e. Unweighted compliance score
12. You have a requirement to associate users in different units to
the same work queue. How do you implement this requirement?
a. Associate the users to a common unit. Then associate a work queue
to the common unit.
b. Associate the users to a common work queue. Then associate a
work queue to the appropriate units
c. Associate the users to a common work group. Then associate a
work queue to the work group.
d. Associate the users to a common work group. Then associate the
work group to the appropriate units.
13. A hospital uses a Patient visit case type to track Emergency Room
(ER) visits. The case type can create Lab analysis and Diagnostic
imaging child cases. While the child cases are active, the doctor
must be able to update the Patient visit case with notes.
In the Answer area, select the three configurations that allow a
doctor to update the parent case while staff perform
assignments on their respective child cases.
a. Configure the Patient visit case type to allow one user.
b. Configure the Patient visit case type to allow multiple users.
c. Configure the Lab analysis and Diagnostic imaging case types to
allow other users to open the parent case type.
d. Configure the Lab analysis and Diagnostic imaging case types to
allow one user
14. Operator A is in Unit A and Operator B is in Unit B, you want both
operators to be able to perform work that is routed to either Unit
A or Unit B
Which configuration supports this requirement?
a. On each operator’s record, associate the operator with the same
work group
b. On each unit record, associate both operators with each unit
c. On the work group record, associate the operators with the work
group
d. On each operator’s record, associate the operator with both units.
15. The company wants you to configure a service level agreement
(SLA) that begins at the start of the next business day, to ensure
timely processing of the following assignments:
Product inquiry assignment – a customer submits product
inquiries
Review Assignment – a customer service representative reviews
the inquiry and replies to the customer
Which two configuration, when performed together, meet the
requirement to delay SLA processing?
a. Set the Assignment Ready to Timed Delay
b. Set the Assignment Ready field to Dynamically defined on a
property
c. Create the SLA on the Review assignment
d. Create the SLA on the product inquiry assignment
16. A requirement states that the Manager role cannot open a
purchase request during the Audit stage.
How do you configure the case stage to satisfy this requirement?
a. Apply a Access When record
b. Apply an Access Deny record
c. Apply a When record
d. Apply a Privilege record
17. Items selected by a user need to copy to a page list property
when the user submits the form. How do you copy the items?
a. Add a data transform to the flow action as a pre-processing action
b. Add a data transform to the flow action as a post-processing
action
c. Create a declare expression with the page list property as the target
18. Which requirement is supported by attribute-based access
control (ABAC)?
a. Personal identifying information in the Work-Baking-class is
restricted
b. Bakers with a rating of 4 or better can add recipes to the database
c. Customers have view access to all attachments on a case
d. Managers can reschedule but not delete appointments
e. Agents who are assigned the Top Secret clearance level can delete
reports
19. Which three types of information can represent an attribute in
attribute-based access control (ABAC)? (Choose Three)
a. Numerical value
b. Boolean
c. List of strings
d. Single string
e. Property
20. Match the log file according to the purpose
Alert --- contains performance-related messages
Pega --- contains warnings, errors, and information
messages about internal operations
Alert Security --- contains messages about URL tampering
attempts
21. Which two best practices for creating a mobile app on Pega
Platform guarantee a consistent user experience? (Choose Two)
a. Use multiple unlocked rulesets when developing a mobile app
b. Decide early in the development process if the mobile app
supports offline mode
c. Apply both responsive and adaptive user interface designs to
optimize the display of the app
d. Incorporate Android emulators during the development and
production phases
22. A city resident can report potholes to the Department of
Transportation by logging into a mobile Pega Platform application
that utilizes the Pega API.
Which two Pega API interactions do you use to facilitate this?
(Choose Two)
a. Submit the report using POST/ cases
b. Access the related case type to report using GET / case types
c. Update the report using GET/cases
d. Log into the application using PUT/authenticate
23. In which of the following situations would you configure
Application Settings?
a. The thresholds for a SLA are set to hours instead of days on a testing
environment
b. The credentials for a REST service differ between development
and production environments
c. A SOAP connector returns simulated data in the development
environment
d. Two SOAP connectors execute in parallel to improve performance.
24. An application contains the class group MyCo-HR-SelfServiceWork. There are two classes derived from Work-class:
MyCo-HR-SelfService-Work-TimeOff
MyCo-HR-SelfService-Work-Expense
If a report is created in the MyCo-HR-SelfService-Work class
group, what instances will the report return?
a. Instances of MyCo-HR-SelfService-Work-TimeOff and MyCo-HRSelfService-Work-Expense, unless they are stored in different
database tables
b. Instances of all Work- derived classes
c. Only instances of MyCo-HR-SelfService-Work
d. Instances of MyCo-HR-SelfService-Work-TimeOff and MyCo-HRSelfService-Work-Expense
25. Which statement is true about connectors?
a. Connectors can be referenced from data transforms
b. Connectors establish a link to a service on another system
c. Connectors use a listener that runs in the background
d. Connectors require REST service to function
26. A data page is used to retrieve data from an external system. If
an error occurs, you want to display a message to the user and send
an email to the system administrator.
How do you implement this requirement?
a. Configure an error handing process that displays the error message
and sends an email
b. Configure an activity’s input source as the error message and the
output as an email.
c. Reuse the out-of-the-box connection problem error handling flow
on the service tab for the connector
d. Create an error handler data transform that adds an error
message to the data page and send an email
27. Which two configurations are required when adding a Split for
Each shape to your case life cycle? (Choose Two)
a. Define when the parent process resumes processing
b. Enable users to get back to the subprocess after the case moves
forward
c. Enter the Page List or Page Group property that is the basis of the
split
d. Enter a rule that stores the audit note that you want to include in
the subprocess
28. A chemical supplier processes thousands of online orders each
day. The supplier provides a material safety data sheet (MSDS) for
each of the 100+ cleaning products in stock. When buyers select an
item to order, the application displays the MSDS. The MSDS rarely
changes.
Which of the following options ensure the MSDS is up to date
when an order is created?
a. Create a data page that contains the MSDS for each cleaning
product
b. Create a parameterized data page that loads a new MSDS for each
product
c. Create a keyed data page with the MSDS for each cleaning product
d. Configure a keyed data page that allows multiple pages for each
key
29. When designing reports with multiple data sources, in which two
ways is an association rule different from a class join? (Choose Two)
a. Class joins are unique to each report. Association are reusable in
any report
b. Anyone with the appropriate permissions can use associations
when creating reports in the User Portal
c. A class join is required to add a filter condition to your report
d. You can join multiple classes with class joins, while you cannot join
multiple classes with associations.
30. A fitness organization wants to ensure that data is entered
correctly into an online form when users apply for, or update, their
membership information.
Which scenario requires an edit validate rule?
a. The first and last name are required on the form, but a middle name
or initial is optional
b. Existing members must enter their membership number in the
correct format, M-######-0#
c. New members can get a 20% discount, if they enter the coupon
code SAVE
d. New members must be at least 18 years of age at that time they
sign up for membership
e. The account or card number must be entered in the correct format
for the payment type (if option B is not available)
31. In which of the following situations do you use branches?
a. Development team A is working on application 02.01.01 and
Development team B is working on application 02.02.02
b. Development team A and Development team B are both working
on application 02.01.01 at the same time
c. Development team A is working in the development environment
and the quality assurance (QA) team is testing in the QA
environment
d. Development team A in India and Development team B in the UK
are working on different applications in different time zones.
32. Which two configurations do you implement when using a Pega
Web Mashup? (Choose Two)
a. Configure aa node-level data page to hold security access
information about the external system
b. Configure the application permissions by specifying a list of
trusted domains in the application rule
c. Add an access group for the application rules that need to be access
from the external system
d. Leverage the standard authentication service IAC authentication
and update the authentication activities.
33. Select the three Pega best practices for developing activities.
(Choose Three)
a. Only use activities to support queue processing and interfaces
b. Activities should have fewer than 15 steps
c. To prevent performance problems, limit activities to three calls
d. Only use custom Java steps when absolutely necessary. Only use
activities when other rule types cannot meet requirements
e. Only use activities when other rule types cannot meet
requirements
34. A Developer has identified resource-intensive queue processors
as the source of performance issues that application users are
experiencing.
Which two actions do you perform to resolve the performance
issues? (Choose Two)
a. Configure the application nodes with node type
b. Associate the queue processors with the appropriate node types
c. Select the include in background processing option on the
application rule
d. Configure the queue processors to run multiple times a day
35. MyCo insurance company completed the development phase of
its application and decided to start the testing phase of the
application in a testing environment. To migrate the application,
the development team created an instance of the Rule-AdminProduct class that includes the application instances to migrate.
Which two components does the Rule-Admin-Product instance
include by default when you generate an archive file? (Choose
Two)
a. Checked-in rules
b. Data- class instances
c. MyCo- class instances
d. Checked-out rules
36.
37. Which two rule types can you mark as a relevant record?
(Choose Two)
a. Property
b. Skin
c. Report
d. Section
38. On which type of rule can you configure edit validate rules?
a. Properties
b. Flow actions
c. Case types
d. Activities
39. In which two scenarios is it a Pega best practice to use Pega Web
Mashup over a Pega API integration? (Choose Two)
a. Users are expected to create cases, open assignments, and manage
data privacy
b. Developers have access to only App Studio when configuring the
integration
c. The application is built on Pega Platform version 8.2 using UI Kit.
d. Minimal resources are assigned to update Pega Platform for each
new release
40. You are working on an update to an application which only
affects some rules for a certain case type. For migration to a
production system, the customer wants the update rules released
as a new patch version of the application ruleset
How do you create the new ruleset version?
a. Skim the relevant rulesets to copy the highest versions of the
existing rules to the new version
b. Merge the existing rules in the relevant rulesets to the new version
c. Lock the current ruleset and then roll (increment) the ruleset
versions
d. Create a branched ruleset and then copy the affected rules into the
new branched ruleset.
41. Teams X and Y work on different enhancements in the same
ruleset. The release date for each enhancement is uncertain.
Which two options, when performed together, allow each team
to keep its work separate? (Choose Two)
a. Create access groups for each of the teams
b. Create a branch ruleset for each team
c. Create a new ruleset version for one of the teams
d. Apply privileges to the rules each team configure
42. A medium-size toy maker wants to fulfill orders received during
the peak season in December and process the orders in batches
multiple times a day
How do you implement this use case?
a. Create scheduled jobs, one for each run that can process
accumulated orders.
b. Create one scheduled job and set its run schedule to multiple
times a day
c. Create a queue processor that can process orders received by the
company
d. Create batches of orders and send each batch for processing when
it gets full
43. In which scenario is a Declare OnChange rule appropriate?
a. When a user updates their address, the active case is suspended
until the address can be confirmed
b. When a developer changes a view, the change is checked into a
development branch
c. During a nightly backup process, only updated fields are backed up
d. When a manager approves a case, the case is routed back to the
appropriate caseworker.
44. You are integrating two Pega Web Mashups into a client’s
mortgage loan financing page. What do you configure to
successfully embed both mashups?
a. Identify unique names for each mashup.
b. Load both mashups simultaneously
c. Run the mashups on the same thread
d. Define identical URLs for each mashup
45. What is the difference between using the Call and Branch
methods in an activity step to invoke other activities?
a. Branch creates a new thread to allow asynchronous processing,
while call runs in the thread from it was invoked
b. Branch overrides the security restrictions of the called activity
allowing you to easily test code it will not run in production
c. Call provides more robust debugging capability than branch, while
branch provides better run-time performance
d. Call returns to the originating activity, while branch skips the
remainder of the origination activity
46. An application contains a rule with an Apply to: class of TGBHRApps-Work-Review in a locked ruleset. There is a higher
unlocked ruleset.
How do you prevent the application from using the rule in TGBHRApps-Work-Review?
a. Save a new version of the rule, applied to TGB-HRApps-WorkReview, and set the availability of the rule to Withdrawn
b. Save a new version of the rule, applied to TGB, and set the
availability of the rule to Final
c. Save a new version of the rule, applied to TGB-HRApps-WorkReview, and set the availability of the rule to Not Available
d. Save a new version of the rule, applied to TGB-HRApps-WorkReview, and set the availability of the rule to Blocked
47. You want to create a new minor version of an application ruleset
to add a new feature to your application. The new feature will be
made available to users in a phased rollout.
How do you update the application to add the new ruleset
version?
a. Skim the existing ruleset and update the existing application
version
b. Create a branch ruleset and a new application, and add the branch
ruleset to the application
c. Lock and roll the existing ruleset, and create a new application
version
d. Create a new application version and add the new ruleset version
as a product ruleset
48. A report needs to list the user ID of the manager of the
operator who creates a time-off case. The report provides
information from the MyCo-HR-SelfService-WorkTimeOff and Data-Admin-Operator- ID classes.
Which two options independently satisfy the business
outcome? (Choose Two)
a. Add the operator ID to the report definition as a
parameter.
b. Configure a class join on the report
definition to join operator information to
each case.
c. Use an association rule to join operator information
to each case.
d. Specify both classes in the Pages & Classes tab on the
report definition.
49. Which two data elements can be used as an attribute for an
access control policy? (Choose Two)
a. Appointment date
b. Encrypted bank account number
c. Number of dependents
d. Password String
50. You are preparing to create a new major version of an application
ruleset with multiple minor and patch versions.
How do you create the new ruleset version?
a. Lock and roll the existing ruleset versions to the new version.
b. Skim the relevant ruleset versions to copy the highest
versions of the existing rules to the new version.
c. Merge the existing rules in the relevant ruleset versions to
the new version.
d. Create a new application ruleset by using the appropriate
version number.
51. In MLP2, the business asks you to create a mobile app for an
existing Pega Platform application.
Which two of the following actions are required to create the
mobile app? (Choose Two)
a. Set up push notifications for developers.
b. Configure the mobile application access in Dev Studio.
c. Configure access to the Pega Mobile Build Server.
d. Create a certificate set
52.What three ways can a developer designate a rule as a relevant
record? (Choose Three)
a. Create the rule in App Studio
b. Add the rule to a production ruleset
c. Create the rule in Dev Studio
d. Add the rule on the Application Inventory Landing Page
e. Mark the rule as relevant record
53. Consider the following requirement: An auditing policy explicitly
requires that employees cannot see the contents of complaints
made against themselves.
Which security solution do you use to satisfy the requirement?
a. Access control policy
b. Access deny
c. Access of Role to Object
d. Access when
54. In the Answer area, drag each mobile application solution on the
left to the correct scenario
SDK Application --- Globo bank wants to build a mobile app of
its pega platform application to embed in its mobile app
Signed Application --- Metro bank wants to build a mobile app
for distribution on Android and iOS app stores
Unsigned Application --- Local bank wants to build a mobile app
for a pega platform application, but developer certificates
cannot be distributed to app developers
55. The MyCoSelfService ruleset contains the following instances of
the same rule. The only differences between the instances are the
circumstance settings and ruleset version. All ruleset versions are
in the ruleset list.
Ruleset Version Circumstance
01-01-01
None
01-01-02
.country = japan
01-01-03
None; base rule checked
01-01-04
.country = japan
01-02-01
None
Assuming users can access all the ruleset versions, which ruleset
version is chosen by rule resolution when .country = Australia?
a. 01-02-01
b. 01-01-01
c. 01-01-02
d. 01-01-03
56. Which three approaches are valid for improving activity
security? (Choose Three)
a. Select the activity type to limit which rule types can call
the activity.
b. Limit the activity to calling activities of the same Apply to
class.
c. Configure the activity to require authentication to
prevent unauthorized use.
d. Configure the activity to restrict individual parameters to
authorized users.
e. Apply a privilege to the activity to restrict the activity to
authorized users
57. A budgeting application uses a job scheduler to automatically
email customers once a week with a breakdown of their weekly
expenses. Due to the international usage of the application,
stakeholders require peak performance at all hours.
Which solution addresses this performance concern?
a. Dedicate and classify a node for the job scheduler.
b. Ensure customers use a common access group.
c. Configure the job scheduler to run at off-hours.
d. Limit the number of operators who access the application.
58. An application includes the following set of circumstanced
instances of a decision table.
Class
MyCo-AccountManage-WorkAccountOpen
MyCo-AccountManage-WorkAccountOpen
MyCo-AccountManage-WorkAccountOpen
MyCo-AccountManage-WorkAccountOpen
MyCo-AccountManage-WorkAccount Open
Ruleset
Account
Manage
Ruleset Version
01-01-01
Circumstance
None
Account
Manage
01-01-05
.Status=”Silver”
Account
Manage
01-01-05
.Status=”Gold”
Account
Manage
01-01-15
.Status=”Platinum”
Account
Manage
01-01-15
.Status=”Silver”
You update the application and increment the Account Manage
ruleset version to 01.02-01. As part of this update, the circumstance
.Status="Silver" is no longer needed by the application. How do you
implement this change?
a. Create a new version of the circumstanced decision table in
Account Manage: 01-02-01 and set the availability of the
rule to Withdrawn.
b. Do nothing. Rule resolution does not consider rules in a lower
minor version of a ruleset.
c. Create a new version of the circumstanced decision table in
Account Manage:01-02-01 and set the availability of the rule
to Blocked.
d. Create a new version of the circumstanced decision table in
Account Manage: 01-02-01 and select the Base rule option.
59. The Account manage ruleset contains the following versions of
a SLA named ReviewAccountChange:
Class
MyCo-AccountManage-Work
MyCo-AccountManage-Work
MyCo-AccountManage-Work
MyCo-AccountManage-Work
MyCo-AccountManage-WorkAccount Open
MyCo-AccountManage-WorkAccount Open
MyCo-AccountManage-WorkAccount Open
Ruleset Version
01-01-01
Circumstance
None
01-01-05
.Status=”Silver”
01-01-05
.Status=”Gold”
01-01-05
.Status=”Platinum”
01-01-05
.Status=”Silver”
01-01-05
.Status=”Gold”
01-01-05
.Status=”Platinum”
The application is being updated with a new patch version of the
AccountManage ruleset. As part of the update, the service level is no
longer specialized for AccountOpen cases. In the updated ruleset, the
circumstancing in the class group applied to all cases types.
Which option do you use to reset the circumstancing for the
AccountOpen case type?
a. Copy the non-circumstanced rule to the AccountOpen class
and select the base rule option
b. Block the circumstanced rules in the AccountOpen class
c. Make the circumstanced rules in the AccountOpen class
unavailable
d. Withdraw the circumstanced rules in the AccountOpen class
60. You perform a major skim on the ruleset ABC:02-02 to ABC:0301
In the Answer area, select the ruleset versions that the skim
operation uses.
Answer Area:
Ruleset Version
Does the Skim operation use the ruleset version?
01-01-01
02-01-01
02-02-01
02-01-05
No
yes
yes
Yes
61. The ruleset list for an application consists of the following
rulesets, ordered from highest to lowest:
SelfService: 01-01
TGB-HR:01-01
TGB:01-01
A rule with an Apply to: class of TGB-HR-SelfService-WorkTimeOff references a rule named ConfirmationRequest. The four
instances of Confirmation Request in the rules cache are shown
in the following table.
ApplyTo
TGB-HRSelfService-Work
TGB-HRSelfService-WorkTimeOff
TGB-HRSelfService-WorkTimeOff
TGB
Ruleset:Version
SelfService:01-0101
SelfService:01-0101
Availability
Available
SelfService:01-0102
Withdrawn
TGB:01-01-02
Available
Available
Which is chosen during the rule resolution?
a.TGB .Confirmation Request (TGB:01-01-02)
b. TGB-HR-SelfService-Work-TimeOff .Confirmation Request
(SelfService: 01-01-01)
c. TGB-HR-SelfService-Work
.Confirmation
Request
(SelfService: 01-01- 01)
d. TGB-HR-SelfService-Work-TimeOff .Confirmation Request
(SelfService: 01-01-02)
62. Drag the application integration methods on the left to the
appropriate use cases on the right.
Answer Area
CUSTOM API ---- Frequent blood donors' contact information is
third-party marketing firm to provide the donor incentives and
reminders.
PEGA API --- Each night, the list of expired items in a food
warehouse is sent to a work group to pull item shelves.
CUSTOM API --- A third-party benefits provider receives a list
client of employees with qualifying life events, marriage or
adoption.
PEGA API --- A company identifies customers who are >90
invoices. The customer data is sent to the c department for
63. Place the steps in the order in which a service process a requests
Answer Area
a. Inbound request received
b. Map inbound data
c. Request processing
d. Map outbound data
e. System returns a response
64. Which three options do you consider when creating a postprocessing data transform? (Choose Three)
a. The effect if the flow action is reloaded
b. The potential reuse of the flow action
c. The sequence in which the system runs different actions
d. The timing of the commit for the flow action
e. The security setting for the data transform
65. A global application with infrastructure nodes located
throughout the world requires certain operations to start executing
at midnight GMT.
Select two possible designs for this use case. (Choose Two)
a. Use the Queue-For-Processing method in an activity and
design a standard queue processor.
b. Use the Queue-For-Processing method in an activity and
design a dedicated queue processor.
c. Use the Run in background step in the case life cycle and
design a standard queue processor.
d. Use the Run in background step in the case life cycle and
design a dedicated queue processor.
66. You have identified an activity that does not perform well. You
need to find out exactly which steps in the activity are causing the
poor performance.
Which tool allows you to identify the cause of the performance
issue?
a. Database Trace
b. Performance Analyzer (PAL)
c. Performance profiler
d. Tracer
67. The Static Assembler is used to address rules assembly issues
due to which cause?
a. The application record lists several branch rulesets.
b. The server is managing a large number of rules caches.
c. Access groups contain multiple production rulesets.
d. A new application is migrated to the production system
68. Which two statements about keyed data pages are true?
(Choose Two).
a. A keyed data page can be any structure except a list.
b. A keyed data page can have multiple keys.
c. A keyed data page can return multiple embedded pages
d. A keyed data page supports editable data pages only.
69. Which two statements are true about configuring Pega Web
Mashup? (Choose Two)
a. Use the Integration wizard to generate mashup code for use in
other systems
b. Add a list of trusted domains to the application that contains the
mashup.
c. Keep the original names of default actions in the mashup code to
prevent security risks.
d. Use action objects to transfer data between gadgets in a mashup.
70. Drag the Enterprise Class Structure (ECS) layers on the left to the
appropriate classes and associated rules on the right
Answer Area
1. Implementation
application
- Assets customized for a specific
2. Division
- Icons and control formatting unique
to a specific line of business
3. Organization
external systems
- Assets to enterprise data in
71. Which statement is true about services?
a. Services may process outbound requests.
b. Services may use a listener that runs in the background.
c. Services require a REST connector to function.
d. Services return all data in XML format.
72. A Pega Platform application has just been integrated with an
external data source. Which of the following tests do you perform
to ensure that the integration passes data as expected?
a. Performance test.
b. Scenario Test
c. Unit Test
d. Automation Test
73. Which two statements about Application Settings are true?
(Choose Two)
a. You
edit
Application
Settings
on
the
D_pxGetApplicationSettingValue data page.
b. Application Settings can have a Value type of text, boolean,
enumerated list, or class.
c. Application Settings require updating integration rules and
data instances for each environment.
d. Using categories, a developer can group related Application
Settings.
74. Which two statements about guardrails are true? (Choose
Two).
a. A product owner creates all the guardrails for the application
design.
b. Pega Platform performs guardrail examination when a rule is
checked out.
c. A guardrail warning indicates the severity of an error.
d. Each rule may have multiple guardrail warnings
75. The ruleset list for an application consists of the following
rulesets, ordered from highest to lowest:
SelfService: 01-01
TGB-HR:01-01
TGB:01-01
A rule with an Apply to: class of TGB-HR-SelfService-WorkTimeOff references a rule named EnterTimeOffDates. The four
instances of EnterTimeOffDates in the rules cache are shown in
the following table.
ApplyTo
Ruleset:Version
Availability
TGB-HRSelfService-Work
TGB-HRSelfService-WorkTimeOff
TGB-HRSelfService-WorkTimeOff
TGB
SelfService:01-0101
SelfService:01-0101
Available
SelfService:01-0102
Blocked
TGB:01-01-02
Available
Available
Which is chosen during the rule resolution?
a. TGB-HR-SelfService-Work-TimeOff . EnterTimeOffDates
(SelfService: 01-01-02)
b. TGB-HR-SelfService-Work-TimeOff . EnterTimeOffDates
(SelfService: 01-01-01)
c. TGB-HR-SelfService-Work
.
EnterTimeOffDates
(SelfService: 01-01- 01)
d. TGB . EnterTimeOffDates (TGB:01-01-02)
76. Consider the following requirement: Customers can review only
their own credit report
Which security solution do you use to satisfy the requirement?
a. Access of Role to Object
b. Access Deny
c. Access group
d. Access Control Policy
77. A report needs to list the user ID of the manager of the operator
who creates a time-off case. The report provides information from
the MyCo-Orders-Work-Ship and Data-Admin-Operator- ID classes.
Which two options independently satisfy the business outcome?
(Choose Two)
a. Configure a class join on the fulfillment report definition to join
operator information to each case.
b. Use an association rule to join operator information to each case
to populate the Fulfillment report
c. Add the operator ID to the report definition as a parameter.
d. Specify both classes in the Pages & Classes tab on the report
definition.
78. As a best practice, in which situation do you configure a keyed
data page?
a. A short list of delivery options that rarely changes
b. A long list of images that often change
c. A long list of vehicle parts that rarely change
d. A short list of emojis that often change
79. Application settings allow you to
a. Store references to an external system connected to an
application
b. Simulate data in an environment for testing purposes
c. Automate the application migration process
d. Execute connectors in parallel to improve performance
80. Which two configuration are required when adding a Split Join
shape to your case life cycle?(Choose two)
a. Enter a rule that stores the audit note that you want to include in
the audit trail of the subprocess.
b. Define when the parent process resumes processing based on the
status of subprocess or the evaluation of when condition.
c. Configure the context of the subprocess by selecting the current
page, a specific work item, or an embedded page.
d. Link an application to the subprocess to specify information about
the subprocess in the application documentation.
81. Which statement about the relationship between organizational
elements is true?
a. A unit can belong to multiple organizations.
b. A work queue can belong to multiple organization.
c. A work group can have multiple managers.
d. A work queue belongs to a single operator.
82. If a customer reports an issue with their online order, an
Investigation case is created. All assignments for Investigation cases
are higher priority than assignment
Which configuration supports the requirements to have a
greater default urgency on Investigation case assignments?
a. Create a SLA rule and ensure that the assignment is ready
immediately.
b. Create a SLA rule and increase the initial urgency.
c. Configure an optional action to enable manual changes to case
urgency.
d. Increase the initial urgency on the case type settings
83. Multiple teams need to update the same application version
during it development cycle.
Which two actions do you perform so that the teams do not
affect each other’s work?
a. Create a separate production ruleset for each team.
b. Create a new ruleset version for the base application.
c. Create a new application for each team built on the base
application.
d. Create branches in each team’s application
84. An assignment service-level agreement (SLA) is configured with
the following details:
Initial urgency: 15
Assignment ready : Timed delay of 2hr
Goal: 1 hr and increase urgency by 10
Deadline: 2hr and increase urgency by 15
Passed deadline: 1hr, increase urgency by 10, and limit events to
10
Assuming no other urgency adjustments, what is the assignment
urgency 4.5 hr after the case reaches the assignment?
a. 40
b. 50
c. 60
d. 25
85. You configure a child case to override the location strategy of the
parent case. The parent case has a time-out value of one hr. Which
time-out value option is recommended for the child case?
a. The Access time-out value on the child case cannot be changed.
b. Set the Access time-out value equal to the parent case time-out
value.
c. Set the Access time-out value less than the parent case time-out
value.
d. Set the Access time-out value greater than the parent case timeout value
86. Your application is deployed to the cloud. A data source outside
your application populates a data access pattern configuration. You
receive complaint that the system takes a long time to fetch data
each time the case worker accesses information for a different
customer?
Which approach solves this performance issue?
a. Access data page with a predefined key so that, once loaded, data
access is faster.
b. Move to local installation because network traffic in cloud
deployment is often slow.
c. Change snapshot data access method to reference pattern data
access method.
d. Fetch only the targeted data from the database each time is needed
so access is faster
87. A travel reservation servicing case includes a service level for
responding to requests. The service level intervals vary according
to passenger status, class of service, and fare type.
Which implementation satisfies this requirement?
a. Create a single property circumstanced rule.
b. Create a multivariate circumstanced rule and a when rule.
c. Create a single property circumstanced rule and a when rule.
d. Create a multivariate circumstanced rule, a circumstanced
definition, and a circumstanced template.
88. A class group is used to__________________.
a. Assign work to a specific group of users
b. Identify a layer of the Enterprise Class Structure.
c. Combine related properties by usage
d. Associate child classes with a single database table
89. Which three statements about the guardrail score are true?
a. The Application Guardrails landing page counts the number of
rules with severe or moderate guardrail warning.
b. Rules with unjustified warning are not counted in the compliance
score.
c. A weighted compliance score above 90 signifies that an
application is ready for general distribution.
d. Guardrail scores do not include Pega Platform core rules.
e. The Application Guardrails landing page counts the number of rules
with no warnings or caution-level guardrail warnings
90. An assignment service-level agreement (SLA) is configured with
the following details?
Initial urgency: 20
Assignment ready: Timed delay of 1hr
Goal: 5hr and increase urgency by 10
Deadline: 8hr and increase urgency by 20
Passed deadline: 2hr, increase urgency by 20, and limit events to
5
Assuming no other urgency adjustment, what is assignment
urgency 16hr after the case reaches the assignment?
Ans: 100
Download