Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PEGACPLSA88V1 Questions and Answers

Question # 6

The clipboard contains a list of details for all companies on the NASDAQ stock Exchange

select the requirement that indicates you use a page list instead of a page group.

A.

A DATA transform must iterate over the list.

B.

company details must be referenced using the company stock triker.

C.

the list must be sorted by company stock ticker.

D.

Each element in the list of companies must contain a list of accounts.

Full Access
Question # 7

The application contains a property named claimid. You want to business users to reuse this property in any new case types they create. How do you define the claimid property?

A.

As a final rule

B.

As a case level property

C.

As an enterprise class level property

D.

As a relevant record

Full Access
Question # 8

which two of the following action are required to configure your application to support SSO authentication ?

A.

configuring the authentication activity to identify the operator in the system

B.

configure the application record to use external authentication

C.

configure required mapping between LDAP attributes and operator properties

D.

configure model operator records for each access group in your application

Full Access
Question # 9

The following figure depicts a hierarchy of applications that are built on other applications.

Specifically , the productionapp application is built on applications customerapp and

employeeapp. Each of these applications has additional built-on applications, including the duplicated MYEnterpriseApp application, which has two different versions in use. All applications are built on the same version of PegaRUUS.

Full Access
Question # 10

You deplyed a pega web mashup implementation into production and are using IACAuthentication.

which two action ensure that the external authentication module, and not another source, has validated the user?

A.

In the IACAuthentication service, map a passoword attribute form the LDAP server used by the external

B.

In an IAC authentication activity, add a step to idenify the security token provied by the external authentication module.

C.

in the IACAuthentication service, specify the appropriate bind password used by the host system

D.

In an IAC authentication activity, add steps that return the security token to the external authentication module for verification.

Full Access
Question # 11

XYZ, Inc. is multinational software interested in deploying a worldwide application as soon as possible. The application currently does not have requirements that depend on its user’s geographical region. An outside consultant suggested that the application initially be generated with a framework and implementation layer.

Which three questions do you ask to validate the outside consultant’s recommendation? (Choose Three)

A.

Can the framework layer instead consist of multiple built-on applications?

B.

How many languages and locales must the application eventually support?

C.

Is there a reason why this decision cannot be made at a later time?

D.

Is there an intent to market the framework layer to other companies?

E.

What is the name of the first division or region that uses the application?

Full Access
Question # 12

You oversee a medium-size development team, and some of the team members are new to

pega. What are the most efficient ways to ensure that the rules the team creates adhere to

best practices? (choose two)

A.

Have new team members create and run Pega automated unit tests against their rules.

B.

Use Pega Log Analyzer to identify exceptions associated with the new team members.

C.

Run Tracer on each rule the new team members check in to identify an failures in rule execution.

D.

Leverage the rule check-in approval process to review the new team member’s changes first.

Full Access
Question # 13

XYZ Corporation wants to ensure that every attempt by a developer to check a rule into a certain ruleset version is reviewed before that rule is allowed to be checked in. The rule should be automatically sent back to the developer without being checked in if all warnings are not justified and the fields on the history tab are not complete.

How do you address this requirement?

A.

Prior to the first assignment in the ApproveRuleCheckin flow, add a decision shape where one output connector is equivalent to the submitting the SendBack flow action.

B.

Implement a CheckForCustomWarnings activity for each rule included in the requirement. The activity issues a warning whenever the requirement's history tab criteria are not met.

C.

Override the FindReviewers decision tree to invoke a when rule that evaluates the criteria, if the when rule returns true, the decision tree returns SendBack.

D.

Override the SendBack Flow Action adding a pre-ctivity that transfers the assignment to the create operator if the rule's criteria are not met.

Full Access
Question # 14

which two statements are correct with regard to inbound email processing? (choose two)

A.

an incoming email reply is liked to its original case by the case ID in the subject of the email.

B.

when creating a case from an email using the standard service activity, email attachments are automatically added as case attachments.

C.

custom configuration is required to handle automatic reply and delivery status notifications.

D.

if an email service executes an action, such as an approval, and the case is locked the email is queued and retried

Full Access
Question # 15

XYZ Corp users are experiencing delays in the application that you suspect is related to the database.

Which two options do you recommend to isolate the issue? (Choose Two)

A.

Write Pega logs to the database server.

B.

Investigate when the database is used most heavily.

C.

Lower query-time-related alert thresholds.

D.

Increase the threshold for blob-size alerts.

Full Access
Question # 16

You want to create a dynamic system setting to adjust an alert threshold for you application in

Production which three tasks do you perform to configure the DSS record?

A.

specifying the node ID of the system used for performance monitoring

B.

Appending / default to the setting purpose

C.

Setting the owing ruleset tp pega-Engine

D.

Prepending prconfig/ to the setting purpose

E.

setting the owning ruleset to one of the application rulesets

Full Access
Question # 17

A cutomer mobile app is configure to support offline usage if the mobile device is online when is a new case persisted to the server?

A.

when the device synchronize with the server

B.

when the case is assigned to an operator or workbasket

C.

when the first assignment is performed

D.

when the case is created on the device

Full Access
Question # 18

What two features do activities and functions share? (Choose Two)

A.

Ability to be circumstanced

B.

Ability to be parameterized

C.

Ability to be called directly from a decision table

D.

Ability to be versioned

Full Access
Question # 19

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

A.

Use a visible when rule for the properties displaying sensitive information.

B.

Create an access control policy restricting access to the sensitive information.

C.

Configure an access deny rule restricting access to the sensitive information.

D.

Move sensitive information to separate sections and apply a privilege to the sections.

Full Access
Question # 20

A shipping case needs to wait a specific time period before progressing in its flow. The developer is considering using a wait shape or an assignment with an SLA to perform this function.

Identify the two requirements for which a wait shape is the simpler approach. (Choose Two)

A.

Adjust the case urgency when the assignment is created-

B.

Manually step past the waiting point prior to the designated time.

C.

Present a custom UI form to the user while waiting to expire.

D.

Automatically bypass locking when the assignment is created.

Full Access
Question # 21

A slow-running connector must run whenever the status of a case changes.

select the three steps to configure a solution that minimizes the delay experienced by the user

A.

set the execution of the activity to immediately

B.

set the execution of the activity to execute in Background an copy

C.

configure an activity to call the connector

D.

configure a declare trigger to execute when the case is committed

E configure a declare trigger to execute when the status of the case change

Full Access
Question # 22

An agent is associated with the Background processing node type. Several nodes in the cluster are

configured to perform background processing. You need to create an agent that runs every day at

midnight and sends customers an email if their birthday is that day

which two options do you select to configure the agent?

A.

Auto queue management

B.

Advanced for mode

C.

Periodic for pattern

D.

Delay next run of agent across the cluster by specified time period

Full Access
Question # 23

Which of the following Skin rule customizations help satisfy the stated requirements?

A.

Configure the importance field for each column included in a repeating layout.

B.

Configure the Column I ayout and specify how the sidebar appears on tablets and smart phones.

C.

Configure the style for all application field values, paragraphs, and correspondence records.

D.

Configure the Column Layout and specify the width of the sidebar on desktops.

Full Access
Question # 24

users complain of difficulty creating a customer service request through facebook massenger. how do you address this issue?

A.

add approximate matches to the response commands for the channel.

B.

add approximate matches to the create case command (s) for the channel.

C.

change the text analyzer configured for the channel.

D.

add response commands to the channel

Full Access
Question # 25

You are designing a form for an online bookstore to display new arrivals. In the form, the book cover pictures are displayed in a row, like words in a sentence. Once the row reaches the full width of the screen, it wraps around to begin a new row.

Which layout do you use to display the book cover pictures?

A.

Screen layout

B.

Column layout

C.

Dynamic layout

D.

Repeating layout

Full Access
Question # 26

Your application is deployed to the cloud. A data source outside your application populates a data page by using your data access pattern configuration. You receive complaints that the system takes a long time to fetch data each time the case worker accesses information for a different customer.

Which approach solves this performance issue?

A.

Move to local installation because network traffic in cloud deployment is often slow.

B.

Change snapshot data access method to reference pattern data access method.

C.

Fetch only the targeted data from the database each time data is needed so access is faster.

D.

Access data page with a predefined key so that, once loaded, data access is faster.

Full Access
Question # 27

Users in a cloud-based production application report a chronic performance issue that occurs every day between 2:00 P.M. and 4:00 P.M. AH attempts to reproduce the problem in the Development, QA, and Staging environments have failed.

Which two techniques help you troubleshoot the problem? (Choose Two)

A.

Review Performance Alerts and Exceptions in PDC.

B.

Review a Production Tracer Log using SMA.

C.

Review Alerts and Exceptions using PLA.

D.

Review Performance Alerts and Exceptions in AES.

Full Access
Question # 28

Select two ways for queuing an item for a queue p

A.

Use the Queue-for-processing method

B.

Use Utility smart shape

C.

Use Run in Background smart shape

D.

Use the Queue for -agent method

Full Access
Question # 29

Using the information shown in the Class structure, select the correct statement.

A.

Auto must be a subcase of Parking.

B.

Instances of EventBooking and Hosted can be stored in a separate.

C.

EventBooking cannot be a subcase of Auto.

D.

Parking and Auto instances must be stored in the same table.

Full Access
Question # 30

An application include two case types: expense report and purchase requests which two steps are required to enable support for both case type for offline user on a mobile device ?

A.

Configure the application record to enable offline access

B.

Configure the user's access group to enable offline access.

C.

configure both case type to enable offline access

D.

Configure the application to build a custom mobile app

Full Access
Question # 31

Using the information shown in the case structure below, which option is always true?

A.

Resolution of the Event Booking case requires the Parking case to be resolved.

B.

Parking, Weather, and Hotel cases must be instantiated for the Event case to process correctly.

C.

The Weather case can be instantiated without a parent Event Booking case.

D.

The Parking class must inherit from the Event Booking class.

Full Access
Question # 32

set the three security tasks you perform when deploying an application to a production environment. (Choose Three)

A.

Delete the Unauthenticated access group.

B.

Restrict access to ruleset configuration.

C.

Change the Rule security mode setting on the access groups to Deny.

D.

Rename the PRServlet default servlets.

E.

Update standard dynamic system settings.

Full Access
Question # 33

Review the following classes and properties:

A page list property is defined at the class group MyCo-Lending-Work. The property name is .Loans and it is defined as being a page List of class MyCo-data-Loan.

Which three statements are valid? (Choose Three.)

A.

At run time, Loans(1) cloud be of class MyCo-data-Loan-Auto while .Loan (2) is of class MyCo-data Loan Mortgage.

B.

At design time, the system provides a warning since it is not a best Loans practice a page list with an abstract class.

C.

At design time, an architect uses a data warning since it is not a best practice to define a page list of an embedded page at run time.

D.

At run time pages o . Loans can be of either MyCo-data-Login Auto or Myco-Data Loan Mortgage but all pages must be the class.

E.

At run time, a specialized rule in MyCo-Date-Loan Mortgage can be reference through-loans only if referenced in MyCo-Data-Loan

Full Access
Question # 34

Which three approaches arc considered a PegaUnit: testing best practice? (Choose Three)

A.

A test ruleset is placed at the top of an application's ruleset stack.

B.

A test case uses limited assertions.

C.

A test case groups relevant asseitions together.

D.

A test case is not necessary when an error message is the expected result.

E.

A test case focuses on a single area of functionality.

Full Access
Question # 35

You isolated the problem to node 1 of the cluster. You see node 1 goes down shortly after

3:00 p.m. every day with an out-of-memory error. Which two alerts typically precede this

condition?(choose two)

A.

PEGA0004 –Quantity of data received by database query exceeds limit

B.

PEGA0001 – HTTP interaction time exceeds limit

C.

PEGA00017 – Cache exceeds limit

D.

PEGA0002 – Connect operation time exceeds limit

Full Access
Question # 36

A company wants to run the same pega application in its eastern US office as well as its india

office. The eastern united states server runs in the eastern united states time zone. The india server runs in the india time zon. The company wants a process to run in both offices at the same time world-wide once a day regardless of the server's location

How do you efficiently meet this requirement?A. Define two advanced agents that call the same activity. one agent is scheduled to run at a time in the eastern united states time zone and the other agents is scheduled to run at a time in the india time zone. The activity checks both the local time zone and the local time. if the local time is close to the expected time the activity should run it continues otherwise it exits

B. Define two advanced agent that call the same parameterzied activity. One agent passes eastern united states time zone to the activity, and the other agent passes india time zone. The activity checks

the local time zone. if the parameter matches the local time zone, the activity continues. otherwise it exits

C. Define a single adavanced agent that is scheduled to run in any desired time zone. in the Eastern us server modify the agaent schedule to run in the eastern united states time zone. For the india server, specify the india time zone within the agent schedule

D. Define a single advanced agent that is scheduled to run in either the eastern united states zone or the india time zone. Ensure that the clocks with the servers in both offices are synchronized using the simple Network time protocal

Full Access
Question # 37

An application uses LDP authentication users have role and application attributes, but not access group attributes. select the two tasks required to configure the application to uses LDAP attributes to determine the access group for a user

A.

Create a decision table that evaluate role and application properties that return access group

B.

Configure the authentication mapping to evaluate the decision table

C.

Create a decision table that evaluate role and application attribute value that return access group

D.

Add a method to the authentication activity to evaluate the decision table

Full Access
Question # 38

A purchase order application allows users in their work group to read and write purchase

request cases. When the total amount exceeds usd10,000 however, only the work group

manger can read and write the case. Select two configuration that satisfy the

requirement.(choose two)

A.

Add a privilege to the case type class that is conditionally granted when the purchase request amount is less than USD 10.000.

B.

Use a reads access control policy with a condition that verifies the amount is less than USD10.000.

C.

Configure the worklist to only display purchase requests greater than USD10.000 for the work group manager.

D.

Configure conditional access in Access Manager to read and write a purchase request case when the amount is less than USD 10.000.

Full Access
Question # 39

you are writing a report that needs to compute the sum of multipul columns and display the result.

The number of columns to sum varies from report to report but does not exceed five.

which two options can you use to implement this requirement? (choose two)

A.

Develop a SQL function that sums two columns. Recursively apply this function as needed.

B.

implement a declare expression to sum the values and store the result as an additional property.

C.

construct the report to group by the columns to be summed followed by a column that uses SUM.

D.

Develop separate SQL functions for summing two through five columns. use the appropriate function.

Full Access
Question # 40

What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over time? (Choose Two)

A.

Add indexes to all columns.

B.

Purge workparty UUI index tables periodically.

C.

Schedule scripts to maintain frequently fragmented tables.

D.

Purge and/or archive records based on the company's record retention policy.

Full Access
Question # 41

an application to onboard new bank customers create child cases for each account that the

customer opens.

You need to configure a report definition that lists new customer cases created in a given day and the

average opening balance for all account child cases for each customer.

which reporting feature do you use?

A.

association

B.

subreport

C.

class join

D.

declare index

Full Access
Question # 42

You manage a 30-person development team with members located across the globe.

Which Pega Cloud environment best supports the needs of your team?

A.

Large sandbox

B.

Standard sandbox

C.

Large development instance

D.

Preproduction instance

Full Access
Question # 43

An application, created by MyCo, has a number of rules implemented as decision tables that use "Title" as an input as seen in the sample rule below:

MyCo is finding a number of application defects caused by incorrect spellings in the title field. The valid titles are stored as field values. MyCo is requesting options to help prevent these types of errors. Which of the following approaches is most applicable? (Choose One)

A.

Recreate the logic in decision trees and use function aliases to limit the options via a drop down box

B.

Use the table edit of the .Title property to reference the field values, the decision table will then automatically validate that the value is valid

C.

Create a custom rule form that uses harnesses and sections and can be configured however MyCo desires

D.

Create a custom validation rule in the Rule-Declare-DecisionTable class to validate that the .Title property always has a valid value

Full Access
Question # 44

A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director.

In order to allow the three physicians to review the orders in parallel, how would you configure the process?

A.

Add a Split Join shape, add a list of physicians, and call the surgical procedure request process.

B.

Add a Split For Each shape, add a list of physicians, and call the evaluation process.

C.

Add a Split Join shape, add a list of physicians, and call the evaluation process.

D.

Add a cascading approvals shape that is called by the evaluation subprocess.

Full Access
Question # 45

BigCo receives complaints from existing customers and new prospects that BigCo representatives contact them with irrelevant offers and products.

Which two Pega solutions do you suggest to help solve this problem? (Choose Two)

A.

Pega Marketing

B.

Pega Customer Service

C.

Robotic Process Automation

D.

Customer Decision Hub

Full Access
Question # 46

An online sales application supports both laptop and mobile devices. You are configuring the application skin and you notice the responsive layout in the mobile device is not displaying views as stakeholders require.

Which two options allow you to resolve this situation without negatively impacting the laptop users? (Choose two.)

A.

Use the same application skin in all portals.

B.

Update the process to give mobile users a separate portal.

C.

Do not use a skin for the mobile application version.

D.

Adjust the responsive behavior in the skin for optimal viewing in the mobile portal.

Full Access
Question # 47

A security requirement states that personal data should only be visible to managers in the HR

organization. All personal data is contained in a single section.

How do you restrict access to personal data ?

A.

configure a visible when rule on the section

B.

Create an Access control policy restricting access to the properties

C.

Add an Access when to relevent properties.

D.

Define a privilege for the section and add the privilege to appropriate roles

Full Access
Question # 48

You are managing distributed, geographically dispersed, development teams A, B and C. Team A is ready to merge changes into their development environment to make available changes to Team B’s Team C’s.

To ensure all development teams are working with the latest version of shared rule base, select and move all of the following tasks to the tasks List Order column and place them in the correct order.

Full Access
Question # 49

What are two valid reasons for defining a case type within a case type-specific ruleset? (Choose Two)

A.

The ruleset can be added to the ruleset stack for multiple applications.

B.

The case type might be converted to a component application in the future.

C.

A User Story can be associated to a single, fine-grained ruleset within a Branch.

D.

The case type ruleset might be converted to a true component in the future.

Full Access
Question # 50

An application consisting of a single case requires sending correspondence at a designated time with minimal delay. The existing solution uses an assignment to pause the case until an SLA invokes the escalation activity that sends the correspondence. Occasionally there is a delay in sending the correspondence.

Which two factors contribute to the delay? (Choose Two)

A.

The number of queued SI A objects

B.

Multiple open assignments on the same case

C.

Error handling for locked items

D.

Correspondence rule configuration

Full Access
Question # 51

You oversee a medium-size development team. Some of the team members and new to Pega and are working on features in a separate branch.

What are two ways you can ensure that the rules the team creates adhere to best practices? (Choose Two)

A.

Run 1 rarer on each new rule in the branch that new team members check in to identify any failures in rule execution.

B.

Leverage the branch review feature to have senior team members validate the branch contents.

C.

Use Pega Log Analyzer to locate any exceptions in the branch associated with the new team members.

D.

Review the branch quality to identify any rules with guardrail warnings.

Full Access