PEGA LSA Architecture
Answer: False The term component implies that an object has a stable interface and can be tested separately according to published specifications.
(True or False) A component has a stable interface and cannot be tested separately.
Answer: True
(True or False) A component is recursive.
Answer: True
(True or False) A ruleset override application can be constructed without needing to run the New Application Wizard.
Answer: True As a best practice, define routing for every assignment, including the first assignment. This prevents routing issues if the case is routed back to the first assignment during case processing, or if the previous step is advanced automatically via an SLA.
(True or False) As a best practice routing should be defined on every assignment.
Answer: True
(True or False) Do not configure the Dynamic System Settings for a development environment, because they restrict the Tracer tool and other developer tools.
Answer: False In general, lock subcases independently of the parent case unless there is a reason for also locking the parent case.
(True or False) It is a best practice to lock the parent case when processing a child case.
Answer: False Using the GetNextWorkCriteria decision tree for filtering has performance impacts since items are iterated and opened one-by-one. Always ensure the GetNextWork list view performs the main filtering.
(True or False) The GetNextWorkCriteria decision tree should be used to perform the main filtering for the work list view.
Answer: False The Rule Security Analyzer tool helps identify security risks introduced in Non-Autogenerated rules
(True or False) The Rule Security Analyzer tool helps identify security risks on autogenerated rules.
Answer: False Avoid generic names such as Owner and Originator. Generic, non-descriptive role names such as Owner can be subject to change and may not intuitively describe the party's role with respect to the case.
(True or False) Use generic role names when configuring work party rules.
Answer: C In general objects are not specialized infinitely.
A dependency tree has which characteristic? A. Layers are synonymous with unique contiguous sets of levels. B. A level can only reference the previous level. C. The number of items in a level tends to decrease as the level increases. D. Circular references are not allowed within a level.
Answer: A This is the primary goal of the release management strategy. Moving to DevOps facilitates the ability to deliver changes to users quickly.
When defining a release management strategy, what is your primary objective? A. Create a repeatable and sustainable process for ensuring business value is delivered safely and as quickly as possible to end users. B. Implement a process for developers to minimize rule conflicts when merging into a central repository. C. Introduce automated testing into the organization. D. Move the organization to a continuous integration/continuous deployment (CI/CD) model.
Answer: C and D An application that overrides the add-to-list data transform should be able reuse an existing list property and not have to define a new one. An application may want to extend the enterprise data class using the data transform as-is.
A enterprise-level data class has multiple instances that can be selected from a data page sourced repeating grid. The class and ruleset in which the class is defined needs to include a data transform that adds an instance to a list. For extensibility, which two of the following could be implemented? (Choose Two) A. Create a class with "-Extension" appended to the data class name. Save the data transform to that class. B. A look-up Data Page that returns the name of page to use when appending to .pxResults(). C. A look-up data page the returns the class of the page according to the application that adds to the list. D. Provide a uniquely-named, embedded-list property applied to @baseclass that collects the same class.
Answer: C The first implementation application built on a framework application can use ruleset override. This does not require the New Application Wizard to generate.
A rule-override application can be used for which purpose? A. Aggregating multiple built-on applications into a single application B. Defining applications specific to a division within an enterprise C. Creating the first implementation application built on a framework application D. A repository for Dependency inversion-based rules
Answer: A and C The load balancer monitors health of the nodes. The shared storage allows stateful application data to be shared across nodes.
An environment designed for high availability consists of which two of the following components? (Choose Two) A. Load balancer B. Database replication C. Shared storage D. Cloud foundry
Answer: C and D Starting with Pega in the middle allows for a consistent solution to be developed and evolved over time, connecting channels and back end systems to provide an end to end solution. Build for change allows you to build solutions iteratively based on what you know today.
When developing a new Pega application start with ___________ and __________ A. Channel design and work your way into the Pega application B. Integration to systems of record and work your way back into the Pega application C. The Pega application in the middle and work your way out to channels and system of record D. One application at a time base your design on what you know today
Answer: A and D Implementing if / then / else switch-like logic within certain Get Next Work is possible. However, customization of the GetNextWork ListView to accommodate different actors is difficult. Circumstancing is a consistent way to specialize Get Next Work for on particular type of actor.
Choose two ways to customize Get Next Work for a particular type of actor or primary role? (Choose two) A. Override certain Get Next Work activities to react differently according to the operator's work group. B. Define skill names specific to each work group. Set skills on each workbasket assignment according to the work group to which the workbasket is associated. C. Define a workgroup-specific variation for each distinct workbasket purpose. Operator records specify workbaskets that correspond to their work group. D. Circumstance Get Next Work rules based on a text fragment derived from the operator's primary access group.
Answer: B and C Content security policies helps by identifying untrusted sources. Content security policies helps mitigate XSS and data injection attacks.
Content security policies ______________ and ________________. (Choose Two) A. Create an event when security relevant rules are updated B. Protect your browser from loading and running content from untrusted sources C. Help detect and mitigate Cross Site Scripting (XSS) and data injection attacks D. Find common vulnerabilities by searching for matches to regular expressions
Answer: B
When do you set the Rule security mode on the access group to Warn? A. When writing a message in the log file if ABAC overrode the RBAC setting B. When verifying that the access role is configured correctly for rule execution C. When displaying a custom warn message if rule execution failed D. When automatically notifying the system administrator when access is denied to a rule
Answer: D Rebase pulls the most recent commits from the system of record.
When does the developer trigger a rebase? A. When the unit tests has executed successfully for a branch B. When there are no merge conflicts for the branch C. Directly after a branch is published to the system of record D. When a branch has been successfully merged in the system of record
Answer: A Acceptance testing is performed in the continuous delivery stage.
In which stage of the DevOps release pipeline is acceptance testing performed? A. Continuous delivery B. Continuous integration C. Development D. Deployment
Answer: A A Decision shape does not contain properties available on assignments.
Which shape is least likely to cause a problem when removed from a flow already in production? A. Decision B. Subflow C. Assignment D. Split-For-Each
Answer: A and B
Pega's applications include ______________ and _______________. (Choose Two) A. Industry applications B. Customer engagement applications C. Marketing applications D. Artificial intelligence applications
Answer: C
Performing a ____________________ allows you to determine the differences between the features that the Pega application provides and your unique business requirements to support delivery of the minimum loveable product (MLP). A. Sprint review B. Requirements planning session C. Solution implementation gap analysis D. DCO session
Answer: C The Pega Hardware Sizing Estimate team possesses years of experience with sizing multiple and Pega application implementations and developed a sizing algorithm specific to Pega's infrastructure needs.
How do you determine if the existing hardware is sufficient to handle a significant increase in the number cases created in the application? A. Ask the organization's infrastructure team to right size the application to handle modifications to the application. B. Create a request with Pega Support to ask for assistance in recommending infrastructure changes. C. Engage the Pega Hardware Sizing Estimate team to produce a recommended sizing. D. Research hardware sizing estimation tools and choose the tool appropriate for your application server and database.
Answer: C. Client Based
If your application stores data that could be used to identify a person and you are subject to GDPR or similar regulations. Which security model should be used? A. Role-Based B. Attribute-Based C. Client-Based
Answer: A A custom queue table can be accessed by multiple requestors at the same time- some requestors wanting to update records, other requestors wanting to delete records.
In which of the following situations is data locking required? A. When ensuring integrity of a custom queue table B. When a case property uses the Data Page Snapshot pattern C. When initially saving a record to a custom queue table D. When the allow locking check-box is checked within a Data class rule and an instance of the Data class is opened
Answer: B Use the ShowWarningOnForm to define which warnings to show on the rule form.
In which of the following situations would you override the ShowWarningOnForm decision tree? A. To invoke the pxAddGuardrailMessage function B. To display a custom guardrail warning C. To define the criteria for adding custom guardrail warning D. To filter guardrail warnings displayed on the rule form
Answer; C
Out of the following layouts which supports a Tour ID? A. Tree Grid B. Grid C. Dynamic Layout D. Layout Group
Answer: A and B
Pega Platform supports which two in-memory cache management options for multi-node cluster topologies? A. Hazelcast B. Apache Ignite C. Windows D. Oracle
Answer: D The escalation activity in a custom SLA can be used to perform a scheduled task, replacing an agent.
Select the true statement regarding SLAs and Wait shapes. A. Wait shapes completely replace SLA functionality. B. An SLA is a special type of advanced agent. C. Wait shape escalation activity can advance the case in a flow. D. An SLA can be used to replace a custom agent in some situations.
Answer: D Advanced agents must handle their own commits.
Select the true statement regarding agents. A. In a multinode system, standard agents are always preferred. B. An advanced agent cannot be used to process a queue. C. An advanced agent should be enabled on only a single node in a multinode system. D. Commits must be issued in advanced agents activities.
Answer: A and C Background processing always involves separate requestors. Connect-Wait method is used after the Run-in-parallel method to wait for child requestors to complete.
Select the two true statements regarding background processing. (Choose Two) A. Background processing involves separate requestors. B. Locking effects are negated with background processing. C. Connect-Wait method is used to test if background processing for connectors complete. D. Parallel flows are an example of leveraging background processing.
Answer: B and D All case data is readily available to the single case; therefore no replication of data is necessary. All attachments are directly available to the single case and no coding is required to access them.
Select two advantages of using a single case over subcase designs. (Choose Two) A. Subflows can be processed without interruption B. No replication of data is necessary with a single case C. Dependency management between subflows can be leveraged D. All attachments are readily accessible
Answer: A and B
Select two reasons when the AllCoveredResolved ticket is required in conjunction with the wait shape. (Choose Two) A. When different types of subcases are involved. B. When the wait shape is configured as a timer with a duration longer than the duration in which the ticket would be issued. C. When any of the covered subcases are resolved. D. When the wait shape is configured as a timer with a duration shorter than duration in which the ticket would be issued.
Answer: B and D Usability testing is done to collect valuable design data in the least amount of time as possible. The output of usability testing helps identify usability issues. Usability testing validates the ease of use of the user interface design so that time and resources are not spent on developing a poor user interface.
Select two reasons why usability testing is important. (Choose Two). A. Usability testing is done after the application is deployed to production and is used to compute a net promoter score B. Usability testing validates the ease of use of the user interface design C. Usability testing allows project managers to subjectively define the applications usability D. Usability testing is done to collect valuable design data
Answer: A and B An AI solution needs to be trained or coached to arrive at a correct conclusion. Over time, the AI becomes more effective. One of the benefits of AI is that it can take in multiple forms of data, structured or unstructured.
What two key aspects distinguish an AI solution from a robotic automation solution (Choose Two)? A. An AI solution needs to be trained or coached. B. An AI solution takes in unstructured input to help it learn. C. An AI solution replaces manual, repetitive tasks. D. An AI solution must be carefully programmed.
Answer: B and D Highly manual tasks are well suited for a robotic automation solution. Routine tasks are well suited for a robotic automation solution.
Tasks that are best suited for a robotic automation solution are _____________ and _____________. (Choose Two) A. Require analysis B. Highly manual C. Require judgment D. Routine
Answer: A
The primary benefit of using a Pega application is that it allows you to _______________________. A. Get to the minimum lovable product (MLP) faster B. Utilize Pega's artificial intelligence (AI applications more effectively C. Integrate with systems of record for lines of business more easily D. Compete with other industry specific point solutions
Answer: B and C Concurrency testing is synonymous with load testing. Volume testing is synonymous with load testing.
The term load testing is often used synonymously with __________ and __________. (Choose Two) A. Functional testing B. Concurrency testing C. Volume testing D. Unit testing
Answer: A and B The Work Parties rule is evaluated to detect whether an attempt is made to use an unspecified party role as well as to prevent a singular work party role from being added multiple times. Visible-on-entry is accessed to decide whether a party role should be populated prior to the first assignment.
The work parties rule directly facilitates routing decisions when accessed in which two configurations? (Choose Two) A. Accessed when validating which work party roles are allowed to be used and their cardinality B. Accessed when a work party is populated immediately after case instantiation C. Accessed when Organization routing activities are called such as ToWorkGroupManager D. Accessed during Get Next Work to validate whether the operator's primary access role corresponds to a party role.
Answer: C and D There is no need to specify a ruleset in an application that is never used. A new base class does not overlap with previously generated classes. DCR can be used to obtain the name of the correct integration base class to use.
To accommodate changes to integration rules, an LSA __________________ and _______________? (Choose Two) A. Creates new ruleset versions using the existing integration base class. B. Develops custom rules to encapsulate the integration data model thereby the complexity of versioning. C. Versions the application when certain integration rulesets become obsolete. D. Specifies a new versioned integration base class when using a wizard. Use dynamic class referencing (DCR) to get the class name at run time.
Answer: A
Use the _____________ landing page to create and manage components. A. Components B. Application C. Ruleset D. System
Answer: B and D The rule is moved to the CheckInCandidates ruleset. A work item of type Work-CheckInRule is created.
What two things happen if the standard rule check-in approval process is enabled when a rule is checked in? (Choose Two) A. The rule is routed to an approver. B. The rule is moved to a candidate ruleset. C. A notification is sent to the approver. D. A work item is created.
Answer: C Class-based security offers more options for security refinement using multiple cases. Data security increases because subcases only contain data pertinent to their case.
Which statement is true when comparing subcases and subflows? A. Subcases perform better than subflows B. Locking consequences can be ignored with subflows C. Subcases offer more security options than subflows D. Subcases are always preferred over subflows
Answer: A, B, and D
What are the last three stages of usability testing? (Choose Three) A. Compile feedback B. Conduct testing C. Select the testing location D. Select participants
Answer: A, B and D
What are the three basic provider models for how to deploy Pega Platform on the cloud? (Choose Three) A. Customer Managed Cloud B. Partner Managed Cloud C. Cloud Foundry D. Pega Cloud
Answer: A and D When adding new users to the application, each user's clipboard takes up a certain amount of memory. Depending on how many active users are in the application and how often garbage collection occurs, that memory may not be available for other application processes. The sizing recommendation is likely to increase the number of connections available in the connection pool for the application.
What are two consequences of adding a large number of new users to your application without evaluating the hardware infrastructure to support those users? (Choose Two) A. Overall application performance can degrade. B. There is no impact. The application resizes automatically to handle the new load. C. Application security configuration is harder to maintain. D. The connection pool for your application may not be sufficient to handle the number of concurrent users and background processes.
Answer: A and C Evaluate that applications are fit for the Pega Express program Establish a center of excellence (COE) for the organization
What are two key initiatives to ensure the successful adoption of Pega Express? (Choose Two) A. Evaluate that applications are fit for the Pega Express program B. Strive towards a decentralized project validation and approval model C. Establish a center of excellence (COE) for the organization D. Ensure business users are technically self-sufficient before starting a project
Answer: A and B This is a benefit of using a data warehouse You can focus on using Pega for reporting on throughput data.
What benefits do you gain by leveraging a data warehouse coupled with Pega reporting? (Choose Two) A. You can use reporting tools suited for trending and data analysis. B. You can focus on using Pega for reporting on throughput data. C. You can purge cases from your database along with the data warehousing process. D. You can use BIX to export cases to a database, a comma separated file, or XML format.
Answer: A An explain plan describes the path the query takes to return a result set. This technique can help you determine if the database is taking the most efficient route to return results.
What database tuning technique do you use to determine if the database is taking the most efficient route to returning results? A. Run explain plans on your queries B, Partition the database tables C. Create table indexes D. Perform a load test
Answer: D
What feature in the Pega Platform supports the pull routing paradigm? A. ToWorklist B. GetNextAssignment C. ToCurrentOperator D. GetNextWork
Answer: A
What is the name of the decision tree that controls the rule warnings shown on the rule form? A. ShowWarningOnForm B. pyShowWarningOnForm C. pzShowWarningOnForm D. pxShowWarningOnForm
Answer: C
What is the name of the function used to add a rule warning to a rule form? A. @baseclass.AddGuardrailMessage B. @baseclass.pzAddGuardrailMessage C. @baseclass.pxAddGuardrailMessage D. @baseclass.pyAddGuardrailMessage
Answer: D Push routing occurs either immediately after case creation or when the FinishAssignment activity is executed during case processing.
What is the primary difference between push routing and pull routing? A.The behavior of push routing is configured in Rule-System-Settings, and pull routing is not. B. Push routing activity names begin with "To," and pull routing activity names begin with either "Get" or "Find." C. The security type value for push routing activities is ROUTE, and the security type value for pull routing activities is ACTIVITY. D. Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing.
Answer: D This is the primary reason for starting the security design early. Security requirements can be complex, and identifying the organization's security standards early to make sure they are woven into your application design is crucial.
What is the primary reason for designing the security model as early as possible? A. To quickly address any warnings you see in the Rule Security Analyzer B. To start your team on building access role, privileges, and attribute-based controls C. To begin penetration testing as early as possible D. To ensure you account for and design to the organization security standards and legal requirements
Answer: A and B Pega Express allows new users to quickly be productive. Rapid construction of new application concepts
What two benefits does Pega Express provide? (Choose Two) A. An easy-to-use development environment designed for new users B. Rapid construction of new application concepts C. Quick creation of enterprise assets D. Support for scenario testing
Answer: C, D, and E
Which three of the following approaches are valid ways to extend rules in Pega Platform? (Choose Three) A. Organization hierarchy B. Dynamic class referencing (DCR) C. Circumstance D. Ruleset E. Class
Answer: B and C Always consider vulnerabilities inherent from the application programming language and underlying platform. It is important to consider the user inconvenience of a security feature.
When implementing a security requirement, it is important to _____________________ and _____________________. (Choose Two) A. Only change default settings if absolutely necessary B. Understand vulnerabilities inherent from the application programming language and underlying platform C. Consider the cost for the users D. Consider if the requirement can be implemented using ABAC instead of RBAC
Answer: A
When is access granted if both RBAC and ABAC are configured in an application? A. Access is only granted if both RBAC and ABAC evaluate to true. B. Access is granted when RBAC evaluates to true as it overrides ABAC. C. Access is granted if ABAC evaluates to true unless an Access Deny restricts access. D. Access is granted when ABAC evaluates to true as it overrides RBAC.
Answer: B and C
When would you use the client-server cluster topology (Choose 2)? A. In a single node environment B. Cluster instability C. In Large production environments that consist of more than five cluster nodes D. In a dev environment
Answer: B
Where are the settings specified on the user's operator record applied when getting the next assignment? A. GetNextWork B. getContentForGetNextWork C. getContent D. findAssignmentInWorkbasket
Answer: D
Where would you place the CheckForCustomeWarnings activity to add a custom warning for an activity? A. @baseclass B. Rule- C. Data- D. Rule-Obj-Activity
Answer: A
Which PEGA Alert identifies a query exceeds the threshold? A. PEGA0005 B. PEGA0001 C. PEGA0004 D. PEGA0002
Answer: B. pyRuleExecutionMessagesLogged
Which activity below can be used to determine the privileges required by logged rules using an Access Deny rule type? A. pzRuleExecutionMessagesLogged B. pyRuleExecutionMessagesLogged C. pzAccessDenyRulePrivileges D. pyAccessDenyRulePrivileges
Answer: B
Which activity is used to create custom rule warnings? A. pyCheckForCustomWarnings B. CheckForCustomWarnings C. pzCheckForCustomWarnings D. pxCheckForCustomWarnings
Answer: A and C A new division of users brings more traffic to the application. Depending on the number of users, this addition may impact the performance of the application. Request a sizing estimate in this situation. Exposing a new case type on an organization's website results in many instances of this case type. Depending on the complexity of the case type, this addition could have database impact. Request a sizing estimate in this situation.
Which application changes cause you to request a hardware sizing estimate? (Choose Two) A. Adding a new division of users to your application. B. Replacing an existing web SOAP call with a REST call. C. Introducing a new case type into your application exposed by Pega Web Mashup in the organization's public facing website. D. Modifying a process flow to include a split for each shape.
Answer: B Logging in the virtual users before each action is not how real users behave.
Which of the following options compromises a performance test? A. Run a first use assembly before the test starts B. Logging in virtual user before each interaction C. Including think times D. Switching off virus-checking
Answer: E and F
Which of the following rules does not support the Pega unit test functionality (Choose two)? A. Flows B. Strategies C. Data Pages D. When E. Report Definitions F. Sections
Answer: C A best practice is for the COE to maintain integration and data model rules across applications to promote reuse and consistent implementation of the industry foundation data model and integration rules.
Which of the following statements is true regarding the mapping of data from a system of record to an industry foundation data model? A. Every property retrieved from an interface must be mapped to the business data model before an application can go live. B. Maintaining a data dictionary is a wasteful use of team resources. C. Leveraging a Center of Excellence (COE) can ensure consistent implementation of the industry foundation data model. D. The mechanics of how data is mapped is the LSA's primary concern.
Anwer: A, C, and E The application repository stores the application archive for each version. The automation server orchestrates and manages the actions. The system of record is the shared development environment.
Which of the following three components are needed to support a DevOps release pipeline? (Choose Three) A. Application repository B. Virtual server C. Automation server D. Enterprise service bus E. System of record
Answer: C and D A matrix helps you understand how different roles use specific reports and discover if there is overlap. Making an inventory lets you see the information needs that drive the organization's reporting requirements.
Which of the following two actions do you perform when you begin developing your reporting strategy? (Choose Two) A. Install the BIX product B. Optimize the properties in all the reports C. Create a matrix categorizing the user roles and reports each role uses to make business decisions D. Inventory the reports the organization currently uses
Answer: C and D Share business assets across applications Manage reusable assets through a center of excellence (COE)
Which of the following two options are best practices in Pega Express? (Choose Two) A. Avoid Pega Express for DCO session B. Create reusable IT assets using Pega Express C. Share business assets across applications D. Manage reusable assets through a center of excellence (COE)
Answer: C and D
Which of the following two statements are correct with regard to the hardware sizing estimation service offered by Pega? (Choose Two) A. There is no need to make use of this service if a cloud is used. B. The service is aimed at production environments only. C. Events such as adding new case types require a new hardware estimate. D. Sizing estimates can be applied at any point of the project.
Answer: A and D The definition of a component is recursive. A component has a stable interface.
Which of the following two terms are associated with the term component? (Choose Two) A. Recursive B. Framework C. Ruleset D. Interface
Answer: A. Client Based
Which security model allows you to track and process requests to view, change, remove, and restrict the use of personal data, and to show auditors that you have done so. A. Client-Based B. Role-Based. C. Attribute-Based
Answer: A, B, D A built on application can be designed to be self-testable. A component's individual rules can be unit tested but cannot test itself. Use a built on application if you want to extend a case type. A built on application can contain a PegaUnit ruleset and support creation of PegaUnit test case and suite rules. A component by itself cannot place test case and suite rules in a PegaUnit ruleset.
Which three of the following features are available in a built on application and are not available in a component? (Choose Three) A. PegaUnit test creation B. Extendable case types C. Integration rules D. Self-testable E. Pega Exchange publishing
Answer: A, C, and D One of the outcomes of usability testing is to document recommended improvements. Identifying key tasks to test is an important part of usability testing. Usability testing must involve the users of the application to be effective.
Which three of the following steps are part of usability testing? (Choose Three) A. Documenting the recommendations needed to fix the issue. B. Locking the ruleset before usability testing. C. Putting together a list of tasks that needs to be tested. D. Identifying the users of the application.
Answer: B and D Use new capability introduced in Pega Platform for better client-side performance. Layout Groups are the official replacement in Pega Platform for legacy tabs. Legacy Tabs run in quirks mode. This is slower and not HTML 5.0 compliant.
Which two Pega features can help improve the user experience? (Choose Two) A. Smart layouts B. Repeating dynamic layouts C. Panel sets D. Layout groups
Answer: A and D The BPO model requires a multitenant deployment. You have requirements to use message driven beans (MDB) to deliver messages from a system of record to the Pega application.
Which two business requirements impact how you deploy your application? A. You have requirements to support a business process outsourcing (BPO) model for your organization. B. You have requirements to start application development in Pega Cloud, and then move your application to an on-premise production environment. C. You have requirements for case types to participate in a distributed architecture through microservices. D. You have requirements to use message driven beans (MDB) to deliver messages from a system of record to the Pega application.
Answer: B and C
Which two configuration approaches differentiate Get Next Work behavior for different actors without modifying Get Next Work related rules? (Choose two) A. Override one or more GetNextWork related Rule-System-Setting rules. B. Increase case urgency prior to a workbasket assignment. C. List workbaskets in specific order on operator records. D. Implement a button that actions open assignment, the key for which is supplied by a Data Page.
Answer: C and D A subsumptive hierarchy is synonymous with is-a relationships. A compositional hierarchy is where a thing is the sum of its parts, its parts also cable of being compositions.
Which two hierarchy types are applicable to object-oriented programming inheritance? (Choose Two) A. Programmatic B. Layer-based C. Subsumptive D. Compositional
Answer: C and D
Which two of the following are key responsibilities of a COE? (Choose Two) A. Lead application development efforts B. Provide support to the LSA on the project C. Identify new opportunities in the organization D. Manage and promote reusable assets
Answer: B and D This option provides a sub-report is used to isolate the correct version to use. A custom rule is inherently versionable.
Which two of the following are ways to version data? (Choose Two) A. Define report definitions with sub-reports that filter on MAX pxUpdateTime. B. Add a property such as an as-of date or monotonically increasing version. Filter based on values. C. Remove existing instances before deploying data. D. Define a custom rule.
Answer: B and D Of the five main (object-oriented programming) OOP development principles, the open-closed principle is the most directly related to extensibility. The Template design pattern embodies the concept of layering.
Which two of the following design approaches are most closely related to the concept of application layering? (Choose Two) A. Polymorphism B. Open-closed principle C. Liskov Substitution D. Template design pattern
Answer: A and B The Rule security analyzer checks for vulnerabilities in hand-crafted Java code. The Rule security analyzer checks for vulnerabilities in hand-crafted stream rules.
Which two of the following security risks can be identified by the Rule security analyzer? (Choose Two) A. Hand-crafted Java code B. Vulnerabilities in stream rules C. Unsecured rulesets and unlocked ruleset versions D. Properties with incorrect type
Answer: B and C
Which two of the following statements are correct with regard to server crashes? (Choose Two) A. The entire clipboard is recovered. B. The UI is redrawn. C. Data not committed is lost. D. The user must reauthenticate.
Answer: C and D Use AES to monitor the health of your application. Use PLA to analyze the contents of application and exception logs.
Which two of the following tools are useful when assessing the quality of an application? (Choose Two) A. BIX B. System Management Application (SMA) C. Autonomic Event Services (AES) D. PegaRULES Log Analyzer (PLA)
Answer: B and C Ideally, the same development team is not charged with developing two layers simultaneously. One application delivery should precede the other application based on versioning in the same fashion that ruleset versions are used to upgrade the same application within a progression of environments (development, QA, UAT, Production). Rules specific to a government agency typically cannot be applied to other government agencies. The components used to build a government agency application could be shared with other government agencies.
Which two options are valid reasons for initially creating a single application? (Choose Two) A. The concept of multiple built-on component applications has not been promoted in the past. B. Avoid the development of two application layers simultaneously. C. The application is specific to a single government agency. D. The component application does not need to be tested
Answer: A and B Running connectors in parallel helps complete complex tasks more quickly by running them asynchronously. Deferred data loading can be used to significantly improve the perceived performance of a user interface.
Which two processing options can help improve the user experience? (Choose Two) A. Use deferred data loading B. Run connectors in parallel C. Run processes synchronously D. Avoid requeueing failed responses
Answer: C and D The complexity of dealing with many-to-many relationships is handled by data pages provided with industry foundation. If you need to add new properties, you can add them to the industry model data classes, in your organization level ruleset. You do not have to add new classes, unless the structure of the source data requires that you do so.
Which two statements are true with regard to industry foundation data model (Choose Two)? A. Data pages provided by the industry foundation data model need to be extended for each external integration. B. The industry foundation data model can only be used as a built on application in conjunction with Pega applications. C. Pega's industry foundation data model simplifies the complexity of many-to-many relationships. D. A best practice is to use the industry foundation data model as-is, as much as possible.
Answer: A and D Using the Optimized code layout mode setting in the dynamic layouts Presentation tab helps to reduce markup. Single Page Dynamic Containers over legacy i-frames enables better design and web-like interaction.
Which two techniques can improve performance and the related user experience? (Choose Two) A. Use the Optimized code option for layout mode in dynamic layouts B. Maximize server-side processing C. Minimize client side expressions D. Use single page dynamic containers
Answer: A and C
Which two types of records can be marked as relevant records? (Choose Two) A. Processes B. Activities C. Properties D. Harnesses
Answer: C UI-based functional tests are used to verify end-to-end test scenarios.
Which type of testing is UI based? A. Functional testing B. Unit testing C. Scenario testing D. API testing
Answer: D PDC and AES show insights in the health of Pega applications, but traditional application server and database monitoring tools do not.
Why would you use PDC or AES when the organization already has application performance monitoring tools in place? A. PDC and AES collect alerts and health activity across Pega nodes. B. PDC and AES are available both on premise and in the Pega Cloud. C. PDC and AES provide the ability to stop and start agents, listeners, and manage requestors. D. PDC and AES show insights into the health of the Pega application.
Answer: B and D Both RBAC and ABAC must be true for access to be granted. Access Deny rules ensure that access is denied across roles in an Access Group.
You have an access group with two access roles with conflicting access privileges. Which two configuration options are recommended to ensure that access is denied? (Choose Two) A. Modify the role granting access B. Use ABAC to restrict access C. Create a single role restricting access D. Use an Access Deny to explicitly restrict access
Answer: C Declare indexes allow you to expose embedded page list data.
You have created a set of reports that use large numbers of embedded properties. Which of the following techniques do you use to help improve report performance? A. Run reports against a reports database B. Enable pagination C. Create declare indexes D. Include all rows when joining reports
Answer: D
You want a group of users to view certain properties in a case without being able to open the case. How do you implement the requirement? A. ABAC Property Read action B. RBAC Privilege C. RBAC Read action D. ABAC Discover action
Answer: A The Intelligent Virtual Assistant lets you introduce a conversational UI into your organization, allowing you to deliver contextual and personalized service.
You want to reduce call-center volume and increase customer service representative effectiveness by offloading routine tasks to a chatbot through a conversational UI. Which tool do you choose? A. Intelligent Virtual Assistant B. Robotic process automation (RPA) C. Natural language processing D. Robotic desktop automation (RDA)
Answer: C The application places query results on the clipboard page of the users. If those pages are not managed, your application eventually shuts down with an OOM error.
Your application database server is experiencing out-of-memory (OOM) errors. You suspect that the issue is related to a new report you recently put into production. Which of the following options is the likeliest reason that the report is causing these OOM issues? A. Heavy network traffic B. Unoptimized properties C. Large result sets D. Complex SQL requests
Answer: A and B BIX is likely the best way to extract data from the application server and export it to the data warehouse. A data warehouse may be the best solution if the organization requires heavy trending reporting and business intelligence (BI) reporting.
Your organization uses a large number of business intelligence (BI) reports. Which two approaches would you consider to be good solutions? (Choose Two) A. BIX B. Data warehouse C. Elasticsearch D. Data archive
