Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

In the first step in a case type, the user compares data on a form to the data on a customer account. If the data matches, the case is resolved. If the data does not match, the user advances the case to update the account.

Management only wants a record of the cases that update an account. What two configuration options do you use to implement this requirement? (Choose two.)

A.

Add a Persist Case shape after the first step.

B.

Apply a when condition to the first step to persist only cases requiring updates.

C.

Configure the starting flow to instantiate the case type as a temporary case.

D.

Configure the first step to instantiate the case type as a temporary case.

Full Access
Question # 5

An end user of the application experienced a browser crash while working on a highly available system. Crash recovery is enabled. Does the user to be reauthenticated?

A.

Yes, if the user is directed to the same node.

B.

No, if the user is directed to a different node.

C.

Yes, If the authentication cookie was lost.

D.

No, if the authentication cookie was lost

Full Access
Question # 6

an application provides the user with written instructions for completing a form. How do you ensure that the instuction can be localized without updating the application?

A.

cricumstance the section that describes the form for each language.

B.

add the section to the translation package using the localization wizard.

C.

create a filed value rule for the instruction text.

D.

create a paragraph rule for the instruction text.

Full Access
Question # 7

which two of the following action are required to configure your application to support SSO authentication ?

A.

configuring the authentication activity to identify the operator in the system

B.

configure the application record to use external authentication

C.

configure required mapping between LDAP attributes and operator properties

D.

configure model operator records for each access group in your application

Full Access
Question # 8

Review the following classes and properties:

A field group list is defined at the MyCo-Lending-Work work pool level. The find group list name is Loans: the specified data type is MyCo-Data-Loan.

Which three statements are valid? (Choose Three)

A.

An auto loan application can extend MyCo-Data-LoarvAuto without affecting a sum performed against .Loans C). Amount

B.

At design time, the system issues a warning since it is poor practice to define a field group with an abstract data type ctas%

C.

All pages within the .Loans field group must be the same class, either MyCo-Data-Loan-Aiito or MyCo-Oata-Loan Mortqage

D.

The pxObjClass of any page in the .Loans field group list can be changed at nm time and does not need to be the same class.

E.

A rule In MyCo-DataLoan-Mortgage can only be referenced through -Loans if also defined In MyCo Data-Loan.

Full Access
Question # 9

your application connects to two REST services that list details about bank offices.

One REST service uses a postal code as a GET parameter and returns a detailed list of bank officers in that postal code.

the other REST service uses a city name as a GET parameter and returns a datailed list of back offices in cities with that name. The application uses data pages to cache details about bank offices.

select two options to configure a data page to accept either a postal code or a city name as a parameter and call the appropriate REST connector.(choose TWO)

A.

sourcing data from both rest connectors and using the response data transform to select the correct data

B.

sourcing data from a single REST connector that is circumstanced based on the input parameter

C.

sourcing data from each REST connector separately and using a when rule to select the appropriate data source at run time

D.

sourcing data from an activity that evaluates the parameter to select the appropriate REST connector to call at run time

Full Access
Question # 10

You are using pega express. You want to avoid creating unnecessary case-level properties

and views. Which three actions do you take to accomplish this goal? (choose three)

A.

Define case type views using *\ page, property" syntax for the majority of the- fields.

B.

Drag-and-drop a Field Group when defining a case view.

C.

Create a data type that corresponds to each case type.

D.

Pre-define properties, sections, and relevant records that are applied to Work-Cover'.

E.

Add an embedded Page property to the case type.

Full Access
Question # 11

The following figure depicts a hierarchy of applications that are built on other applications.

Specifically , the productionapp application is built on applications customerapp and

employeeapp. Each of these applications has additional built-on applications, including the duplicated MYEnterpriseApp application, which has two different versions in use. All applications are built on the same version of PegaRUUS.

Full Access
Question # 12

an application to onboard new bank customers create child cases for each account that the

customer opens.

You need to configure a report definition that lists new customer cases created in a given day and the

average opening balance for all account child cases for each customer.

which reporting feature do you use?

A.

association

B.

subreport

C.

class join

D.

declare index

Full Access
Question # 13

You are working with BigCo to create an application for insurance quoting. BigCo is a multinational corporation that has traded on the NASDAQ as BCO. BigCo headquarters is located in the UK, and the company has division for each geographical location.

You expect the application to contain two types of work: Quote and Policy.

The Quote guides the sales preventative through one or more quote with the customer. Each quote must be retained by the system and visible to the sales representative and the manager, any data captured during the quoting process must be available to the Policy case. The Policy represents the accepted insurance quote.

For the next year, BigCo intends to use the insurance quoting application only for the personal insurance business in the United Kingdom, Joe the business experts (SMEs) to understand the quoting process. Joe uses Pega Express to develop the quoting application with the SMEs.

Default application settings are shown in the image.

What two edits do you make to the advanced configuration based on information in the reading passage? (Choose Two).

A.

Deselect ‘’Create demonstration users’’.

B.

Edit the Organization name to BCO.’’

C.

Edit the Organization name to UK’’

D.

Edit the Division name to ‘’UK’’.

E.

Select ‘’Framework’’ as the application structure.

Full Access
Question # 14

when a customer submits a credit card dispute, the application connects to an external service to retrieve all transactions made by the customer. the external service returns transactions ordered by date of transaction, in a descending, chronological order. when a case worker reviews the dispute, the application displays the 10 most recent transactions.

if the case worker does not see the disputed transaction in the list, the case worker can search for additional transactions. the case. the case worker can filter search results on transaction date, the transaction amount or the merchant name the search results display the 10 most recent transactions that satisfy the filter criteria. the case worker cannot paginate through the results.

how do you configure the data page to satisfy all the requirements in the scenario?

A.

create a node-level data page that uses a connector as its source.

B.

create a thread-level data page with parameters that uses a connector as it source.

C.

create a thread-level data page that uses a report definition as its source.

D.

create a node-level data page with parameters that uses a report definition as its source

Full Access
Question # 15

application ABC defines and creates survey cases based on a customer s profile. a second application, ABCproxy, is hosted in a cloud environment. the ABC proxy application creates a survey proxy case on demand from application ABC. The questions contained in the survey case are transferred to the survey proxy case. customers answer questions on the survey using the ABC proxy application. the completed survey information is passed back to the survey case created by application ABC. the company wants to use REST services to accomplish this interface. select and move the three options that are needed to satisfy the requirement to the configuration columns and place.

Full Access
Question # 16

XYZ Corp users are experiencing delays in the application that you suspect is related to the database.

Which two options do you recommend to isolate the issue? (Choose Two)

A.

Write Pega logs to the database server.

B.

Investigate when the database is used most heavily.

C.

Lower query-time-related alert thresholds.

D.

Increase the threshold for blob-size alerts.

Full Access
Question # 17

A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director.

In order to allow the three physicians to review the orders in parallel, how would you configure the process?

A.

Add a Split Join shape, add a list of physicians, and call the surgical procedure request process.

B.

Add a Split For Each shape, add a list of physicians, and call the evaluation process.

C.

Add a Split Join shape, add a list of physicians, and call the evaluation process.

D.

Add a cascading approvals shape that is called by the evaluation subprocess.

Full Access
Question # 18

You are configuring the container settings of a display a title. The title is based on the type of loan requested

Full Access
Question # 19

BigCo receives complaints from existing customers and new prospects that BigCo representatives contact them with irrelevant offers and products.

Which two Pega solutions do you suggest to help solve this problem? (Choose Two)

A.

Pega Marketing

B.

Pega Customer Service

C.

Robotic Process Automation

D.

Customer Decision Hub

Full Access
Question # 20

An online sales application supports both laptop and mobile devices. You are configuring the application skin and you notice the responsive layout in the mobile device is not displaying views as stakeholders require.

Which two options allow you to resolve this situation without negatively impacting the laptop users? (Choose two.)

A.

Use the same application skin in all portals.

B.

Update the process to give mobile users a separate portal.

C.

Do not use a skin for the mobile application version.

D.

Adjust the responsive behavior in the skin for optimal viewing in the mobile portal.

Full Access
Question # 21

A user report poor application performance at 5:00 pm yesterday. which two tools do you use to review the user's session to identify the cause of the poor performance ?

A.

performance profiler

B.

my performance Details report

C.

Alerts log

D.

tracer

Full Access
Question # 22

You oversee a medium-size development team, and some of the team members are new to

pega. What are the most efficient ways to ensure that the rules the team creates adhere to

best practices? (choose two)

A.

Have new team members create and run Pega automated unit tests against their rules.

B.

Use Pega Log Analyzer to identify exceptions associated with the new team members.

C.

Run Tracer on each rule the new team members check in to identify an failures in rule execution.

D.

Leverage the rule check-in approval process to review the new team member’s changes first.

Full Access
Question # 23
A.

Create a new autogenerated button control and alter its caption to support a shortcut key.

B.

Create a new custom burton control that uses an image and uses a fixed width.

C.

Create a new custom text label control set as required and uses relative widths.

D.

Create a new autogenerated link control with a shortcut key and limit its obsolute width.

Full Access
Question # 24

An application consisting of a single case requires sending correspondence at a designated time with minimal delay. The existing solution uses an assignment to pause the case until an SLA invokes the escalation activity that sends the correspondence. Occasionally there is a delay in sending the correspondence.

Which two factors contribute to the delay? (Choose Two)

A.

The number of queued SI A objects

B.

Multiple open assignments on the same case

C.

Error handling for locked items

D.

Correspondence rule configuration

Full Access
Question # 25

You are working on an insurance claims application that receives claims through email. The company receives 500 emails per hour. the insurance company promises a 24-hour response time to receives and verify the clain. After the claim is verified. The system automatically responds with email containing the claim ID.

The application is developed in the Pega cloud environment. The production environment is currently running on premises.

What is your recommendation to ensure that insurance company can meet the 24-hour response time requirement for claims submitted by email?

A.

Recommend the insurance company change its policy to allow for a broader processing window.

B.

Recommend the insurance company use an advanced agent to verify claims and respond.

C.

Recommend the insurance company use an email lister with concurrent threats.

D.

Recommend the insurance company use an MDB listener instead of an email listener.

Full Access
Question # 26

You imported a rule-admin-product (RAP) file that contains new features into a user acceptance testing(UAT) environment. Select the option that ensures basic functionality behaves as expected before inviting users to start acceptance testing.

A.

Create a smoke test suite. Run the test suite using the pre-import process.

B.

Create an ad hoc test suite. Run the test suite using the post-import process.

C.

Create an integration test suite. Run the test suite using the Execute Test REST service

D.

Create a regression test suite. Run the test suite using the automation server.

Full Access
Question # 27

XYZ, Inc. is multinational software interested in deploying a worldwide application as soon as possible. The application currently does not have requirements that depend on its user’s geographical region. An outside consultant suggested that the application initially be generated with a framework and implementation layer.

Which three questions do you ask to validate the outside consultant’s recommendation? (Choose Three)

A.

Can the framework layer instead consist of multiple built-on applications?

B.

How many languages and locales must the application eventually support?

C.

Is there a reason why this decision cannot be made at a later time?

D.

Is there an intent to market the framework layer to other companies?

E.

What is the name of the first division or region that uses the application?

Full Access
Question # 28

An application uses LDP authentication users have role and application attributes, but not access group attributes. select the two tasks required to configure the application to uses LDAP attributes to determine the access group for a user

A.

Create a decision table that evaluate role and application properties that return access group

B.

Configure the authentication mapping to evaluate the decision table

C.

Create a decision table that evaluate role and application attribute value that return access group

D.

Add a method to the authentication activity to evaluate the decision table

Full Access
Question # 29

A call center uses Pega Customer Service. Where does Pega Customer Service fit into the enterprise architecture?

A.

Pega Customer Set vice is the customer and account enterprise service bus.

B.

Pega Customer Service is the customer interaction system of record.

C.

Pega Customer Service is the billing and reporting system of record.

D.

Pega Customer Service is the new customer onboarding system.

Full Access
Question # 30

An application, created by MyCo, has a number of rules implemented as decision tables that use "Title" as an input as seen in the sample rule below:

MyCo is finding a number of application defects caused by incorrect spellings in the title field. The valid titles are stored as field values. MyCo is requesting options to help prevent these types of errors. Which of the following approaches is most applicable? (Choose One)

A.

Recreate the logic in decision trees and use function aliases to limit the options via a drop down box

B.

Use the table edit of the .Title property to reference the field values, the decision table will then automatically validate that the value is valid

C.

Create a custom rule form that uses harnesses and sections and can be configured however MyCo desires

D.

Create a custom validation rule in the Rule-Declare-DecisionTable class to validate that the .Title property always has a valid value

Full Access
Question # 31

When implementing a Next-Best-Action, the customer Lifetime value Threshold is used to __________ for an offer

A.

determine customer eligibility

B.

apply the customer's lifetime value

C.

prioritze high value propositions

D.

prioritize customer

Full Access
Question # 32

You manage a 30-person development team with members located across the globe.

Which Pega Cloud environment best supports the needs of your team?

A.

Large sandbox

B.

Standard sandbox

C.

Large development instance

D.

Preproduction instance

Full Access
Question # 33

You isolated the problem to node ! of the cluster. Y see node 1 goes down shortly «ift

What is the likely cause of the out of-memory error?

A.

At 3:00 P.M., managers view multiple reports displaying open assignments and cases so they can plan work for the following day.

B.

At 3:00 P.M., a robotic process automation runs every day. The mapping of results to each case type horn the automation is CPU intensive.

C.

At 3:00 P.M., a job scheduler is mistakenly configured to run on a single Web Tier node that pulls an increasingly large number of records onto a clipboard page each day.

D.

At 3:00 P.M., a shift change occurs and several users login and display the" work list and dashboard.

Full Access
Question # 34

Six weeks after you deliver your application to production, your users report that the application slows down in the afternoon. The application is almost completely unresponsive for some users shortly after

3:00 P.M. Other users do not experience this problem until later in the day.

You do not have access to the Production environment, but you do have access to AES. The production environment has three nodes and a load balancer.

You need to resolve this issue because a new division of the organization will start using the application next month.

How do you begin your research to diagnose the cause of the reported performance issue?

A.

Look at the performance profile and DB Trace output from each node.

B.

Observe the cluster and node status on the Enterprise Health Console.

C.

Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.

D.

Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Full Access
Question # 35

You isolated the problem to node 1 of the cluster. You see node 1 goes down shortly after

3:00 p.m. every day with an out-of-memory error. Which two alerts typically precede this

condition?(choose two)

A.

PEGA0004 –Quantity of data received by database query exceeds limit

B.

PEGA0001 – HTTP interaction time exceeds limit

C.

PEGA00017 – Cache exceeds limit

D.

PEGA0002 – Connect operation time exceeds limit

Full Access
Question # 36

XYZ Corporation wants to perform extensive analysis on work party information across various case types in near real time. At the same time, XYZ wants to minimize the impact this analysis has on case workers using Pega applications.

Choose two options that would contribute to viable solutions. (Choose Two)

A.

Use Pega API RCST services to update Case and Work Party data in a reports database.

B.

Configure a reports database for the Class Group and Index WorkPartyUri Data Admm DB-Table records.

C.

Define additional database indexes for the Class Group and related Work Party tables.

D.

Use BIX to export Case and related Work Party data to a data warehouse.

Full Access
Question # 37

which of the following things do you need to add to the whitelist for a mobile application to function correctly while offline?

A.

Data transforms invoked by custom javascript

B.

Data paga used to source a drop-down list

C.

Validate rules on an email address field

D.

Filed values used to populate a drop-down

Full Access
Question # 38

An application contains cases which transition though different statuses throughout their life cycle which typically lasts 3 months.

Design a reporting strategy to display the number of cases by status at the end of each month for a 12-month period.

A.

Configure an agent to record monthly case status in a separate table and report on that table.

B.

Configure an activity to generate the data in the clipboard and report using a custom section.

C.

Configure a summary report that leverages sub reports for each month.

D.

Configure a Declare index to record case data to a separate table.

Full Access
Question # 39

Which of the following Skin rule customizations help satisfy the states requirements?

A.

In the Skin rule, configure the importance field for each column included in a repeating layout.

B.

In the Skin rule, configure the Column Layout and specify the width of the sidebar on desktops.

C.

In the Skin rule, configure the Column Layout and specify how the sidebar appears on tables and smart phones.

D.

In the Skin rule, configure the style for all application field values, paragraphs, and correspondence records.

Full Access
Question # 40

XYZ corp has requirement to send an email to every person who has used a certain service in the previous month thanking them for doing business with XYZ. Generating and sending these emails take a certain amount of time XYZ wants these email processed as quickly as possible to avoid interfering with emails sent during business hours.XYZ also wants to ensure that the thank-you email is not sent to the same person twice

Full Access
Question # 41

In the Answer Area, determine where data is stored for each design option.

Full Access
Question # 42

you are configuring authentication for a pega web mashup implementation.

how do you ensure the host system origin is trusted?

A.

in the authentication service JNDI binding parameters, specify the protocol, host, and port.

B.

in the authentication service spaecify the IACAuthverification activity

C.

in the application definition, specify the protocol, host, and port

D.

in the content security policy record specify the website as allowed

Full Access
Question # 43

A company wants to run the same pega application in its eastern US office as well as its india

office. The eastern united states server runs in the eastern united states time zone. The india server runs in the india time zon. The company wants a process to run in both offices at the same time world-wide once a day regardless of the server's location

How do you efficiently meet this requirement?A. Define two advanced agents that call the same activity. one agent is scheduled to run at a time in the eastern united states time zone and the other agents is scheduled to run at a time in the india time zone. The activity checks both the local time zone and the local time. if the local time is close to the expected time the activity should run it continues otherwise it exits

B. Define two advanced agent that call the same parameterzied activity. One agent passes eastern united states time zone to the activity, and the other agent passes india time zone. The activity checks

the local time zone. if the parameter matches the local time zone, the activity continues. otherwise it exits

C. Define a single adavanced agent that is scheduled to run in any desired time zone. in the Eastern us server modify the agaent schedule to run in the eastern united states time zone. For the india server, specify the india time zone within the agent schedule

D. Define a single advanced agent that is scheduled to run in either the eastern united states zone or the india time zone. Ensure that the clocks with the servers in both offices are synchronized using the simple Network time protocal

Full Access
Question # 44

A slow-running connector must run whenever the status of a case changes.

select the three steps to configure a solution that minimizes the delay experienced by the user

A.

set the execution of the activity to immediately

B.

set the execution of the activity to execute in Background an copy

C.

configure an activity to call the connector

D.

configure a declare trigger to execute when the case is committed

E configure a declare trigger to execute when the status of the case change

Full Access
Question # 45

XYZ corp expects managers to create a variety of reports. Those reports are always based on the same set of classes, but every report does not use every class in the set.

to simplify report creation for managers, you create________________________

A.

numerous sample reports showing how to join the classes

B.

association rules for the classes in this set

C.

a template report with every class join predefined

D.

a declare trigger that restricts report class joins to this set

Full Access
Question # 46

You are configuring the container setting of a section to display a title. The title is based on the type of loan requested. The section has a parameter defined named Loantype

Full Access
Question # 47

You are designing a case life cycle to process fraudulent charge claims. After a list of suspected fraudulent charge is submitted, the case advances to the processing stage. In the first step of theprocess fraud claim process, a seprate child case must be created for each suspected fraudulent charge.

After all necessary fraudulent charge cases are created, the parent cse advance to the next step where the customer is notified that their claims are being processed

choose three actions needed to configure the missing step so that a separate child case is created for

each fraudulent charge selected

A.

Add a customer split for each process step to the cse life cycle and configure it ti create child cases.

B.

configure data propagation to map property value between the parent and clid cases.

C.

add a create case smart shape to the case life cycle and configure it to be created a case

D.

add a create case smart setup to the cse life cycle and configure it to creare child cases

E.

use a page list property to store the fraudulent claim items and identify the number if child cases to create

Full Access
Question # 48

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

A.

Use a visible when rule for the properties displaying sensitive information.

B.

Create an access control policy restricting access to the sensitive information.

C.

Configure an access deny rule restricting access to the sensitive information.

D.

Move sensitive information to separate sections and apply a privilege to the sections.

Full Access
Question # 49

You review and tune the agent configuration on a production system since some default

agents----------------and--------------.(choose two)

A.

Are not necessary for every application.

B.

require an agent schedule record

C.

Should never run in a production environment.

D.

need to be registered with the master agent

Full Access
Question # 50

How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?

A.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg-HRWork-RFP

B.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

C.

Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

D.

Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools

Full Access
Question # 51

set the three security tasks you perform when deploying an application to a production environment. (Choose Three)

A.

Delete the Unauthenticated access group.

B.

Restrict access to ruleset configuration.

C.

Change the Rule security mode setting on the access groups to Deny.

D.

Rename the PRServlet default servlets.

E.

Update standard dynamic system settings.

Full Access