Winter Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

An application include two case types: expense report and purchase requests which two steps are required to enable support for both case type for offline user on a mobile device ?

A.

Configure the application record to enable offline access

B.

Configure the user's access group to enable offline access.

C.

configure both case type to enable offline access

D.

Configure the application to build a custom mobile app

Full Access
Question # 5

You are configuring the container settings of a display a title. The title is based on the type of loan requested

Full Access
Question # 6

MyMealth Corporation wants to use the age of the claim to increase the urgency on the assignment so that claims processors work on the most urgent claims first. The claim assignment urgency increases by 1 each day the claim remains in an unresolved status. At any time. My Health has up to 10,000 claims in process. Claims in the PendingProcessing workbasket are subject to this calculation. The application updates the claim urgency daily before the work day begins. AM claims are processed within 30 days.

MyHealth also processes complaint cases from health plan members. Complaint cases use a service level agreement (SLA) to ensure the customer service representatives respond to complaints within 48 hours. All claims processors work in Los Angeles 9:00 AM-5:OQ PM PST.

Which approach satisfies the claim urgency requirement and provides the best experience for the claims processor?

A.

Use an advanced agent on a dedicated node to increment the pyUrgencyAssignAdjust value by 1 for every assignment that matches the selection criteria.

B.

Use the assignment SLA to increment the pyUnjerncyAssiqnAdjust value by 1 every day the claim is in an open status.

C.

Use a declare expression to increment the pytJrgcncyAsp/gnAdjur.t value to 1. When a claim processor opens the assignment, the urgency is increased by 1.

D.

Use the overall SLA to increment the pyUrgencyAssignAdjust value by 1. Reset the goal date to the following day

Full Access
Question # 7

A shipping case needs to wait a specific time period before progressing in its flow. The developer is considering using a wait shape or an assignment with an SLA to perform this function.

Identify the two requirements for which a wait shape is the simpler approach. (Choose Two)

A.

Adjust the case urgency when the assignment is created-

B.

Manually step past the waiting point prior to the designated time.

C.

Present a custom UI form to the user while waiting to expire.

D.

Automatically bypass locking when the assignment is created.

Full Access
Question # 8

A pega application has cases that represent customer accounts each with many members.

When a member of a customer account registers with the application through an offline

component, a related registration transaction is recorded. An advanced agent updates the

customer account cases with new members. The application is running in a multimode

system and advanced agents are enabled on all nodes. Which two elements are valid design

choices? (choose two)

A.

Use the optimistic locking option on the case types.

B.

Create a Registration subcase configured to run in offline mode.

C.

Leverage the default object lock contention requeuing capability.

D.

Override DetermineLockString to use .AccountID instead of .pyID as the lock string.

Full Access
Question # 9

You isolated the problem to node 1 of the cluster. You see node 1 goes down shortly after

3:00 p.m. every day with an out-of-memory error. Which two alerts typically precede this

condition?(choose two)

A.

PEGA0004 –Quantity of data received by database query exceeds limit

B.

PEGA0001 – HTTP interaction time exceeds limit

C.

PEGA00017 – Cache exceeds limit

D.

PEGA0002 – Connect operation time exceeds limit

Full Access
Question # 10

What advantage does a rule-utility-function have over a rule-obj-activity?

A.

Ability to be circumstanced

B.

Ability to be saved multiple rulesets

C.

Ability to be directly called from a decision table

D.

Ability to be used to enforce security

Full Access
Question # 11

Select two ways for queuing an item for a queue processor. (Choose Two.)

A.

Use the Queue-for-processing method

B.

Use Utility smart shape

C.

Use Run in Background smart shape

D.

Use the Queue for -agent method

Full Access
Question # 12

your application queues items for a standard agent a case has not been updated as expected by the agent. on the system queue management landing page the queue status for each item us available.

what two issues can be identified in the system queue management landing page using the status?

(choose two)

A.

the agent failed when processing the item.

B.

the agent is scheduled to process the item in the future.

C.

the agent schedules were disabled.

D.

the agent is not configured for optimistic locking.

Full Access
Question # 13

You are working on an insurance claims application that receives claims through email. The company receives 500 emails per hour. the insurance company promises a 24-hour response time to receives and verify the clain. After the claim is verified. The system automatically responds with email containing the claim ID.

The application is developed in the Pega cloud environment. The production environment is currently running on premises.

What is your recommendation to ensure that insurance company can meet the 24-hour response time requirement for claims submitted by email?

A.

Recommend the insurance company change its policy to allow for a broader processing window.

B.

Recommend the insurance company use an advanced agent to verify claims and respond.

C.

Recommend the insurance company use an email lister with concurrent threats.

D.

Recommend the insurance company use an MDB listener instead of an email listener.

Full Access
Question # 14

A security requirement states that personal data should only be visible to managers in the HR

organization. All personal data is contained in a single section.

How do you restrict access to personal data ?

A.

configure a visible when rule on the section

B.

Create an Access control policy restricting access to the properties

C.

Add an Access when to relevent properties.

D.

Define a privilege for the section and add the privilege to appropriate roles

Full Access
Question # 15

An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner

how do you implement this requirement?

A.

create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.

B.

create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.

C.

create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.

D.

create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access

Full Access
Question # 16

You are designing a case life cycle to process fraudulent charge claims. After a list of suspected fraudulent charge is submitted, the case advances to the processing stage. In the first step of theprocess fraud claim process, a seprate child case must be created for each suspected fraudulent charge.

After all necessary fraudulent charge cases are created, the parent cse advance to the next step where the customer is notified that their claims are being processed

choose three actions needed to configure the missing step so that a separate child case is created for

each fraudulent charge selected

A.

Add a customer split for each process step to the cse life cycle and configure it ti create child cases.

B.

configure data propagation to map property value between the parent and clid cases.

C.

add a create case smart shape to the case life cycle and configure it to be created a case

D.

add a create case smart setup to the cse life cycle and configure it to creare child cases

E.

use a page list property to store the fraudulent claim items and identify the number if child cases to create

Full Access
Question # 17

What two features do activities and functions share? (Choose Two)

A.

Ability to be circumstanced

B.

Ability to be parameterized

C.

Ability to be called directly from a decision table

D.

Ability to be versioned

Full Access
Question # 18

your application connects to two REST services that list details about bank offices.

One REST service uses a postal code as a GET parameter and returns a detailed list of bank officers in that postal code.

the other REST service uses a city name as a GET parameter and returns a datailed list of back offices in

cities with that name. The application uses data pages to cache details about bank offices.

which approach do you use to populate a data page with a list of bank offices in a postal code from the REST service?

A.

configure a REST connector data source. configure the REST connector to reference the postal code from the work object using the request data transform.

B.

configure a REST connector data source. Set the Endpoint on the data source to reference the postal code parameter value at the end of the URL

C.

configure a REST connector data source and pass the parameter page to the connector. configure the REST connector to reference the same parameter in the query string for the get method

D.

configure a REST connector data source and pass the postal code parameter to the request data transform configure the REST connector to use the postal code the query string for the get method

Full Access
Question # 19

How do you configure an application to monitor changes made to delegated Decision Table in a production environment?

A.

check Enable Auditing on the Rule-Declare-Decision Table RuleForm harness

B.

use Designer studio> system> Refactor-rules>compare rule

C.

check Audit the use of this flow action on the Rule check in flow action

D.

Define an Advanced agent that scans History-Rule instances on a daily basis

Full Access
Question # 20

XYZ corp expects managers to create a variety of reports. Those reports are always based on the same set of classes, but every report does not use every class in the set.

to simplify report creation for managers, you create________________________

A.

numerous sample reports showing how to join the classes

B.

association rules for the classes in this set

C.

a template report with every class join predefined

D.

a declare trigger that restricts report class joins to this set

Full Access
Question # 21

How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?

A.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg-HRWork-RFP

B.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

C.

Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

D.

Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools

Full Access
Question # 22

your application connects to two REST services that list details about bank offices.

One REST service uses a postal code as a GET parameter and returns a detailed list of bank officers in that postal code.

the other REST service uses a city name as a GET parameter and returns a datailed list of back offices in cities with that name. The application uses data pages to cache details about bank offices.

select two options to configure a data page to accept either a postal code or a city name as a parameter and call the appropriate REST connector.(choose TWO)

A.

sourcing data from both rest connectors and using the response data transform to select the correct data

B.

sourcing data from a single REST connector that is circumstanced based on the input parameter

C.

sourcing data from each REST connector separately and using a when rule to select the appropriate data source at run time

D.

sourcing data from an activity that evaluates the parameter to select the appropriate REST connector to call at run time

Full Access