New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PEGACPLSA88V1 Questions and Answers

Question # 6

when a customer submits a credit card dispute, the application connects to an external service to retrieve all transactions made by the customer. the external service returns transactions ordered by date of transaction, in a descending, chronological order. when a case worker reviews the dispute, the application displays the 10 most recent transactions.

if the case worker does not see the disputed transaction in the list, the case worker can search for additional transactions. the case. the case worker can filter search results on transaction date, the transaction amount or the merchant name the search results display the 10 most recent transactions that satisfy the filter criteria. the case worker cannot paginate through the results.

how do you configure the data page to satisfy all the requirements in the scenario?

A.

create a node-level data page that uses a connector as its source.

B.

create a thread-level data page with parameters that uses a connector as it source.

C.

create a thread-level data page that uses a report definition as its source.

D.

create a node-level data page with parameters that uses a report definition as its source

Full Access
Question # 7

To access a property from an unconnected component, you use the______________.

A.

customer-dot-property construct

B.

property value

C.

dot-property value directly

D.

component-dot-property construct

Full Access
Question # 8

A Citizen Developer working on a Claims case type wants to validate the BenefitType property value. This property is located on a Clipboard page named ClaimBenefit of the MyCo-Data-ClaimBenefit class, which is inherited from Data-.

As a Lead System Architect, what do you recommend to make this validation available to the Citizen Developer?

A.

A System Architect should create a When rule in Dev Studio and reference the ClaimBenefit Clipboard page on the Pages it Classes tab. They define and implement the required criteria, because it is not possible to make it available for Citizen Developers.

B.

A System Architect should create a property BenefitType in the work class and copies the BenefitType property value from the ClaimBenefit Clipboard page to pyWorkPage. Citizen Developers can check the criteria on work class BenefitType property.

C.

A Citizen Developer uses any existing property and informs the system architect to implement a constraint rule. The System Architect marks the constraint rule as a relevant record, to make it visible to the Citizen Developer.

D.

A System Architect should create a When rule in Dev Studio and reference the ClaimBenefit Clipboard page on the Pages file Classes tab. They mark the rule as a relevant record so that the rule becomes available to Citizen Developers.

Full Access
Question # 9

A Pega COE team is building a reusable component for a functionality that will be mandatory for all Pega applications that are built for the different departments of a company.

The component functionality is documented and published in a common SharePoint file, so that it is accessible by all Pega developers within the company.

Which one of the following approaches will work best for this use case?

A.

The component should be embedded in the enterprise application, so that it does not need to be embedded in the department applications.

B.

The component should be embedded in the enterprise application, and should also be embedded in the department applications.

C.

The component should be placed in a separate application so that the departments can all integrate with that application when they want to run the functionality.

D.

The component should not be embedded in the enterprise application. Instead, each department should include the component in their own application.

Full Access
Question # 10

A user report poor application performance at 5:00 pm yesterday. which two tools do you use to review the user's session to identify the cause of the poor performance ?

A.

performance profiler

B.

my performance Details report

C.

Alerts log

D.

tracer

Full Access
Question # 11

A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director.

In order to allow the three physicians to review the orders in parallel, how would you configure the process?

A.

Add a Split Join shape, add a list of physicians, and call the surgical procedure request process.

B.

Add a Split For Each shape, add a list of physicians, and call the evaluation process.

C.

Add a Split Join shape, add a list of physicians, and call the evaluation process.

D.

Add a cascading approvals shape that is called by the evaluation subprocess.

Full Access
Question # 12

In a decision strategy, to use a customer property in an expression, you

A.

define the property as a strategy property

B.

prefix the property with the keyword Customer

C.

use the property as defined without any prefix

D.

define Customer page in Pages & Classes

Full Access
Question # 13

U+ Bank follows all engagement policy best practices to present credit card offers on their website. The bank has introduced a new credit card offer, the Rewards card. Anna, an existing customer, currently holds a higher value card, Premier Rewards, and does not see the new Rewards card offer.

What condition possibly prevents Anna from seeing the new Rewards card offer?

A.

Suppression rules

B.

Applicability

C.

Suitability

D.

Eligibility

Full Access
Question # 14

Using the information shown in the Class structure, select the correct statement.

A.

Auto must be a subcase of Parking.

B.

Instances of EventBooking and Hosted can be stored in a separate.

C.

EventBooking cannot be a subcase of Auto.

D.

Parking and Auto instances must be stored in the same table.

Full Access
Question # 15

While extracting transactional data from the Pega Platform database to external data store with the Business Intelligence Exchange (BIX) rueset, how do you avoid recalculating declarative properties from its source properties?

A.

Log in to Dev Studio, and then withdraw declarative rules processing during the BIX extraction.

B.

Configure the BIX command line argument '-D' to turn off declarative processing.

C.

Use the BIX command line with disableBackWardChaining and disableForwardChaining options.

D.

By default, BIX does not recalculate the declarative properties.

Full Access
Question # 16

In a product management application, the configuration of a flow rule must be different for two products from the hundreds

of other products.

A Pega COE team has been evaluating the specialization design considerations for this requirement.

Which of the following approaches is best suited to this scenario?

A.

Class specialization is the best approach, because it takes precedence in the rule resolution algorithm and helps to pick up correct flow rule.

B.

Creating two different flow rules appended with the product name is the best design approach.

C.

Application specialization is the best specialization design approach, so that every product can be managed separately.

D.

Circumstancing the flow rule is the best specialization design approach, as it is only for two products.

Full Access
Question # 17

An application contains cases which transition though different statuses throughout their life cycle which typically lasts 3 months.

Design a reporting strategy to display the number of cases by status at the end of each month for a 12-month period.

A.

Configure an agent to record monthly case status in a separate table and report on that table.

B.

Configure an activity to generate the data in the clipboard and report using a custom section.

C.

Configure a summary report that leverages sub reports for each month.

D.

Configure a Declare index to record case data to a separate table.

Full Access
Question # 18

Inconsistent formatting of phone numbers is causing, usability issues. You hnvo been asked to enh interface to ensure all phone numbers are automatically reformatted consistently.

Which two options incorporate best practices for applying the required formatting? (Choose Two)

A.

Configure a Declare Constraint rule.

B.

Configure an Edit Validate rule.

C.

Configure a Custom Control.

D.

Configure an Edit Input rule.

Full Access
Question # 19

U+ Bank uses Pega Customer Decision Hub™ to approve credit card limit changes requested by customers automatically. A scorecard model determines the customer credit score. The automatic approval of credit card limits are processed based on the following criteria set by the bank.

The bank wants to change the threshold value for the USD2000 credit limit from <175 to <200. How do you implement this change?

A.

Change in the strategy the condition from .pxSegment <=175 to .pxSegment <=200.

B.

Map the score value in the decision strategy to <=200.

C.

Change the cutoff value in the Results tab of the scorecard model.

D.

Change the cutoff value in the Results tab of the scorecard decision component.

Full Access
Question # 20

You isolated the problem to node ! of the cluster. Y see node 1 goes down shortly «ift

What is the likely cause of the out of-memory error?

A.

At 3:00 P.M., managers view multiple reports displaying open assignments and cases so they can plan work for the following day.

B.

At 3:00 P.M., a robotic process automation runs every day. The mapping of results to each case type horn the automation is CPU intensive.

C.

At 3:00 P.M., a job scheduler is mistakenly configured to run on a single Web Tier node that pulls an increasingly large number of records onto a clipboard page each day.

D.

At 3:00 P.M., a shift change occurs and several users login and display the" work list and dashboard.

Full Access
Question # 21

You need to create custom workspaces for the manager and for the Customer service representative (CSR), Also, you are asked to display some properties in custom formats that arc not supported by Pega.

Which approach satisfies these requirements?

A.

Each access group can use separate portals, harnesses, and sections. Use Specialty Components and use XML to pass data.

B.

Level age the Case Manager and Case Worker as reference points to create new portals, if required. Use Special Components and use JSON to pass data.

C.

Create different harnesses for each user's workspace. New portal rules are not needed. Define Specialty Components and use JSON to pass data.

D.

Identify the functionality required for each portal. Customize the portal either by modifying the section or harness. Use Specialty Components and use XML to pass data.

Full Access
Question # 22

As a Customer Service Representative, you present an offer to a customer who called to learn more about a new product. The customer rejects the offer.

What is the next step that Pega Customer Decision Hub takes?

A.

Stops presenting offers to the customer

B.

Adds the customer to the potential churn list

C.

Reevaluates the Next-Best-Action

D.

Sends a detailed email about the offer

Full Access
Question # 23

U+ Bank implemented a customer journey for its customers. The journey consists of three stages. The first stage raises awareness about available products, the second stage presents available offers, and in the last stage, customers can talk to an advisor to get a personalized quote. The bank wants to actively increase offers promotion over time.

What action does the bank need to take to achieve this business requirement?

A.

Upweight the propensity by adding more predictors that fit the target customers and repeat this process over time.

B.

Enable increasing stage upweighting for the second stage of the journey.

C.

Enable increasing stage upweighting for the first stage of the journey.

D.

Enable constant stage upweighting for the second stage of the journey.

Full Access
Question # 24

You are working on an insurance claims application that receives claims through email. The company receives 500 emails per hour. the insurance company promises a 24-hour response time to receives and verify the clain. After the claim is verified. The system automatically responds with email containing the claim ID.

The application is developed in the Pega cloud environment. The production environment is currently running on premises.

What is your recommendation to ensure that insurance company can meet the 24-hour response time requirement for claims submitted by email?

A.

Recommend the insurance company change its policy to allow for a broader processing window.

B.

Recommend the insurance company use an advanced agent to verify claims and respond.

C.

Recommend the insurance company use an email lister with concurrent threats.

D.

Recommend the insurance company use an MDB listener instead of an email listener.

Full Access
Question # 25
A.

Create a new autogenerated button control and alter its caption to support a shortcut key.

B.

Create a new custom burton control that uses an image and uses a fixed width.

C.

Create a new custom text label control set as required and uses relative widths.

D.

Create a new autogenerated link control with a shortcut key and limit its obsolute width.

Full Access
Question # 26

your application uses a page type property named customerinfo to store the customer's first and last

names.which two approaches ensure that the customer's first and last names are stored in upper case?(choose two)

A.

creating a vaildate rule that validates the first and last names are in upper case and reference the vaildate rule in the flow action

B.

creating an Edit input rule on the customerinfo property that automatically changes the first and last names to upper case

C.

creating a post-processing data trabsform that converts the values to upper case (if needed ) and reference it in the flow action

D.

creating an Edit vaildate rule on the customerinfo property to vaildate that the first and last names are in upper case

Full Access
Question # 27

You are implementing a paga customer service application and are integrating the system of record data for account information?

select the three tasks required to implement this integation

A.

Specialize the pega customer service data pages that use account data.

B.

Integrate with the system of record in the pega customer service account class

C.

Rename the pega customer service data pages to match the system of record.

D.

Integrate with the system of record to populate an Account data class.

E.

Create a data transform to map the Account data class to the pega customer service Account class

Full Access
Question # 28

What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over time? (Choose Two)

A.

Add indexes to all columns.

B.

Purge workparty UUI index tables periodically.

C.

Schedule scripts to maintain frequently fragmented tables.

D.

Purge and/or archive records based on the company's record retention policy.

Full Access
Question # 29

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

A.

Use a visible when rule for the properties displaying sensitive information.

B.

Create an access control policy restricting access to the sensitive information.

C.

Configure an access deny rule restricting access to the sensitive information.

D.

Move sensitive information to separate sections and apply a privilege to the sections.

Full Access
Question # 30

You are a decisioning architect on a next-best-action project and are responsible for designing and implementing decision strategies Select each component on the left and drag it to the correct requirement on the right.

Full Access
Question # 31

An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner

how do you implement this requirement?

A.

create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.

B.

create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.

C.

create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.

D.

create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access

Full Access
Question # 32

How do you improve performance during synchronization for users of an offline-enable mobile app.

A.

Use only node-scope data pages for reference data

B.

Configure optimistic locking on offline-enabled cases.

C.

Restrict the number of offline-enable access group

D.

Declare large data pages in the data page whitel

Full Access
Question # 33

XYZ Corp requires employees to designate alternate operators to perform their work while they are on vacation. Work vacationing operators should be visible to alternate operators.

How do you configure the application to handle this requirement?

A.

Add a ValueList Property to Data Admin-Operator-ID. Alternate operators add vacationing persons to their ValueList. Modify the Assign Worklist report definition to include this ValueList. Modify security accordingly to allow access.

B.

Modify the user portal to only display team members for which the operator has been designated an alternate. Clicking on an operator displays that operator's worklist. Assignments are opened accordingly.

C.

Define a custom Access When rule named pxAssignedToMeOr Alternate. Modify the pyUserWorkList Report Definition using this rule to display every Assign-Worklist assignment within the WorkGroup.

D.

Develop an agent that transfers worklist assignments from the operator going on vacation, when that vacation starts, to the alternate operator. When vacation ends, transfer uncompleted assignments back.

Full Access
Question # 34

Your application is deployed to the cloud. A data source outside your application populates a data page by using your data access pattern configuration. You receive complaints that the system takes a long time to fetch data each time the case worker accesses information for a different customer.

Which approach solves this performance issue?

A.

Move to local installation because network traffic in cloud deployment is often slow.

B.

Change snapshot data access method to reference pattern data access method.

C.

Fetch only the targeted data from the database each time data is needed so access is faster.

D.

Access data page with a predefined key so that, once loaded, data access is faster.

Full Access
Question # 35

Identify the two correct statements regarding Localization wizard capabilities. (Choose Two)

A.

Extracts the string values from all application field values, paragraphs, and correspondence records.

B.

Creates field value rules for all labels used in the application.

C.

Automatically sets the locale, base currency, and time zones based on the user's language.

D.

Generates a package for French even though Pega provides an associated language pack.

Full Access
Question # 36

What does a dotted line from a "Group By" component to a "Filter" component mean?

A.

To evaluate the "Group By" component, the "Filter" component is evaluated first.

B.

Information from the "Group By" is copied over to the "Filter" component.

C.

There is a one-to-one relationship between the "Group By" and the "Filter" components.

D.

A property from the "Group By" is referenced by the "Filter" component.

Full Access
Question # 37

Case Type A and Case Type B capture information about multiple line items. Each line item is an Instance erf the same Line Item data type. Separate work pool classes are used for Case Types A and B.

What is the optimal data model design to meet these requirements?

A.

Add a CaseTypeRef property to the Line Item data type. Case Types A and B possess a Query (tisf Uneltem) property. This List Query property sources a D_UneltemList data page that accepts a pylD parameter.

B.

Add a CsseTypeRef property, an ObjClass property, and Query property related to the Line Item data type. The Query property sources a Lookup Data Page that accepts ObjClass and CaseTypeRef parameters.

C.

Add CaseTypeARef and CaseTypeBRef properties to the Line Item data type. The CaseTypeARef property is a case reference to Case Type A. The CaseTypeBRef property is a case reference to Case Type B.

D.

Case Types A and B both possess an embedded list of line items. Define a Declare Index against each embedded list. Change the direct inheritance class for each Declare Index class to the Line Item data type.

Full Access
Question # 38

you are writing a report that needs to compute the sum of multipul columns and display the result.

The number of columns to sum varies from report to report but does not exceed five.

which two options can you use to implement this requirement? (choose two)

A.

Develop a SQL function that sums two columns. Recursively apply this function as needed.

B.

implement a declare expression to sum the values and store the result as an additional property.

C.

construct the report to group by the columns to be summed followed by a column that uses SUM.

D.

Develop separate SQL functions for summing two through five columns. use the appropriate function.

Full Access
Question # 39

A recent review of the audit polices log show that a specific IP address has made a large number of failed login attempts within a few minutes you suspect that it is an internet bot attack

Select two options you can configure to prevent the bot from accessing you application

A.

Enable the CAPTCHA security policy

B.

Enable an authentication lockout policy

C.

Enable a contect security policy

D.

Enable a failed login attempts security event

Full Access
Question # 40

You oversee a medium-size development team, and some of the team members are new to

pega. What are the most efficient ways to ensure that the rules the team creates adhere to

best practices? (choose two)

A.

Have new team members create and run Pega automated unit tests against their rules.

B.

Use Pega Log Analyzer to identify exceptions associated with the new team members.

C.

Run Tracer on each rule the new team members check in to identify an failures in rule execution.

D.

Leverage the rule check-in approval process to review the new team member’s changes first.

Full Access
Question # 41

You deplyed a pega web mashup implementation into production and are using IACAuthentication.

which two action ensure that the external authentication module, and not another source, has validated the user?

A.

In the IACAuthentication service, map a passoword attribute form the LDAP server used by the external

B.

In an IAC authentication activity, add a step to idenify the security token provied by the external authentication module.

C.

in the IACAuthentication service, specify the appropriate bind password used by the host system

D.

In an IAC authentication activity, add steps that return the security token to the external authentication module for verification.

Full Access
Question # 42

An end user of the application experienced a browser crash while working on a highly available system. Crash recovery is enabled. Does the user to be reauthenticated?

A.

Yes, if the user is directed to the same node.

B.

No, if the user is directed to a different node.

C.

Yes, If the authentication cookie was lost.

D.

No, if the authentication cookie was lost

Full Access
Question # 43

A software training company wants to hold a webinar on a particular subject if a sufficient number of people express an interest in attending. An instructor is tasked with developing the webinar presentation, if they get enough people to register. There is no limit on the number of attendees.

Which case design pattern is the best solution in this scenario?

A.

Divide and Conquer

B.

Sibling Case Update

C.

Data Instance First

D.

Data Instance After

Full Access
Question # 44

What are two valid reasons for defining a case type within a case type-specific ruleset? (Choose two)

A.

Case-specific rulesets make it easier to rebase ruleset versions.

B.

Each branch ruleset can be associated to case-specific user stories.

C.

The ruleset can be added to the ruleset stack for multiple applications.

D.

The case type might be converted to a component application in the future.

Full Access
Question # 45

How do you configure an application to monitor changes made to delegated Decision Table in a production environment?

A.

check Enable Auditing on the Rule-Declare-Decision Table RuleForm harness

B.

use Designer studio> system> Refactor-rules>compare rule

C.

check Audit the use of this flow action on the Rule check in flow action

D.

Define an Advanced agent that scans History-Rule instances on a daily basis

Full Access
Question # 46

BiyCo has two development projects currently in progress developed by independent teams. One team builds the Quoting application. Another team builds the Policy Administration application. Development takes place on different servers with separate rulebases.

The Quoting application is built on the Policy Administration application.

The Policy Administration application requires enhancements to support other areas of the business.

The Quoting team is notified when the Policy Administration application is versioned. The Quoting team responds by importing a HAP containing the new version.

Select the two best practices to minimize potential development conflicts and work with the most current version of the Policy Administration application. (Choose Two)

A.

Periodically rebase the Policy Administration application.

B.

Switch between applications when modifying rules.

C.

Perform branch reviews when merging brandies.

D.

Share rulesets between both applications.

Full Access
Question # 47

An external application calls a Pega REST service, which takes a significant amount of time to respond. Pega Platform returns a unique identifier instantly and runs the service without the application waiting.

Which configuration implements this functionality?

A.

A REST service that runs Queue-For-Agent method, and then returns a unique ID.

B.

A REST service that runs asynchronously by using a service request processor.

C.

A REST service that runs a connector in parallel to call a Pega server.

D.

A REST service that runs a spin-off flow to run the service asynchronously.

Full Access
Question # 48

You are working with BigCo to create an application for insurance quoting. BigCo is a multinational corporation that has traded on the NASDAQ as BCO. BigCo headquarters is located in the UK, and the company has division for each geographical location.

You expect the application to contain two types of work: Quote and Policy.

The Quote guides the sales preventative through one or more quote with the customer. Each quote must be retained by the system and visible to the sales representative and the manager, any data captured during the quoting process must be available to the Policy case. The Policy represents the accepted insurance quote.

For the next year, BigCo intends to use the insurance quoting application only for the personal insurance business in the United Kingdom, Joe the business experts (SMEs) to understand the quoting process. Joe uses Pega Express to develop the quoting application with the SMEs.

Default application settings are shown in the image.

What two edits do you make to the advanced configuration based on information in the reading passage? (Choose Two).

A.

Deselect ‘’Create demonstration users’’.

B.

Edit the Organization name to BCO.’’

C.

Edit the Organization name to UK’’

D.

Edit the Division name to ‘’UK’’.

E.

Select ‘’Framework’’ as the application structure.

Full Access
Question # 49

The BigCo quoting application is currently on-premise. BigCo plans to move the application to Pega Cloud What factor do you need to consider for environment setup?

A.

Network security configuration

B.

Database access configuration

C.

System management application configuration

D.

Log file access configuration

Full Access
Question # 50

An application processes stock market trades.

which two requirement are best implemented by an advanced agent?

A.

call a service every day at 5 : 00 am to get the marker open and close time, and recird the result

B.

Excute a trade cae only after the stock reaches a certain price

C.

create a case to audit an account if the customer trade more tha usd9999in a day

D.

complete unexecuted trade when the market

Full Access
Question # 51

Six weeks after you deliver your application to production, your users report that the application slows down in the afternoon. The application is almost completely unresponsive for some users shortly after

3:00 P.M. Other users do not experience this problem until later in the day.

You do not have access to the Production environment, but you do have access to AES. The production environment has three nodes and a load balancer.

You need to resolve this issue because a new division of the organization will start using the application next month.

How do you begin your research to diagnose the cause of the reported performance issue?

A.

Look at the performance profile and DB Trace output from each node.

B.

Observe the cluster and node status on the Enterprise Health Console.

C.

Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.

D.

Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Full Access
Question # 52

How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?

A.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg-HRWork-RFP

B.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

C.

Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

D.

Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools

Full Access
Question # 53

MyCo, a telecom company, developed a new data plan group to suit the needs of its customers. The following table lists the three data plan actions and the criteria that customers must satisfy to qualify for the offer:

How do you configure the engagement policies to implement this requirement? Choose the engagement policy level that is best-suited for each criterion

Full Access
Question # 54

Using the information shown in the case structure below, which option is always true?

A.

Resolution of the Event Booking case requires the Parking case to be resolved.

B.

Parking, Weather, and Hotel cases must be instantiated for the Event case to process correctly.

C.

The Weather case can be instantiated without a parent Event Booking case.

D.

The Parking class must inherit from the Event Booking class.

Full Access
Question # 55

Which two tools and/or methods support continuous integration practices? (Choose Two)

A.

Performing Ul regression testing

B.

Leveraging release toggles

C.

Using an automation server to invoke unit test suites

D.

Configuring pre and post import steps

Full Access
Question # 56

A Pega developer working on customizing GetNextWork functionality has overridden the

GetNextWork_WorkBasketUrgencyThreshold application settings rule, because they want to define a minimum cutoff value for assignment urgency.

Overriding this value can speed things up by changing the order in which assignment candidates are examined.

As an LSA, which one of the following would you recommend as a best practice in this situation?

A.

To simplify migration, create a separate ruleset for customization of GetNextWork functionality.

B.

To keep in sync with the work list, change the Urgency Threshold for the worklist as well.

C.

To avoid customization, do not approve check-in of the rule.

D.

To simplify testing of GetNextWork functionality, supply different cutoffs for different production levels.

Full Access
Question # 57

You are configuring a new version of a data transform that is partially complete. During testing, you want to be able to use previous of the rule.

select the rule configuration that enable you to save ans check in the record with validation error and allows previous versions of the rule to execute.

A.

Set the availability of the record to Not AvailableB. set the status of the record to Template

B.

set the availability of the record to Blocked

C.

set the availability of the record to withdrawn

Full Access
Question # 58

which two of the following action are required to configure your application to support SSO authentication ?

A.

configuring the authentication activity to identify the operator in the system

B.

configure the application record to use external authentication

C.

configure required mapping between LDAP attributes and operator properties

D.

configure model operator records for each access group in your application

Full Access
Question # 59

A healthcare company decides to use Pega Foundation for Healthcare (PFH) for all of their new Pega Platform"" applications, because the data model that PFH provides can accommodate all of their needs. However, some new fields and new data classes need to be created to suit the company's specific processes.

What is the recommended approach to extending the foundation data model?

A.

Create a copy of the foundation data model in the Pega Platform application. Then use direct inheritance to extend the copied data model.

B.

Extend the provided data model by using direct inheritance. Pattern inheritance can be used to extend application-specific behavior.

C.

Create a copy of the foundation data model in the Pega Platform application. Then use pattern inheritance to extend the copied data model.

D.

Extend the provided data model by using pattern inheritance. Direct inheritance can be used to extend application-specific behavior.

Full Access
Question # 60

MyHealth Corporation wants to use the age of the claim to increase the urgency of the assignment so that persons processing the claims work on the most urgent claims first. The claim assignment urgency increases by 1 each day the claim remains in an Unresolved status. At any time, MyHealth has up to 10,000 claims that are in process. Claims in the PendingProcessing workbasket are subject to this calculation. The application updates the claim urgency daily before the work day begins. All claims are processed within 30 days.

Which approach satisfies the claim urgency requirement and provides the best experience for the user who processes the claims?

A.

Use the service-level agreement of the case to increase the value of pyUrgencyAssignAdjust by 1. Reset the goal date to the following day.

B.

Use a declare expression to increment the value of pyUrgencyAssignAdjust by 1. When a user who processes claims opens the assignment, the urgency is increased by 1.

C.

Use a job scheduler on a dedicated node to increase the value of pyUrgencyAssignAdjust by 1 for every assignment that matches the selection criteria.

D.

Use the service-level agreement of the assignment to increase the value of pyUrgencyAssignAdjust by 1 every day the claim is in an Open status.

Full Access
Question # 61

An organization has two sets of users: Manager and Vice President, with no role dependencies. The organization wants to introduce a new set of users called Senior Manager that has Manager access and a subset of Vice President access.

What is the recommended approach to add the Senior Manager role to meet this requirement?

A.

Create a new Senior Manager role, and define new Access of Role to Object rules as required.

B.

Create a new Senior Manager role with Manager as a dependent role, and define new Access of Role to Object rules as required.

C.

Create a new Senior Manager role with Vice President as a dependent role, and override Access of Role to Object rues as required.

D.

Create a new Senior Manager role with Manager and Vice President as dependent roles, and override the Access of Role to Object rules from the Vice President role as required.

Full Access
Question # 62

When implementing a Next-Best-Action, the customer Lifetime value Threshold is used to __________ for an offer

A.

determine customer eligibility

B.

apply the customer's lifetime value

C.

prioritze high value propositions

D.

prioritize customer

Full Access
Question # 63

Select three operations that Elasticsearch queries can support when using a report definition. (Choose Three)

A.

Starts with

B.

Contains

C.

Custom SQL functions

D.

Only Include matching rows

E.

Greater than

Full Access
Question # 64

Select two ways for queuing an item for a queue processor. (Choose Two.)

A.

Use the Queue-for-processing method

B.

Use Utility smart shape

C.

Use Run in Background smart shape

D.

Use the Queue for -agent method

Full Access
Question # 65

U+ Bank is facing an unforeseen technical issue with its customer care system. As a result, the bank wants to share the new temporary contact details with all customers over an SMS.

Which type of outbound interaction do you configure to implement this requirement?

A.

Security event

B.

Scheduled update

C.

Customer event

D.

Priority communication

Full Access
Question # 66

U+ Bank currently uses a Pega Platform'" application to automate its internal operations. The bank wants to add independent tax processing functionality to its application. This work should be routed to tax consultants in the application.

To support this new feature, the bank has appointed country-specific tax consultants because tax processing is handled differently in different countries.

Which one of the following options is the best approach to add tax processing to the bank's existing Pega Platform application?

A.

Create a tax case type, then circumstance the required processes and routing utilities by using the country property.

B.

Create a country-specific tax assessment application that is built on the existing Pega Platform application.

C.

Create a tax case type and use case type specialization by country, each with its own process, to be routed and assigned to the appropriate tax consultant.

D.

Create a country-specific tax process for tax assessment that is routed to the appropriate tax consultant.

Full Access
Question # 67

XYZ corp sells products that can be researched and ordered within a single screen. After the user submits the order, only the ID for each ordered product is propagated to a product child case. An additional property within the product child case reference a data page that displays product detail. XYZ wants you to define a report that shows detail about each product associated within a given order case.

In which class do you optimize the detail properties for the product?

A.

both the order class and product class

B.

the product class

C.

the order class

D.

the data class for the product

.

Full Access
Question # 68

Review the following classes and properties:

A field group list is defined at the MyCo-Lending-Work work pool level. The find group list name is Loans: the specified data type is MyCo-Data-Loan.

Which three statements are valid? (Choose Three)

A.

An auto loan application can extend MyCo-Data-LoarvAuto without affecting a sum performed against .Loans C). Amount

B.

At design time, the system issues a warning since it is poor practice to define a field group with an abstract data type ctas%

C.

All pages within the .Loans field group must be the same class, either MyCo-Data-Loan-Aiito or MyCo-Oata-Loan Mortqage

D.

The pxObjClass of any page in the .Loans field group list can be changed at nm time and does not need to be the same class.

E.

A rule In MyCo-DataLoan-Mortgage can only be referenced through -Loans if also defined In MyCo Data-Loan.

Full Access
Question # 69

What is the primary reason for developing a set of unit test cases and automated testing suites in a continuous integration and continuous deployment (CI/CD) model?

A.

Automated testing reduces costs by reducing the need to hire and train testing resources.

B.

Automated testing programmatically ensures quality of rules to maintain the integrity of the pipeline.

C.

Automated testing accelerates the deployment of rules from the development environment to target environments.

D.

Automated testing assists orchestration between automation server and the Execute Test REST service.

Full Access
Question # 70

Consider the following requirement:

case worker must be able to add a work party when creating a case

select the configuration option that fulfills this requirement

A.

add a data transform to the pyCaseManagementDefault work parties rule

B.

Ensure the addparty user action is available as a local action

C.

add the addworkObjectparty activity to the assigments

D.

select the VOE? option on the pyCaseManagementDefault work parties rule

Full Access
Question # 71

Given the following classes and properties:

myco-data-shape (abstract)

area

color

myco-data-shape-rectangle

length

width

myco-data-shape-circle

radius

a page list property .shapes is defined as being of the abstract class myco-data-shape.

select two correct statements. (choose two)

A.

a rule defined in myco-data-shape-rectangle can modify the. Color property.

B.

pages of shapes can contain. length and. Radius.

C.

A rule existing in myco-data-shape can be overridden in myco-data-shape-circle.

D.

pages of .Shapes can be of either myco-data-Shape-rectangle or myco-data-shape-circle, but all pages must be the same.

Full Access