Exam Questions Flashcards

1
Q

What is the order of environments throughout the lifecycle of a project?

A

Sandbox -> Dev -> QA -> Staging -> Prod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Outside of branches what is another way that developers can work on the same application independently of one another?

A
  • Branches / Branched RS
  • Create a development application
    • Built on the production application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Based on the information below, if you execute the rule when .Dept=Accounting, which version does Pega Platform™ use?

Rule Version Circumstance

01-01-01 None
01-01-01 .Dept=Accounting
01-01-15 None
01-01-25 None, base rule selected
01-01-30 .Dept=Accounting
01-01-35 None

  1. 01-01-25, None, base rule selected.
  2. 01-01-01, .Dept=Accounting.
  3. 01-01-01, None.
  4. 01-01-30, .Dept=Accounting.
A
  1. 01-01-30, .Dept = Accounting
    * This version is the circumstanced version in the highest ruleset version above the ruleset in which the base rule flag was selected. All the rules before the base rule selected version are not applicable*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Based on the information below, if you execute the rule when .Dept=Engineering, which version does Pega Platform™ use?

Rule Version Circumstance

01-01-01 None
01-01-01 .Dept=Engineering
01-01-15 None
01-01-20 .Dept=Engineering
01-01-25 None, base rule selected
01-01-35 None

  1. 01-01-35, None
  2. 01-01-01, None.
  3. 01-01-20, .Dept=Engineering.
  4. 01-01-01, .Dept=Engineering.
A
  1. 01-01-35, None
    * Rule version 01-01-25 has the base rule selected. All the rules before this version are no longer applicable. When the system looks at only those rules available for ranking, the circumstance for Engineering is not applicable. The system chooses the highest version of the rule without any circumstances defined.*
    * When we have a new base rule flagged, ignore previous circumstancing AND all previous rules*
    * We don’t have to select the actual new base rule, just one in a higher RS like we have in this scenario*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When do we want to use a Queue Processor versus a Job Scheduler?

The real exam question was a word problem

A

Queue Processor:

  • We want to use a queue processor for tasks that can either be queued immediately or delayed (not time sensitive)
  • Tasks are queued using either a Run in Background smart shape or Queue-For Processing method in an activity
  • Run a specific activity on a queued item
  • Standard Configuration

Job Scheduler:

  • Schedules a recurring task that runs at a specified interval or at a specific time
  • Advanced Configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If Activity A made a Branching call to Activity B what would happen after Activity B was finished? Where would the control return to?

What would happen in the same scenario if instead we called Activity B with an activity Call method?

A

Call:

  • Runs the specified activity then returns control to the calling activity

Branch:

  • Runs the specified activity, but then control returns to the rule that called the activity first
  • PROCESSING OF THE CURRENT ACTIVITY ENDS
  • NO STEPS AFTER THE BRANCH STEP ARE EXECUTED
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Select the content that is included in the ALERT log file?

  1. Contains warnings, errors, and information about internal operations
  2. Contains performance-related messages
  3. Contains alerts that suggest improper configuration of IAC
  4. Contains performance data saved from services
A
  1. Contains performance-related messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the tools is generally used first when analyzing system performance?

  1. Clipboard
  2. Database Trace
  3. Performance Analyzer
  4. Performance Profiler
A
  1. Performance Analyzer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rule resolution is applied to which of the following listed class instances? (choose 3)

  1. Case types
  2. Operator IDs
  3. Properties
  4. Sections
  5. Workbaskets
A
  1. Case type
  2. Properties
  3. Sections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In rule resolution, ranking the remaining rule candidates uses a 3-step subprocess. The first step is to sort the remaining rule candidates. Which of the following criteria is sorted last?

  1. Class
  2. Circumstance
  3. Circumstance Date
  4. Ruleset Name
  5. Ruleset Version
A
  1. Ruleset Version
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following scenarios is LEAST likely to use circumstancing as a mechanism to provide the specialization described?

  1. Provide specialized functionality when “ReferredByEmployee” property is “Bob Buran” and the “PositionAppliedFor” property is “REQ2”
  2. Provide specialized functionality when a rule is called during the months of October - December
  3. Provide specialized functionality when creating a particular case
  4. Provide specialized functionality when the “StartDate” is after January 1, 2020
A
  1. Provide specialized functionality when creating a particular case
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You wish to create a declarative expression named CalculateRate. You want to specialize the functionality based on the AccountNumber property. Specifically, any account between 64111-64999 should have this special functionality. Assuming circumstancing is used to provide this specialization and that CalculateRate does not exist in the current system, how many rules at minimum must be created?

1

2

3

4

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do we limit the # of duplicate cases that we see?

A
  • Add some more basic conditions to qualify
  • Raise the threshold
  • Reduce weighted condition values
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Where is the data from a temporary case stored?

A
  • Temporary cases data is stored in memory in the clipboad and NOT stored in the Pega Database.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do we ensure that pre/post processing actions don’t overwrite data on multiple visits to the same step in a Data Transform or Activity?

A
  • Add conditional logic to the Data Transform / Activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two data structures can be tested for completeness?

A
  • Decision Tables and Trees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

For reporting structure and authority matrix when is the approval chain set? When called? During each step of the chain?

A

Reporting Structure:

  • Approval always moves up the submitter’s reporting structure
  • Honestly this one could also go both ways it may be set at the beginning or just based on the current user’s direct report at each step of the chain

Authority Matrix:

  • Approval chain is directed by a set of conditions (custom condition based path)
  • WHEN A REQUEST IS MADE the system populates the approver list with the operators who evaluate true in the table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two steps in order to find duplicate cases?

  1. Use a persist case shape after the duplicate check
  2. Set as a temporary case in the first step of the flow
  3. Set as a temporary case in the starting flow action
A
  1. Use a persist case shape after the duplicate check
  2. Set the case as a temporary case in the starting flow action of the case type
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which one of these situations would require an authority matrix? There are two types of cascading approvals (one uses reporting structure and one uses authority matrix)

  1. Manager
  2. Manager’s Manager
  3. CEO (if income < 10 and from US)
  4. Head of HR (if income > 10 and from Europe)
A
  1. CEO
  2. Head of HR
    - Use an authority matrix that requires multiple approvers, where a set of rules directs the approval chain. (Use reporting structure when approvals always move up the reporting structure of the submitter or another defined list)
    - Basically, conditional approval chain = authority matrix and constant reporting structure or list = reporting structure configuration.

The authority matrix model determines the approvers using a list of operators stored in a Page List, and a single value property that identifies the approver. In most situations, you use a decision table for populating the list. This list is set when a request is made.

If approval conditions exist, use the authority matrix model!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If we want to add a section to the bottom of a user portal how do we do this?

A

The organization of the portal affects how the contents of the portal are presented to the user. The default user portals are organized with a header, a left navigation pane, and a content pane. To change the layout of the portal, you change the screen layout used in the harness. To modify the content in these sections, you use Live UI in the screen layout to identify and open the section to configure.

  • In Pega, a portal is represented with a portal rule.*
  • Portal rule = type of user expected to use the portal*
  • Harness = organizes the portal contents*
  • Skin = Defines the branding applied to the portal (text size, font style, background color)*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the best 3 ways to prevent horizontal scrolling on mobile?

  1. Use native controls
  2. Table format vs Dynamic repeating format (dynamic layout)
  3. Layout Groups
  4. Set the maximum pixels to 44
  5. Fixed Layout
A
  1. Use native controls
  2. Dynamic repeating format (dynamic layout)

Mobile Interface Design Approaches

  • Set widths in percentages
  • Use auto-generated controls
  • Incorporate native features
  • Use data pages as data sources

- Use layout groups

  • We can also prioritize columns in tables with a higher importance than others
  • Create a simpler user interface
  • Design for finger taps
  • Test the applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which two rule types do we localize

  1. Field Groups
  2. Paragraph Rules
  3. Dropdown menu options
  4. Correspondence Fragments
A
  1. Paragraph Rules (for instructions and messages)
  2. Correspondence Rules (for emails and other correspondence)

A field group is NOT the same as a value – A field group for example would be a contact in a cellphone (think object)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of these 3 are true about mobile offline syncing?

  1. Rules called by scripts as part of an action set on a UI control need to be whitelisted in order to sync properly
  2. Delta-sync improves time by only syncing small amounts of data
  3. Blacklist data pages that are large and change infrequently
A
  1. Rules called by scripts as part of an action set on a UI control need to be whitelisted in order to sync properly
  2. Delta-sync improves sync time by only syncing small amounts of data at a time
    * As the name suggests a delta sync does any of the changes that have been made since the last sync.*
  3. Blacklist data pages that are large and change infrequently
    * For example, you may add a data page listing countries of the world to a delta sync blacklist (I thought that the question said referenced infrequently so watch out for this distinction)*
    * Other info: Use large data pages to store reference data in your application to improve performance of a mobile app. Only individual records of the large data page that have changed are synced.*
    * pyModificationDateTime*
    * pyIsRecordDeleted*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How do we enable offline support for a mobile app? What two things do we have to configure?

A

Enable offline support for users by configuring the appropriate access groups and enabling the appropriate case types for offline processing

Decide which users and which case types require being able to work offline

When the network connection state changes and the device comes back online, data sync is triggered automatically for the offline-enabled application, and any saved data is updated to the server. An _indicator_ displays whether you are _online, offline, or currently syncing with the server_

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How would we assign operators in two different units to the same work group?

  • Add the work group to each operator’s profile
  • Add the operator’s to the work group itself
A

Answer: Add the work group to each operator’s profile

For example we have Charlie Garcia who is an iaconsultant and we also have Sharon Doherty who is a uxdesigner. The consultant is a member of the Technical Enablement unit and the ux designer is a member of the Design unit. In order to facilitate working across units, both the consultant and the ux designer are assigned to the Design work group to give each memeber of the work group the ability to access work from a shared queue. (I think in the example that they gave only the individual consultant had to be assigned because the design work group was the default work group in the case of the UX designer)

Organization -> Division -> Unit -> Unit (child - sometimes)

  • Members of a work group may belong to different organization units, divisions, or even different organizations.*
  • Operators and work queues are associated with business units in the organization. You can create work groups to share resources across the organization, regardless of the business with which the operator is associated.*
  • The operator must always be configured with a default work group. If the operator receives work from other departments with their own work queues, the operator must be configured with more than one work groups*
  • Other Information:*
  • A unit can have child units. For example, two units such as Hardware and Software may report to a single unit (Internal) that belongs to the IT division. The Internal unit manages IT requests from inside the organization. The child units handle the requests and inventories and ship the items*
  • Unit:*
  • Divisions can have one more more units. A unit contains operators who perform work specific to their organization. These operators can include caseworkers, agents, and customer service representatives.*
  • Division:*
  • An organization can have one more more divisions. A division is definable as a layer for categorizing business unitst such as region, brand or a department*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

When we have a pre-processing data transform on a flow action, what are two ways that we can ensure data integrity?

  • Checking conditions
  • Account for them refreshing the case
A
  • Checking conditions
  • Account for them refreshing the case or is presented with the assignment
  • Pre-Processing flow actions are performed any time that the user selects the assignment or is presented with the case (IE refreshes or returns to the case later on down the line)*
  • This DOES call pre-processing data transform on the flow action a second time so we need to account and check for this to make sure it wouldn’t run something twice that should not be.*
  • For example think of a withdraw case from a bank account, we should not keep withdrawing money each time that the page is refreshed.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Explain Split Join, Split for each, and Spinoff differences

A

Split Join:

  • Multiple functions running in parallel with join conditions to determine when the primary process continues

Split for each:

  • One function applied to a list with join conditions to determine when the primary process continues
  • Runs on page list/group

Spinoff:

  • Main process continues, does not care about this spinoff background process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of parallel processing would we use if we had a doctor’s process A that requires manager approvals (subprocess B). We decide that we should halvke 3 managers working on these approvals at the same time. We need 2/3 approvals in order to continue with process A.

A

Answer: Split for Each

The main differentiator here is that we use Split for each if we are running multiple instances of the SAME subprocess and we use Split Join if they are DIFFERENT subprocesses.

  • Split for each shape allow you to run one subprocess multiple times by iterating through a set of records stored in a page list or page group.*
  • Spinoff allows you to run the subprocess in parallel with the main flow. The main process does not wait for the subprocess to complete before proceeding.*
  • Join Conditions:*
  • on SFE and SJ you can use Select Any to join after any of the subprocesses have completed, Select All to continue the main process after all of the subprocess have completed, and Select Some if you want to use a when rule or a count to determine when the main process can resume.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A company would like to automate the delivery of a report of new hires who would like health insurance. They would like to run a report monthly on the last Friday at 1am. Which background processing option would best satisfy their need?

  1. Background Agent
  2. Dedicated queue processor
  3. Job Scheduler
  4. Standard Queue Processor
A
  1. Job Scheduler

Use Job Schedule for any repetitive tasks on a set interval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A company wants to batch inbound applications together and set them to batch run multiple times a day, which background processing options would work?

Background Agent

Dedicated queue processor

Job Scheduler

Standard Queue Processor

A

Dedicated Queue Processor

Queue Processors queue tasks for background processing. Used as either a Run in Background smart shape, or as the Queue-For-Processing method in the activity. This is the correct answer for a question like this because we are batching inbound jobs into the queue and we would use a dedicated queue processor because it allows us to delay the processing of the queued items. By using dedicated nodes or off peak hours, users can continue to process cases without any impact caused by the uploading operations.

  • Standard Queue Processor:*
    • Process a queued item immediately*
  • Dedicated Queue Processor:*

- Delay processing of queued items

  • Job Scheduler:*
    • Schedules a recurring task*

- runs at a specified interval

- Identifies the items to process at that time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

For each of the scenarios match Job Scheduler / Standard queue processor / Dedicated queue processor

A. Upload an insurance claim to an external database after normal business hours

B. Submit each status change to an external system. Processing does not require high-throughput

C. Delete older records from log files

A

A. Dedicated Queue Processor Upload an insurance claim to an external database after normal business hours

Queueing up items that come in throughout the day to be run on a dedicated node. Anytime we are queueing something to be batch run later it is a dedicated queue processor

B. Standard Queue Processor Submit each status change to an external system. Processing does not require high-throughput

Not requiring high throughput is important here because we don’t want to bog the system down as this will run immediately in the background as normal operations continue on a standard queue processor

C. Job Scheduler Delete older records from log files

Set interval to run a set task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Refund requests are queued for overnight processing. What two pieces of information are required to queue the refund request? (Choose Two)

  1. The ID of the queue processor.
  2. The ID of the customer requesting the refund.
  3. The case ID of the refund request case.
  4. The date and time at which the queued item can be processed.
A

1.

For a dedicated Queue processor configured to process items on a delay, you must specify the queue processor ID.

  1. The date and time at which the queued item can be processed.

For a dedicated Queue processor configured to process items on a delay, you must provide a Date time property for the queued object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

________ queues are used for simple queue management. _______ queues can be used when the task is delayed for processing.

A

Standard queues are used for simple queue management. Dedicated queues can be used when the task is delayed for processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Service Agents at a marina belong to two access groups that inherit permissions from different dependent roles: T1 Service Agents inherit permissions from the PegaRules: User1, and T2 Service Agents Inherit from PegaRULES: User4.

Application requirements state that T1 and T2 Service Agents can create cases in Work-Painting and Work-Repair, but only the T2 Service Representatives can modify cases.

What is the best approach to implement this requirement?

  1. Configure an Access When record for the edit feature in both Work-Painting and Work-Repair and reference the T2 Service Agent user role.
  2. Clone the Standard Access Role permissinos for PegaRULES: User4 and configure the role to include edit access.
  3. Configure an Access of Role to Object (ARO) record in Work- class to include T2 Service Agent’s edit permissions
  4. Configure an Access of Role to Object (ARO) records on both Work-Painting and Work-Repair to include T2 Service Agent’s edit permissions.
A
  1. Configure an Access of Role to Object (ARO) record in Work- class to include T2 Service Agent’s edit permissions
    * This approach maximizes reuse of dependent role permissions as instances of Work-Repair and Work-Painting will inherit the permissions set in the Work- class.*
    * Some of the other options here would work, like an Access When record but if we wanted to edit stuff later on down the line we would have to update the Access When rules, or if we added a Work-Building class then we would have to remember to set these Access When records up instead of just having the permissions being inherited from the Work- class.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

You want to restrict access to a specific flow action to certain users. Which two steps must you perform? (Choose Two)

  1. Add the privilege to the flow action record.
  2. Add an Access When record to the flow action.
  3. Add the privilege to the users’ access group.
  4. Add the privilege to a user role that is available to the users’ access group.
A

1. Add the privilege to the flow action record

  • This will require that users have the specific privilege in order to perform the action*
    2. Add an Access When record to the flow action.
  • No, Access When records are used for conditional access*
    3. Add the privilege to the users’ access group.

NO, PRIVILEGES are NOT added to ACCESS GROUPS

4. Add the privilege to a user role that is available to the users’ access group.

Yes, after we add the privilege as a requirement in the flow action record then we can add the privilege to the user role or roles that we want to be able to access the flow action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What requirement do you satisfy with an Access When record?

  1. Managers can perform an optional action to transfer a case to another workbasket, but users cannot.
  2. Government regulations require that you explicitly block user access to personally identifiable information.
  3. Company policies require that you only allow managers to run reports on purchase requests.
  4. Accountants can edit a purchase request only if the case was created by a member of their assigned department.
A

What requirement do you satisfy with an Access When record?

  1. Managers can perform an optional action to transfer a case to another workbasket, but users cannot.
  2. Government regulations require that you explicitly block user access to personally identifiable information.
    * You configure an Access Deny record to explicitly deny user access to instances of a class, such as a case type or data type. Whenever I see regulations I should think of Access Deny records - Think of them as targetted denial of access due to changes.*
  3. Company policies require that you only allow managers to run reports on purchase requests.

.

4. Accountants can edit a purchase request only if the case was created by a member of their assigned department.

Access When records are used to conditionally allow users to perform an action, think of them literally as when rules with very specific scenarios. The other answers can all be answered through different role based access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

For what reason would you configure an Access Deny Record?

  1. To prevent users from performing a specific flow action
  2. To prevent users from deleting attachments to a case
  3. To explicitly prevent users from deleting cases to satisfy a company policy
  4. To prevent users from updating cases durinog a particular stage of the case life cycle
A
  1. To prevent users from performing a specific flow action
  2. To prevent users from deleting attachments to a case

3. To explicitly prevent users from deleting cases to satisfy a company policy

  • You configure an Access Deny record if government or corporate regulatinos require explicitly denying an action to users. Even though there are probably other role based access controls that can handle this, we need to use Access Deny records so that the regulations are satisfied that access is denied.*
    4. To prevent users from updating cases during a particular stage of the case life cycle
  • This would be an Access When rule because it is a conditional access denial based on them being in a particular stage*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Pega Web Mashups provide the same rich application experience users normally have in a Pega Platform Application. True or False?

A

ANSWER: True

  • Actions commonly defined inside a mashup include:*
    • Opening a new case*
    • Displaying a user’s worklist*
    • Selecting and performing an assignment*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The ________ _______ ______ option opens a window that provides the necessary HTML for you to copy, paste and view within the web page. You can modify the code to meet the specific needs of the web page or customize the appearance of the mashup. Ex: You can set the width of the mashup

A

The Generate mashup code option opens a window that provides the necessary HTML for you to copy, paste and view within the web page. You can modify the code to meet the specific needs of the web page or customize the appearance of the mashup. Ex: You can set the width of the mashup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Pega provides a standard authentication service named ________ ________ ________ (___) for Pega Web Mashup configurations

A

Pega provides a standard authentication service named Internet Application Composer (IAC) for Pega Web Mashup configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The standard IACAuthentication activity extracts values from ____ ______ in the request to identify an authenticated Pega Platform operator ID.

A

The standard IACAuthentication activity extracts values from HTTP headers in the request to identify an authenticated Pega Platform operator ID.

The standard IACAuthentication activity uses the operator’s identifier to verify that the user is in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which security switch blocks unregistered and unencrypted requests coming from the client.

  1. pyuseridentifier
  2. pyShowSecureFeatureWarning
  3. pyBlockUnregisteredRequests
  4. pzSecureFeatures
A
  1. pyBlockUnregisteredRequests
    * Requests are blocked with a 403 error*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Pega Web Mashup supports which 3 options for passing data to or from a Pega Platform application?

A
  1. data-pega-event-onpagedata
    * Use the data-pega-event-onpagedata attribute to specify the default value for the gadget*
  2. Javascript function doAction()
    * Use the Javascript function doAction() to set or read data values from the web page hosting the gadget, such as by clicking a button. Call the doAction() function using the syntax: pega.web.api.doAction([gadgetname], [action], [parameters])*
  3. Action object to perform additional actions on a web mashup gadget (or configure the gadget to interact with another gadget)
    * Use an action object to perform additional actions on a web mashup gadget or configure the gadget to interact with another gadget. Configure the action object as a script within the gadget DIV tag and specify the attributes and paraameters as required to perform the action.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

To use the value of an element from the page JS as the value of a gadget attribute or action parameter use [_____ / _____ / _____].

A

To use the value of an element from the page JS as the value of a gadget attribute or action parameter use [page/id/elementID].

elementID is the name of the DOM element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

To use the value returned by a function on the page JS as the value of a mshup attribute or action parameter, use the syntax [____ / _____ / ____].

A

To use the value returned by a function on the page JS as the value of a mshup attribute or action parameter, use the syntax [page/function/token].

In the syntax ‘token’ is a string that has meaning to the function. Specify the functino used to retreive the value by using the data-pega-event-onpagedata attribute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Use the _________ and ______ actions to read and set property values in a mashup gadget.

A

Use the getGadgetData and setGadgetData actions to read and set property values in a mashup gadget.

The getGadgetData action uses the syntax [gadget/gadgetName/property] to reference the property reference where gadgetName is the name of the mashup, and property is the name of the property used in a Pega application (pyWorkPage, pyID, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

To reference properties in another gadget use the syntax [______ / ______ / ______]

A

To reference properties in another gadget use the syntax [gadget/gadgetName/propertyReference]

If the property data you need is in the same gadget as the reference use the syntax: [propertyReference]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which two of the following options does Pega Web Mashup support for passing data to or from a Pega application? (Choose Two)

  1. Use the data-pega-event-onpagedata attribute to specify the default value for the gadget.
  2. Use an action object to perform additional actions on a web mashup gadget or configure the gadget to interact with another gadget.
  3. Use an activity to copy data to or from a Pega application to the Pega Web Mashup.
  4. Use the Javascript function Action() to set or read data values from the web page hosting the gadget.
A

1. Use the data-pega-event-onpagedata attribute to specify the default value for the gadget.

2. Use an action object to perform additional actions on a web mashup gadget or configure the gadget to interact with another gadget.

  1. Use an activity to copy data to or from a Pega application to the Pega Web Mashup.
  2. Use the Javascript function Action() to set or read data values from the web page hosting the gadget.
    * BE CAREFUL FOR THIS TRICK ON THE EXAM, READ CAREFULLY*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which two of the following statements are true about Pega Web Mashup? (Choose Two)

  1. Opening a new case is an example of an action that can be done through a Pega Web Mashup..
  2. The Pega Web Mashup can be created using Dev Studio only.
  3. When using a Pega Web Mashup, an operator ID is not required to access a Pega Platform™ application..
  4. The Generate Mashup code option generates HTML code.
A

1. Opening a new case is an example of an action that can be done through a Pega Web Mashup.

  1. The Pega Web Mashup can be created using Dev Studio only.
  2. When using a Pega Web Mashup, an operator ID is not required to access a Pega Platform™ application..

4. The Generate Mashup code option generates HTML code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which two of the following steps are required to create a Pega Web Mashup? (Choose Two)

  1. Configure a list of approved sites for the site origin..
  2. Set the data-pega-resizetype attribute to customize the mashup width..
  3. Define attributes to defer for the default action
  4. Generate the mashup code
A

1. Configure a list of approved sites for the site origin..

  1. Set the data-pega-resizetype attribute to customize the mashup width..
  2. Define attributes to defer for the default action

4. Generate the mashup code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

You want to configure a Pega Web Mashup gadget to use the value of an element from the host page as the value of a gadget attribute or action parameter. Which of the following is the correct syntax?

  1. data-pega-parameters=”{Customer:’[page/id/Account]’}” — where the DOM element is named “Account”
  2. [gadget/gadgetName/property] — where gadgetName is the name of the mashup, and property is the name of a property used in a Pega application.
  3. data-pega-parameters=”{Customer:’[page/id/Account]’, Level:’gold’}”
  4. [page/function/token] — where token is a string that has meaning to the function
A

1. data-pega-parameters=”{Customer:’[page/id/Account]’}” — where the DOM element is named “Account”

  1. [gadget/gadgetName/property] — where gadgetName is the name of the mashup, and property is the name of a property used in a Pega application.
  2. data-pega-parameters=”{Customer:’[page/id/Account]’, Level:’gold’}”
  3. [page/function/token] — where token is a string that has meaning to the function
52
Q

Which three prerequisites must be satisfied before you configure a channel to build a mobile app? (choose 3)

  1. Configure the responsive layout for the mobile application.
  2. Configure access to the Pega Mobile Build Server.
  3. Upload a certificate set for the appropriate mobile platform.
  4. Confirm that Pega Platform is configured to support access through HTTPS.
  5. Download and install an integrated development environment (IDE) of your choice, depending on which platform for which you are building the app.
A
  1. Configure the responsive layout for the mobile application.

2. Configure access to the Pega Mobile Build Server.

Before you can configure a mobile app channel, you must configure access to the Pega Mobile Build Server.

3. Upload a certificate set for the appropriate mobile platform.

Certificate sets are required to sign and distribute native mobile apps on their respective platform’s application marketplaces.

4. Confirm that Pega Platform is configured to support access through HTTPS.

  • Pega Platform requires that mobile apps connect through HTTPS for increased security.*
    5. Download and install an integrated development environment (IDE) of your choice, depending on which platform for which you are building the app.
53
Q

On a mobile device, in order to use a case type in offline mode you need to configure the case to be offline-enabled. True or False

A

TRUE

  • If the application contains cases that are not offline-enabled, the offline enabled mobile app can process them only when the device is online.*
  • In order to be ready to process cases offline you also need to ensure that the cases are in the worklist on top of being offline enabled cases.*
  • When multiple users need to perform the same offline task, you can create a child case to allow users to perform the task independently*
54
Q

______ data pages are used on mobile offline-enabled applications, and in these pages only the records that you modify sync with the server.

A

Large data pages are used on mobile offline-enabled applications, and in these pages only the records that you modify sync with the server.

55
Q

For mobile UI development, instead of small text links use _______.

A

For mobile UI development, instead of small text links use buttons.

We want to make sure that the buttons are large enough to tap.

56
Q

We want to take advantage of ________ components on mobile.

A

We want to take advantage of native components on mobile.

57
Q

To display lists with more than 20 rows in online only mobile apps, control the amount of data on the screen by using the pagination option in a ________ ______ layout

A

To display lists with more than 20 rows in online only mobile apps, control the amount of data on the screen by using the pagination option in a repeating dynamic layout.

58
Q

On mobile applications to make the UI display properly we want to use native, and out-of-the-box controls, using percentages instead of pixels to define the size of layouts, and use dynamic layouts with responsive breakpoints for tables to automatically adjust the number of columns depending on the width of the device in use.

Also, to display several layouts together using the layout group feature.

Don’t use tables.

True or False?

A

TRUE

59
Q

For creating a properly displayed mobile UI we want to avoid using tables and instead use repeating dynamic layouts.

A

TRUE

Tables aren’t even supported on mobile applications. DO NOT USE THEM.

60
Q

If tables are necessary on a mobile UI, ensure that you define the ______ setting for each table column and enable the _________ setting for the table.

A

If tables are necessary on a mobile UI, ensure that you define the importance setting for each table column and enable the responsiveness setting for the table.

  • The table layout uses the importance setting to adjust the way the content of the table displays on a mobile device by prioritizing the display of the most important data.*
  • Also, use conditional logic to determine what content should appear on your mobile application.*
61
Q

Your company has developed a process in Pega Platform™ for tracking orders. Your company also has an existing Android app. You are asked to create a mobile app solution to include the new order tracking process in their existing app. How do you build the mobile app?

  1. Export an unsigned app.
  2. Build a native Android app.
  3. Create a signed SDK app.
  4. Create an SDK app .
A
  1. Export an unsigned app.
  2. Build a native Android app.
  3. Create a signed SDK app.

4. Create an SDK app .

SDK apps allow you to embed parts of an application, like a process in Pega Platform, into existing mobile apps.

62
Q

You can use the same certificate sets to build and distribute iOS and Android apps.

True or False?

A

False

Each platform uses a different set of certificate set requirements.

63
Q

The __________ log contains warnings, errors, and information messages about internal operations. This log also called the console log or system log is used for debugging the application.

A

The PEGA log contains warnings, errors, and information messages about internal operations. This log also called the console log or system log is used for debugging the application.

64
Q

The _______ log contains performance-related alerts triggered when an operation exceeds the specified performance threshold.

A

The ALERT log contains performance-related alerts triggered when an operation exceeds the specified performance threshold.

65
Q

The __________ log contains alerts (identified by the prefix SECU) that suggest improper configuration of Internet Application Composer facilities, or overt attempts to bypass system security features on the Pega Platform node through URL tampering.

A

The ALERTSECURITY log contains alerts (identified by the prefix SECU) that suggest improper configuration of Internet Application Composer facilities, or overt attempts to bypass system security features on the Pega Platform node through URL tampering.

66
Q

The ______ log contains entries generated by the Business Intelligence Exchange (BIX) during extract operations. BIX is an optional add-on product that extracts transactional data from the Pega database into formats suitable for exporting to a reporting data warehouse, operational data store (ODS), or other downstream processes.

A

The BIX log contains entries generated by the Business Intelligence Exchange (BIX) during extract operations. BIX is an optional add-on product that extracts transactional data from the Pega database into formats suitable for exporting to a reporting data warehouse, operational data store (ODS), or other downstream processes.

67
Q

The _________ log contains performance data saved from services.

A

The SERVICES-PAL log contains performance data saved from services.

68
Q

The ________ log contains information about the setup and run-time behavior of the cluster.

A

The CLUSTER log contains information about the setup and run-time behavior of the cluster.

69
Q

Refer to image:

I got this horribly wrong so review this section well.

A
70
Q

DB Trace is best suited to diagnose a performance issue in which of the following two environments? (choose 2)

  1. Staging
  2. Development
  3. Production
  4. Production Mirror
A

1. Staging

Run DB Trace in a non-production environment to avoid performance issues associated with debugging. IE Database Tracer DOES have an impact on performance if we are running it.

2. Development

  • Run DB Trace in a non-production environment to avoid performance issues associated with debugging.*
    3. Production
    4. Production Mirror
71
Q

The Performance Profiler is used to identify a step of a data transform that might have a performance issue.

True or False?

A

TRUE

Even though it says performance issues, we are profiling a particular step of a data transform

72
Q

The Performance Analyzer (PAL) works on existing data and does not degrade processing.

True or False?

A

TRUE

We use the PAL to understand the system resources consumed by processing a single requestor session.

73
Q

Predictive Diagnostic Cloud (PDC) is available only to cloud-based applications.

True or False?

A

FALSE

PDC is available for both cloud and on-premise applications.

74
Q

Which three of the following elements does PDC monitor? (choose 3)

  1. Guardrail warnings
  2. Informational Messages
  3. Alerts
  4. Health Statistics
  5. Application errors
A

1. Guardrail warnings

  1. Informational Messages

3. Alerts

4. Health Statistics

  1. Application errors
75
Q

Which performance tool do you use to collect performance data for individual steps in a data transform?

  1. Database Trace
  2. Performance Profiler
  3. Performance Analyzer (PAL)
  4. Clipboard Tool
A
  1. Database Trace

2. Performance Profiler

  • You use the Performance Profiler to collect performance data for individual steps in a data transform*
    3. Performance Analyzer (PAL)
    4. Clipboard Tool
76
Q

As you run a case instance, you notice it takes a significant amount of time to advance from one view to the next view. You run the case multiple times and notice the same slow performance. How do you proceed?

  1. Use the database trace tool
  2. Use the Pega Predictive Diagnostic Cloud (PDC)
  3. Use the Performance Analyzer (PAL)
  4. Use Performance Profiler tool
A
  1. Use the database trace tool
  2. Use the Pega Predictive Diagnostic Cloud (PDC)

3. Use the Performance Analyzer (PAL)

  • You use the Performance Analyzer (PAL) to understand the system resources consumed by processing a single requestor session.*
    4. Use Performance Profiler tool
77
Q

In which scenario is it most appropriate to leverage Predictive Diagnostic Cloud™ (PDC)?

  1. A company has a Pega Platform™ application and is interested in browsing a list of performance-related alerts.
  2. A company has a Pega Platform™ application and is interested in finding the cause of an error that occurs during case processing.
  3. A company has multiple Pega Platform™ and non-Pega Platform applications and is interested in receiving guidance to avoid system performance issues.
  4. A company has multiple Pega Platform™ applications and is interested in monitoring the health of all active applications.
A
  1. A company has a Pega Platform™ application and is interested in browsing a list of performance-related alerts.
  2. A company has a Pega Platform™ application and is interested in finding the cause of an error that occurs during case processing.
  3. A company has multiple Pega Platform™ and non-Pega Platform applications and is interested in receiving guidance to avoid system performance issues.

4. A company has multiple Pega Platform™ applications and is interested in monitoring the health of all active applications.

PDC can actively gather, monitor, and analyze real-time performance and health indicators from all active Pega Platform™ applications.

78
Q

You use the ________ ______ to translate application-specific rules.

A

You use the Localization wizard to translate application-specific rules.

We must first design and develop the application to support localization in multiple languages and install the language packs if available.

79
Q

To ensure that you design your application for localization, create _____ _____ rules for capturing labels and notes, ______ rules for instructions and messages, and _______ rules for emails.

A

To ensure that you design your application for localization, create field value rules for capturing labels and notes, paragraph rules for instructions and messages, and correspondence rules for emails.

80
Q

How can your applications be localized if a language pack is not available for that region?

  1. Edit all the required fields present in an unlocked ruleset with the translated value and import your custom translation pack
  2. Export all the required fields using the Localization wizard, have them translated, and import your custom translation pack
  3. Edit all the required fields present in a locked ruleset with the translated value and import your custom translation pack
  4. Export all the required fields using the Localization wizard and import your translation pack
A
  1. Edit all the required fields present in an unlocked ruleset with the translated value and import your custom translation pack

2. Export all the required fields using the Localization wizard, have them translated, and import your custom translation pack

  • The Localization wizard helps you create an archive package of the files to be translated. After all the files are translated, import your translation pack.*
    3. Edit all the required fields present in a locked ruleset with the translated value and import your custom translation pack
    4. Export all the required fields using the Localization wizard and import your translation pack
81
Q

Text strings longer than 64 characters are defined as field value rules in a ruleset used for each language-specific localization.

True or False?

A

FALSE

Field values cannot be more than 64 characters. Use paragraph rules for length text strings.

82
Q

Which of the following two statements are true about the Localization wizard? (Choose Two)

  1. You can use the Localization wizard to export the strings to be translated which contain certain rules such as field value or message rules.
  2. The Localization wizard verifies if the localization flag is enabled on user interface rules.
  3. You can use the Localization wizard to change the locale, the base currency, and the time zone.
  4. Correspondence and paragraph rules are exported as HTML files to be translated.
A

1. You can use the Localization wizard to export the strings to be translated which contain certain rules such as field value or message rules.

  • Field values and message rules appear in an XML file. The translated version is inserted in the XML file, and imported in Pega Platform™.*
    2. The Localization wizard verifies if the localization flag is enabled on user interface rules.
    3. You can use the Localization wizard to change the locale, the base currency, and the time zone.

4. Correspondence and paragraph rules are exported as HTML files to be translated.

After downloading the translation pack, look for Base and Translation HTML files. Save the localized versions in the Translation files.

83
Q

You can use field values to localize _______ and _______.

  1. Short descriptions
  2. Correspondence Text
  3. Instruction Text
  4. Paragraph rules
A

1. Short descriptions

  1. Correspondence Text

3. Instruction Text

  1. Paragraph rules
    * Field values are used to localize instruction text and short descriptions under 64 characters*
84
Q

Use _____ only for actions, and use _______ only for navigation

A

Use buttons** only for actions, and use **links only for navigation

85
Q

The _________ ________ tool allows you to identify and rectify some of the accessibility issues within your application.

A

The Accessibility Inspector tool allows you to identify and rectify some of the accessibility issues within your application.

86
Q

How do we check for color blind compliance?

A

Disability preview

The disability preview options allows you to observe your application as it appears to users with one of four types of color vision deficiency.

87
Q

Identify the two issues that the Accessibility Inspector identifies when enabled. (Choose Two)

  1. A screen reader has not been configured properly to interact with a form.
  2. A label is not configured for an icon.
  3. Highlighted text displays indistinctly from the background for a user with color vision deficiency.
  4. A web page lacks a link to quickly navigate to the content area of the work form.
A
  1. A screen reader has not been configured properly to interact with a form.

2. A label is not configured for an icon.

  • This was the answer to one of the questions on the exam, the accessibility inspector identifies when we don’t have helper labels configured for components. Labels are used by assistive devices to identify a control for users with limited or no vision.*
    3. Highlighted text displays indistinctly from the background for a user with color vision deficiency.
  • NO, This is not the accessibility inspector but it is instead the disability preview option.*
  • This question is honestly kind of confusing because even though this is part of the Disability preview the Disability preview is actually a function of the Accessability Inspector*

4. A web page lacks a link to quickly navigate to the content area of the work form.

The Accessibility Inspector highlights issues with the structure of a web page that impact page navigation while using an assistive device

88
Q

What is the purpose of accessibility roles?

  1. Prevent access by unauthorized personnel
  2. Provide enhanced interface support for users requiring assistance
  3. Provide parental controls that enable parents to control access to the application by their children
  4. Enable application use on all software platforms
A
  1. Provide enhanced interface support for users requiring assistance
    * Some users require the accessibility features to interact with your application*
89
Q

A developer decides that buttons in a Pega Platform™ application are blue and the button text is purple. What Pega Platform feature allows the developer to check whether application users with a form of color blindness can easily differentiate between the button text and button background?

  1. Tracer
  2. Live UI
  3. The Device Preview
  4. The Accessibility Inspector
A
  1. The Accessibility Inspector
    * Ok I thought the disability preview was the answer here but the Disability preview is part of the accessibility inspector as it turns out.*
    * The Disability preview in the Accessibility Inspector tool allows you to preview what the current UI looks like to users with different forms of color blindness.*
90
Q

How do we check for a missing alternate option for a section? (label missing helper text?)

A

Accessibilty features

91
Q

Relevant records are rules that have been marked for reuse automatically by Pega Platform or manually by application developers in Dev Studio.

True or False?

A

TRUE

When you create records in App Studio, Pega Platform automatically marks the records as relevant. For example, Pega Platform automatically marks fields, views, and processes as relevant records when you create them in a case type or data type.

92
Q

You can manually mark many rules types as relevant records such as:

  • Properties
  • Sections
  • Harnesses
  • Paragraphs
  • Correspondences
  • SLA’s
  • Flows
  • Flow actions

True or False?

A

TRUE

Some things like fields for a case type are marked automatically as relevant records and we can make Properties, Sections, Harnesses, Paragraphs, Correspondences, SLA’s, Flows and Flow actions as relevant records as well.

93
Q

What are two benefits of leveraging relevant records?

  1. Improves application quality.
  2. Reduces development time
  3. Marks a rule as more important than other rules
  4. Makes the rule available only in Dev Studio
A
  1. Improves application quality
  2. Reduces development time
    * Leveraging relevant records encourages reuse by developers, which improves the quality and reduces development time.*
94
Q

Which three rule types can be reused through the use of relevant records? (Choose Three)

  1. Data transform
  2. FIeld values
  3. Sections
  4. Paragraphs
  5. Flows
A
  1. Sections
  2. Paragraphs
  3. Flows
95
Q

Which performance tool do you run to determine the specific step executed by your requestor session that is causing a problem?

  1. The PegaRULES Log Analyzer (PLA)
  2. The Performance Profiler Tool
  3. The Performance Analyzer
  4. The Database Trace Tool
A
  1. The Performance Profiler Tool
    * The Performance Profiler tool is run to narrow down which specific step is causing a problem.*
    * I answered PAL here the first time but if we need to determine a step and not the actual cause of the issue then we will use the profiler*
96
Q

Which of the following options can you use along with system alerts to determine if your application performance needs optimization?

  1. Live UI Tool
  2. Performance Analyzer (PAL)
  3. Database Trace
  4. Performance Profiler
A
  1. Performance Analyzer
    * The Performance Analyzer (PAL) uses existing performance data, so it does not slow down the application*
    * I answered the Profiler here the first time but this is not correct. If we want to determine if our application performance needs optimization we will use the performance analyzer (PAL)*
97
Q

Which requirement do you implement with an access control policy?

  1. Only a customer service representative can view an unmasked account number..
  2. Only a manager can authorize a refund exceeding USD1000..
  3. Only a specialized appraiser can provide an appraisal of art for a homeowner’s insurance policy.
  4. Only an administrator can delete a duplicate address change request.
A

1. Only a customer service representative can view an unmasked account number..

  • You mask a property value to obscure sensitive data with an access control policy rule.*
    2. Only a manager can authorize a refund exceeding USD1000..
    3. Only a specialized appraiser can provide an appraisal of art for a homeowner’s insurance policy.
    4. Only an administrator can delete a duplicate address change request.
98
Q

A case type includes the following security requirement: After a transaction dispute enters the Review stage, only the customer or the case manager assigned to the dispute can cancel the dispute. Before the Review stage, the customer or the customer service representative who created the case can cancel the transaction dispute. Which three types of rules are needed to configure the security requirement? (Choose Three)

  1. Access when.
  2. When.
  3. Access control policy.
  4. Access control policy condition.
  5. Privilege
A

1. Access when.

  • An Access when rule is used to test whether the case has entered the Review stage or a later stage.*
    2. When

3. Access control policy.

An access control policy is needed to allow the delete action on instances of the transaction dispute case type.

4. Access control policy condition.

  • An access control policy condition is used to determine whether the current user meets the access control policy’s conditions.*
    5. Privilege
99
Q

An online order must include item price information at the time of the order placement. Which is the best implementation for this use case?

  1. Configure a page property with the Copy data from a data page option enabled
  2. Reference data directly without making it part of the data model
  3. Configure a data transform to directly populate the data model with price information
  4. Configure a page property with the Refer to a data page option enabled
A

1. Configure a page property with the Copy data from a data page option enabled

  • The snapshot pattern copies data from an external system to the case.*
  • Here since we need the item price information in the order case we should Copy the data in, if we did not need to hold on to this data we could simply Refer to a data page.*
    2. Reference data directly without making it part of the data model
    3. Configure a data transform to directly populate the data model with price information
    4. Configure a page property with the Refer to a data page option enabled
100
Q

The ______ pattern copies data from an external system to the case.

A

The snapshot pattern copies data from an external system to the case

101
Q

A product return case must always show the current contact information for the customer from the customer database. Which is the best implementation for this use case?

  1. Configure a page property with the Copy data from a data page option enabled
  2. Configure a data transform to directly populate the data model with customer data
  3. Reference a data page with customer information directly from UI controls
  4. Configure a page property with the Refer to a data page option enabled
A
  1. Configure a page property with the Copy data from a data page option enabled
  2. Configure a data transform to directly populate the data model with customer data
  3. Reference a data page with customer information directly from UI controls

4. Configure a page property with the Refer to a data page option enabled

The system of record (SoR) pattern references data in an external system without including it in the case data.

102
Q

The _______ __ ______ option references data in an external system without including it in the case data.

A

The Refer to a data page option references data in an external system without including it in the case data.

The system of record (SoR) pattern references data in an external system without including it in case data for whenever we need to display something but don’t need to use its values later on for case processing.

103
Q

Users must select the make and model of their vehicle when submitting a new insurance claim. Which is the best implementation for this use case?

  1. Source the contents of the UI control directly from a data page
  2. Configure a keyed data page of make and model information
  3. Configure a page property with the Refer to a data page option enabled
  4. Configure a page property with the Copy data from a data page option enabled
A

1. Source the contents of the UI control directly from a data page

  • The reference pattern references data directly without making it part of the data model.*
    2. Configure a keyed data page of make and model information
    3. Configure a page property with the Refer to a data page option enabled
    4. Configure a page property with the Copy data from a data page option enabled
104
Q

When users select the model of their vehicle, the application displays the specifications for the model. Most vehicle model requests occur before the vehicle information becomes stale. Which is the best implementation for this use case?

  1. Create a keyed data page with vehicle information
  2. Reference a data page with vehicle information directly from UI controls
  3. Create a vehicle information data page for each model
  4. Create a parameterized vehicle information data page which loads the desired vehicle information
A

1. Create a keyed data page with vehicle information

  • A keyed data page frontloads the data from the data source and then uses one or multiple keys to locate and return matching instances. The keyed data page is the best implementation when there are frequent unique queries before the information becomes stale.*
    2. Reference a data page with vehicle information directly from UI controls
    3. Create a vehicle information data page for each model
    4. Create a parameterized vehicle information data page which loads the desired vehicle information
105
Q

A ______ ______ _____ frontloads the data from the data source and then uses one or multiple keys to locate and return matching instances. The ______ _______ _____ is the best implementation when there are frequent unique queries before the information becomes stale.

A

A keyed data page frontloads the data from the data source and then uses one or multiple keys to locate and return matching instances. The keyed data page is the best implementation when there are frequent unique queries before the information becomes stale.

Multiple users requesting data from a system that doesn’t change that often would be a keyed data page. With a keyed data page after the first load of the data this type of frequent data access will become a lot faster because the data will already be in the system with the key value pairs.

106
Q

A connector can be directly referenced from ______ and _______

  1. flows
  2. data pages.
  3. activities
  4. data transforms
A

A connector can be directly referenced from activities** and **data pages

107
Q

How do we change the configuration of a SOAP data connection to an external data source if it slow every time a customer opens a new clients info?

A

Setup the data page to Keyed data access. This makes it so that the first itme that we access the data we have it loaded and it should be nearly instant access after that point.

108
Q

If a client has a pre-existing application (web-based) how do we allow them to utilize pega?

A
  • Add URL to the Pega Application as allowed and trusted
  • Have client allow HTTPS on their end so that the mashup can perform all the necessary security checks
109
Q

How do we simulate data for a SOAP connection?

A

Create a simulation activity and data transform for the data page.

110
Q

How do we handle errors with a SOAP connection?

A
  • Add error detection to all data pages
  • Invoke a reusable data transform to handle errors
  • Pega Platform provides a template data transform called pxErrorHandlingTemplate.*
  • This data can be used to create a reusable error handling data transform. The pxErrorHandlingTemplate data transform is in the base class and is shipped as part of the product.*
111
Q

If something goes wrong mapping data from an external system to Pega data structure, what type of error would this be?

A
  • Permanent Error?
112
Q

Which three prerequisites must be satisfied before you configure a channel to build a mobile app? (Choose Three)

  1. Confirm that Pega Platform is configured to support access through HTTPS.
  2. Download and install an integrated development environment (IDE) of your choice, depending on which platform for which you are building the app.
  3. Configure access to the Pega Mobile Build Server.
  4. Configure the responsive layout for the mobile application.
  5. Upload a certificate set for the appropriate mobile platform.
A

1. Confirm that Pega Platform is configured to support access through HTTPS.

  1. Download and install an integrated development environment (IDE) of your choice, depending on which platform for which you are building the app.

3. Configure access to the Pega Mobile Build Server.

  1. Configure the responsive layout for the mobile application.

5. Upload a certificate set for the appropriate mobile platform.

113
Q

Pega API is based on _____ / _____ services

A

Pega API is based on REST/JSON services

114
Q

Which two of the following actions can you perform with the Pega API?

  1. Create a new case
  2. Update a decision table
  3. Access data from a data page
  4. Add a property to a data class
A
  1. Create a new case
    * The Pega API allows you to create new cases and access data from a data page*
  2. Access data from a data page
115
Q

_______, _____ ______, and ______ use the response data transform to detect errors.

A

Connectors, report definitions and lookups use the response data transform to detect errors.

116
Q

When data pages invoke a connector, in terms of error detection and handling the two best practices are to…

A
  • Add error detection to all data pages
  • Invoke a reusable data transform to handle errors
117
Q

Pega Platform provides a template data transform called ________.

A

Pega Platform provides a template data transform called pxErrorHandlingTemplate.

  • This data can be used to create a reusable error handling data transform. The pxErrorHandlingTemplate data transform is in the base class and is shipped as part of the product.*
  • Each connector has an error handling flow. Pega Platform automatically invokes the error handler flow if the error is not detected by another mechanism*
118
Q

The best practice is to use an ____ ______ _____ _____ if errors are detected by using a response data transform in a data page.

A

The best prractice is to use an error handling data transform if the errors are detected byt using a response data transform in a data page.

  • If the error is not detected on the data page, then the error handler flow for the connector is invoked to detect the error. The response data transform is invboked after the connector call is complete and if there is an issue messages are added.*
  • In your response data transform, use a when condition to check for any error messages on the page. If an error has occurred apply the reusable error handling data transform.*
119
Q

The ______ ______ ______ feature detects errors that are not detected in a data page. This feature is always enabled and allows you to implement a process for handling the error. It is typically used when the connector response is not required immediately.

A

The error handling flow feature detects errors that are not detected in a data page. This feature is always enabled and allows you to implement a process for handling the error. It is typically used when the connector response is not required immediately.

The error handler flow is not executed if the error is detected in the response data transform.

120
Q

You can configure the error handler flow in the service tab for the connector. By default, connectors use the standard ConnectionProblem flow. The flow can be copied and customized. You can also choose to create an alternative error handler flow.

True or False?

A

TRUE

When an error occurs, the original flow execution is paused and control is handed over to the error handler flow. If the resource is unavailable a transient error may be preventing processing. If there is no transient error, the connector is retried, and processing continues in a flow called FlowProblems.

121
Q

An error is generated when a connector invokes a remote service. Which of the following is an example of a transient error?

  1. The service does not understand the request format
  2. The total of a returned order is incorrectly calculated
  3. The service is running on a system that is temporarily unavailable
  4. The request is sent to the wrong system.
A
  1. The service is running on a system that is temporarily unavailable.

This is a transient error because the situation is temporary.

122
Q

Which of the following allows you to write all errors that are detected when loading a data page to a log file?

  1. Invoke the error handler from the post-processing activity in a data page.
  2. Use the error handling flow
  3. Use an existing function in the error handling data transform
  4. Use a transition condition
A
  1. Use an existing function in the error handling data transform

There is an existing function for writing messages to a log file.

123
Q

Which two of the following statements are the most accurate with respect to the error handler flow? (Choose Two)

  1. The standard error handler flow is final and cannot be customized.
  2. The error handler flow is invoked if the error is not handled elsewhere.
  3. The error handler flow is the recommended way to handle all integration errors.
  4. The standard connector error handler flow can help recover from transient errors.
A

2. The error handler flow is invoked if the error is not handled elsewhere.

The error handler flow is always enabled and invoked if the error is not handled in the data page or activity.

4. The standard connector error handler flow can help recover from transient errors.

The standard error handler flow retries sending the request in order to recover from transient errors.

124
Q

You can call any of the Pega API services by using _______

A

You can call any of the Pega API services by using standard HTTP methods

You can call a Pega API from outside a Pega application using standard HTTP methods like GET, POST, REST

125
Q

What is one way that we can implement rapid implementation of Pega-powered mobile and client applications?

A

Pega API

  • REST/JSON services enable this, and the Pega API provides a standard set of services that includes new case creation, assignment processing, and access to data pages.*
  • You can call the Pega API services using standard HTTP methods.*
126
Q

If we want to have a SOAP connection we would need to use a _______

If we want to use the REST protocol we use the _____ _____

It is best practice to use the ______ ____ whenever possible

A

If we want to have a SOAP connection we would need to use a Service

If we want to use the REST protocol we use the Pega API

It is best practice to use the Pega API whenever possible

127
Q

Your application has a top-level Purchase Request case type and a Purchaser Order child case type. The company determines that only one user at a time may open and work on a case. However, users working on purchase orders should not lock out users working on purchase requests. How do you configure the lock settings for both case types?

  1. Select the Allow multiple users locking option on the Purchase request case type and select the Allow access for the parent case when the child case is opened option in the Purchase order case type
  2. Select the Allow one user locking option on the Purchase Order case type and the Allow access for the parent case type when the child case is opened option on the Purchase Order case type.
  3. Select the Allow one user locking option on the Purchase Request case type and select the Allow access for the parent case when the child case is opened option on the Purchase Order case type
  4. Select the Allow one user locking option on the Purchase Order case type and the Allow access for the parent case when the child case is opened option on the Purchase Request case type
A
  1. Select the Allow one user locking option on the Purchase Request case type and select the Allow access for the parent case when the child case is opened option on the Purchase order case type

You always select the Allow one user locking option on the parent case type and select Allow access for the parent case when the child case is opened option on the child case type in this scenario