DRAG DROP
XYZ Inc.'s COE wants case life cycle developers to use a field group named "Claim" regardless of the application being developed.
Select and move the three tasks that the COE performs for this requirement to the Task List column and place them in the correct order. (Choose Three)
Select and Place:
An application contains cases which transition though different statuses throughout their life cycle which typ.ca, months. Design a reporting strategy to display the number of cases by status at the end of each month for a 12 month period.
A. Configure an agent to record monthly case status in a separate table and report on that table.
B. Configure an activity to generate the data in the clipboard and report using a custom section.
C. Configure a summary report that leverages sub reports for each month.
D. Configure a Declare index to record case data to a separate table.
While configuring GetNextWork, overriding the System Settings rule
GetNextWork__WorkBasketUrgencyThreshold imposes a minimum cutoff value for assignment urgency.
Which statement accurately depicts the system behavior when the GetNextWork_WorkBaseketUrgencyThreshold setting is overridden?
A. The override ignores other criteria in GetNextWork.
B. The override causes the application to revisit workbaskets for assignments with lower urgency.
C. The override causes a search of only those assignments with the urgency higher than the threshold value.
D. The override causes a search of all assignments in a work queue that equal or exceed the set urgency threshold.
An application consisting of a single case requires sending correspondence at a designated time with minimal delay. The existing solution uses an assignment to pause the case until an SLA invokes the escalation activity that sends the correspondence. Occasionally there is a delay in sending the correspondence.
Which two factors contribute to the delay? (Choose Two)
A. The number of queued SI A objects
B. Multiple open assignments on the same case
C. Error handling for locked items
D. Correspondence rule configuration
Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.
Which configuration do you recommend?
A. Use a visible when rule for the properties displaying sensitive information.
B. Create an access control policy restricting access to the sensitive information.
C. Configure an access deny rule restricting access to the sensitive information.
D. Move sensitive information to separate sections and apply a privilege to the sections.
XYZ, Inc. is multinational software interested in deploying a worldwide application as soon as possible. The application currently does not have requirements that depend on its user's geographical region. An outside consultant suggested that the application initially be generated with a framework and implementation layer.
Which three questions do you ask to validate the outside consultant's recommendation? (Choose Three)
A. Can the framework layer instead consist of multiple built-on applications?
B. How many languages and locales must the application eventually support?
C. Is there a reason why this decision cannot be made at a later time?
D. Is there an intent to market the framework layer to other companies?
E. What is the name of the first division or region that uses the application?
Which of the following Skin rule customizations help satisfy the stated requirements?
A. Configure the importance field for each column included in a repeating layout.
B. Configure the Column I ayout and specify how the sidebar appears on tablets and smart phones.
C. Configure the style for all application field values, paragraphs, and correspondence records.
D. Configure the Column Layout and specify the width of the sidebar on desktops.
You oversee a medium-size development team. Some of the team members and new to Pega and are working on features in a separate branch. What are two ways you can ensure that the rules the team creates adhere to best practices? (Choose Two)
A. Run 1 rarer on each new rule in the branch that new team members check in to identify any failures in rule execution.
B. Leverage the branch review feature to have senior team members validate the branch contents.
C. Use Pega Log Analyzer to locate any exceptions in the branch associated with the new team members.
D. Review the branch quality to identify any rules with guardrail warnings.
An end user of the application experienced a browser crash while working on a highly available system. Crash recovery is enabled. Does the user to be reauthenticated?
A. Yes, if the user is directed to the same node.
B. No, if the user is directed to a different node.
C. Yes, If the authentication cookie was lost.
D. No, if the authentication cookie was lost
Which two actions can yon perform to improve the guardrails compliance score of an application? (Choose two)
A. Ensure keyed data classes are not mapped to pr-other where possible.
B. Convert activities that only retrieve data to data transforms that invoke data pages.
C. Achieve a higher application level test coverage percentage score.
D. Increase the percentage of unit tests and scenario tests that pass.