You are on page 1of 6

Which statement about managing encrypted data in Pega Platform is true?

a. Each organization uses a custom key to encrypt its data

b. Encryption policies apply to Work- and Data- classes only

(entire class instances and encryption of specific properties)

c. Property-level encryption is a time-efficient method to encrypt data

(Property level is time-consuming….class level is time-efficient method)

d. Filter conditions cannot reference encrypted properties in reports

An application includes three case types.

A business requirement states that members of the An application includes three case types. A
business requirement states that members of the App: Users access role cannot run reports for one
of the case types.

Which configuration can you apply to satisfy this requirement?

a. Use an automation to verify that the user does not have access to the App: users access role
before running the report. ( Answer-online platforms without before running the report)

b. Use an Access When record to verify that the user role has access to the Run reports action

(Can be the answer)

c. Use an Access When record to verify that the case type has access to the Run reports action

d. Use the Access Manager and set the Run reports action for the case type to No Access for the
user role. (Answer in given bit bank)

e. Use an Access Deny record to set the Run reports action to No Access

You perform a major skim on the ruleset ABC:02-02 to ABC:03-01. In the Answer area, select the
ruleset versions that the skim operation uses. Ruleset Version Does the skim operation use RS
version?

Ruleset Version Does the skim operation use the RS version?

01-01-01 No

02-01-01 Yes

02-02-01 Yes

02-01-05 Yes

The current version of the application lists ABC:02-02 as an application ruleset. The ruleset versions
listed in the Answer Area are also present in the System. Identify the ruleset versions that the skim
operations consider when you perform a major version ruleset skim on ruleset ABC.
i)01-01-01 No

ii)02-01-01 Yes

iii)01-02-01 No
iv)02-01-05 Yes

In which situation do you configure branched rulesets?

a. One team creates a new patch for an application while another team creates a new major version
of the application

b. You need to delegate rules to process owners from the business

c. Multiple teams need to work on the same application version

d. A team needs to work on the next version of an application while preparing to migrate the current
version.

Which two configurations can you use to include access groups into your Product rule?

a. Add the access group to the Product record in the individual instances to include section

b. Add the access group to the application definition

c. Associate the access groups with a ruleset included in the application

d. Export the access groups using the Access Manager

Access groups that have access to a ruleset (associated) will get pulled into the RAP file (Product
rule). Adding individual is an option and is self-explanatory.

In the following example, the HomeIns, HomeInsInt, and Customer rulesets are configured for
application validation.MyCo and MyCoInt are configured for ruleset validation. MyCo lists MyCoInt
and Customer as its prerequisites, and the prerequisite forMyCoInt is Pega-ProcessCommander.

Which of the following statements is correct ?

a. Rules in MyCo can reference rules in HomeIns

b. Rules in MyCo can reference rules in HomeInsInt

c. Rules in MyCoInt can reference rules in Customer

d. Rules in Customer can reference rules in HomeIns


You want to create a new minor version of an application ruleset to add a new feature to your
application. The new feature will be made available to users in a phased rollout. How do you update
the application to add the new ruleset version?

a. Perform a major skim on the existing ruleset and update the existing application version.

b. Create a branch ruleset and a new application, and add the branch ruleset to the application

c. Lock and roll the existing ruleset, and create a new application version

d. Create a new application version and add the new ruleset version as a product ruleset
You use the lock and roll method for small changes or patches.

You are preparing to create a new major version of an application ruleset with multiple minor and
patch versions. How do you create the new ruleset version?

a. Lock and roll the existing ruleset versions to the new version.

b. Skim the relevant ruleset versions to copy the highest versions of the existing rules to the new
version

Use the Ruleset Maintenance wizard to skim the relevant ruleset version to copy the highest
version of existing rules to the new ruleset version

c. Merge the existing rules in the relevant ruleset versions to the new version.

d. Create a new application ruleset by using the appropriate version number

You are working on an update to an application which only affects some rules for a certain case type.
For migration to a production system, the customer wants the update rules released as a new patch
version of the application ruleset How do you create the new ruleset version?

a. Skim the relevant rulesets to copy the highest versions of the existing rules to the new version

b. Merge the existing rules in the relevant rulesets to the new version

c. Lock the current ruleset and then roll (increment) the ruleset versions

d. Create a branched ruleset and then copy the affected rules into the new branched ruleset.
--------------------------------------------------------------------------------------------------------------------------------------

What are three valid ways to exchange data through a Pega Web Mashup?

a. Use an SQL call to exchange data between the mashup and hosting web page.

b. Use the Javascript function doAction() to set or read data values through the hosting web page.

c. Use a queue processor to pass updated attributes to the gadget on the hosting webpage.

d. Use the data-pega-event-onpagedata attribute to configure the default value for the gadget.

e. Use an action object configured as a script to perform additional actions on a web mashup
gadget
Place the steps in the order in which a service process a request

Inbound request received

Map inbound data

Request processing

Map outbound data

system returns a response

Using the Pega Mobile client you can Leverage Mobile Devices features such as

a.Biometric Identification

b.Phone Calls

c.Photo Gallery

d.Text message

Using the Pega Mobile Client™, you can develop a stand-alone, native mobile app experience that
leverages full device functionality such as continued offline processing of a case, push notifications,
barcode scanning, or biometric identification.

Which three mobile devices features can you leverage by using Pega Mobile Client? (Choose Three)

a. Phone Call

b. Messages

c. Barcode Scanner

d. Push Notifications

e. Biometric Identification

Using the Pega Mobile Client™, you can develop a stand-alone, native mobile app experience that
leverages full device functionality such as continued offline processing of a case, push notifications,
barcode scanning, or biometric identification.

What are the two most common ways to expose your application to an external system? (Choose
Two)

a. Create a web service with the Service wizard.

b. Configure a signed certificate.

c. Leverage the Pega API.

d. Create a connector linked to a data page.


The two most common ways to expose your application as a service are either to leverage the Pega
API or to create a web service with the Service wizard. Conceptually, these two options work the
same way: a request is made to a URL, and a response is returned.
Which two statements about keyed data pages are true? (Choose Two).

a. A keyed data page can be any structure except a list.

b. A keyed data page can have multiple keys.

c. A keyed data page can return multiple embedded pages.

d. A keyed data page supports editable data pages only.


--------------------------------------------------------------------------------------------------------------------------------------

Graduate school students create and submit project proposals to their advisors. During the proposal
phase, the advisor and the student can edit the proposal. How do you ensure the advisor and the
student can simultaneously edit the proposal, and the application can check the proposal for changes
before submitting them?

a. Configure the student and advisor roles with view and edit permission.

b. Configure the locking on the case type to allow one user.

c. Configure an assignment for the advisor and an assignment for the student.

d. Configure the locking on the case type to allow multiple users.

A view has a part number field that requires the first two characters are letters, and the last four are
digits (for example, AB1234).

How do you ensure that the correct pattern is entered when the user exits the field?

a. Configure a validate rule to use input-qualified validation configuration.

b. Configure an edit validate rule and reference it from the property rule for the field

c. Configure an edit validate rule and call it from a validate rule in the relevant flow action.

d. Configure a validate rule on the flow action to validate the field with Boolean logic

A class group is used to .

a. Assign work to a specific group of users

b. Identify a layer of the Enterprise Class Structure.

c. Combine related properties by usage

d. Associate child classes with a single database table

Which two statements are true about database tables in Pega Platform? (Choose Two)

A. The Database Table rule allows the configuration of a connection to a specific table.

B. The report definition rule should only be used against one table for performance reasons.

C. The PegaRULES database contains rules while PegaDATA contains work instances.

D. The History record table contains a record of when each user logged in to the system.

You might also like