Leon Souza
Quiz von , erstellt am more than 1 year ago

Information Technology Quiz am Quiz Pega Lead System Architect 8.5V, erstellt von Leon Souza am 28/10/2021.

138
0
0
Leon Souza
Erstellt von Leon Souza vor fast 3 Jahre
Schließen

Quiz Pega Lead System Architect 8.5V

Frage 1 von 111

1

What are the are two main goals of the Lead System Architect mission? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Identify design options for particular situations

  • Evaluate identified design options to form a recommended solution

  • Learn how asynchronous integration works

  • Solidify techniques for advanced rule configuration

Erklärung

Frage 2 von 111

1

Which five of the following options should you consider when recommending a design solution? (Choose Five)

Wähle eine oder mehr der folgenden:

  • Deployment

  • Effort (cost)

  • Complexity (which indirectly impact effort and maintenance)

  • Maintenance

  • Resource management (memory/database)

  • User experience/responsiveness

Erklärung

Frage 3 von 111

1

Why would you use PDC or AES when the organization already has application performance monitoring tools in place?

Wähle eine der folgenden:

  • PDC and AES show insights into the health of the Pega application.

  • PDC and AES collect alerts and health activity across Pega nodes.

  • PDC and AES provide the ability to stop and start agents, listeners, and manage requestors.

  • PDC and AES are available both on premise and in the Pega Cloud.

Erklärung

Frage 4 von 111

1

To automate work in the center-out business architecture, _______________ is needed.

Wähle eine der folgenden:

  • Case management

  • Robotic Process Automation

  • Business process management

  • Business rules engine

Erklärung

Frage 5 von 111

1

Which two business requirements impact how you deploy your application? (Choose Two)

Wähle eine oder mehr der folgenden:

  • You have requirements to support a business process outsourcing (BPO) model for your organization.

  • You have requirements for case types to participate in a distributed architecture through microservices.

  • You have requirements to start application development in Pega Cloud, and then move your application to an on-premise production environment.

  • You have requirements to use message driven beans (MDB) to deliver messages from a system of record to the Pega application.

Erklärung

Frage 6 von 111

1

When developing a new Pega application, start with _________________ and ___________________. (Choose Two)

Wähle eine oder mehr der folgenden:

  • integration to systems of record and work your way back into the Pega application

  • the Pega application in the middle and work your way out to channels and systems of record

  • one application at a time and base your design on what you know today

  • channel design and work your way into the Pega application

Erklärung

Frage 7 von 111

1

What is the primary reason for designing the security model as early as possible?

Wähle eine der folgenden:

  • To quickly address any warnings you see in the Rule Security Analyzer

  • To begin penetration testing as early as possible

  • To start your team on building access role, privileges, and attribute-based controls

  • To ensure you account for and design to the organization security standards and legal requirements

Erklärung

Frage 8 von 111

1

__________ allows users to quickly and easily define the data required to build the apps they need, and then access that data in their running application – all without having to worry about how and where the data is actually stored and accessed.

Wähle eine der folgenden:

  • Clipboard

  • Live Data

  • Live UI

  • App Studio

Erklärung

Frage 9 von 111

1

The primary benefit of using a Pega application is that it allows you to _______________________.

Wähle eine der folgenden:

  • integrate with systems of record for lines of business more easily

  • get to the minimum lovable product (MLP) faster

  • utilize Pega's artificial intelligence (AI applications more effectively

  • compete with other industry-specific point solutions

Erklärung

Frage 10 von 111

1

Pega's applications include ______________ and _______________. (Choose Two)

Wähle eine oder mehr der folgenden:

  • marketing applications

  • customer engagement applications

  • industry applications

  • artificial intelligence applications

Erklärung

Frage 11 von 111

1

Performing a ____________________ allows you to determine the differences between the features that the Pega application provides and your unique business requirements to support the delivery of the minimum loveable product (MLP).

Wähle eine der folgenden:

  • solution implementation gap analysis

  • sprint review

  • DCO session

  • requirements planning session

Erklärung

Frage 12 von 111

1

What two benefits does App Studio provide? (Choose Two)

Wähle eine oder mehr der folgenden:

  • An easy-to-use development environment designed for new users.

  • Support for scenario testing.

  • Quick creation of enterprise assets.

  • Rapid construction of new application concepts.

Erklärung

Frage 13 von 111

1

What are two key initiatives to ensure the successful adoption of App Studio? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Evaluate that applications are fit for the App Studio program.

  • Establish a center of excellence (COE) for the organization.

  • Strive towards a decentralized project validation and approval model.

  • Ensure business users are technically self-sufficient before starting a project.

Erklärung

Frage 14 von 111

1

Which of the following two options are best practices in App Studio? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Create reusable IT assets using App Studio.

  • Share business assets across applications.

  • Manage reusable assets through a center of excellence (COE).

  • Avoid App Studio for DCO session.

Erklärung

Frage 15 von 111

1

Which three types of records can be marked as relevant records? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Activities

  • Harnesses

  • Properties

  • Processes

Erklärung

Frage 16 von 111

1

Which statement is true when comparing subcases and sub-flows?

Wähle eine der folgenden:

  • Subcases are always preferred over sub-flows.

  • Subcases perform better than sub-flows.

  • Locking consequences can be ignored with sub-flows.

  • Subcases offer more security options than sub-flows.

Erklärung

Frage 17 von 111

1

Which two of the following statements are advantages of using a single case over subcase designs? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Subflows can be processed without interruption.

  • You can make use of dependency management between subflows.

  • All attachments are readily accessible.

  • No replication of data is necessary with a single case.

Erklärung

Frage 18 von 111

1

Which two of the following situations require that the AllCoveredResolved ticket is required in conjunction with the wait shape? (Choose Two)

Wähle eine oder mehr der folgenden:

  • When different types of subcases are involved.

  • When any of the covered subcases are resolved.

  • When the wait shape is configured as a timer with a duration shorter than the duration in which the ticket would be issued.

  • When the wait shape is configured as a timer with a duration longer than the duration in which the ticket would be issued.

Erklärung

Frage 19 von 111

1

A case can enter the Create stage only _________________________________.

Wähle eine der folgenden:

  • twice

  • as many times as there are processes defined in the Create stage

  • as many times as there are stages defined in the case life cycle

  • once

Erklärung

Frage 20 von 111

1

Case processing can be performed by which three of the following requestor types? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Portal

  • Browser

  • Batch

  • App

Erklärung

Frage 21 von 111

1

Which two of the following terms are associated with the term "component"? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Recursive

  • Interface

  • Ruleset

  • Framework

Erklärung

Frage 22 von 111

1

Which two of the following design approaches are most closely related to the concept of application layering? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Liskov Substitution

  • Open-closed principle

  • Template design pattern

  • Polymorphism

Erklärung

Frage 23 von 111

1

A ruleset override application can be used for which purpose?

Wähle eine der folgenden:

  • For aggregating multiple built-on applications into a single application.

  • As a repository for Dependency inversion-based rules.

  • For creating the first implementation application built on a framework application

  • For defining applications specific to a division within an enterprise.

Erklärung

Frage 24 von 111

1

Which two options are valid reasons for initially creating a single application? (Choose Two)

Wähle eine oder mehr der folgenden:

  • The development of component applications takes more time because each application has to be tested individually.

  • The application is specific to a single government agency.

  • Avoid the development of two application layers simultaneously.

  • The concept of multiple built-on component applications has not been promoted in the past.

Erklärung

Frage 25 von 111

1

Which three of the following approaches are valid ways of extending rules in Pega Platform? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Organization hierarchy

  • Circumstance

  • Dynamic class referencing (DCR)

  • Class

  • Ruleset

Erklärung

Frage 26 von 111

1

It is a good practice to include case types in a component.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 27 von 111

1

How do you create a deployment package file for a component? (Choose two)

Wähle eine oder mehr der folgenden:

  • On the component documentation tab, use the options in the Installation section.

  • Use Rule-Admin-Product

  • On the component definition tab, use Package Component

  • Use Export from ruleset version.

Erklärung

Frage 28 von 111

1

Which one of the following object-oriented programming principles is followed by Pega component applications?

Wähle eine der folgenden:

  • Single Responsibility

  • Interface Segregation

  • Open/Closed

  • Liskov Substitution

Erklärung

Frage 29 von 111

1

Which one of the following specialization techniques is best suited for localization of Pega applications?

Wähle eine der folgenden:

  • Circumstances

  • Organization hierarchy

  • Rulesets

  • Classes

Erklärung

Frage 30 von 111

1

Which three of the following features are available in a built-on application and are not available in a component? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Pega Exchange publishing

  • Self-testable

  • Extendable case types

  • Integration rules

  • PegaUnit test creation

Erklärung

Frage 31 von 111

1

Which two of the following options are key responsibilities of a Center of Excellence (COE)? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Provide support to the lead system architect (LSA) on the project

  • Lead application development efforts

  • Manage and promote reusable assets

  • Identify new opportunities in the organization

Erklärung

Frage 32 von 111

1

Which two statements are true regarding rule names? (Choose Two)

Wähle eine oder mehr der folgenden:

  • App Studio generates names for rules

  • Case type class names must exactly reflect their user population otherwise developer productivity may suffer

  • Refactoring class names is a time-consuming process

  • All foundation classes must contain FW

Erklärung

Frage 33 von 111

1

Which two statements are true when subdividing an existing user population into two distinct applications? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Cloning the existing database is desirable

  • Reporting and security is simplified

  • Resolved cases can be duplicated during migration

  • User/account data can be gradually migrated

Erklärung

Frage 34 von 111

1

What are two benefits of using a completely new database for a new user population? (Choose Two)

Wähle eine oder mehr der folgenden:

  • No need exists to use class specialization

  • Assignments and attachments can be saved to different tables

  • Multitenancy can be avoided

  • The same table names can be used in both databases

Erklärung

Frage 35 von 111

1

Which three of the following options make up the data modeling three-level approach? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Flexible

  • Extensible

  • Physical

  • Logical

  • Conceptual

Erklärung

Frage 36 von 111

1

Which of the following are considered while designing a data model?

Wähle eine oder mehr der folgenden:

  • Organizing the data

  • Performing action on the data

  • Managing the data storage

  • Archiving the data

Erklärung

Frage 37 von 111

1

Which two of the following options are ways to version data? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Add a property such as an as-of date or monotonically increasing version. Filter based on values.

  • Define a custom rule.

  • When deploying data, remove existing instances first.

  • Define report definitions with subreports that filter on MAX pxUpdateTime.

Erklärung

Frage 38 von 111

1

A dependency tree has which characteristic?

Wähle eine der folgenden:

  • Circular references are not allowed within a level.

  • The number of items in a level tends to decrease as the level increases.

  • A level can only reference the previous level.

  • Layers are synonymous with unique contiguous sets of levels.

Erklärung

Frage 39 von 111

1

Which two hierarchy types are applicable to object-oriented programing inheritance? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Subsumptive

  • Compositional

  • Programmatic

  • Layer-based

Erklärung

Frage 40 von 111

1

In which of the following situations is data locking required?

Wähle eine der folgenden:

  • When ensuring integrity of a custom queue table.

  • When a case property uses the Data Page Snapshot pattern.

  • When the allow locking check-box is checked within a data class rule and an instance of the data class is opened.

  • When initially saving a record to a custom queue table.

Erklärung

Frage 41 von 111

1

A enterprise-level data class has multiple instances that can be selected from a data page sourced repeating grid. The class and ruleset in which the class is defined needs to include a data transform that adds an instance to a list. For extensibility, which two of the following could be implemented? (Choose Two)

Wähle eine oder mehr der folgenden:

  • A Lookup data page that returns the class of the page according to the application that adds to the list.

  • A Lookup data page that returns the name of page to use when appending to .pxResults().

  • Create a class with -Extension appended to the data class name. Save the data transform to that class.

  • Provide a uniquely-named, embedded-list property applied to @baseclass that collects the same class.

Erklärung

Frage 42 von 111

1

To accommodate changes to integration rules, a lead system architect (LSA) should do what two things? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Specify a new integration base class when using a wizard by using dynamic class referencing (DCR) to get the class name at run time.

  • Version the application when certain integration rulesets become obsolete.

  • Develop custom rules to encapsulate the integration data model thereby the complexity of versioning.

  • Create new ruleset versions using the existing integration base class.

Erklärung

Frage 43 von 111

1

During GetNextWork, if Get from work queues first is not selected in a operator record, the Work-.findAssignmentInWorkbasket activity is invoked followed by the Work-.findAssignmentInWorklist activity.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 44 von 111

1

What is the primary difference between push routing and pull routing?

Wähle eine der folgenden:

  • Push routing activity names begin with To and pull routing activity names begin with either Get or Find.

  • The security type value for push routing activities is Route, and the security type value for pull routing activities is Activity.

  • The behavior of push routing is configured in Rule-System-Settings, and pull routing is not.

  • Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing.

Erklärung

Frage 45 von 111

1

The Work Parties rule directly facilitates routing decisions when accessed in which two configurations? (Choose Two)

Wähle eine oder mehr der folgenden:

  • During Get Next Work to validate whether the operator's primary access role corresponds to a party role

  • When validating which work party roles are allowed to be used and their cardinality

  • When organization routing activities are called, such as ToWorkGroupManager

  • When a work party is populated immediately after case instantiation

Erklärung

Frage 46 von 111

1

Choose two ways to customize Get Next Work for a particular type of actor or primary role. (Choose Two)

Wähle eine oder mehr der folgenden:

  • Define a workgroup-specific variation for each distinct workbasket purpose. Operator records specify workbaskets that correspond to their workgroup.

  • Define skill names specific to each workgroup. Set skills on each workbasket assignment according to the workgroup to which the workbasket is associated.

  • Override certain Get Next Work activities to react differently according to the operator's work group.

  • Circumstance Get Next Work rules based on a text fragment derived from the operator's primary access group.

Erklärung

Frage 47 von 111

1

Which two configuration approaches differentiate Get Next Work behavior for different actors without modifying Get Next Work related rules? (Choose Two)

Wähle eine oder mehr der folgenden:

  • List workbaskets in a specific order on operator records

  • Increase case urgency prior to a workbasket assignment.

  • Override one or more GetNextWork-related Application Settings rules.

  • Implement a button that actions open assignment, the key for which is supplied by a data page.

Erklärung

Frage 48 von 111

1

Which one of the following flows are called for general process configuration error?

Wähle eine der folgenden:

  • pzStageProblems

  • ProblemFlow

  • FlowProblems

  • ConnectionProblem

Erklärung

Frage 49 von 111

1

Which of the following options is usually the best approach to safely change flows in production?

Wähle eine der folgenden:

  • Create a new circumstanced flow and leave the old flow intact to support outdated assignments

  • Use tickets, change stage, or restart the current stage to process old assignments for removal before applying changes

  • Revert the user’s application version when processing older assignments.

  • The best approach to use depends on the nature of the application.

Erklärung

Frage 50 von 111

1

Which assignment property is not critical in terms of flow processing?

Wähle eine der folgenden:

  • pyInterestPageClass — The class of the flow rule

  • pyFlowType — The name of the flow rule

  • pxTaskName — The shape ID of the assignment shape

  • pxTaskLabel — The label given to the assignment task

Erklärung

Frage 51 von 111

1

Which shape is least likely to cause a problem when removed from a flow already in production?

Wähle eine der folgenden:

  • Split-For-Each

  • Subflow

  • Decision

  • Assignment

Erklärung

Frage 52 von 111

1

Select the two true statements regarding background processing. (Choose Two)

Wähle eine oder mehr der folgenden:

  • Parallel flows are an example of leveraging background processing.

  • Locking effects are negated with background processing.

  • The Connect-Wait method is used to test if background processing for connectors complete.

  • Background processing involves separate requestors.

Erklärung

Frage 53 von 111

1

Which of the following statements is true regarding service-level agreements (SLAs) and Wait shapes?

Wähle eine der folgenden:

  • Wait shape escalation activity can advance the case in a flow.

  • Wait shapes completely replace SLA functionality.

  • An SLA can be used to replace a custom agent in some situations.

  • An SLA is a special type of advanced agent.

Erklärung

Frage 54 von 111

1

Select the true statement regarding agents.

Wähle eine der folgenden:

  • An advanced agent should be enabled on only a single node in a multinode system.

  • Commits must be issued in advanced agents activities.

  • In a multinode system, standard agents are always preferred.

  • An advanced agent cannot be used to process a queue.

Erklärung

Frage 55 von 111

1

What are the three security levels in application security? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Data in archive

  • Data at rest

  • Data in transit

  • Data at sleep

  • Data at display

Erklärung

Frage 56 von 111

1

How do you identify security vulnerabilities in the custom code written by the project team in a Pega application?

Wähle eine der folgenden:

  • Review the PegaRULES log file

  • Run the Rule Security Analyzer tool

  • Run the App Studio Compliance tool

  • Run the Access Manager tool

Erklärung

Frage 57 von 111

1

Where do you configure authentication timeout in Pega?

Wähle eine der folgenden:

  • prlogging.xml

  • Advanced tab of the access group

  • prconfig.xml

  • web.xml

Erklärung

Frage 58 von 111

1

Enabling audit tracking on each property used in the application does not impact the performance of the application.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 59 von 111

1

The goal of security is to maintain three witch of the following options? (Choose Three

Wähle eine oder mehr der folgenden:

  • Integrity

  • Extensibility

  • Maintainability

  • Confidentiality

  • Availability

Erklärung

Frage 60 von 111

1

For which two types of rule can the authentication profile be configured in Pega? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Flows

  • Activities

  • Services

  • Connectors

Erklärung

Frage 61 von 111

1

What is the default Authentication type in the Pega Platform?

Wähle eine der folgenden:

  • Java

  • PRSecuredBasic

  • Basic Credentials

  • Custom

Erklärung

Frage 62 von 111

1

What three kinds of security issues can be detected if you monitor PegaRULES-ALERTSECURITY.log file? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Authorized data access

  • Cross-site request forgery (CSRF) attacks

  • User successful login information

  • Access to a restricted activity, stream, or report

  • Content Security Policy violations

Erklärung

Frage 63 von 111

1

In which four of the following rule types can you configure privileges? (Choose Four)

Wähle eine oder mehr der folgenden:

  • Attachment category rules

  • Flows

  • Correspondence

  • Parse structured rules

  • Rule utility functions

  • Report definitions

  • Data pages

Erklärung

Frage 64 von 111

1

What are the three benefits of using dependent role hierarchies? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Increases complexity with multiple access roles

  • Reuse Pega application authorization

  • Access role layering

  • Eliiminates duplication of Access of Role to Objects (AROs) for application-specific access roles

  • No dependency if more than one access role configured

Erklärung

Frage 65 von 111

1

When do you set the Rule security mode on the access group to Warn?

Wähle eine der folgenden:

  • When verifying that the access role is configured correctly for rule execution.

  • When displaying a custom warn message if rule execution failed.

  • When automatically notifying the system administrator when access is denied to a rule.

  • When writing a message in the log file if attribute-based access control (ABAC) overrode the role-based access control (RBAC) setting.

Erklärung

Frage 66 von 111

1

You have an access group with two access roles with conflicting access privileges. Which two configuration options are recommended to ensure that access is denied? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Use attribute-based access control (ABAC) to restrict access.

  • Use an Access Deny to explicitly restrict access.

  • Create a single role restricting access.

  • Modify the role that is granting access.

Erklärung

Frage 67 von 111

1

You want a group of users to view certain properties in a case without being able to open the case. How do you implement the requirement?

Wähle eine der folgenden:

  • Attribute-based access control Discover action

  • Attribute-based access control Property Read action

  • Role-based access control privilege

  • Role-based access control Read action

Erklärung

Frage 68 von 111

1

When is access granted if both role-based access control (RBAC) and attribute-based access control (ABAC) are configured in an application?

Wähle eine der folgenden:

  • Access is granted when ABAC evaluates to true as it overrides RBAC.

  • Access is granted when RBAC evaluates to true as it overrides ABAC.

  • Access is only granted if both RBAC and ABAC evaluate to true.

  • Access is granted if ABAC evaluates to true unless an Access Deny restricts access.

Erklärung

Frage 69 von 111

1

Whose primary responsibility to monitor and address security alerts and events in an application?

Wähle eine der folgenden:

  • Lead System Architect

  • Security Administrator

  • Citizen developer

  • Senior System Architect

Erklärung

Frage 70 von 111

1

Content security policies help to detect and protect what two types of security threats or attacks for your application? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Cross-Site Scripting (XSS)

  • Session hijacking

  • Data injection attacks

  • Broken authentication

Erklärung

Frage 71 von 111

1

Select two of the content security policies that come with Pega Platform by default (Choose Two)

Wähle eine oder mehr der folgenden:

  • pxDefaultSecuredAll

  • pxDefaultAllowAll

  • pxDefaultDenyAll

  • pxDefaultSecured

Erklärung

Frage 72 von 111

1

The rule security mode (RSM) Utility is used for ________________________ and ____________________. (Choose Two)

Wähle eine oder mehr der folgenden:

  • setting role privileges manually by creating privileges

  • ensuring that users do not have unauthorized access to applications

  • ensuring that users have authorized access to applications

  • setting role privileges automatically by creating “implicit” privileges

Erklärung

Frage 73 von 111

1

Content security policies ______________ and ________________. (Choose Two)

Wähle eine oder mehr der folgenden:

  • find common vulnerabilities by searching for matches to regular expressions

  • create an event when security relevant rules are updated

  • help detect and mitigate Cross Site Scripting (XSS) and data injection attacks

  • protect your browser from loading and running content from untrusted sources

Erklärung

Frage 74 von 111

1

Which two of the following security risks can be identified by the Rule security analyzer? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Hand-crafted Java code

  • Properties with an incorrect type

  • Unsecured rulesets and unlocked ruleset versions

  • Vulnerabilities in stream rules

Erklärung

Frage 75 von 111

1

When implementing a security requirement, it is important to _____________________ and _____________________. (Choose Two)

Wähle eine oder mehr der folgenden:

  • understand vulnerabilities inherent in the application programming language and underlying platform.

  • consider the cost for the users.

  • only change default settings if absolutely necessary.

  • consider if the requirement can be implemented using ABAC instead of RBAC.

Erklärung

Frage 76 von 111

1

What two benefits do you gain by leveraging a data warehouse coupled with Pega reporting? (Choose Two)

Wähle eine oder mehr der folgenden:

  • You can focus on using Pega Reporting for reporting on throughput data or cases in flight.

  • You can purge cases from your database along with the data warehousing process.

  • You can use BIX to export cases to a database, a comma-separated file, or XML format.

  • You can use reporting tools suited for trending and data analysis.

Erklärung

Frage 77 von 111

1

Your organization uses a large number of business intelligence (BI) reports. Which two approaches would you consider to be good solutions? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Elasticsearch

  • BIX

  • Data warehouse

  • Data Archive

Erklärung

Frage 78 von 111

1

Which two of the following actions do you perform when you begin developing your reporting strategy? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Create a matrix categorizing the user roles and reports each role uses to make business decisions

  • Inventory the reports the organization currently uses

  • Optimize the properties in all the reports

  • Install the BIX product

Erklärung

Frage 79 von 111

1

What database tuning technique do you use to determine if the database is taking the most efficient route to return results?

Wähle eine der folgenden:

  • Create table indexes

  • Run explain plans on your queries

  • Perform a load test

  • Partition the database tables

Erklärung

Frage 80 von 111

1

You have created a set of reports that use large numbers of embedded properties. Which of the following techniques do you use to help improve report performance?

Wähle eine der folgenden:

  • Include all rows when joining reports

  • Create declare indexes

  • Enable pagination

  • Run reports against a reports database

Erklärung

Frage 81 von 111

1

Your application server is experiencing out-of-memory (OOM) errors. You suspect that the issue is related to a new report you recently put into production. Which of the following options is the likeliest reason that the report is causing these OOM issues?

Wähle eine der folgenden:

  • Complex SQL requests

  • Large result sets

  • Heavy network traffic

  • Unoptimized properties

Erklärung

Frage 82 von 111

1

XYZ Corp. sends a survey to its customers with responses such as Poor, Fair, Good, Very Good, Exceptional. XYZ would like to see this information graphed numerically where Poor = 5, Fair = 4, Good = 3, Very Good = 2, and Excellent = 1, those values being summed, not counted. The resulting sum should then be averaged over the number of questions in the survey. XYZ’s goal is to lower the disatisfied customer averaged score as low as possible. Which of the following approaches should be used as part of the solution?

Wähle eine der folgenden:

  • Define an SQL Function that returns a number 1-5. In subreport A, apply the “Sum” Summarize option to the output of that SQL Function. In subreport B, use the “Count” Summarize option to obtain the number of rows queried by subreport A. In the main report, divide() subreport’s A’s sum by subreport B’s count.

  • Define an SQL Function that returns a number 1-5. Apply the “Average” Summarize option to the output of that SQL Function.

  • Define an Activity that uses Obj-Browse. Loop the result. In the loop adding to running total using When/Otherwise When/Otherwise conditions. Divide that total by param.pyForEachCount to obtain the average.

  • Define SQL Functions such as Poor() or Fair(). Each Function returns a number 1-5 when matching the response otherwise 0. In subreport A, apply the “sum” Summarize option to each column then use the Add() Function to add those sums. In the main report, divide() subreport A’s total by the count of the rows queried by subreport A queried, that count obtained by subreport

Erklärung

Frage 83 von 111

1

Multiple case types within the Booking application’s case hierarchy can produce FSG-Data-Pricing records, BookEvent and VehicleParking, for example. To generate a customer’s invoice, the Booking team needs to collect every Pricing record related to a given BookEvent case. Which of the following approaches should be used as part of solution?

Wähle eine der folgenden:

  • Define an FSG-Booking-Work-BookEvent Report Definition that defines a JOIN to FSG-Booking-Work-BookEvent aliased as “CHILD”. The JOIN compares pyOrigOrg values. The Query tab’s filter condition compares CHILD.pzInsKey to the pxCoveredInsKeys ValueList which generates an ((A = B) or (A = C) or…) clause.

  • Define an SQL Function named isInCaseHierachy() that takes two parameters, one being the passed-in pyID of the parent case, the other being the Reference property within the FSG-Data-Pricing record Pricing record.

  • Define an FSG-Booking-Work subreport that uses Do Not JOIN rows. The main FSG-Booking-Work-BookEvent Report Definition declares a ParentKey parameter which is passed to the subreport. The subreport filters on pxCoveredInsKey = param.ParentKey. Main report filters on pzInsKey = SUBRPT.pxCoveredInsKey which generates an IN clause. The main report OR’s that filter with pzInsKey = param.ParentKey

  • Define an FSG-Booking-Data-CaseHierarchy class. Within each row of that class, both the pyID of the BookEvent case and the pyID of a BookEvent child case are persisted. That generated table is joined to FSG-Data-Pricing’s Reference property.

Erklärung

Frage 84 von 111

1

What are two ways to define a trend report with a chart that shows the number of cases completed each day as well as the number of cases resolved each day? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Use a series of sub-reports

  • Use Complex SQL requests

  • Define and report against a Timeline table

  • Define and reports against history table

Erklärung

Frage 85 von 111

1

Select the true statement about Jakob Nielsen's eight stages of UX maturity.

Wähle eine der folgenden:

  • If a company invests enough in UX, it is possible to skip a stage of UX maturity.

  • Teams should always rely on their intuition to create user-centered software.

  • An important part of the systematic user-centered design process is using user research earlier in the software development life cycle.

  • Integrated user-centered design, or systemic tracking of UX quality, is the end goal for any organization going through the eight stages of UX maturity

Erklärung

Frage 86 von 111

1

What is the term for the set of interactions a customer has from the beginning to the end of their relationship with the company?

Wähle eine der folgenden:

  • User-driven corporation

  • End-to-end experience

  • Front- and back-end handoff

  • Multi-channel

Erklärung

Frage 87 von 111

1

How can a business emphasis on UX break down silos in a company?

Wähle eine der folgenden:

  • Better B2E UX builds on familiar experiences for employees.

  • Better UX allows front- and back-end developers to operate independently in their area of expertise.

  • Better end-to-end experiences can drive collaboration between teams.

  • Better UX requires the creation of new design teams.

  • Better B2E UX allows employees to focus on a single task or application.

Erklärung

Frage 88 von 111

1

Which of the following is NOT a direct advantage of investing in B2E UX?

Wähle eine der folgenden:

  • Better B2E UX helps groups within the company work better together.

  • Better B2E UX can help the company's brand.

  • Better B2E UX helps companies scale.

  • Better B2E UX will save companies time and money.

  • Better B2E UX means companies must hire more designers.

Erklärung

Frage 89 von 111

1

B2E applications are self-service applications built for customers.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 90 von 111

1

What are four critical characteristics of a successful UX design? (Choose Four)

Wähle eine oder mehr der folgenden:

  • User-centric

  • Independent

  • Solves a user or business problem

  • Developer-driven

  • Engaging

  • Empathetic

  • Sympathetic

  • Spontaneous

Erklärung

Frage 91 von 111

1

Which three of the following options are reasons for companies to invest in UX design? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Studies show that good design leads to more profits for companies.

  • UX design is a key component of client and user satisfaction.

  • The UX design process begets effective cross-functional collaboration.

  • UX design eliminates the iterative process in software development

Erklärung

Frage 92 von 111

1

Which of the following terms refers to the total experience of a user, whether intended or not?

Wähle eine der folgenden:

  • UI

  • AI

  • UX

  • IT

Erklärung

Frage 93 von 111

1

Which two techniques can improve performance and the related user experience? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Maximize server-side Processing

  • Use single page dynamic containers

  • Minimize client-side expressions

  • Use the Optimized code option for layout mode in dynamic layouts

Erklärung

Frage 94 von 111

1

Which two Pega features can help improve the user experience? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Repeating dynamic layouts

  • Panel sets

  • Layout groups

  • Smart layouts

Erklärung

Frage 95 von 111

1

Which two processing options can help improve the user experience? (Choose Two)

Wähle eine oder mehr der folgenden:

  • Run processes synchronously

  • Use deferred data loading

  • Run connectors in parallel

  • Avoid requeuing failed responses

Erklärung

Frage 96 von 111

1

To leverage cosmos UI design, your application must have Theme-Cosmos application in the application stack.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 97 von 111

1

Which three of the following options are the different parts of a case in a Cosmos-themed user portal? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Media

  • Summary panel

  • Marketplace

  • Utility Panel

  • Activity area

Erklärung

Frage 98 von 111

1

What are the last three stages of usability testing? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Conduct testing

  • Select participants

  • Select the testing location

  • Compile feedback

Erklärung

Frage 99 von 111

1

Select two reasons why usability testing is important. (Choose Two).

Wähle eine oder mehr der folgenden:

  • Usability testing is done after the application is deployed to production and is used to compute a net promoter score

  • Usability testing validates the ease of use of the user interface design

  • Usability testing is done to collect valuable design data

  • Usability testing allows project managers to subjectively define the applications usability

Erklärung

Frage 100 von 111

1

Which three of the following steps are part of usability testing? (Choose Three)
Putting together a list of tasks that needs to be tested.

Wähle eine oder mehr der folgenden:

  • Putting together a list of tasks that needs to be tested.

  • Locking the ruleset before usability testing.

  • Documenting the recommendations needed to fix the issue.

  • Identifying the users of the application.

Erklärung

Frage 101 von 111

1

What is the correct sequence for DevOps release pipeline?

Wähle eine der folgenden:

  • Development -> Continuous Integration -> Continuous Delivery -> Deployment

  • Continuous Integration -> Deployment-> Continuous Delivery -> Development

  • Continuous Delivery -> Deployment-> Continuous Integration ->Development

  • Deployment -> Continuous Delivery -> Continuous Integration -> Development

Erklärung

Frage 102 von 111

1

When defining a release management strategy, what is your primary objective?

Wähle eine der folgenden:

  • Create a repeatable and sustainable process for ensuring business value is delivered safely and as quickly as possible to end users.

  • Implement a process for developers to minimize rule conflicts when merging into a central repository.

  • Move the organization to a continuous integration/continuous deployment (CI/CD) model.

  • Introduce automated testing into the organization.

Erklärung

Frage 103 von 111

1

In which stage of the DevOps release pipeline is acceptance testing performed?

Wähle eine der folgenden:

  • Deployment

  • Continuous delivery

  • Continuous integration

  • Development

Erklärung

Frage 104 von 111

1

When does the developer trigger a rebase?

Wähle eine der folgenden:

  • Directly after a branch is published to the system of record

  • When there are no merge conflicts for the branch

  • When a branch has been successfully merged in the system of record

  • When the unit tests have been executed successfully for a branch

Erklärung

Frage 105 von 111

1

Which three of the following components are needed to support a DevOps release pipeline? (Choose Three)

Wähle eine oder mehr der folgenden:

  • Automation server

  • System of record

  • Enterprise service bus

  • Application repository

  • Virtual server

Erklärung

Frage 106 von 111

1

It is a best practice to suppress rule warnings to improve your application guardrail compliance score.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 107 von 111

1

Which of the following test type is most expensive to run in a Test pyramid of test automation?

Wähle eine der folgenden:

  • API-based functional tests

  • Performance testing

  • UI-based functional and scenario tests

  • Unit testing

Erklärung

Frage 108 von 111

1

What two things happen if the standard rule check-in approval process is enabled when a rule is checked in? (Choose Two)

Wähle eine oder mehr der folgenden:

  • A work item is created.

  • The rule is routed to an approver.

  • The rule is moved to a candidate ruleset.

  • A notification is sent to the approver.

Erklärung

Frage 109 von 111

1

Which type of testing is UI-based?

Wähle eine der folgenden:

  • API testing

  • Scenario testing

  • Unit testing

  • Functional testing

Erklärung

Frage 110 von 111

1

In which of the following situations would you override the ShowWarningOnForm decision tree?

Wähle eine der folgenden:

  • To display a custom guardrail warning

  • To filter guardrail warnings displayed on the rule form

  • To define the criteria for adding custom guardrail warning

  • To invoke the pxAddGuardrailMessage function

Erklärung

Frage 111 von 111

1

Which two of the following tools are useful when assessing the quality of an application? (Choose Two)

Wähle eine oder mehr der folgenden:

  • BIX

  • ADMIN Studio

  • PegaRULES Log Analyzer (PLA)

  • Autonomic Event Services (AES)

Erklärung