Pega Certified Lead System Architect (Modules)

Descripción

All the questions from LSA modules on Pega Academy.
Ian Lucas
Test por Ian Lucas, actualizado hace más de 1 año
Ian Lucas
Creado por Ian Lucas hace más de 3 años
1070
0

Resumen del Recurso

Pregunta 1

Pregunta
Which of the following options should you consider when recommending a design solution?
Respuesta
  • Effort (cost)
  • Deployment
  • User experience/responsiveness
  • Resource management (memory/database)
  • Complexity (which indirectly impact effort and maintenance)
  • Maintenance

Pregunta 2

Pregunta
What are the two main goals of the Lead System Architect mission?
Respuesta
  • Solidify techniques for advanced rule configuration
  • Evaluate identified design options to form a recommended solution
  • Identify design options for particular situations
  • Learn how asynchronous integration works

Pregunta 3

Pregunta
The [blank_start]App Studio[blank_end] allows users to quickly and easily define the data required to build the apps they need, and then access that data in their running application - all without having to worry about how and where the data is actually stored and accessed.
Respuesta
  • Clipboard
  • Live UI
  • App Studio
  • Live Data

Pregunta 4

Pregunta
What is the primary reason for designing the security model as early as possible?
Respuesta
  • To ensure you account for and design to the organization security standards and legal requirements
  • To begin penetration testing as early as possible
  • To start your team on building access role, privileges, and attribute-based controls
  • To quickly address any warnings you see in the Rule Security Analyzer

Pregunta 5

Pregunta
Which two business requirements impact how you deploy your application?
Respuesta
  • You have requirements to support a business process outsourcing (BPO) model for your organization
  • You have requirements for case types to participate in a distributed architecture through microservices
  • You have requirements to use message driven beans (MDB) to deliver messages from a system of record to the Pega application
  • You have requirements to start application development in Pega Cloud, and then move your application to an on-premise production environment

Pregunta 6

Pregunta
When developing a new Pega application, start with ___________ and ___________. Choose all that apply.
Respuesta
  • channel design and work your way into Pega application
  • integration to systems of record and work your way back into the Pega application
  • the Pega application in the middle and work your way out to channels and systems of record
  • one application at a time and base your design on what you know today

Pregunta 7

Pregunta
To automate work in the center-out business architecture, [blank_start]Robotic Process Automation[blank_end] is needed.
Respuesta
  • Robotic Process Automation
  • Business rules engine
  • Business process management
  • Case management

Pregunta 8

Pregunta
Why would you use PDC or AES when the organization already has application performance monitoring tools in place?
Respuesta
  • PDC and AES show insights into the health of the Pega application
  • PDC and AES provide the ability to stop and start agents, listeners, and manage requestors
  • PDC and AES are available both on premise and in the Pega Cloud
  • PDC and AES collect alerts and health activity across Pega nodes

Pregunta 9

Pregunta
Performing a [blank_start]solution implementation gap analysis[blank_end] allows you to determine the differences between the features that the Pega application provides and your unique business requirements to support delivery of the minimum lovable product (MLP)
Respuesta
  • solution implementation gap analysis
  • sprint review
  • DCO session
  • requirements planning session

Pregunta 10

Pregunta
The primary benefit of using a Pega application is that it allows you to
Respuesta
  • integrate with systems of record for lines of business more easily
  • compete with other industry specific point solutions
  • get to the minimum lovable product (MLP) faster
  • utilize Pega's artificial intelligence (AI applications) more effectively

Pregunta 11

Pregunta
Pega's application include
Respuesta
  • artificial intelligence applications
  • industry applications
  • marketing applications
  • customer engagement applications

Pregunta 12

Pregunta
What two benefits does App Studio provide?
Respuesta
  • Support for scenario testing
  • Rapid construction of new application concepts
  • An easy-to-use development environment designed for new users
  • Quick creation of enterprise assets

Pregunta 13

Pregunta
Which three types of records can be marked as relevant records?
Respuesta
  • Harnesses
  • Properties
  • Activities
  • Processes

Pregunta 14

Pregunta
What are two key initiatives to ensure the successful adoption of App Studio?
Respuesta
  • Strive towards a decentralized project validation and approval model
  • Evaluate that applications are fit for the App Studio program
  • Establish a center of excellence (COE) for the organization
  • Ensure business users are technically self-sufficient before starting a project

Pregunta 15

Pregunta
Which of the following two options are best practices in App Studio?
Respuesta
  • Create reusable IT assets using App Studio
  • Avoid App Studio for DCO session
  • Share business assets across applications
  • Manage reusable assets through a center of excellence (COE)

Pregunta 16

Pregunta
Which statement is true when comparing subcases and subflows?
Respuesta
  • Subcases are always preferred over subflows
  • Subcases offer more security options than subflows
  • Locking consequences can be ignored with subflows
  • Subcases perform better than subflows

Pregunta 17

Pregunta
Select two advantages of using a single case over subcase designs.
Respuesta
  • No repliciation of data is necessary with a single case
  • Subflows can be processed without interruption
  • Dependency management between subflows can be leveraged
  • All attachments are readily accessible

Pregunta 18

Pregunta
Select two reasons when the AllCoveredResolved ticket is required in conjunction with the wait shape
Respuesta
  • When any of the covered subcases are resolved
  • When the wait shape is configured as a timer with a duration longer than the duration in which the ticket would be issued
  • When the wait shape is configured as a timer with a duration shorter than the duration in which the ticket would be issued
  • When different types of subcases are involved

Pregunta 19

Pregunta
A case can enter the Create stage only
Respuesta
  • once
  • twice
  • as many times as there are stages defined in case life cycle
  • as many times as there are processes defined in the Create stage

Pregunta 20

Pregunta
Case processing can be performed by which three of the following requestor types?
Respuesta
  • Browser
  • Portal
  • Batch
  • App

Pregunta 21

Pregunta
Which two of the following terms are associated with the term component?
Respuesta
  • Framework
  • Interface
  • Recursive
  • Ruleset

Pregunta 22

Pregunta
Which two of the following design approaches are most closely related to the concept of application layering?
Respuesta
  • Open-closed principle
  • Template design pattern
  • Polymorphism
  • Liskov Substitution

Pregunta 23

Pregunta
A ruleset override application can be used for which purpose?
Respuesta
  • Aggregating multiple built-on applications into a single application
  • A repository for Dependency inversion-based rules
  • Defining applications specific to a division within an enterprise
  • Creating the first implementation application built on a framework application

Pregunta 24

Pregunta
Which two options are valid reasons for initially creating a single application?
Respuesta
  • Avoid the development of two application layers simultaneously
  • Development of component applications takes more time because each application has to be tested individually
  • The application is specific to a single government agency
  • The concept of multiple built-on component applications has not been promoted in the past

Pregunta 25

Pregunta
Which three of the following approaches are valid ways to extend rules in Pega Platform?
Respuesta
  • Dynamic class referencing
  • Ruleset
  • Organization hierarchy
  • Class
  • Circumstance

Pregunta 26

Pregunta
It is a good practice to include case types in a component.
Respuesta
  • True
  • False

Pregunta 27

Pregunta
How do you create deployment package file for a component?
Respuesta
  • Use Rule-Admin-Product
  • In component definition tab, use "Package Component"
  • Use "Export" from ruleset version
  • In the component documentation tab, use the "Installation" section

Pregunta 28

Pregunta
Which of the following object-oriented programming principle is followed by Pega component applications?
Respuesta
  • Liskov Substitution
  • Open/Closed
  • Interface Segregation
  • Single Responsability

Pregunta 29

Pregunta
Which of the following specialization technique is best suited for localization in Pega?
Respuesta
  • Circumstance
  • Organization hierarchy
  • Class
  • Ruleset

Pregunta 30

Pregunta
Which three of the following features are available in a built-on application and are not available in a component?
Respuesta
  • Self-testable
  • Pega Exchange publishing
  • PegaUnit test creation
  • Extendable case types
  • Integration rules

Pregunta 31

Pregunta
Which two of the following options are key responsibilities of a Center of Excellence (COE)?
Respuesta
  • Manage and promote reusable assets
  • Lead application development efforts
  • Identify new opportunities in the organization
  • Provide support to the lead system architect (LSA) on the project

Pregunta 32

Pregunta
What are two benefits of using a completely new database for a new user population?
Respuesta
  • Assignments and attachments can be saved to different tables
  • The same table names can be used in both databases
  • No need exists to use class specialization
  • Multitenancy can be avoided

Pregunta 33

Pregunta
Which two statements are true when subdividing an existing user population into two distinct applications?
Respuesta
  • Cloning the existing database is desirable
  • Resolved cases can be duplicated during migration
  • Reporting and security is simplified
  • User/account data can be gradually migrated

Pregunta 34

Pregunta
Which two statements are true regarding rule names?
Respuesta
  • All foundation classes must contain FW
  • App Studio generates names for rules
  • Case type class names must exactly reflect their user population otherwise developer productivity may suffer
  • Refactoring class names is a time-consuming process

Pregunta 35

Pregunta
Which two of the following options are ways to version data?
Respuesta
  • Add a property such as an as-of date or monotonically increasing version and filter based on values
  • When deploying data, remove existing instances first
  • Define report definitions with subreports that filter on MAX pxUpdateTime
  • Define a custom rule

Pregunta 36

Pregunta
Which two hierarchy types are applicable to object-oriented programming inheritance?
Respuesta
  • Compositional
  • Programmatic
  • Subsumptive
  • Layer-based

Pregunta 37

Pregunta
A enterprise-level data class has multiple instances that can be selected from a data page sourced repeating grid. The class and ruleset in which the class is defined needs to include a data transform that adds an instance to a list. For extensibility, which two of the following could be implemented?
Respuesta
  • Provide a uniquely-named, embedded-list property applied to @baseclass that collects the same class
  • A Lookup data page that returns the class of the page according to the application that adds to the list
  • Create a class with -Extension appended to the data class name and save the data transform to that class
  • A Lookup data page that returns the name of page to use when appending to .pxResults()

Pregunta 38

Pregunta
Which of the following are considered while designing a data model?
Respuesta
  • Managing the data storage
  • Organizing the data
  • Performing action on the data
  • Archiving the data

Pregunta 39

Pregunta
In which of the following situations is data locking required?
Respuesta
  • When the allow locking check-box is checked within a data class rule and an instance of the data class is opened
  • When initially saving a record to a custom queue table
  • When a case property uses the Data Page Snapshot pattern
  • When ensuring integrity of a custom queue table

Pregunta 40

Pregunta
A dependency tree has which characteristic?
Respuesta
  • Layers are synonymous with unique contiguous sets of levels
  • A level can only reference the previous level
  • The number of items in a level tends to decrease as the level increases
  • Circular references are not allowed within a level

Pregunta 41

Pregunta
Which three of the following options make up the data modeling three-level approach?
Respuesta
  • Logical
  • Extensible
  • Conceptual
  • Flexible
  • Physical

Pregunta 42

Pregunta
Which two statements are true with regard to industry foundation data model?
Respuesta
  • The industry foundation data model can only be used as a built on application in conjunction with Pega applications
  • A best practice is to use the industry foundation data model as-is, as much as possible
  • Data pages provided by the industry foundation data model need to be extended for each external integration
  • Pega's industry foundation data model simplifies the complexity of many-to-many relationships

Pregunta 43

Pregunta
Which of the following statements is true regarding the mapping of data from a system of record to an industry foundation data model?
Respuesta
  • Maintaining a data dictionary is a wasteful use of team resources
  • The mechanics of how data is mapped is the primary concern of a lead system architect (LSA)
  • Leveraging a Center of Excellence (COE) can ensure consistent implementation of the industry foundation data model
  • Every property retrieved from an interface must be mapped to the business data model before an application can go live

Pregunta 44

Pregunta
To accommodate changes to integration rules, a lead system architect (LSA)
Respuesta
  • specifies a new integration base class when using a wizard and use dynamic class referencing (DCR) to get the class name at run time
  • develops custom rules to encapsulate the integration data model thereby the complexity of versioning
  • creates new ruleset versions using the existing integration base class
  • versions the application when certain integration rulesets become obsolete

Pregunta 45

Pregunta
What is the primary difference between push routing and pull routing
Respuesta
  • The behavior of push routing is configured in Rule-System-Settings, and pull routing is not
  • The security type value for push routing activities is Route, and the security type value for pull routing activities is Activity
  • Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing
  • Push routing activity names begin with To and pull routing activity names begin with either Get or Find

Pregunta 46

Pregunta
The Work Parties rule directly facilitates routing decisions when accessed in which two configurations?
Respuesta
  • When organization routing activities are called, such as ToWorkGroupManager
  • When a work party is populated immediately after case instantiation
  • When validating which work party roles are allowed to be used and their cardinality
  • During Get Next Work to validate whether the operator's primary access role corresponds to a party role

Pregunta 47

Pregunta
Choose two ways to customize Get Next Work for a particular type of actor or primary role
Respuesta
  • Define skill names specific to each work group and set skills on each workbasket assignment according to the work group to which the workbasket is associated
  • Override certain Get Next Work activities to react differently according to the operator's work group
  • Define a workgroup-specific variation for each distinct workbasket purpose and operator records specify workbaskets that correspond to their work group
  • Circumstance Get Next Work rules based on a text fragment derived from the operator's primary access group

Pregunta 48

Pregunta
Which two configuration approaches differentiate Get Next Work behavior for different actors without modifying Get Next Work related rules?
Respuesta
  • Increase case urgency prior to a workbasket assignment
  • Implement a button that actions open assignment, the key for which is supplied by a data page
  • List workbaskets in a specific order on operator records
  • Override one or more GetNextWork-related Application Settings rules

Pregunta 49

Pregunta
During GetNextWork, if "Get from work queues first" is not selected in a operator record, the Work-.findAssignmentInWorkbasket activity is invoked followed by the Work-.findAssignmentInWorklist activity
Respuesta
  • True
  • False

Pregunta 50

Pregunta
Which shape is least likely to cause a problem when removed from a flow already in production?
Respuesta
  • Subflow
  • Assignment
  • Decision
  • Split-For-Each

Pregunta 51

Pregunta
Which assignment property is not critical in terms of flow processing?
Respuesta
  • pxTaskLabel - the label given to the assignment task
  • pxTaskName - the shape ID of the assignment shape
  • pyFlowType - the name of the flow rule
  • pyInterestPageClass - the class of the flow rule

Pregunta 52

Pregunta
Which of the following options is usually the best approach to safely change flows in production?
Respuesta
  • Revert the user's application version when processing older assignments
  • The best approach to use depends on the nature of the application
  • Create a new circumstanced flow and leave the old flow intact to support outdated assignments
  • Use tickets, change stage, or restart the current stage to process old assignments for removal before applying changes

Pregunta 53

Pregunta
Which one of the following flows is called for general process and configuration error?
Respuesta
  • ConnectionProblem
  • pzStageProblems
  • FlowProblems
  • ProblemFlow

Pregunta 54

Pregunta
Select the two true statements regarding background processing
Respuesta
  • Locking effects are negated with background processing
  • Background processing involves separate requestors
  • The Connect-Wait method is used to test if background processing for connectors complete
  • Parallel flows are an example of leveraging background processing

Pregunta 55

Pregunta
Select the true statement regarding agents
Respuesta
  • In a multinode system, standard agents are always preferred
  • An advanced agent should be enabled on only a single node in a multinode system
  • An advanced agent cannot be used to process a queue
  • Commits must be issued in advanced agents activities

Pregunta 56

Pregunta
Which of the following statements is true regarding service-level agreements (SLAs) and Wait shapes?
Respuesta
  • Wait shapes completely replace SLA functionality
  • An SLA is a special type of advanced agent
  • Wait shape escalation activity can advance the case in a flow
  • An SLA can be used to replace a custom agent in some situations

Pregunta 57

Pregunta
What three kinds of security issues can be detected if you monitor PegaRULES-ALERTSECURITY.log file?
Respuesta
  • Content Security Policy violations
  • User successful login information
  • Cross-site request forgery (CSRF) attacks
  • Access to a restricted activity, stream, or report
  • Authorized data access

Pregunta 58

Pregunta
For which two types of rule can the authentication profile be configured in Pega?
Respuesta
  • Flows
  • Activities
  • Connectors
  • Services

Pregunta 59

Pregunta
What is the default Authentication type in the Pega platform?
Respuesta
  • PRSecuredBasic
  • Custom
  • Java
  • Basic Credentials

Pregunta 60

Pregunta
The goal of security is to maintain which three of the following options?
Respuesta
  • Integrity
  • Maintainability
  • Availability
  • Extensibility
  • Confidentiality

Pregunta 61

Pregunta
Where do you configure authentication timeout in Pega?
Respuesta
  • prconfig.xml
  • web.xml
  • prlogging.xml
  • Advanced tab of the access group

Pregunta 62

Pregunta
How do you identify security vulnerabilities in the custom code written by the project team in a Pega application?
Respuesta
  • Run the App Studio Compliance tool
  • Run the Rule Security Analyzer tool
  • Run the Access Manager tool
  • Review the PegaRULES log file

Pregunta 63

Pregunta
Enabling audit tracking on each property used in the application does not impact the performance of the application
Respuesta
  • True
  • False

Pregunta 64

Pregunta
What are the three security levels in application security?
Respuesta
  • Data at rest
  • Data in archive
  • Data at sleep
  • Data in transit
  • Data at display

Pregunta 65

Pregunta
The rule security mode (RSM) Utility is used for
Respuesta
  • setting role privileges automatically by creating "implicit" privileges
  • ensuring that users do not have unauthorized access to applications
  • ensuring that users have authorized access to applications
  • setting role privileges manually by creating privileges

Pregunta 66

Pregunta
Select two of the content security policies that come with Pega Platform by default
Respuesta
  • pxDefaultAllowAll
  • pxDefaultDenyAll
  • pxDefaultSecuredAll
  • pxDefaultSecured

Pregunta 67

Pregunta
Content security policies helps to detect and protect what two types security threats or attacks for your application?
Respuesta
  • Data injection attacks
  • Session hijacking
  • Broken authentication
  • Cross Site Scripting (XSS)

Pregunta 68

Pregunta
When implementing a security requirement, it is important to
Respuesta
  • only change default settings if absolutely necessary
  • understand vulnerabilities inherent from the application programming language and underlying platform
  • consider if the requirement can be implemented using ABAC instead of RBAC
  • consider the cost for the users

Pregunta 69

Pregunta
Content security policies
Respuesta
  • protect your browser from loading and running content from untrusted sources
  • help detect and mitigate Cross Site Scripting (XSS) and data injection attacks
  • find common vulnerabilities by searching for matches to regular expressions
  • create an event when security relevant rules are updated

Pregunta 70

Pregunta
Whose primary responsibility to monitor and address security alerts and events in an application?
Respuesta
  • Security Administrator
  • Senior System Architect
  • Lead System Architect
  • Citizen developer

Pregunta 71

Pregunta
Which two of the following security risks can be identified by the Rule security analyzer?
Respuesta
  • Unsecured rulesets and unlocked ruleset versions
  • Properties with incorrect type
  • Hand-crafted Java code
  • Vulnerabilities in stream rules

Pregunta 72

Pregunta
What two benefits you gain by leveraging a data warehousing process?
Respuesta
  • You can purge cases from your database along with the data warehousing process
  • You can use reporting tools suited for trending and data analysis
  • You can use BIX to export cases to a database, a comma-separated file, or XML format
  • You can focus on using Pega Reporting for reporting throughput data or cases in flight

Pregunta 73

Pregunta
Your organization uses a large number of business intelligence (BI) reports. Which two approaches would you consider to be good solutions?
Respuesta
  • Data archive
  • Data warehouse
  • BIX
  • Elasticsearch

Pregunta 74

Pregunta
Which of the following actions do you perform when you begin developing your reporting strategy?
Respuesta
  • Create a matrix categorizing the user roles and reports each role uses to make business decisions
  • Inventory the reports the organization currently uses
  • Install the BIX product
  • Optimize the properties in all the reports

Pregunta 75

Pregunta
What database tuning technique do you use to determine if the database is taking the most efficient route to return results?
Respuesta
  • Create table indexes
  • Perform a load test
  • Partition the database tables
  • Run explain plans on your queries

Pregunta 76

Pregunta
Your application server is experiencing out-of-memory (OOM) errors. You suspect that the issue is related to a new report you recently put into production. Which of the following options is the likeliest reason that the report is causing these OOM issues?
Respuesta
  • Unoptimized properties
  • Heavy network traffic
  • Complex SQL requests
  • Large result sets

Pregunta 77

Pregunta
You have created a set of reports that use large numbers of embedded properties. Which of the following techniques do you use to help improve report performance?
Respuesta
  • Enable pagination
  • Include all rows when joining reports
  • Create declare indexes
  • Run reports against a reports database

Pregunta 78

Pregunta
XYZ Corp. sends a survey to its customers with responses such as Poor, Fair, Good, Very Good, Exceptional. XYZ would like to see this information graphed numerically where Poor = 5, Fair = 4, Good = 3, Very Good = 2, and Exceptional = 1, those values being summed, not counted. The resulting sum should then be averaged over the number of questions in the survey. XYZ's goal is to lower the dissatisfied customer averaged score as low as possible. Which of the following approaches should be used as part of the solution?
Respuesta
  • Define an SQL Function that returns a number 1-5. Apply the "Average" Summarize option to the output of the SQL Function
  • Define SQL Functions such as Poor() and Fair(). Each function returns a number 1-5 when matching the response otherwise 0. In subreport A, apply the "Sum" Summarize option to each column then use the Add() Function to add these sums. In the main report, divide() subreport A's total by the count of the rows queried by subreport A queried, that count obtained by subreport
  • Define an SQL Function that returns a number 1-5. In subreport A, apply the "Sum" Summarize option to the output of that SQL Function. In a subreport B, use the "Count" Summarize option to obtain the number of rows queried by subreport A. In the main report, divide() subreport's A's sum by subreport B's count
  • Define an Activity that uses Obj-Browse. Loop the result. In the loop adding to running total using When/Otherwise conditions. Divide that total by param.pyForEachCount to obtain the average

Pregunta 79

Pregunta
Multiple case types within the Booking application's case hierarchy can produce FSG-Data-Pricing records, BookEvent and VehicleParking, for example. To generate a customer's invoice, the Booking team needs to collect every Pricing record related to a given BookEvent case. Which of the following approaches should be used as part of solution?
Respuesta
  • Define a FSG-Booking-Data-CaseHierarchy class. Within each row of that class, both the pyID of the BookEvent case and the pyID of a BookEvent child case are persisted. That generated table is joined to FSG-Data-Princing's Reference property
  • Define a FSG-Booking-Work subreport that uses Do Not JOIN rows. The main FSG-Booking-Work-BookEvent Report Definition declares a ParentKey parameter which is passed to the subreport. The subreport filters on pxCoveredInsKey = param.ParentKey. Main report filters on pzInsKey = SUBRPT.pxCoveredInsKey which generates an IN clause. The main report OR's that filter with pzInsKey = param.ParentKey
  • Define a SQL Function named isInCaseHierarchy() that takes two parameters, one being the passed-in pyID of the parent case, the other being the Reference property within the FSG-Data-Pricing record Pricing record
  • Define a FSG-Booking-Work-BookEvent Report Definition that defines a JOIN to FSG-Booking-Work-BookEvent aliased as "CHILD". The JOIN compares pyOrigOrg values. The Query tab's filter condition compares CHILD.pzInsKey to the pxCoveredInsKeys ValueList which generates a ((A = B) or (A = C) or ...) clause

Pregunta 80

Pregunta
What are two ways to define a trend report with a chart that shows the number of cases completed each day as well as the number of cases resolved each day?
Respuesta
  • Define and report against a Timeline table
  • Define and reports against history table
  • Use a series of sub-reports
  • Use a Complex SQL requests

Pregunta 81

Pregunta
What is the term for the set of interactions a customer has from the beginning to the end of their relationship with the company?
Respuesta
  • End-to-end experience
  • Front- and back-end handoff
  • User-driven corporation
  • Multi-channel

Pregunta 82

Pregunta
Select the true statement about Jakob Nielsen's eight stages of UX maturity
Respuesta
  • Integrated user-centered design, or systemic tracking of UX quality, is the end goal for any organization going through the eight stages of UX maturity
  • If a company invests enough in UX, it is possible to skip a stage of UX maturity
  • Teams should always rely on their intuition to create user-centered software
  • An important part of the systematic user-centered design process is using user research earlier in the software development cycle

Pregunta 83

Pregunta
B2E applications are self-service applications built for customers
Respuesta
  • True
  • False

Pregunta 84

Pregunta
Which of the following is NOT a direct advantage of investing in B2E UX?
Respuesta
  • Better B2E UX helps companies scale
  • Better B2E UX means companies must hire more designers
  • Better B2E UX can help the company's brand
  • Better B2E UX will save companies time and money
  • Better B2E UX helps groups within the company work better together

Pregunta 85

Pregunta
How can a business emphasis on UX break down silos in a company?
Respuesta
  • Better UX requires the creation of new design teams
  • Better end-to-end experiences can drive collaboration between teams
  • Better B2E UX allows employees to focus on a single task or application
  • Better B2E UX builds on familiar experiences for employees
  • Better UX allows front- and back-end developers to operate independently in their area of expertise

Pregunta 86

Pregunta
Which of the following terms refers to the total experience of a user, whether intended or not?
Respuesta
  • UI
  • IT
  • UX
  • AI

Pregunta 87

Pregunta
Which three of the following options are reasons for companies to invest in UX design?
Respuesta
  • UX design is a key component of client and user satisfaction
  • Studies show that good design leads to more profits for companies
  • The UX design process begets effective cross-functional collaboration
  • UX design eliminates the iterative process in software development

Pregunta 88

Pregunta
What are four critical characteristics of a successful UX design?
Respuesta
  • Spontaneous
  • Empathic
  • Engaging
  • Independent
  • Solves a user or business problem
  • User-centric
  • Developer-driven
  • Sympathetic

Pregunta 89

Pregunta
Which two processing options can improve the user experience?
Respuesta
  • Run connectors in parallel
  • Use deferred data loading
  • Run processes synchronously
  • Avoid requeuing failed responses

Pregunta 90

Pregunta
Which two Pega features can help improve the user experience?
Respuesta
  • Layout groups
  • Repeating dynamic layouts
  • Smart layouts
  • Panel sets

Pregunta 91

Pregunta
Which two techniques can improve performance and the related user experience?
Respuesta
  • Maximize server-side processing
  • Minimize client side expressions
  • Use the Optimized code option for layout mode in dynamic layouts
  • Use single page dynamic containers

Pregunta 92

Pregunta
Which three of the following options are the different parts of a case in a Cosmos themed user portal?
Respuesta
  • Summary panel
  • Utility Panel
  • Activity area
  • Media
  • Marketplace

Pregunta 93

Pregunta
To leverage cosmos UI design, your application must have Theme-Cosmos application in the application stack
Respuesta
  • True
  • False

Pregunta 94

Pregunta
Which three of the following steps are part of usability testing?
Respuesta
  • Identifying the users of the application
  • Documenting the recommendations needed to fix the issue
  • Putting together a list of tasks that needs to be tested
  • Locking the ruleset before usability testing

Pregunta 95

Pregunta
Select two reasons why usability testing is important
Respuesta
  • Usability testing allows project managers to subjectively define the applications usability
  • Usability testing validates the ease of use of the user interface design
  • Usability testing is done to collect valuable design data
  • Usability testing is done after the application is deployed to production and is used to compute a net promoter score

Pregunta 96

Pregunta
What are the last three stages of usability testing?
Respuesta
  • Conduct testing
  • Select participants
  • Select the testing location
  • Compile feedback

Pregunta 97

Pregunta
Which three of the following components are needed to support a DevOps release pipeline?
Respuesta
  • System of record
  • Enterprise service bus
  • Automation server
  • Virtual server
  • Application repository

Pregunta 98

Pregunta
When does the developer trigger a rebase?
Respuesta
  • When a branch has been successfully merged in the system of record
  • When there are no merge conflicts for the branch
  • Directly after a branch is published to the system of record
  • When the unit tests has executed successfully for a branch

Pregunta 99

Pregunta
In which stage of the DevOps release pipeline is acceptance testing performed?
Respuesta
  • Continuous delivery
  • Deployment
  • Continuous integration
  • Development

Pregunta 100

Pregunta
When defining a release management strategy, what is your primary objective?
Respuesta
  • Implement a process for developers to minimize rule conflicts when merging into a central repository
  • Introduce automated testing into the organization
  • Create a repeatable and sustainable process for ensuring business value is delivered safely and as quickly as possible to end users
  • Move the organization to a continuous integration/continuous deployment (CI/CD) model

Pregunta 101

Pregunta
The correct sequence for a DevOps release pipeline is [blank_start]Development[blank_end] > [blank_start]Continuous Integration[blank_end] > [blank_start]Continuous Delivery[blank_end] > [blank_start]Deployment[blank_end].
Respuesta
  • Development
  • Continuous Delivery
  • Continuous Integration
  • Deployment
  • Continuous Integration
  • Continuous Delivery
  • Development
  • Deployment
  • Continuous Delivery
  • Continuous Integration
  • Development
  • Deployment
  • Deployment
  • Development
  • Continuous Integration
  • Continuous Delivery

Pregunta 102

Pregunta
Which type of testing is UI based?
Respuesta
  • Unit testing
  • API testing
  • Scenario testing
  • Functional testing

Pregunta 103

Pregunta
Which of the following test type is the most expensive to run in a Test pyramid of test automation?
Respuesta
  • API-based functional tests
  • Performance tests
  • UI-based functional and scenario tests
  • Unit testing

Pregunta 104

Pregunta
It is a best practice to suppress rule warnings to improve your application guardrail compliance score.
Respuesta
  • True
  • False

Pregunta 105

Pregunta
What two things happen if the standard rule check-in approval process is enabled when a rule is checked in?
Respuesta
  • A notification is sent to the approver
  • A work item is created
  • The rule is moved to a candidate ruleset
  • The rule is routed to an approver

Pregunta 106

Pregunta
In which of the following situations would you override the ShowWarningOnForm decision tree?
Respuesta
  • To define the criteria for adding custom guardrail warning
  • To invoke the pxAddGuardrailMessage function
  • To display a custom guardrail warning
  • To filter guardrail warning displayed on the rule form

Pregunta 107

Pregunta
Which two of the following tools are useful when assessing the quality of an application?
Respuesta
  • BIX
  • Autonomic Event Services (AES)
  • PegaRULES Log Analyzer (PLA)
  • ADMIN Studio
Mostrar resumen completo Ocultar resumen completo

Similar

Pega Certified Lead System Architect (Tests)
Ian Lucas
Pega Certified Lead System Architect (Tests)
Jean Wick
PEGA CSSA Prep
Wendell Phipps
Pega Systems CPMC Training
Elena Briones
Pega Certified Lead System Architect (Tests)
filibusty eveonline
Pega Certified Lead System Architect (Tests)
filibusty eveonline
Pega Certified Lead System Architect (Tests)
filibusty eveonline
Pega Assessment
anna.buchanan
plagio
Yatziri Genis
Random OSPF fun time.
I L
Pega
Luc Chase