Pega Certified Lead System Architect (Tests)

Description

All the questions from LSA mission tests on Pega Academy.
Ian Lucas
Quiz by Ian Lucas, updated more than 1 year ago
Ian Lucas
Created by Ian Lucas over 3 years ago
1680
0

Resource summary

Question 1

Question
Which user type would exclusively use App Studio?
Answer
  • Lead system architects
  • Low Code developers
  • Technical architects
  • Application developers

Question 2

Question
Which of the following statements are true about Specialization layers?
Answer
  • A specialization layer can be built on only one application
  • A specialization layer can be built on multiple applications
  • A specialization layer must use a framework as a built-on application
  • An implementation cannot be a specialization layer

Question 3

Question
Which two of the following statements are true related to Predictive Diagnostic Cloud (PDC) and Autonomic Event Services (AES)?
Answer
  • The AES application only reads data from, and does not communicate back, to the monitored system
  • The PDC application communicates with the monitored system in a two-way fashion
  • The AES application communicates with the monitored system in a two-way fashion
  • PDC only reads data from, and does not communicate back, to the monitored system

Question 4

Question
Which two of the following statements are true about building an implementation-only application?
Answer
  • The enterprise does not span multiple regions where business rules vary dramatically
  • The enterprise clearly wants to extend the application across multiple regions
  • The application case types are reused and modified across the enterprise
  • The enterprise does not need or want to extend the application

Question 5

Question
When App Studio is used, in which schema is a data type table created?
Answer
  • PegaRULES schema
  • PegaDATA schema
  • ClientData schema
  • CustomerData schema

Question 6

Question
What are two methods you can use to generate mashup code in Pega Platform?
Answer
  • Using Channels and interfaces in App Studio
  • Using Resources in Admin Studio
  • Using Case Designer in App Studio
  • Using Case Designer in Dev Studio

Question 7

Question
In which two of the following ways can App Studio accelerate projects?
Answer
  • Standardization through UI templates
  • Improved application structuring
  • Direct inheritance automation
  • Leverages company's IT reusable assets

Question 8

Question
What are two options you can use to monitor the status of nodes in the cluster of Pega Platform?
Answer
  • Dev Studio
  • App Studio
  • ADMIN Studio
  • Pega Predictive Diganostic Cloud (PDC)

Question 9

Question
Which two statements are true about the component applications?
Answer
  • Do not contain case types
  • Designed to be used as built on applications
  • Can be composed of other components
  • Can be used as a production application

Question 10

Question
Which two of the following are the best practices for using multiple built-on applications?
Answer
  • Use branch IDs that span several applications
  • Avoid using different versions of same application in the application stack
  • Use the same ruleset in multiple applications
  • Limit development to rulesets in the top-most application

Question 11

Question
If you need to extend an existing application for a new division, which of the following options do you recommend?
Answer
  • Define a set of plausible viable alternatives and then compare the advantages and disadvantages of each. Make a recommendation based on the requirements
  • Use the existing application as a built-on application and create a new divisional layer application
  • Extract all the case types from the existing application and refactor them into a series of modular microservices based applications that can be used as built-on applications for the new implementation
  • Refactor the existing application into a framework, and then create the new application as an implementation of the refactored framework

Question 12

Question
Which two of the following options are reasons to version an application?
Answer
  • If an application is using upgraded built-on application versions
  • If you need to move Utility code to a specialized ruleset
  • If you need to add rules that do not impact built on applications
  • If the rulesets in the application ruleset list have been versioned

Question 13

Question
Which three of the following items make sense to be packaged as components?
Answer
  • Correspondence
  • Case types
  • Application rules
  • Integration assets
  • Function library

Question 14

Question
What two reasons justify using subcases when designing a case hierarchy?
Answer
  • To simplify reporting, security, and auditing
  • When parallel processing of cases is optional
  • When multiple units of work must be completed simultaneously and independently
  • When optimistic locking is required

Question 15

Question
In a scenario where you need to specialize rules for a particular region, which two of the following options can be?
Answer
  • Dependent roles
  • Pattern inheritance
  • Circumstancing
  • Branching

Question 16

Question
The initial behavior of the case type is always the same. The case type must ultimately change based on the type of data instance it is associated with. The data instance's type is not known when the case is created. How do you implement this scenario?
Answer
  • Pattern inherit the case type class for each data instance type. Define type-specific behavior in each specialized class
  • Circumstance every rule in the case life-cycle beyond the point that the data instance's type is determined
  • For each data instance type create a subcase. Use a Decision shape to select the appropriate create case flow shape
  • For each data instance type create a subflow. Use a Decision shape to select the appropriate subflow shape

Question 17

Question
When specializing a case using class inheritance, which two of the following options are correct?
Answer
  • Use pattern inheritance for case specialization within an application
  • Use direct inheritance for case specialization across applications
  • Use direct inheritance for case specialization within an application
  • Use pattern inheritance for case specialization across applications

Question 18

Question
Which two of the following statements are true regarding circumstanced case type rules?
Answer
  • The rule resolution algorithm does not apply to circumstanced case type rules
  • Circumstanced case type rules are active only when a case instance is opened
  • Case Designer supports viewing circumstanced case type rules, the base rule and its circumstanced variations, side-by-side
  • Case workers can select which circumstanced variation of the case type rules to run

Question 19

Question
In which three of the following ways can an application be specialized?
Answer
  • Use branching
  • Circumstancing
  • Release toggles
  • Use decision rules
  • Class inheritance
  • Ruleset overriding

Question 20

Question
Which two of the following statements are true about component applications?
Answer
  • Component application cannot be self-testable
  • Are designed to be used as built-on applications
  • Do not contain case type
  • Can be composed of other components

Question 21

Question
At a certain point in its life cycle, a case is required to capture the list of data instances viewed by the user from which one was selected. The data instance would be classified as reference data, values associated to a unique key rarely, if ever, changing. What is the best way to implement this requirement in Pega taking into consideration performance and extensibility?
Answer
  • Define a data page using the Snapshot pattern to copy the list and define a Declare Index that creates a separate database table
  • Define a report definition that uses the Reference pattern against a database view
  • Define a data page using the Reference pattern and populate a field group list with the keys to the reference data instances
  • Define a Link class with two keys, one pointing to the reference data instance, the other pointing to the case

Question 22

Question
Which two statements are true with regards to industry foundation data model?
Answer
  • Data pages provided by the industry foundation data model need to be extended for each external integration
  • A best practice is to use the industry foundation data model as-is, as much as possible
  • The industry foundation data model can only be used as built-on application in conjunction with Pega applications
  • Pega's industry foundation data simplifies the complexity of many-to-many relationships

Question 23

Question
Greenfield Data Modeling follows the three-level approach. What is the order of applying this three-level approach?
Answer
  • Conceptual, Logical, Physical
  • Physical, Conceptual, Logical
  • Logical, Conceptual, Physical
  • Logical, Physical, Conceptual

Question 24

Question
What are the two ways to minimize or avoid data integrity issues?
Answer
  • Do not persist values that are derivable such as counts and categorizations and that are subject to change
  • Avoid using properties that represent a version or as-of-date
  • Store critical data within multiple tables to prevent data loss
  • Follow the single source of truth principle (SSOT)

Question 25

Question
What are two key benefits of using a Pega industry foundation data model?
Answer
  • The industry foundation provides data pages that separate business logic from the source of the data (interface)
  • Provides a robust starting point for data properties and classes
  • The industry foundation data model can replace the customer's data model
  • The industry foundation provides data pages that consolidate both business logic and the source of the data (interface)

Question 26

Question
What are three different ways to accommodate temporal data?
Answer
  • Use a custom rule
  • Use a data class with an as-of date property
  • Declare the data class as abstract
  • Leverage the History-Rule class
  • Use a data class with a version property

Question 27

Question
How is polymorphism implemented when defining a data relationship field type during data modelling?
Answer
  • Map a field type to a class at design-time and allow its actual type to be determined by Direct inheritance at runtime
  • Map a field type to an abstract class at design-time and allow its actual type to be determined at runtime
  • Map a field type to a class at design-time and allow its actual type to be determined by Pattern inheritance at runtime
  • Map a field type to a concrete class at design-time and allow its actual type to be determined at run time

Question 28

Question
Which of the following is true about data classes?
Answer
  • Persisting a derived value, such as a date-dependent historical price, is acceptable for performance reasons provided it is reproducible
  • Every data class should be defined at the Enterprise layer under Org-Data-, then extended to higher layers
  • Reference data must be embedded within a case's BLOB
  • A reference data class must not possess a BLOB column

Question 29

Question
Which of the following statements best describes data model design?
Answer
  • It is a discussion on organizing and designing the data
  • It is a discussion on operations performed on the data while working on a case
  • It is a discussion on operations performed on the data
  • It is a discussion on designing the data but not organizing the data

Question 30

Question
What is the primary difference between push routing and pull routing?
Answer
  • The behavior of push routing is configured in Rule-System-Settings, and pull routing is not
  • Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing
  • Push routing activity names begin with "To" and pull routing activity names begin with either "Get" or "Find"
  • The security type value for push routing activities is "Route" and the security type value for pull routing activities is "Activity"

Question 31

Question
After deploying a flow change to production which affects in flight cases, which three activities can be used to avoid orphaned assignments?
Answer
  • pxRestartStage
  • pxAdjustSLA
  • OpenAndLockWork
  • SetTicket
  • pxRestartRun

Question 32

Question
A Low code developer can select which tow of the following participants that are associated to user account within the application?
Answer
  • Reporting manager
  • Org Unit manager
  • Workgroup manager
  • Current user

Question 33

Question
Which of the following techniques is the most recommended for handling changes to processes when there are existing open cases in production?
Answer
  • There is no recommended approach, as a best practice, you should never modify existing processes once deployed to production
  • There is no ideal technique as every approach has advantages and disadvantages, the best approach depends on the requirements and the environments
  • The recommended approach is to circumstance the flow and case type rules and use tickets to control processing of existing assignments
  • The recommended approach is to require users to switch between the old and new versions of the processes by switching between application versions

Question 34

Question
A case is routed to a work queue after creation in a Fraud application. The fraud analyst picks-up the work using GetNextWork functionality. If the fraud analyst cannot complete the assignment, the analyst clicks Cancel so that another fraud analyst can work on the assignment. Which item can be configured to implement the above requirement?
Answer
  • GetNextWorkCriteria
  • Assign-Workbasket.GetNextWork
  • MoveToWorkList
  • GetNextWork_MoveAssignmentToWorklist

Question 35

Question
An existing process uses an integrator shape to exchange data with an external system. Which of the following flows is used to send email correspondence for exception that occur with the integrator shape?
Answer
  • ConnectionProblem
  • FLowProblems
  • pzStageProblems
  • ProblemFlow

Question 36

Question
What are the three ways that you change the Get Next Work priorization without customizing the GetNextWork and GetNextWorkCriteria rules?
Answer
  • Adjust the assigment urgency
  • Override the ToWorklist routing activity
  • Increase case urgency
  • Update operator skills
  • Override one or more GetNextWork related application settings rules

Question 37

Question
Which three of the following options are flow-related assignment properties that can be used to identify assignments for cases in flight?
Answer
  • pxTaskName
  • pyFlowType
  • pyLockInterval
  • UrgencyAdjust
  • pyInterestPageClass

Question 38

Question
A process with three assignments exists in production. After redesign, one of the assignments is removed. After the deployment, in flight cases should use the old assignment for processing Which one of the following approaches can be used for the above requirement?
Answer
  • Processing existing assignments in parallel with the new flow
  • Switching the application version of in flight cases
  • As-of-date circumstancing the flow
  • Moving existing assignments

Question 39

Question
Which two of the following routing activities leverage the @pickBalancedOperator() function?
Answer
  • ToSkilledGroup
  • ToWorkGroup
  • ToSkilledWorkbasket
  • ToLeveledGroup

Question 40

Question
You need to automate a claim adjudication process in which files containing claims are parsed, verified, adjudicated. Claims which pass those initial steps are automatically created for further processing. A single file containing up to 1,000 claims is received daily before 5:00 PM. Claim verification is simple and takes a few milliseconds, but claim adjudication might take up to five minutes. Which two design options best fit for this solution?
Answer
  • Create Job Scheduler to fetch all the claims with status as Pending-Adjudication and process for calculation
  • Create an advanced agent to identify all the cases for adjudication with status as Pending-Adjudication
  • Create a Queue Processor to perform the calculation, use "Run in Background" to call the Queue Processor, pause the case processing, and wait for the Queue Processor to complete processing
  • In an activity, invoke the Queue-For-Processing method against each claim
  • Create a standard agent to perform the case processing and calculation

Question 41

Question
What are the two reasons why you tune some of the Pega out-of-the-box default agents in a production environment?
Answer
  • The agent is preconfigured to run at an optimal time by default
  • The agent runs based on node classification
  • The agent runs more frequently than needed
  • The agent should not run in production

Question 42

Question
In which situation do you consider calling external services asynchronously?
Answer
  • When the response may return an error condition
  • When the response is required exactly after one hour
  • When the response is not immediately required
  • When the response is immediately required

Question 43

Question
In which two scenarios the access group context can be changed for Queue Processors?
Answer
  • Queue-For-Processing
  • Run immediately
  • Queue Schedule
  • Run in background

Question 44

Question
By default, queue processors run in the security context of which requestor type?
Answer
  • App
  • Background
  • AsyncProcessor
  • System Runtime Context

Question 45

Question
ABC Company is a distributor of discount wines and uses Pega Platform for order tracking. There are up to 100 orders per day, with up to 40 different line items in each order specifying the product and quantity. There are up to 5,000 varieties of wines that continuously change over time as new wines are added to and dropped from the list. ABC Company want to extend the functionality of the order tracking application to determine recent hot-selling items by recording the top 10 items ordered by volume each day. This information is populated in a table and used to ease historical reporting. Select a design solution to support this
Answer
  • The job scheduler should leverage a report to easily retrieve and sort the number of items ordered in a day and a record values in the historical table
  • Create an advanced agent to identify the list of orders to be processed
  • Create a standard agent to perform the orders to be processed
  • Use a queue processor to identify the list of orders to be processed

Question 46

Question
In asynchronous service processing, which rule decides the queuing and dequeuing option?
Answer
  • Connect response processor
  • Connect request processor
  • Service request processor
  • Service response processor

Question 47

Question
When integrating with multiple independent services with long response times, which option can improve user experience?
Answer
  • Use a spin-off subflow
  • Use a subcase
  • Use the run-in-parallel option
  • Use the Append and Map to action in a data transform

Question 48

Question
As part of an underwriting process, the application must generate a risk factor for a loan and insert the risk factor into the Loan case. The risk factor generation is an intensive calculation that requires several minutes to run. The calculation slows down the environment. You want to have all risk factor calculations run automatically between the hours of 10:00 PM and 6:00 AM to avoid the slowdown during daytime working hours. Which two design options best fit for this solution?
Answer
  • Use standard agent to process the queued Loan cases
  • Use a standard queue processor to perform the calculation, pause the case until 10 PM and include a step in the flow to queue the case for the queue processor
  • Use an advanced agent to fetch and process the Loan Risk factors
  • Use a delayed dedicated queue processor and set the DateTime for processing to 10 PM using the run in background shape
  • Use a job scheduler to fetch all the Loan cases with status Pending-RiskCalculation and then calculate risk factor and call Resume Flow

Question 49

Question
Which two of the following actions need to be configured for a job scheduler activity?
Answer
  • Transaction management
  • On which node to run
  • Record locking
  • System runtime context

Question 50

Question
Which three statements are true regarding attribute-based access control (ABAC)?
Answer
  • Must reference at least one type of RBAC rule to enforce security
  • Access Control Policy rules cannot be turned off once defined
  • Allows only certain properties within a class to be masked
  • Does not need to reference role-based access control (RBAC) rules to enforce security
  • Does not support encryption at the property level
  • Possible to prevent an Access Control Policy from being overridden
  • The Applies-To class for every rule used by an Access Control Policy Rule must extend either Work- or Data-

Question 51

Question
Which two of the following security risks can be identified by the Rule security analyzer?
Answer
  • Custom-written Java code
  • Unsecured rulesets or unlocked ruleset versions
  • Properties with incorrect type
  • Vulnerabilities in stream rules

Question 52

Question
Which access is granted if there are several dependent access roles defined for a dependent access role?
Answer
  • Only the most generic dependent role is considered
  • Only the most specialized dependent role is considered
  • All dependent role names are considered and the conditions are joined with OR
  • All dependent role names are considered and the conditions are joined with AND

Question 53

Question
Select the best practices that can help minimize security vulnerabilities in the custom HTML rule
Answer
  • Use of hidden elements (type=hidden)
  • Minimize the use of mode=literal
  • Use the StringUtils.crossScriptingFilter method when using parameters in Pega Platform reference tag
  • Use dynamic SQL statements instead of prepared statements to prevent possible SQL injection
  • Use the SafeURL function to generate Pega Platform request URLs in custom JavaScript

Question 54

Question
What are the supported Rule Security Mode settings on the access group which helps enforce a deny first policy?
Answer
  • Reject
  • Warn
  • Accept
  • Deny
  • Allow
  • Approve

Question 55

Question
Which three of the following application rule properties can you use within an access when rule to restrict access between applications hosted in the same database and sharing the same work and assignment table?
Answer
  • pyOrigDivision
  • pyOwningOrganization
  • pyOwningUnit
  • pyOrigOrg
  • pyOwningDivision
  • pyOrigOrgUnit

Question 56

Question
By default, Queue Processors run in the security context of the which requestor type?
Answer
  • Syncprocessor
  • AsyncProcessor
  • Background
  • Batch

Question 57

Question
Which authorization model do you use to implement the data privacy requirements of the European Union's General Data Protection Regulation (GDPR) and similar regulations?
Answer
  • Attribute-based access control (ABAC)
  • Role-based access control (RBAC)
  • Client-based access control (CBAC)
  • Privileged based access control (PBAC)

Question 58

Question
Select three best practices that can protect against the cross-site scripting (XSS) attacks
Answer
  • Filter all inputs
  • Write custom JavaScript
  • PublicAPI methods for XSS filtering
  • Filter HTML and XML outputs
  • PrivateAPI methods for XSS filtering

Question 59

Question
Select the four authentication protocols supported by Pega
Answer
  • SAML 2.0
  • PRSecuredBasic
  • Token credentials
  • Session Management
  • PRBasic
  • Basic credentials
  • OpenID Connect

Question 60

Question
XYZ Corp orders office supplies through multiple suppiers. XYZ Corp wants to see detail about the least expensive line items purchased through each supplier. XYZ has Order cases that have LineItem subcases. LineItem detail is stored in a separate table. Which of the following approaches should be used as part of the solution?
Answer
  • Define a subreport that obtains supplier ID and min(Price) from the line item table and within the main report query the line item table joining to the subreport by product ID
  • Define a subreport that obtains supplier ID and max(Price) from the line item table and within the main report query the line item table joining to the subreport by supplier ID
  • Define a subreport that obtains supplier ID and min(Price) from the line item table and within the main report query the line item table joining to the subreport by supplier ID
  • Define a subreport that obtains supplier ID and max(Price) from the line item table and within the main report query the line item table joining to the subreport by product ID

Question 61

Question
A report must have a list of all operators with the following columns: Operator Last Name, Operator First Name, Count of Assignments. What report is best suited for this requirement?
Answer
  • Summary Report in the Operator class
  • Summary Report in the Worklist Assignment class
  • List Report in the Operator classs with a subreport
  • List Report in the Worklist Assignment Class

Question 62

Question
Which of the following statements is true about reports database in Pega?
Answer
  • Pega automatically replicates data on to Reports database schema
  • A table in a reports database need not have the same structure (columns, etc.) as its counterpart table in the PegaRULES database
  • Reports database schema and Pega database schema must be on the same database server
  • A table in a reports database must have the same structure (such as columns) as its counterpart table in the PegaRULES database

Question 63

Question
Which JOIN condition is the most efficient in a report definition?
Answer
  • Only include matching rows
  • Only include unmatched rows
  • Include all rows in joined class
  • Include all rows

Question 64

Question
What are two issues that can result if large data sets are generated by a report and sent to another user?
Answer
  • Hardware failure
  • Testing issues
  • Out-of-memory issues
  • Network issues

Question 65

Question
Which of the following is a benefit of table partitioning?
Answer
  • Take less space for storage
  • Improve the query performance
  • Improve guardrail score
  • Can create index automatically for better results

Question 66

Question
Which of the following best describes the function of BIX?
Answer
  • To extract Pega data for loading into a data warehouse
  • To extract non-Pega data for loading into Pega
  • To configure reports on both Pega and non-Pega data
  • To transform data within the Pega database

Question 67

Question
Which column can be removed from Declare Index tables to improve performance?
Answer
  • pxPvStream
  • pwPvStream
  • pyPvStream
  • pzPvStream

Question 68

Question
Which of the following setups most likely requires the use of a subreport?
Answer
  • Columns-Operator Name, Operator Division, Count of Purchase Requests created, 1 row for every operator excluding Purchase Requests being audited
  • Columns-Operator Name, Count of Purchase Requests created, 1 row for every operator
  • Columns-Operator Name, Operator Division, 1 row for every operator
  • Columns-Operator Name, Operator Division, Count of Purchase Requests created, 1 row for every operator

Question 69

Question
Which report definition data access method should be used to include Work Parties?
Answer
  • Association
  • Join
  • Declare index
  • Sub Reportt

Question 70

Question
Design teams are primarily responsible for user experience
Answer
  • True
  • False

Question 71

Question
Good UX design can save a company money because it helps define and scope a team's work
Answer
  • True
  • False

Question 72

Question
While designing an application for large set of users working across regions on a large set of data, which three of the following points have to taken into consideration to improve the user experience?
Answer
  • Capture all the data required from user in a single form
  • Leverage asynchronous and background processing
  • Leverage case management to divide complex cases
  • Use the deferred data loading technique
  • Maximize server-side expressions, calculations, and validation

Question 73

Question
Business-to-Consumer (B2C) apps tend to focus on a specific business process
Answer
  • True
  • False

Question 74

Question
For which three conditions are client-side expressions better than the server-side expressions?
Answer
  • Edit-Validate
  • Required conditions
  • Obj-Validate
  • Disabled conditions
  • Visibility conditions
  • Edit-Input

Question 75

Question
When do you perform usability testing?
Answer
  • Conducted periodically throughout the user acceptance testing phase
  • Conducted periodically throughout the design phase
  • Conducted periodically throughout the software development life cycle
  • Conducted at the end the development phase

Question 76

Question
Usability testing is a method for determining how easy an application is performed by the
Answer
  • developer
  • application user
  • business architect
  • project manager

Question 77

Question
While the user is busy reading a screen or completing another task, the application can perform required tasks in another requestor session, apart from the user's requestor session. Which two tasks can improve the user experience?
Answer
  • Use synchronous connectors
  • Use defer load
  • Use large data sets
  • Use Load-DataPage method

Question 78

Question
Autocomplete controls negatively impact the user experience if
Answer
  • the potential result set is larger than 50 rows
  • if all the results in the list end with the same three characters
  • the potential result set is larger than 100 rows
  • if all the results in the list start with the same three characters

Question 79

Question
According to Nielsen, at what stage does iterative design first become a part of company culture?
Answer
  • Managed usability
  • Systematic user-centered design process
  • Integrated user-centric design
  • Skunkworks

Question 80

Question
Which two of the following items are consistent with branch development?
Answer
  • Performing merges
  • Using a customized rule check-in approval process
  • Bypassing conflict detection
  • Conducting reviews
  • Versioning access groups

Question 81

Question
What are the four developer activities in DevOps Release pipeline?
Answer
  • Unit testing
  • Testing new features
  • Configure toggles
  • Accepting the software and deploying to production
  • Sharing changes with other developers
  • Making sure existing features still work as expected
  • Ensuring changes do not conflict with other developer's changes

Question 82

Question
Which two of the following items are normally performed when implementing a custom guardrail warning?
Answer
  • Use a customized rule check-in approval process
  • Override the Embed-Warning.ShowWarningOnForm decision tree
  • Use the @baseclass.pxAddGuardrailMessage activity
  • Override the @baseclass.CheckForCustomWarning activity

Question 83

Question
Which load testing tool do you recommend to the client?
Answer
  • Performance Analyzer
  • Any client-preferred web application load-testing tool
  • Loadrunner
  • JMeter

Question 84

Question
Which two of the following tools can be used to determine how to best address rule conflicts?
Answer
  • Compare Rules
  • Live UI
  • Performance Analyzer
  • Alert logs
  • Merge branch wizard

Question 85

Question
Which two of the following items best describe technical debt?
Answer
  • Allowing only carefully reviewed and thoroughly tested changes to move through a release pipeline
  • Pattern of allowing low-quality features into your production environment
  • You spend more time fixing bugs than working on new features that add business value
  • The debt incurred due to postponing the implementation of a technical requirement

Question 86

Question
What are the three end-user activities in a DevOps Release pipeline?
Answer
  • Unit testing
  • Testing new features
  • Accepting the software and deploying to production
  • Ensuring changes do not conflict with other developer's changes
  • Sharing changes with other developers
  • Making sure existing features still work as expected

Question 87

Question
What two benefits do you receive by running appropriate tests at each stage of a release pipeline?
Answer
  • Fewer design issues within the application
  • Reinforcement of testing best practices
  • Better performance
  • Timely feedback

Question 88

Question
Which statement is true about Guardrail wanings?
Answer
  • A Guardrail warning prevents the role from saving
  • Only one Guardrail warning is shown on the rule form
  • Guardrail warnings are stored in the pc_rule_declare database table
  • A rule with a Guardrail warning can be executed

Question 89

Question
In which two situations do you typically use rule check-in approval?
Answer
  • To coordinate efforts of a large development team
  • When business logic requires a manager to review a case
  • To track interface changes for connectors
  • To control changes to a framework application
Show full summary Hide full summary

Similar

Pega Certified Lead System Architect (Modules)
Ian Lucas
PEGA CSSA Prep
Wendell Phipps
Pega Systems CPMC Training
Elena Briones
Pega Certified Lead System Architect (Modules)
filibusty eveonline
Pega (Modules)
Jean Wick
Pega Assessment
anna.buchanan
plagio
Yatziri Genis
Random OSPF fun time.
I L
Pega
Luc Chase
PEGA CSSA Prep
x x
Cognizant BPM Practice
Kinjal Sengupta