1.
You want to write all errors detected when loading a data page to a log file. How would you do that?
Correct Answer
A. Use an existing function in the error handling data transform
Explanation
One way to write all errors detected when loading a data page to a log file is by using an existing function in the error handling data transform. This means that there is already a function available in the error handling data transform that can be used to capture and log any errors that occur during the data page loading process. By utilizing this function, all errors can be easily recorded and stored in a log file for further analysis and troubleshooting.
2.
An agent runs every day at 7:00 A.M. You have been asked to update the agent so that it runs once every 300 seconds. How would you modify the agent schedule to meet this requirement?
Correct Answer
B. Change the Recurring pattern to Periodic and enter the Interval value.
3.
You have configured an agent to automatically send correspondence. The agent runs in standard mode using AQM. As of the last agent run, entries failed to commit and the correspondence was not sent. Which two approaches could you take to troubleshoot the issue? (Choose Two)
Correct Answer(s)
A. Open the Requestor Management screen in SMA, select the requestor with a waiting message, and run the Tracer.
D. Open the Broken Process queue, select the entry, and view the error message and stack trace information.
Explanation
To troubleshoot the issue of failed correspondence, you can take the following two approaches:
1. Open the Requestor Management screen in SMA, select the requestor with a waiting message, and run the Tracer. This will help you trace the execution of the agent and identify any errors or issues that may have occurred during the process.
2. Open the Broken Process queue, select the entry, and view the error message and stack trace information. This will provide you with specific details about the error that caused the correspondence to fail, allowing you to investigate and resolve the issue.
4.
Which two statements accurately describe the use of a symbolic index? (Choose two.)
Correct Answer(s)
A. <LAST> sets or retrieves an element value from the end of a value list or page list property.
B. <PREPEND> inserts a new element in a value list or page list property as the first element.
Explanation
The first statement, " sets or retrieves an element value from the end of a value list or page list property," accurately describes the use of a symbolic index. This means that the index can be used to access the last element in a list or property.
The second statement, " inserts a new element in a value list or page list property as the first element," also accurately describes the use of a symbolic index. This means that the index can be used to add a new element at the beginning of a list or property.
5.
Field values enable you to _________________.
Correct Answer
A. Customize a list of allowed values for a property based on the context of the property
Explanation
Field values enable you to customize a list of allowed values for a property based on the context of the property. This means that you can specify which values are valid for a specific property, ensuring that only those values can be entered or selected. This allows for greater control and accuracy in data entry, as well as consistency in the values used across different instances of the property.
6.
An order fulfillment process includes a request for quotes from multiple shippers. You want the system to automatically call a quote request subprocess for each vendor. How would you configure your process?
Correct Answer
B. Add a Split For Each shape and run the request subprocess for each vendor on a page list.
Explanation
To configure the process, you would add a Split For Each shape and run the request subprocess for each vendor on a page list. This means that for each vendor, the system will automatically call the quote request subprocess. The Split For Each shape allows the process to split into multiple instances, each corresponding to a different vendor, and the request subprocess will be executed for each instance. By using a page list, you can easily iterate through each vendor and ensure that the quote request subprocess is called for each one.
7.
Which two options do you configure on a portal record? (Choose Two)
Correct Answer(s)
A. Identify the user role of the type of user who would access the portal.
B. Determine which skin to use to apply branding to the portal.
Explanation
On a portal record, you configure the user role of the type of user who would access the portal. This helps determine the level of access and permissions for different users. Additionally, you configure the skin to use for branding the portal. This allows you to customize the appearance and design of the portal to align with your organization's branding guidelines.
8.
Select two benefits of adopting a rule delegation strategy. (Choose Two)
Correct Answer(s)
A. Adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance.
D. Adopting a rule delegation strategy can help improve the business' ability to adapt to changing business conditions.
Explanation
Adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance. This means that they can allocate their time and resources more efficiently, leading to increased productivity and effectiveness in their respective roles. Additionally, adopting a rule delegation strategy can help improve the business' ability to adapt to changing business conditions. By allowing business users to make changes to the application on their own, the business can quickly respond to market demands and make necessary adjustments without relying on lengthy approval processes.
9.
Which two configurations can you use to include access groups into your Product rule? (Choose two.)
Correct Answer(s)
B. Add the access groups to the application record.
D. Associate the access groups with a ruleset included in the application.
Explanation
You can include access groups into your Product rule by adding the access groups to the application record and associating the access groups with a ruleset included in the application. This allows the access groups to be used and applied within the Product rule.
10.
Your application contains a top-level case type named Purchase Request and a Purchaser Order child case. The company has determined that only one user may open and work on a case at one time. However, users working on purchase orders should not lock out users working on the parent purchase request cases. How would you configure the lock settings among the case types?
Correct Answer
A. Set default locking on purchase requests and set the do not lock the parent option on purchase orders.
Explanation
To ensure that only one user can work on a case at a time but still allow users to work on parent purchase request cases while others work on purchase orders, the correct configuration is to set default locking on purchase requests and set the "do not lock the parent" option on purchase orders. This means that when a user opens a purchase request case, it will be locked for them exclusively. However, when a user opens a purchase order case, it will not lock the parent purchase request case, allowing other users to still work on it simultaneously.
11.
What two artifacts should you prepare in advance before delegating a rule? (Choose Two)
Correct Answer(s)
A. An Access Group that has access to the production ruleset
C. An unlocked ruleset added to the Application rule as a production ruleset
Explanation
Before delegating a rule, you should prepare an Access Group that has access to the production ruleset and an unlocked ruleset added to the Application rule as a production ruleset. The Access Group is necessary to provide the necessary permissions and access to the production ruleset. The unlocked ruleset added to the Application rule ensures that the delegated rule can be accessed and executed properly within the application.
12.
You want to evaluate cases as potential duplicates when the existing cases and the current case have the same create operator. How would you ensure that only cases with the same create operator are evaluated?
Correct Answer
A. Add a must match condition where the create operator in an existing case is the same as in the current case
Explanation
To ensure that only cases with the same create operator are evaluated, you should add a must match condition where the create operator in an existing case is the same as in the current case. This means that the create operator value must be an exact match in order for the cases to be considered potential duplicates. This condition ensures that only cases with the same create operator are evaluated, allowing for more accurate duplicate case identification.
13.
Your application is deployed to the cloud. A data source outside your application populates a data page by using your data access pattern configuration. You receive complaints that the system takes a long time to fetch data each time the case worker accesses information for a different customer.
Which approach solves this performance issue?
Correct Answer
B. Change snapshot data access method to reference pattern data access method.
Explanation
The correct answer is to change the snapshot data access method to the reference pattern data access method. This approach would solve the performance issue by reducing the time it takes to fetch data each time the case worker accesses information for a different customer. The reference pattern data access method allows the data page to be populated with references to the data instead of creating a snapshot of the data. This means that when the case worker accesses information for a different customer, only the targeted data needs to be fetched from the database, resulting in faster access.
14.
For what reason would you configure an Access Deny record?
Correct Answer
D. To explicitly prevent users from deleting cases to satisfy a company policy.
Explanation
An Access Deny record is configured to explicitly prevent users from deleting cases to satisfy a company policy. This means that users will not have the ability to delete cases, regardless of their role or permissions. By implementing this restriction, the company ensures that cases are not accidentally or intentionally deleted, preserving important data and maintaining compliance with company policies.
15.
In which of the following situations would you simulate a data page?
Correct Answer
A. When the interface definition is not finalizedOption 1
Explanation
When the interface definition is not finalized, it would be necessary to simulate a data page. This is because without a finalized interface definition, the actual data cannot be retrieved or processed. By simulating a data page, the system can generate mock data that can be used for testing and development purposes until the interface definition is finalized.
16.
Based on the information in the chart. If you execute the rule when .Dept=Engineering. which version does Pega use?
Correct Answer
B. 01-01-35
Explanation
Pega uses version 01-01-35 when the rule is executed with the condition .Dept=Engineering.
17.
You create a report in a work class that displays the assigned operator and task name for each open case.
Which two ways can you combine data in the Assign-Worklist class for your report? (Choose Two)
Correct Answer(s)
B. Use a class join to the Assign-Worklist class. Specify a join filter where the pxRefObjectKey in the join class is equal to an object identifier in the work class.
D. Use a Worklist Assignment association rule to join the Work class to the Assign-Worklist class.
Explanation
To combine data in the Assign-Worklist class for the report, you can use a class join to the Assign-Worklist class and specify a join filter where the pxRefObjectKey in the join class is equal to an object identifier in the work class. This allows you to retrieve the assigned operator and task name for each open case. Additionally, you can also use a Worklist Assignment association rule to join the Work class to the Assign-Worklist class, which further helps in combining the data for the report.
18.
You have configured an agent to automatically send correspondence. The agent runs in standard mode using AQM. As of the last agent run, entries failed to commit and the correspondence was not sent. Which two approaches could you take to troubleshoot the issue? (Choose Two)
Correct Answer(s)
A. Open the Broken Process queue, select the entry, and view the error message and stack trace information.
D. Open the Requestor Management screen in SMA, select the requestor with a waiting message, and run the Tracer.
Explanation
To troubleshoot the issue of failed correspondence, you can take two approaches. First, open the Broken Process queue and select the entry to view the error message and stack trace information. This will provide insights into the specific error that caused the failure. Second, open the Requestor Management screen in SMA and select the requestor with a waiting message. Running the Tracer will help identify any issues in the requestor's processing flow and provide additional debugging information. These two approaches allow you to investigate both the failed entry and the requestor to pinpoint the cause of the correspondence failure.