PEGA CSSA Mock Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mocker4
M
Mocker4
Community Contributor
Quizzes Created: 3 | Total Attempts: 10,307
| Attempts: 7,174
SettingsSettings
Please wait...
  • 1/70 Questions

    Which tool is best if you wanted to compare PRPC Error with alerts , as well as the JVM garabge collection log(Choose one)

    • PLA_ PegaRules Log Analyzer
    • AES
    • SMA
    • Excel
Please wait...
About This Quiz

A Pega certification is not an easy achievement. Most people take up exams severally before getting it right. This Pega CSSA Mock Test will help you prepare well to get through at the first shot. All the best.

PEGA CSSA Mock Test - Quiz

Quiz Preview

  • 2. 

    Why is allowing instances to be stored in a default table(pr_other) a poor design practice?(choose one)

    • The default table does not contain adequate indexes and columns for performance

    • Data is purged by the system cleaner

    • The default table names are too generic

    • The default table is too small to hold of ur data

    • Because the Preflight tool will flag it as bad practice

    Correct Answer
    A. The default table does not contain adequate indexes and columns for performance
    Explanation
    Allowing instances to be stored in a default table (pr_other) is a poor design practice because the default table does not contain adequate indexes and columns for performance. This means that retrieving and manipulating data from the table may be slower and less efficient. In order to optimize performance and ensure proper data organization, it is recommended to use tables specifically designed for storing and managing the relevant data.

    Rate this question:

  • 3. 

    Your application just went into production and the users are complaining that response times are terrible.Your best initial action should be?(Choose one)

    • Use the PLA-PegaRULES Log Analyzer to analyze the ALERTS, System Logs and GC

    • Run PAL on every screen in the application

    • Run Pre-Flight

    • Ask the DBA to monitor the database

    Correct Answer
    A. Use the PLA-PegaRULES Log Analyzer to analyze the ALERTS, System Logs and GC
    Explanation
    The best initial action to take when users complain about terrible response times in a newly deployed application is to use the PLA-PegaRULES Log Analyzer to analyze the ALERTS, System Logs, and GC. This tool allows for a comprehensive analysis of the application's logs and garbage collection, which can help identify any performance issues or bottlenecks that may be causing the slow response times. By analyzing these logs, it becomes easier to pinpoint the root cause of the problem and take appropriate actions to optimize the application's performance.

    Rate this question:

  • 4. 

    How can you debug an agent using Tracer(choose one)

    • There is a way to select the agent and force its execution

    • You can delay the agent processing from SMA and then trace the given requestor

    • We can set a breakpoint in the activity that the agent runs to have tracer pick it up

    • We can set a log message step in the activity the agent runs to have tracer find the activity

    Correct Answer
    A. You can delay the agent processing from SMA and then trace the given requestor
    Explanation
    To debug an agent using Tracer, you can delay the agent processing from SMA and then trace the given requestor. This means that you can pause the execution of the agent and then trace the specific requestor that you want to debug. By doing this, you can analyze the execution flow and identify any issues or errors in the agent's processing.

    Rate this question:

  • 5. 

    Decision Table rules can be edited in Excel

    • True

    • False

    Correct Answer
    A. True
    Explanation
    Decision Table rules can be edited in Excel because Excel provides a user-friendly interface and a wide range of features that allow users to input and manipulate data easily. Excel also offers various tools for organizing and analyzing data, making it a suitable platform for creating and editing decision tables. Users can enter the conditions and corresponding actions in separate columns, and use Excel's formatting and formula capabilities to create and modify decision table rules efficiently. Additionally, Excel allows for easy collaboration and sharing of decision tables among team members.

    Rate this question:

  • 6. 

    What determines which table a work object is persisted to?

    • The Data-Admin-DB-Table record for the class group the work object belongs to and the Access Group

    • The Rule-Set the class belongs and Data-Admin-DB-Table definitions

    • Data-Admin-DB-Table record associated to the class group the work object belongs to

    • The Rule-Set the class belongs to

    Correct Answer
    A. Data-Admin-DB-Table record associated to the class group the work object belongs to
    Explanation
    The correct answer is the Data-Admin-DB-Table record associated with the class group the work object belongs to. This is because the Data-Admin-DB-Table record defines the database table where the work object will be persisted. By associating the record with the class group, it ensures that all work objects belonging to that class group are stored in the same table.

    Rate this question:

  • 7. 

    Which one statement describes the best practice for branding an application to meet a company's style requirements (choose one)

    • Using the application skin wizard and then use the inline styles on the User Interface rules

    • Use the Application Skin wizard and then modify the generated skins when needed, try to limit inline styles

    • Only use the style viewer and make the changes to the out of the box CSS files and your own RuleSets

    • Use inline styles to change displays to meet corporate standards.

    Correct Answer
    A. Use the Application Skin wizard and then modify the generated skins when needed, try to limit inline styles
    Explanation
    The best practice for branding an application to meet a company's style requirements is to use the Application Skin wizard and then modify the generated skins when needed, while trying to limit the use of inline styles. This approach allows for customization of the application's appearance while maintaining consistency and avoiding excessive use of inline styles, which can make maintenance and future updates more difficult.

    Rate this question:

  • 8. 

    Where can you view the contents of the Rule Instance Cache? (Choose one)

    • Using the SMA you can view the contents of the instance cache which are displayed in the form of an excel file

    • Using the Developer Portal you can viewe the contents of the instance cache which are displayed

    • By viewing the XML files from the TEMPDIR\PRGenJava\XML directory

    • By Viewing the XML files from the pzInsKey column by usng JDBC code

    Correct Answer
    A. Using the SMA you can view the contents of the instance cache which are displayed in the form of an excel file
    Explanation
    The correct answer is "Using the SMA you can view the contents of the instance cache which are displayed in the form of an excel file." This is because the SMA (System Management Application) provides a user interface for monitoring and managing Pega applications. It allows users to view various system information, including the contents of the instance cache, which are displayed in the form of an excel file. The other options mentioned, such as using the Developer Portal or viewing XML files, do not provide a direct way to view the contents of the Rule Instance Cache.

    Rate this question:

  • 9. 

    What does PRPC do when executing a blocked rule (choose one)

    • It writes a message to log4j

    • only ignores the rule and continues to search for the next rule via rule resolution

    • It throws an exception

    • It either ignores the rule or throws an exception depending on the prcofig.xml setting

    Correct Answer
    A. It throws an exception
    Explanation
    When executing a blocked rule, PRPC throws an exception. This means that if a rule is blocked, PRPC will not ignore it or continue searching for the next rule, but instead, it will stop the execution and throw an exception.

    Rate this question:

  • 10. 

    Given the following situation:A BPM application was deployed in to production 9 months ago and was performing well initially.Now users have statrted complaining slow responses on certain screen interactions irrespective of the time of day. Which of the following stmts is most likly to be accurate as to the root cause of this issue (choose one)

    • Over time more rows have been added to work, history, assignment and operator tables and inefficient queries on them are taking longer than they did 9 months ago

    • A memory leak in the configuration has led to more and more garbage collection over the past 9 months

    • If the PRPC application server has not been restarted recently it is likely the case that the PRPC cache has not been utilized well

    • As new rules have been added to PRPC rulebase , the database containing the rules needs to be tuned so that frequent access to the rules is made as efficient as possible

    Correct Answer
    A. Over time more rows have been added to work, history, assignment and operator tables and inefficient queries on them are taking longer than they did 9 months ago
    Explanation
    The most likely root cause of the slow response issue is that over time, more rows have been added to the work, history, assignment, and operator tables. This has resulted in inefficient queries on these tables, causing them to take longer than they did 9 months ago. As the number of rows increases, the queries become slower, impacting the overall performance of the BPM application.

    Rate this question:

  • 11. 

    Which one of the following rules can use backward chaining as a method of propagation ?(Choose one)

    • Rule-Declare-Expression

    • Rule-Declare-OnChange

    • Rule-Declare-Constraint

    • Rule-Declare-Trigger

    • Rule-Declare-CaseMatch

    Correct Answer
    A. Rule-Declare-Expression
    Explanation
    Rule-Declare-Expression can use backward chaining as a method of propagation because it allows the system to infer values based on the values of other properties. Backward chaining starts with the goal and works backward to find the conditions that need to be satisfied. In this case, the rule is declared as an expression, which means that it is used to calculate a value based on the values of other properties. Therefore, backward chaining can be used to propagate the value of the rule based on the values of the properties it depends on.

    Rate this question:

  • 12. 

    There are two session-related timeouts that are configurable in PRPC, the authentication timeout and the requestor timeout. Which statement is true

    • Authentication timeout should be set to occur first

    • Requestor timeout should be set to occur first

    • Both timeouts should be set to the same value

    • With passivation enabled , authentication timeout should be set to 0

    Correct Answer
    A. Authentication timeout should be set to occur first
    Explanation
    The correct answer is that the Authentication timeout should be set to occur first. This means that the authentication timeout should be set to a shorter duration compared to the requestor timeout. This ensures that the user is prompted to re-authenticate before their session expires due to inactivity. By setting the authentication timeout to occur first, it helps to maintain the security of the system by regularly verifying the user's identity.

    Rate this question:

  • 13. 

    What four steps must be taken to unit test a connector within a flow when the target interface /system is not yet available(Choose 4)

    • Create a Simulation activity

    • Set the connector to simulate in the Simulation data instance and specify the activity

    • Use Tracer and set a breakpoint

    • Define a Connect simulation instance

    • Test the flow with simulation enabled

    Correct Answer(s)
    A. Create a Simulation activity
    A. Set the connector to simulate in the Simulation data instance and specify the activity
    A. Define a Connect simulation instance
    A. Test the flow with simulation enabled
    Explanation
    To unit test a connector within a flow when the target interface/system is not yet available, four steps must be taken. First, create a Simulation activity. Then, set the connector to simulate in the Simulation data instance and specify the activity. Next, define a Connect simulation instance. Finally, test the flow with simulation enabled. These steps allow for testing the connector functionality without the actual target system being available.

    Rate this question:

  • 14. 

    Which method of service integration within PRPC requires the configuration of a listener?(choose one)

    • SOAP

    • BPEL

    • EJB

    • JMS

    • SQL

    Correct Answer
    A. JMS
    Explanation
    JMS stands for Java Message Service, which is a method of service integration within PRPC that requires the configuration of a listener. JMS allows applications to send, receive, and process messages asynchronously, making it a suitable choice for integrating services within PRPC. By configuring a listener, PRPC can listen for incoming messages and process them accordingly, enabling effective communication and integration between different systems.

    Rate this question:

  • 15. 

    A user has the access role that allows Level 5 access to modify instances of the MyCo-Work-Policy. What should you use to disallow access to instances of the MyCo-Work-PolicyApp-Endorse class

    • Access Settings

    • Access Role to Object

    • Access Deny

    • Access Privilege

    Correct Answer
    A. Access Deny
    Explanation
    To disallow access to instances of the MyCo-Work-PolicyApp-Endorse class, the user should use "Access Deny". This access setting will prevent the user from having access to modify instances of the specified class, ensuring that they cannot make any changes to it.

    Rate this question:

  • 16. 

    The customer wants to rollback a recently deployed Rule-Admin-Product which was imported into a target prduction system. How to solve this problem in the best possible way.(choose two)

    • By doing an export of the Rulesets from the target production system.An export also deletes the rules which were imported

    • By taking a DB backup before the import on the target system and restoring from the DB backup in a case of rollback

    • By explaining to the customer that even though the new rules are in the target system we can controls which rules are accssed by access groups

    • There is no way to do this in the product or outside of the product currently

    Correct Answer(s)
    A. By taking a DB backup before the import on the target system and restoring from the DB backup in a case of rollback
    A. By explaining to the customer that even though the new rules are in the target system we can controls which rules are accssed by access groups
    Explanation
    The first option suggests that by taking a DB backup before the import, the system can be restored to its previous state in case of rollback. This ensures that any changes made by the imported Rule-Admin-Product can be undone.

    The second option suggests that even though the new rules are in the target system, access to these rules can be controlled by access groups. This means that the customer can still have control over which rules are accessed, providing a solution to the problem without completely rolling back the import.

    Rate this question:

  • 17. 

    What does the rollback method do?

    • It supports incremental rollbacks

    • Rollback is not supported by PRPC.The only way to do a rollback is by using the compensation action method

    • Rollback is a way to rollback an object to a previous state using the History instance for a work object

    • Rolls back the entire deferred stack of operation

    Correct Answer
    A. Rolls back the entire deferred stack of operation
    Explanation
    The rollback method is used to undo a series of operations or changes that have been deferred or queued up. It is capable of rolling back multiple operations in one go, reverting the system to a previous state. This is useful in situations where a set of operations needs to be undone, such as in a transaction or when handling errors. By rolling back the entire deferred stack of operations, any changes made during the execution of those operations are effectively undone, restoring the system to its previous state.

    Rate this question:

  • 18. 

    Which one of the following is not a refactoring tool provided by PRPC (Choose one)

    • Renaming a class and propagating the name change through the heirarchy and rule references

    • Converting a Map-Value into a decision table

    • Search and replace of a string in all rules

    • Merging one ruleset into another

    Correct Answer
    A. Converting a Map-Value into a decision table
    Explanation
    The correct answer is "Converting a Map-Value into a decision table". This is not a refactoring tool provided by PRPC. Refactoring tools are used to restructure code without changing its behavior, and they typically involve renaming, searching, replacing, and merging functionalities. However, converting a Map-Value into a decision table is not a refactoring action but rather a transformation or conversion of one data structure into another.

    Rate this question:

  • 19. 

    PegaRULES is installed on a multi-node system and a copy of the various caches is stored on each node. Each of these nodes must be updated with rule changes. Which functionality in RPC manages the update process?(choose one)

    • Node-Pulse

    • Rule Cache

    • System-Update

    • System-Pulse

    Correct Answer
    A. System-Pulse
    Explanation
    System-Pulse manages the update process in a multi-node system where PegaRULES is installed. It ensures that each node is updated with rule changes by coordinating the synchronization of the various caches stored on each node.

    Rate this question:

  • 20. 

    What is the recommended way to configure Service endpoint URLs and other connector specific information(Choose one)

    • The requestor page

    • The process page

    • A Declarative page

    • The primary page

    Correct Answer
    A. A Declarative page
    Explanation
    A Declarative page is the recommended way to configure Service endpoint URLs and other connector specific information. Declarative pages provide a centralized and reusable approach to define and manage connector configurations. They allow for easy maintenance and updates, as any changes made to the declarative page will automatically reflect in all the instances where it is used. Using a declarative page ensures consistency and reduces the need for duplicating configuration settings across multiple pages or processes.

    Rate this question:

  • 21. 

    . PRPC can be installed using a WAR or EAR configuration.Which of the following NOT require an EAR configuration (choose one)

    • JMS message services support need to be provided

    • Support for two-phase commits is required

    • Support for EJB services need to be provided

    • J2EE security is required

    • JSR-94 support is required

    Correct Answer
    A. JSR-94 support is required
    Explanation
    The question is asking which requirement does not require an EAR configuration. An EAR configuration is used to package multiple modules, such as EJBs and JMS, into a single deployable unit. JMS message services, support for two-phase commits, support for EJB services, and J2EE security all typically require an EAR configuration. However, JSR-94 is a specification for rules engines and does not require an EAR configuration.

    Rate this question:

  • 22. 

    The BLOB is stored in the pzPVStream column of a table and contains the data associated with the instance. Which two statements are true

    • Since it is a column in a table in a database you can extract the BLOB and use it in another system

    • The BLOB contains the same clear text xml which you see when clicking the rule data or the View XML option on the clipboard

    • The "pzPVStream" can be eliminated by use of simple tables (those without embedded pages and page lists)

    • The BLOB enables a single table to store complex data structure that would normally require multiple tables in a non blob database.

    Correct Answer(s)
    A. The "pzPVStream" can be eliminated by use of simple tables (those without embedded pages and page lists)
    A. The BLOB enables a single table to store complex data structure that would normally require multiple tables in a non blob database.
    Explanation
    The first statement is false because the BLOB cannot be easily extracted and used in another system since it is stored in a specific column of a table in a database. The second statement is also false because the BLOB does not contain clear text XML, but rather binary data. The third statement is true as simple tables without embedded pages and page lists do not require the use of "pzPVStream". The fourth statement is true as the BLOB allows for storing complex data structures in a single table, eliminating the need for multiple tables in a non BLOB database.

    Rate this question:

  • 23. 

    Which tool gives you the broadest picture of a system's overall health (Choose one)

    • PAL

    • Profiler

    • SMA

    • DBTrace

    Correct Answer
    A. PAL
    Explanation
    PAL (Performance Analysis of Logs): PAL is a powerful tool that reads in a performance monitor counter log and analyzes it using known thresholds. It generates an HTML-based report that provides an overview of the performance-related aspects of the server environment. It is very comprehensive for system diagnostics and can provide insights into various system metrics. PAL (Performance Analysis of Logs) is the tool that gives the broadest picture of a system’s overall health.

    Rate this question:

  • 24. 

    Which statement is true abt running Connect- methods in parallel (choose one)

    • RunInParallel uses the same mechanism as a Spin-off flow to achieve asynchronous behavior

    • Only connect soap rules can run in parallel

    • Connect Wait is used with the run in parallel option to wait for the parallel connection to complete

    • Connect cancel can be used to cancel a running connector

    Correct Answer
    A. Connect Wait is used with the run in parallel option to wait for the parallel connection to complete
    Explanation
    Connect Wait is used with the run in parallel option to wait for the parallel connection to complete. This means that when running Connect- methods in parallel, the Connect Wait method can be used to pause the execution of the flow until all the parallel connections have completed their tasks. This ensures that the flow does not proceed further until all the parallel connections have finished their execution.

    Rate this question:

  • 25. 

    If an access role to Object and an access deny rule are defined on the same class which rule is applied

    • Access role to object

    • Access deny

    • PRPC prevents them from being applied to the same class

    • None-they both are applied

    Correct Answer
    A. Access deny
    Explanation
    When an access role to an object and an access deny rule are defined on the same class, the access deny rule takes precedence over the access role. This means that the access deny rule will be applied, and the access role will not have any effect on the class.

    Rate this question:

  • 26. 

    What is the Rule Assembly Cache? (Choose one)

    • The Rule assembly cache is a memory based cache that stores the generated XML and resulting class files, post compilation since what finally gets executed is XML , not Java code

    • The Rule Assembly cache is a memory cache which is used to determine the right instance or existence of the generated Java code on disk used by the classloader

    • The Rule Assembly Cache is a memory cache of the rule data accessed when using the Obj-Open, Obj-Open-By-Handle.The cache is checked when rule data is needed

    • The Rule Assembly cache is used by PRPC to feed the instance cache as the instance cache is the instance of a given rule for which code has been generated

    Correct Answer
    A. The Rule Assembly cache is a memory cache which is used to determine the right instance or existence of the generated Java code on disk used by the classloader
    Explanation
    The Rule Assembly Cache is a memory cache that is utilized to determine the correct instance or existence of the generated Java code on disk, which is then used by the classloader. This cache helps in efficiently managing and accessing the generated Java code, ensuring that the correct version is retrieved when needed.

    Rate this question:

  • 27. 

    If you created Rule-Declare-Expression on a target property A first, will PRPC let you to use property A in the left hand side of a property-set in a new activity?

    • Yes

    • No

    Correct Answer
    A. No
    Explanation
    PRPC will not allow you to use property A in the left hand side of a property-set in a new activity if you created a Rule-Declare-Expression on the target property A first. This is because Rule-Declare-Expression locks the target property for any updates or modifications. Therefore, it cannot be used in a property-set in a new activity.

    Rate this question:

  • 28. 

    Which two of the below statements are about exposing BLOB data(Choose two)

    • ) Declare expression or Declare Trigger rules can be used to copy a single embedded property to a top level page property and can be exposed

    • Declare Index rules can be used to expose many or all of the items in an embedded list or group

    • Ask your DBA to create a database level index.This is a good mechanism to expose embedded properties

    • ) Exposing a new property with the Modify Databse schema Wizard will automatically populate all rws of the new column - both for new rows and existing rows

    Correct Answer(s)
    A. ) Declare expression or Declare Trigger rules can be used to copy a single embedded property to a top level page property and can be exposed
    A. Declare Index rules can be used to expose many or all of the items in an embedded list or group
    Explanation
    The correct answer is that Declare expression or Declare Trigger rules can be used to copy a single embedded property to a top-level page property and can be exposed, and Declare Index rules can be used to expose many or all of the items in an embedded list or group. These statements explain two different ways to expose BLOB data in a Pega application. The first statement suggests using Declare expression or Declare Trigger rules to copy a single embedded property to a top-level page property, which allows the data to be easily accessed and exposed. The second statement mentions using Declare Index rules to expose multiple items in an embedded list or group, providing a mechanism to expose BLOB data in bulk.

    Rate this question:

  • 29. 

    Which three actions help to optimize your database or promote effective SQL statements (Choose three)

    • Partition the database

    • Avoid arithmetic operations or functions in the where clause

    • Write queries that operate on large results sets but only display small amounts of data

    • Create and use indexes effectively

    • Avoid using Where clauses

    Correct Answer(s)
    A. Partition the database
    A. Avoid arithmetic operations or functions in the where clause
    A. Create and use indexes effectively
    Explanation
    Partitioning the database helps to optimize the database by dividing it into smaller, more manageable parts. This can improve query performance and make it easier to manage and maintain the database. Avoiding arithmetic operations or functions in the where clause can also optimize the database as it reduces the complexity of the query and allows it to be executed more efficiently. Creating and using indexes effectively can improve query performance by allowing the database to quickly locate the required data.

    Rate this question:

  • 30. 

    Which of the following are disk based caches ?(choose two)

    • Rule Instance Cache

    • Static Contect Cache

    • Look up list cache

    • Conclusion cache

    • Dictionary cache

    Correct Answer(s)
    A. Static Contect Cache
    A. Look up list cache
    Explanation
    The correct answer is Static Context Cache and Look up list cache. These two caches are disk-based caches because they store data on a disk rather than in memory. Disk-based caches are often used when the amount of data to be cached is too large to fit in memory. They provide a way to store and retrieve data quickly by utilizing the faster read and write speeds of a disk compared to traditional memory storage.

    Rate this question:

  • 31. 

    Which two of the following statements regarding the Preflight tool are true? (Choose one)

    • The Preflight checks rules when run to validate if they follow best practices

    • ) The Preflight tool checks the Index Warnings table to find which rules have warnings on them- (pr_index_warning table)

    • The Preflight tool is flexible and allows for you to create your own custom warnings on rules, possibly to implement additional best practises for client

    • The Pre-flight tool will check for specialization and re-use and determine if your application is following the best practices of an enterprise class structure.

    Correct Answer
    A. ) The Preflight tool checks the Index Warnings table to find which rules have warnings on them- (pr_index_warning table)
    Explanation
    The explanation for the correct answer is that the Preflight tool checks the Index Warnings table to find which rules have warnings on them. This means that the tool looks for any warnings that have been generated for specific rules and alerts the user to those warnings. By checking the Index Warnings table, the Preflight tool ensures that any potential issues or violations of best practices are identified and can be addressed. This helps to ensure that the application is following the necessary guidelines and standards.

    Rate this question:

  • 32. 

    Can the out of the box PRPC Access Roles be modified?(Choose one)

    • No, All of these roles are in blocked RuleSets

    • Yes, Out of the box roles are starter roles that are supposed o be customized

    • No, Out of the box roles should be overridden in application Rulesets

    • Yes, The Role Editor allows you to modify all roles

    Correct Answer
    A. No, Out of the box roles should be overridden in application Rulesets
  • 33. 

    Which two statements are true about RuleSet prerequisites?(Choose 2)

    • ) Ruleset prerequisites as specified in the "Requires Ruleset and Versions" fields of the Ruleset form are enforced at runtime

    • Pre-requisites Rulesets govern the creation of new rules during development

    • RuleSet prerequisites are validated during export of application archives

    • When saving Application rules, Ruleset prerequisites are validated

    Correct Answer(s)
    A. ) Ruleset prerequisites as specified in the "Requires Ruleset and Versions" fields of the Ruleset form are enforced at runtime
    A. When saving Application rules, Ruleset prerequisites are validated
    Explanation
    Ruleset prerequisites as specified in the "Requires Ruleset and Versions" fields of the Ruleset form are enforced at runtime: This statement is true because RuleSet prerequisites specified in the "Requires Ruleset and Versions" fields of the Ruleset form define dependencies between different RuleSets. These dependencies are enforced at runtime to ensure that all required RuleSets and their versions are available for execution.
    When saving Application rules, Ruleset prerequisites are validated: This statement is true because when saving Application rules (such as Case Type rules, Data Transform rules, etc.), the system validates the RuleSet prerequisites to ensure that all necessary RuleSets and their versions are present. This validation helps maintain consistency and prevents issues during rule execution.

    Rate this question:

  • 34. 

    What is true about Container managed and PRPC managed authentication (choose one)

    • Container managed authentication disable the entire PRPC authorization mechanism(s)

    • Container managed authentication cannot be used when deloying a PRPC WAR on TOMCAT

    • Eliminates the need to store Operator ID in PRPC

    • PRPC does not support container managed authentication

    Correct Answer
    A. Container managed authentication cannot be used when deloying a PRPC WAR on TOMCAT
    Explanation
    Container managed authentication cannot be used when deploying a PRPC WAR on TOMCAT.

    Rate this question:

  • 35. 

    Which one stmt is true regarding configuring log files in PRPC(Choose one)

    • You can configure within an activity rule which log file you want to write errors to

    • You are able to configure within SMA which rules write to which log files

    • You can update prlogging.xml file to change the efault PegaRules log file name

    • You can update the prlogging.xml file to change the log file names, roll over settings and even add new log files for specific rule type and class within PRPC

    Correct Answer
    A. You can update the prlogging.xml file to change the log file names, roll over settings and even add new log files for specific rule type and class within PRPC
    Explanation
    You can update the prlogging.xml file to change the log file names, roll over settings and even add new log files for specific rule type and class within PRPC. This means that you have the flexibility to customize the logging configuration according to your specific requirements, such as specifying different log files for different types of rules or classes.

    Rate this question:

  • 36. 

    What is the Byte Governor Alert (PEGA0004) and how does it work?(Choose one)

    • It is a non-critical alert that says you have too much data on the clipboard

    • It is triggered when the total number of bytes sent to the browser in an interaction exceeds a byte count threshold

    • It is triggered when the total number of bytes read to the browser in an interaction exceeds a byte count threshold

    • It is triggered when the total number of bytes saved to the database in an interaction exceeds a byte count threshold

    Correct Answer
    A. It is triggered when the total number of bytes read to the browser in an interaction exceeds a byte count threshold
    Explanation
    The Byte Governor Alert (PEGA0004) is triggered when the total number of bytes sent to the browser in an interaction exceeds a byte count threshold. This alert is designed to notify the user when there is an excessive amount of data being sent to the browser, which can lead to performance issues. By monitoring the byte count, the system can identify and address any potential bottlenecks or inefficiencies in the application.

    Rate this question:

  • 37. 

    Which of the following is true about Data-Agent-Queue instance (Choose one)

    • ) Data-Agnet-Queue instances are not locked so they allow you to control the behavior of Agents in a locke RuleSet at run time

    • Data-Agent-Queue instances are created by PRPC to support the new Queue for Agent functionality which was provided in PRPC 5.4

    • ) Data-Adgent-Queue instances are created automatically by PRPC whenevr Queue-For-Agent method is used in an activity step to queue work for agent

    • Data-Agent-Queue instances are data instances which are used by the Queue manager functionality to allow for concurrent access to a queued piece of work by agents running on multiple nodes

    • ) Data-Agent-Queue instances represent the master definition of PRPC agents and have been deprecated in PRPC 5.4 in favor of using Rule-Agent-Queue

    Correct Answer
    A. ) Data-Agnet-Queue instances are not locked so they allow you to control the behavior of Agents in a locke RuleSet at run time
    Explanation
    Data-Agent-Queue instances are not locked, which means they can be accessed and modified at runtime. This allows you to have control over the behavior of agents that are working on a locked RuleSet. By being able to modify the Data-Agent-Queue instance, you can make changes to the agent's behavior without having to make changes to the RuleSet itself. This flexibility enables you to adjust the agent's behavior dynamically based on specific conditions or requirements.

    Rate this question:

  • 38. 

    What is the default error handling mechanism for connector rules generated through the Connector Wizard

    • The connector activity does not handle a failure in the connector, processing is trnsferred to the connector error flow

    • The connector activity handles the result of the connector via a Precondition on the step following the

    • The connector activity handles the result of the connector via a transition

    • The connector activity doesnot handle a failure in the connector, processing is transferred to the Flow problem

    Correct Answer
    A. The connector activity doesnot handle a failure in the connector, processing is transferred to the Flow problem
    Explanation
    The correct answer is that the connector activity does not handle a failure in the connector, and processing is transferred to the Flow problem. This means that if there is an error or failure in the connector, the processing will not be handled within the connector activity itself, but will instead be transferred to the Flow problem for further handling or resolution.

    Rate this question:

  • 39. 

    Which two statements are true about PRPC security?(Choose 2)

    • An access group can reference one or more access roles

    • A production level of 0 identifies an experimental system

    • Security in PRPC can be controlled at a class level

    • A user's Ruleset list is a proper mechanism to control access to rules

    Correct Answer(s)
    A. An access group can reference one or more access roles
    A. Security in PRPC can be controlled at a class level
    Explanation
    An access group can reference one or more access roles, meaning that multiple roles can be assigned to a single access group, allowing for more granular control over user access and permissions. Security in PRPC can also be controlled at a class level, meaning that access to specific classes and their associated rules can be restricted or granted based on user roles and permissions. This allows for more fine-grained control over who can access and modify specific areas of the application.

    Rate this question:

  • 40. 

    Which two statements are correct in regards to Java stack trace and PRPC

    • They are thrown only to log files when an internal engine class file throws an exception

    • They are very helpful in debugging because it shows you the entire execution

    • They can be found in the log file or within the application(on the screen)

    • They are thrown only when you can call the Log-Message method and check the

    Correct Answer(s)
    A. They are very helpful in debugging because it shows you the entire execution
    A. They can be found in the log file or within the application(on the screen)
    Explanation
    Java stack traces are very helpful in debugging because they show the entire execution flow of a program, including the sequence of method calls and the corresponding line numbers where exceptions occur. They can be found in the log file or displayed within the application on the screen. This allows developers to identify the exact location and cause of an exception, making it easier to troubleshoot and fix issues in the code.

    Rate this question:

  • 41. 

    Which client side events are supported within PRPC(choose 3)

    • ONCHANGE

    • ONMOUSEOUT

    • ONCLICK

    • ONBLUR

    • ONFOCUS

    Correct Answer(s)
    A. ONCHANGE
    A. ONCLICK
    A. ONBLUR
    Explanation
    PRPC (Pega Rules Process Commander) supports three client-side events: ONCHANGE, ONCLICK, and ONBLUR. These events allow for interactive behavior and user input within the PRPC application. ONCHANGE event is triggered when the value of an input field is changed. ONCLICK event is triggered when a user clicks on an element. ONBLUR event is triggered when an element loses focus, typically when the user clicks outside of an input field. These events enable developers to create dynamic and responsive user interfaces in PRPC.

    Rate this question:

  • 42. 

    Which statements are true about creating a Rule-Admin-Product ZIP files? (Choose Two)

    • All rules should be checked-in, otherwise errors are reported

    • RuleSet versions must be locked

    • You only need to include major and minor Rule-Set versions. All paches will be automatically

    • You must create a When Rule to include data instances.

    Correct Answer(s)
    A. All rules should be checked-in, otherwise errors are reported
    A. You only need to include major and minor Rule-Set versions. All paches will be automatically
    Explanation
    When creating a Rule-Admin-Product ZIP file, it is important to ensure that all rules are checked-in, otherwise errors may be reported during the creation process. Additionally, when including RuleSet versions in the ZIP file, only major and minor versions are required as all patches will be automatically included. Therefore, the correct statements are: All rules should be checked-in, otherwise errors are reported and You only need to include major and minor Rule-Set versions. All patches will be automatically included.

    Rate this question:

  • 43. 

    Which two of the out-of-box feature do List Views Provide?

    • Pagination

    • Dynamic Select Control

    • Single or Multi Selection

    • Drag and Drop columns

    • AJAX based calculations

    Correct Answer(s)
    A. Pagination
    A. Single or Multi Selection
    Explanation
    List Views provide the features of Pagination and Single or Multi Selection. Pagination allows users to navigate through a large set of data by displaying a limited number of records per page. Single or Multi Selection allows users to select one or multiple items from the list. These features enhance the usability and functionality of List Views by providing efficient data navigation and selection capabilities.

    Rate this question:

  • 44. 

    Which of the following statements are true about Summary Views ?(Choose two)

    • Summary View report provide a multi-level report display with drill down capabilities

    • The drill down capabiltity provides only the ability to invoke another Summary View –

    • Because of the aggregate first level display, Summary Views allow you to report on table with 10,000 + rows

    • Summary View rules generate HTML and JSP for display that can be further customized

    Correct Answer(s)
    A. Summary View report provide a multi-level report display with drill down capabilities
    A. Because of the aggregate first level display, Summary Views allow you to report on table with 10,000 + rows
    Explanation
    Summary Views provide a multi-level report display with drill down capabilities, allowing users to navigate through different levels of data. Additionally, Summary Views allow reporting on tables with a large number of rows (10,000+), thanks to the aggregate first level display. The drill down capability in Summary Views enables users to invoke another Summary View for further analysis. The Summary View rules generate HTML and JSP for display, which can be customized as per requirements.

    Rate this question:

  • 45. 

    Pick the most appropriate statement about PRPC reporting (Choose one)

    • PRPC is an excellent reporting solution and is recommended for reporting instead of purchasing expensive Business Intelligence reporting software

    • You can always get the reporting data you need by exposing properties as database columns

    • If the reporting data is stored in sources other than PRPC, you need to create connectors to retrieve the data from the source system

    • PRPC reporting is highly optimized, the impact of running large reports in a production system is negligible

    • PRPC includes powerful BAM reports that provide business managers with real-time and historical information to measure and manage business process performance

    Correct Answer
    A. PRPC includes powerful BAM reports that provide business managers with real-time and historical information to measure and manage business process performance
    Explanation
    PRPC includes powerful BAM reports that provide business managers with real-time and historical information to measure and manage business process performance. This statement suggests that PRPC has built-in reporting capabilities that are specifically designed to help business managers track and analyze their business processes. These reports provide real-time and historical data, allowing managers to make informed decisions and improve process performance.

    Rate this question:

  • 46. 

    Which two statemenst are true about SmartInfo display

    • You can trigger the SmartInfo display by hitting the down arrow

    • The SmartInfo display can contain a live URL

    • SmartInfo uses AJAX texchnology

    • The SmartInfo feature is part of Client-side processing and handled completely by the browser

    Correct Answer(s)
    A. The SmartInfo display can contain a live URL
    A. SmartInfo uses AJAX texchnology
    Explanation
    The SmartInfo display can contain a live URL, allowing users to access external websites or resources directly from the display. Additionally, SmartInfo uses AJAX technology, which enables dynamic content updates without requiring a full page reload.

    Rate this question:

  • 47. 

    Access groups cannot be referenced from which of the following objects?(Choose one)

    • Divison

    • Unit

    • Requestor type definition

    • Operator ID

    Correct Answer
    A. Unit
    Explanation
    Access groups cannot be referenced from the "Unit" object. Access groups are used to control the level of access and permissions granted to users within an application. They are typically associated with divisions, requestor type definitions, and operator IDs, allowing for the management of access rights. However, units are not directly related to access control, and therefore, access groups cannot be referenced from them.

    Rate this question:

  • 48. 

    What are three performance impacts of having an extremely large work object

    • Slower persistence to database as the BLOB needs to be compressed

    • Garbage collection impacts when object is released

    • Large clipboard page foot print

    • Large work objects waste space in the instance cache

    • Large work objects are stored as XML files on the files system and

    Correct Answer(s)
    A. Slower persistence to database as the BLOB needs to be compressed
    A. Garbage collection impacts when object is released
    A. Large clipboard page foot print
    Explanation
    An extremely large work object can have three performance impacts. Firstly, the persistence to the database will be slower as the Binary Large Object (BLOB) needs to be compressed before being stored. Secondly, when the object is released, it will have garbage collection impacts. Lastly, the large work object will have a large clipboard page footprint, which can consume a significant amount of memory.

    Rate this question:

  • 49. 

    Which four statements are true about roles? (Choose four)

    • A role defines the levels of access to rules that aply to a class and instances of that class

    • Roles can be created and modified using the Role Editor

    • A Role defines various levels of access to RuleSets and RuleSet versions

    • A role defines a list of privileges a user has on a class level

    • An acess when rule defines a test that the system performs to allow, or disallow a requestor to perform actions on specific class

    Correct Answer(s)
    A. A role defines the levels of access to rules that aply to a class and instances of that class
    A. Roles can be created and modified using the Role Editor
    A. A role defines a list of privileges a user has on a class level
    A. An acess when rule defines a test that the system performs to allow, or disallow a requestor to perform actions on specific class
    Explanation
    Roles in a system define the levels of access to rules that apply to a class and its instances. They can be created and modified using the Role Editor. A role also defines a list of privileges that a user has on a class level. Additionally, an access when rule is used to test whether a system allows or disallows a requestor to perform actions on a specific class.

    Rate this question:

Quiz Review Timeline (Updated): Apr 16, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 16, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 25, 2014
    Quiz Created by
    Mocker4
Back to Top Back to top
Advertisement