1.
Which two steps do you perform to update the logo in a portal header? (Choose Two)
Correct Answer(s)
A. Update the portal header to reference the new image.
D. Upload the new image to a binary file record.
Explanation
To update the logo in a portal header, two steps need to be performed. First, the portal header needs to be updated to reference the new image. This ensures that the portal header displays the updated logo. Second, the new image needs to be uploaded to a binary file record. This allows the system to store the new image and make it accessible for reference in the portal header. By completing these two steps, the logo in the portal header will be successfully updated.
2.
Which record do you configure to add an item to the left-pane menu in the Case Manager portal?
Correct Answer
A. Navigation record
Explanation
A navigation record is used to configure and add an item to the left-pane menu in the Case Manager portal. This record allows administrators to define the structure and hierarchy of the menu, including the items that appear in it. By configuring a navigation record, administrators can easily customize the left-pane menu to include the desired items and provide easy navigation for users within the Case Manager portal.
3.
Which two options do you configure on a portal record? (Choose Two)
Correct Answer(s)
A. Identify the user role of the type of user who would access the portal.
D. Determine which skin to use to apply branding to the portal.
Explanation
On a portal record, you can configure the user role of the type of user who would access the portal. This helps determine the level of access and permissions that different users have within the portal. Additionally, you can determine which skin to use to apply branding to the portal. This allows you to customize the appearance and design of the portal to align with your organization's branding guidelines.
4.
Select two of the following best practices to follow when designing mobile applications. (Choose Two)
Correct Answer(s)
B. Use controls that allow tapping.
D. Use layout groups instead of containers to group sections in harnesses.
Explanation
The first best practice is to use controls that allow tapping. This means using controls that are designed to be easily tapped or clicked on a mobile device, such as buttons or links, to enhance the user experience and make it easier for users to interact with the application. The second best practice is to use layout groups instead of containers to group sections in harnesses. Layout groups provide more flexibility in organizing and arranging sections within a mobile application, allowing for better responsiveness and adaptability to different screen sizes.
5.
How is the signature stored in the application when using a Signature Capture control?
Correct Answer
C. An attachment
Explanation
Signatures are stored as an attachment to a case
6.
Which two of the following options are user interface best practices to display a list of items to a user who may access the application on mobile and non-mobile devices? (Choose Two)
Correct Answer(s)
C. Use a grid and mark the columns in the grid as primary, secondary, and other.
D. Use a repeating dynamic layout.
Explanation
The use of a grid and marking the columns as primary, secondary, and other is a user interface best practice because it allows for organized and structured display of information, making it easier for the user to understand and navigate the list of items.
Using a repeating dynamic layout is also a best practice as it allows for a responsive design that can adapt to different screen sizes and devices, ensuring a consistent and user-friendly experience for both mobile and non-mobile users.
7.
A ________ defines the look and feel of an application.
Correct Answer
A. Skin
Explanation
A skin defines the look and feel of an application. It includes the visual elements such as colors, fonts, and graphics that determine the overall appearance of the user interface. By applying a skin, developers can customize the visual design of an application to align with the desired aesthetic and branding. Skins are often used in user interface frameworks to provide a consistent and visually appealing experience across different devices and platforms.
8.
You want to create a reusable font style for buttons, and links. To do this, you would create a ___________.
Correct Answer
C. Mixin
Explanation
To create a reusable font style for buttons and links, you would create a mixin. A mixin is a piece of code that can be reused in multiple places within a program. It allows you to define a set of styles or properties and apply them to different elements. In this case, you can define the font style for buttons and links in a mixin and then easily apply it to any button or link throughout your project, ensuring consistency and saving time.
9.
Which option represents the relationship between mixins, controls, and formats?
Correct Answer
A. A control specifies a format which uses a mixin.
Explanation
A control specifies a format which uses a mixin. This means that a control defines the specific format that will be used, and this format utilizes a mixin to implement certain functionalities or behaviors. The control is responsible for specifying the format, and the format relies on the mixin to provide additional functionality.
10.
Which two of the following options are benefits of using skin inheritance? (Choose Two)
Correct Answer(s)
C. Creating standard styles in a parent skin are easier to maintain.
D. Child skins only need to customize the parent skin.
Explanation
Using skin inheritance provides two benefits: creating standard styles in a parent skin that are easier to maintain and allowing child skins to only customize the parent skin. This means that child skins can reuse mixins and formats from other child skins with the same parent, while maintaining consistency by not being able to modify formats and mixins from the parent skin. Overall, using skin inheritance simplifies the process of creating and maintaining consistent styles across multiple skins.
11.
You have a requirement to create an email correspondence that can be reused by other applications. In which two layers of the Enterprise Class Structure could you apply the email correspondence rule? (Choose Two)
Correct Answer(s)
A. Organization
B. Division
Explanation
The email correspondence rule can be applied in the Organization and Division layers of the Enterprise Class Structure. By applying it in the Organization layer, the rule can be shared and reused across multiple applications within the same organization. Applying it in the Division layer allows for further customization and reuse within specific divisions or departments of the organization. This ensures consistency and efficiency in email correspondence across different applications and divisions.
12.
Which layer of the Enterprise Class Structure contains assets that cannot be reused in other applications?
Correct Answer
C. Implementation
Explanation
The Implementation layer of the Enterprise Class Structure contains assets that cannot be reused in other applications. This layer involves the actual development and customization of software applications specific to the organization's needs. The assets created at this layer are typically tailored to meet the unique requirements of a particular application and cannot be easily reused or shared with other applications or divisions within the organization. Therefore, the Implementation layer is where assets are created that are not designed for reuse.
13.
Which layer of the Enterprise Class Structure contains generalized assets that are then extended by specific implementations?
Correct Answer
A. Framework
Explanation
The correct answer is Framework. In the Enterprise Class Structure, the Framework layer contains generalized assets that serve as a foundation for specific implementations. These assets provide a structure and set of functionalities that can be extended and customized to meet the specific needs of an organization. The Framework layer promotes consistency, reusability, and efficiency by providing a common set of resources that can be leveraged across different implementations.
14.
When creating a new ruleset version, what extra step must the system architect perform?
Correct Answer
B. There are no extra steps if the ruleset version is up-to-date.
Explanation
When creating a new ruleset version, there are no extra steps required if the ruleset version is already up-to-date. This means that the current version of the ruleset already includes all the necessary changes and updates, so there is no need for any additional actions or modifications.
15.
What is the importance of application versioning?
Correct Answer
D. Application versioning preserves prior application versions.
Explanation
Application versioning is important because it allows for the preservation of prior application versions. This means that if any changes or updates are made to an application, previous versions can still be accessed and used if needed. This is crucial for maintaining stability and ensuring that any potential issues or bugs can be resolved by reverting back to a previous version. It also provides a backup and recovery mechanism, allowing for the restoration of a working version in case of any problems with the latest version.
16.
What advantage does skimming provide over lock and roll as a versioning option?
Correct Answer
C. Skimming is most efficient for major and minor updates. Lock and roll is most useful for patches.
Explanation
Skimming is a more efficient versioning option for major and minor updates because it allows for the saving of checked out rules and carries blocked rules forward. On the other hand, lock and roll is most useful for patches but does not save checked out rules and does not carry blocked rules forward. Therefore, skimming provides the advantage of preserving checked out and blocked rules while facilitating major and minor updates, making it a better option for those types of changes.
17.
A user is granted access to an application which lists HRApps:02-02 under Application rulesets. The ruleset contains rules in the versions below:
Which of the following rules can the user access?
Correct Answer
D. Rule_B, Rule_C, and Rule_D
Explanation
The user can access Rule_B, Rule_C, and Rule_D because these rules are all part of the HRApps:02-02 ruleset, which the user has been granted access to.
18.
Select two record types that are involved when configuring a production ruleset. (Choose Two)
Correct Answer(s)
D. Access group
E. Application
Explanation
When configuring a production ruleset, two record types that are involved are Access group and Application. An Access group defines the access privileges for a user or a group of users, determining what actions they can perform within an application. On the other hand, an Application represents a collection of rules, data instances, and other components that define the functionality of an application. Therefore, both Access group and Application are necessary components when setting up a production ruleset.
19.
A claims framework contains two rulesets, ClaimsFW and ClaimsFWInt, and an application built on the framework contains two rulesets, Claims and ClaimsInt. Which statement is false if all the rulesets are configured as Application Validation?
Correct Answer
C. Rules in ClaimsFW can reference rules in Claims
Explanation
In a claims framework, rules in the ClaimsFW ruleset cannot reference rules in the Claims ruleset. The ClaimsFW ruleset is at a higher level in the hierarchy and cannot reference rules in a lower-level ruleset like Claims. Therefore, the statement "Rules in ClaimsFW can reference rules in Claims" is false.
20.
A claims application contains two organizational and two application rulesets. The organizational rulesets MyCo and MyCoInt are configured as Ruleset Validation, where the prerequisite for MyCo is MyCoInt and the prerequisite for MyCoInt is Pega-ProcessCommander. The two application rulesets Claims and ClaimsInt are configured as Application Validation. Which of the following statements is false?
Correct Answer
C. Rules in MyCo can reference rules in Claims
Explanation
The statement "Rules in MyCo can reference rules in Claims" is false because the organizational ruleset MyCo is configured as Ruleset Validation, which means it can only reference the prerequisite ruleset MyCoInt and the Pega-ProcessCommander ruleset. It cannot directly reference the application ruleset Claims.
21.
An application contains the following rulesets.
- AccountManagement contains the rules for administering checking and savings accounts.
- AccountManagementInt contains supporting rules for integrating with other applications.
- BankCorp contains rules shared across the entire organization.
- BankCorpInt contains supporting rules for integrations shared with other internal applications.
- CreditCheck contains rules for processing a credit check and is shared with another Pega application to administer loans.
Which two rulesets can be configured to use application validation, according to best practices? (Choose Two)
Correct Answer(s)
D. AccountManagementInt
E. AccountManagement
Explanation
The rulesets AccountManagementInt and AccountManagement can be configured to use application validation because they contain the rules for administering checking and savings accounts, which are critical components of the application. Application validation ensures that these rules are properly validated and adhere to the defined standards and best practices. On the other hand, BankCorp, BankCorpInt, and CreditCheck are not directly related to administering accounts and may not require the same level of application validation.
22.
Which two of the following prerequisites would you choose to create a branch rule for parallel development? (Choose Two)
Correct Answer(s)
B. Create a team application
C. Give team members access to the team application
Explanation
To create a branch rule for parallel development, it is necessary to create a team application and give team members access to that application. By creating a team application, a separate environment is established for the parallel development process. Giving team members access to the team application ensures that they can collaborate and work on the branch rule simultaneously. This allows for independent development without affecting the original rule or the work of other team members.
23.
A branch ruleset is a ruleset that ___________. (Choose Two)
Correct Answer(s)
A. Is based off of another ruleset
C. Is designed for large projects
Explanation
A branch ruleset is a ruleset that is based off of another ruleset. This means that it inherits the rules and configurations from the parent ruleset, allowing for easier management and maintenance of rules. Additionally, a branch ruleset is designed for large projects, as it allows for better organization and collaboration among team members working on different aspects of the project.
24.
Which two of the following steps do you perform after you develop branch rules and before you merge a ruleset? (Choose Two)
Correct Answer(s)
B. Check in rules to merge
C. Review conflicts and warnings
Explanation
After developing branch rules, the first step is to check in the rules to merge them into the main ruleset. This ensures that the changes made in the branch are saved and ready to be merged with the main ruleset. The second step is to review conflicts and warnings. This involves identifying any conflicts or issues that may arise when merging the branch rules with the main ruleset. By reviewing conflicts and warnings, any necessary adjustments or resolutions can be made before proceeding with the merge.
25.
A user has the following rulesets in their ruleset list:
- TGB:01-01
- TGBInt:01-01
- LoanShrk:01-01
- LoanShrkPrime:01-01
- LoanShrkInt:01-01
There are six instances of CollectBorrowerDetails in the rules cache as indicated in the table below:
Instance
Apply to:
Ruleset
Availability
One
TGB-FW-LoanShrk-Work
TGB:01-01-05
Withdrawn
Two
TGB-FW-LoanShrk-Work
TGB:01-01-03
Yes
Three
TGB-FW-LoanShrk-Work
LoanShrkPrime:01-01-05
Withdrawn
Four
TGB-FW-LoanShrk-Work
LoanShrkPrime:01-01-01
Yes
Five
TGB-FW-LoanShrk
TGBSubPrime:01-01-03
Yes
Six
TGB-FW-LoanShrk
LoanShrkPrime:01-01-01
Yes
A rule with an Apply to: class of TGB-FW-LoanShrk-Work-AutoLoan calls CollectBorrowerDetails. Which rule is selected from the rules cache during rule resolution?
Correct Answer
C. Instance Six
Explanation
The rule with an Apply to class of TGB-FW-LoanShrk-Work-AutoLoan calls CollectBorrowerDetails. Looking at the rules cache, Instance Six has the same Apply to class TGB-FW-LoanShrk and the same ruleset LoanShrkPrime:01-01-01. Therefore, Instance Six is selected from the rules cache during rule resolution.
26.
Which of the following statements is true about the rule resolution process?
Correct Answer
B. If a user does not have access to the selected rule, the system sends a message that it could not find an appropriate rule to execute.
Explanation
The statement "If a user does not have access to the selected rule, the system sends a message that it could not find an appropriate rule to execute" is true about the rule resolution process. This means that if a user does not have the necessary permissions to access a particular rule, the system will notify them that it cannot find a suitable rule to execute. This highlights the importance of having the appropriate access rights in order to effectively utilize the rule resolution process.
27.
Which rule availability setting can you use to force the system to look for an instance of the rule in the next highest class or ruleset?
Correct Answer
D. Withdrawn
Explanation
The rule availability setting "Withdrawn" can be used to force the system to look for an instance of the rule in the next highest class or ruleset. When a rule is marked as "Withdrawn," it means that it is no longer active or available for use. In this case, the system will automatically search for an instance of the rule in the next highest class or ruleset to ensure that the required functionality is still accessible.
28.
Adding parameters to a rule enables you to _____________________.
Correct Answer
C. Separate the functional behavior of a rule from specific business contexts
Explanation
Adding parameters to a rule enables you to separate the functional behavior of a rule from specific business contexts. This means that by adding parameters, you can define the general functionality of a rule and then customize it based on different business contexts or scenarios. This allows for greater flexibility and adaptability, as the same rule can be used in multiple contexts without needing to create separate rules for each specific scenario.
29.
Use the ________________ keyword to reference a parameter in the same rule in which the parameter is defined.
Correct Answer
B. Param
Explanation
The correct answer is "Param." The "Param" keyword is used to reference a parameter in the same rule in which the parameter is defined. This allows the parameter to be accessed and used within the rule to perform calculations or make comparisons.
30.
Which two fields are required when adding a parameter to a rule? (Choose Two)
Correct Answer(s)
C. Data type
D. Name
Explanation
When adding a parameter to a rule, the two required fields are the data type and the name. The data type specifies the type of data that the parameter will accept, such as text, number, or date. The name is used to identify the parameter and is typically a descriptive label. The default value and the "Required" field are optional and can be set based on the specific requirements of the rule.
31.
When a process is configured to create temporary cases, which of the following occurs when a user creates a case?
Correct Answer
B. The case is stored in memory.
Explanation
When a process is configured to create temporary cases, the case is stored in memory. This means that the case data is not permanently stored in the database, but rather kept temporarily in the system's memory. This allows for faster processing and retrieval of the case information, but it also means that the data will be lost once the system is restarted or the session is ended. Storing the case in memory is useful for scenarios where the case data is not required to be persisted long-term and can be discarded after the process is completed.
32.
What task must you perform in order to persist a temporary case?
Correct Answer
B. Add a Persist Case SmartShape to the process.
Explanation
To persist a temporary case, you need to add a Persist Case SmartShape to the process. This SmartShape allows the case to be saved and stored in the system, ensuring its persistence. By adding this SmartShape, the temporary case will become a permanent case and its data will be retained even after the process is completed.
33.
You have added weighted conditions to duplicate case search in a case type. How do you configure the condition fields to differentiate between fields on the current case and fields on the existing case?
Correct Answer
D. Prefix the keyword Primary to the value used in the current case.
Explanation
To differentiate between fields on the current case and fields on the existing case when adding weighted conditions to duplicate case search, you need to prefix the keyword "Primary" to the value used in the current case. This allows the system to identify and distinguish between the two cases, ensuring accurate search results.
34.
You want to evaluate cases as potential duplicates when the existing cases and the current case have the same create operator. How would you ensure that only cases with the same create operator are evaluated?
Correct Answer
D. Add a must match condition where the create operator in an existing case is the same as in the current case
Explanation
To ensure that only cases with the same create operator are evaluated, you would add a must match condition where the create operator in an existing case is the same as in the current case. This means that the system will only consider cases as potential duplicates if they have the exact same create operator.
35.
Management reports that have an unacceptably large number of cases are incorrectly identified as duplicate cases. Which two approaches could you use to modify the duplicate case search process so that it produces fewer invalid duplicates? (Choose Two)
Correct Answer(s)
B. Adjust the threshold value.
D. Adjust the condition weights.
Explanation
To reduce the number of invalid duplicates in management reports, two approaches can be used. Firstly, adjusting the threshold value can help in setting a higher similarity score required for cases to be considered duplicates. This will filter out cases that are not closely related and reduce the number of false duplicates. Secondly, adjusting the condition weights can be effective as it allows assigning more importance to certain conditions, making the search process more accurate and reducing the chances of incorrect duplicate identification.
36.
Field values enable you to _________________.
Correct Answer
A. Customize a list of allowed values for a property based on the context of the property
Explanation
Field values enable you to customize a list of allowed values for a property based on the context of the property. This means that you can define specific values that are valid for a particular property, ensuring that only those values can be selected or entered. This customization allows for more precise and tailored data entry, ensuring accuracy and consistency in the information being captured.
37.
How do you customize the allowed values for a property based on the context of the property using field values?
Correct Answer
D. Create a field value record for each value and set the context using the Apply to: field.
Explanation
To customize the allowed values for a property based on the context of the property using field values, you need to create a field value record for each value and set the context using the Apply to: field. This allows you to define specific values for the property based on different contexts, ensuring that the allowed values are tailored to the specific needs of each context. By setting the context using the Apply to: field, you can ensure that the property behaves differently depending on the context in which it is used.
38.
Sourcing a data page directly from a UI control is an example of which pattern?
Correct Answer
C. System of Record (SoR) pattern
Explanation
Sourcing a data page directly from a UI control is an example of the System of Record (SoR) pattern. This pattern involves accessing and retrieving data from a central data source, which serves as the authoritative system for that particular data. In this case, the UI control is directly linked to the system of record, allowing for real-time data retrieval and updates. This pattern ensures consistency and accuracy of data across different applications or interfaces that rely on the same system of record.
39.
Which feature would you use to implement the System of Record (SoR) pattern?
Correct Answer
D. The refer to a data page option on a property
Explanation
The "refer to a data page" option on a property would be used to implement the System of Record (SoR) pattern. This option allows the property to refer to a data page, which serves as the source of truth or the system of record for that particular data. By using this option, any changes made to the data page will automatically reflect in the property, ensuring that the property always has the most up-to-date and accurate information from the SoR.
40.
Which feature would you use to implement the alias pattern?
Correct Answer
C. The Property-Ref activity method
Explanation
The Property-Ref activity method is the correct answer because it allows you to implement the alias pattern. The Property-Ref activity method is used to refer to a property on a class and retrieve its value. This method can be used to create an alias for a property, allowing you to refer to the property using a different name. This can be useful in scenarios where you want to provide a more meaningful or descriptive name for a property, or when you want to simplify the property name for readability purposes.
41.
You add a new work group to an application. Which two organization rules do you need to update? (Choose Two)
Correct Answer(s)
A. Operator ID
C. Work queue
Explanation
When adding a new work group to an application, you need to update the organization rules for Operator ID and Work queue. The Operator ID rule determines the access and permissions for individual users within the work group, while the Work queue rule defines the routing and assignment of work items to the newly added group. By updating these two organization rules, you ensure that the new work group is properly configured and can effectively handle tasks within the application.
42.
Which requirement causes you to consider using Dynamic Class Referencing (DCR)?
Correct Answer
A. To reuse a flow from the framework in the implementation layer
Explanation
Dynamic Class Referencing (DCR) allows for the reuse of a flow from the framework in the implementation layer. By using DCR, the flow can be referenced dynamically, meaning that it can be reused without having to hardcode the specific class name. This allows for greater flexibility and ease of maintenance, as any changes made to the flow in the framework will automatically be reflected in the implementation layer. Therefore, using DCR is the appropriate requirement in this case.
43.
The TGB organization structure has a Sales unit, and it belongs to a Marketing division. TGB plans to add new units for the East, Central, and West geographical sales regions. These regional units report to the Sales unit. How do you configure the organizational hierarchy to support the new structure?
Correct Answer
B. Add the regional units as sub-units to the Sales unit.
Explanation
To support the new structure, the regional units should be added as sub-units to the Sales unit. This means that the Sales unit will have control and oversight over the regional units. By adding them as sub-units, it ensures that the regional units report directly to the Sales unit and maintain a clear hierarchical structure within the organization. Adding them to the Marketing division or creating a new Regional unit would not align with the desired reporting structure and hierarchy outlined in the question. Adding them to the TGB organization without specifying their relationship to the Sales unit would also not be appropriate.
44.
You configure a cascading approval step for insurance claims. The request requires approval from the submitter's manager. However, approval from operators in other units in the organization may be required. Which approval model would you use?
Correct Answer
A. Authority matrix
Explanation
An authority matrix is the most suitable approval model in this scenario because it allows for approval from different units in the organization. This model defines the levels of authority and responsibility within the organization, specifying who has the power to approve certain requests. In this case, the submitter's manager would have the authority to approve the insurance claim, but if additional approval is needed from operators in other units, the authority matrix would outline their roles and responsibilities in the approval process.
45.
You have added a cascading approval step that uses an authority matrix. You have specified a decision table to determine the approvers for each case. You have confirmed that the conditions in the decision table are configured correctly. You test the configuration by entering requests that require multiple approvers. However, the system routes all requests to only one approver. Which of the following actions would you take to correct this issue?
Correct Answer
C. Set the decision table to evaluate all rows.
Explanation
The correct action to correct the issue of the system routing all requests to only one approver is to set the decision table to evaluate all rows. This means that the system will consider all the conditions and rules specified in the decision table and select the appropriate approvers based on those conditions. By evaluating all rows, the system will be able to accurately determine the approvers for each case and route the requests accordingly.
46.
Your application requires a cascading approval for expense reports. Approvals must follow the submitter's reporting structure, with the following thresholds. A manager must approve expense reports up to USD500. A director must approve expense reports up to USD1500. A vice president must approve expense reports of USD1500 or greater. How do you configure the approval process?
Correct Answer
D. Select the reporting structure configuration with custom levels, then configure when rules to determine the number of levels.
Explanation
The given scenario requires a cascading approval process based on the submitter's reporting structure and different thresholds for each level. To achieve this, the reporting structure configuration with custom levels should be selected. By configuring when rules, the system can determine the number of levels based on the expense amount. This allows for the manager, director, and vice president to approve expense reports based on their respective thresholds.
47.
Your team is building an application for a contact center that handles a variety of customer requests. Business policies require that each customer interaction be conducted with the most appropriate next available Customer Service Representative (CSR). What is the best way to implement this requirement?
Correct Answer
A. Use a ToWorkbasket router and Pega's Get Next Work functionality
Explanation
The best way to implement the requirement of conducting each customer interaction with the most appropriate next available CSR is to use a ToWorkbasket router and Pega's Get Next Work functionality. This approach allows for the routing of work to specific workbaskets, which are assigned to individual CSRs or groups of CSRs based on their skills or availability. Pega's Get Next Work functionality ensures that the work is assigned to the next available CSR in the designated workbasket, ensuring efficient and effective customer service.
48.
You are tasked with configuring the Get Next Work functionality for an application. The requirement states that the workbaskets a user is associated with must be checked first, and all eligible assignments must be consolidated into a single list before being filtered and sorted. Which two of the following options do you select on an Operator ID record to configure the Get Next Work functionality to meet this requirement? (Choose Two)
Correct Answer(s)
A. Merge workbaskets
D. Get from workbaskets first
Explanation
To configure the Get Next Work functionality to meet the requirement of checking the user's associated workbaskets first and consolidating all eligible assignments into a single list before filtering and sorting, you would select the options "Merge workbaskets" and "Get from workbaskets first" on the Operator ID record. "Merge workbaskets" allows the system to combine assignments from multiple workbaskets into a single list, while "Get from workbaskets first" ensures that assignments from workbaskets are retrieved before any other source.
49.
What effect does the Use all workbasket assignments in user’s work group option have on how workbaskets are searched when using the Get Next Work functionality?
Correct Answer
B. This option limits the workbasket search to only those workbaskets defined in the user's work group.
Explanation
The option "Use all workbasket assignments in user's work group" limits the search for workbaskets to only those that are defined in the user's work group. This means that when using the "Get Next Work" functionality, the system will only consider assignments from the workbaskets associated with the user's work group. If no assignments are found in these workbaskets, the user's worklist will then be checked. This option ensures that the search for assignments is narrowed down to a specific set of workbaskets based on the user's work group.
50.
What two artifacts should you prepare in advance before delegating a rule? (Choose Two)
Correct Answer(s)
C. An Access Group that has access to the production ruleset
D. An unlocked ruleset added to the Application rule as a production ruleset
Explanation
Before delegating a rule, you should prepare an Access Group that has access to the production ruleset. This is necessary to ensure that the delegated rule can be accessed and executed by the appropriate users. Additionally, an unlocked ruleset should be added to the Application rule as a production ruleset. This allows the delegated rule to be deployed and used in the production environment without any restrictions or limitations.