Senior 7

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Patricklafunk
P
Patricklafunk
Community Contributor
Quizzes Created: 5 | Total Attempts: 8,697
Questions: 103 | Attempts: 729

SettingsSettingsSettings
Senior 7 - Quiz

Questions and Answers
  • 1. 

    You have a requirement to create an email correspondence that can be reused by other applications. In which two layers of the Enterprise Class Structure could you apply the email correspondence rule? 

    • A.

      Framework

    • B.

      Organization

    • C.

      Implementation

    • D.

      Division

    Correct Answer(s)
    B. Organization
    D. Division
    Explanation
    The email correspondence rule can be applied in the Organization and Division layers of the Enterprise Class Structure. The Organization layer represents a specific business unit or department within the enterprise, and applying the email correspondence rule at this layer allows for the reuse of the rule across different applications within that business unit. The Division layer represents a specific division or team within the organization, and applying the rule at this layer allows for further customization and reuse within that specific division or team.

    Rate this question:

  • 2. 

    Which layer of the Enterprise Class Structure contains assets that cannot be reused in other applications?

    • A.

      Implementation

    • B.

      Framework

    • C.

      Organization

    • D.

      Division

    Correct Answer
    A. Implementation
    Explanation
    The layer of the Enterprise Class Structure that contains assets that cannot be reused in other applications is the Implementation layer. This layer is responsible for implementing specific functionalities and features that are unique to a particular application. The assets created at this layer are tightly coupled with the application and cannot be easily reused in other applications.

    Rate this question:

  • 3. 

    Which layer of the Enterprise Class Structure contains generalized assets that are then extended by specific implementations?

    • A.

      Implementation

    • B.

      Framework

    • C.

      Division

    • D.

      Organization

    Correct Answer
    B. Framework
    Explanation
    The correct answer is Framework. In the Enterprise Class Structure, the Framework layer contains generalized assets that serve as a foundation for specific implementations. This layer provides a structure and set of guidelines for developing and extending functionalities. It helps in promoting consistency, reusability, and efficiency across different implementations within the organization.

    Rate this question:

  • 4. 

    When creating a new ruleset version, what extra step must the system architect perform?

    • A.

      There are no extra steps if the ruleset version is up-to-date.

    • B.

      Rulesets cannot be versioned.

    • C.

      Change the decision table item numbers.

    • D.

      Lock the ruleset to prevent automatic versioning.

    Correct Answer
    A. There are no extra steps if the ruleset version is up-to-date.
    Explanation
    When creating a new ruleset version, if the ruleset version is already up-to-date, there are no extra steps required by the system architect. This means that the existing ruleset version is already the latest version and there is no need to make any changes or updates.

    Rate this question:

  • 5. 

    What is the importance of application versioning?

    • A.

      Application versioning provides the ability to version data classes without impacting existing data classes.

    • B.

      Application versioning provides a means to organize applications by priority.

    • C.

      Application versioning provides the ability to clone rules.

    • D.

      Application versioning preserves prior application versions.

    Correct Answer
    D. Application versioning preserves prior application versions.
    Explanation
    Application versioning is important because it allows for the preservation of prior application versions. This means that if any issues or bugs arise in the latest version, the previous versions can still be accessed and used. It provides a safety net in case any changes or updates in the current version cause any problems. By preserving prior versions, application versioning ensures that users have the option to revert back to a stable and functional version if needed.

    Rate this question:

  • 6. 

    What advantage does skimming provide over lock and roll as a versioning option?

    • A.

      Pega provides a skimming wizard but not a lock and roll wizard.

    • B.

      Skimming carries blocked rules forward. Lock and roll does not carry blocked rules forward.

    • C.

      Skimming is most efficient for major and minor updates. Lock and roll is most useful for patches.

    • D.

      Skimming saves checked out rules. Lock and roll does not save checked out rules.

    Correct Answer
    C. Skimming is most efficient for major and minor updates. Lock and roll is most useful for patches.
    Explanation
    Skimming provides an advantage over lock and roll as a versioning option because it is most efficient for major and minor updates. On the other hand, lock and roll is most useful for patches. Skimming carries blocked rules forward, while lock and roll does not. Additionally, skimming saves checked out rules, whereas lock and roll does not save checked out rules.

    Rate this question:

  • 7. 

    A user is granted access to an application which lists HRApps:02-02 under Application rulesets. The ruleset contains rules in the versions below. Which of the following rules can the user access?

    • A.

      All rules

    • B.

      Rule_B, Rule_C, and Rule_D

    • C.

      Rule_D

    • D.

      Rule_B and Rule_C

    Correct Answer
    B. Rule_B, Rule_C, and Rule_D
    Explanation
    The user can access Rule_B, Rule_C, and Rule_D because they are all part of the HRApps:02-02 ruleset, which the user has been granted access to.

    Rate this question:

  • 8. 

    Select two record types that are involved when configuring a production ruleset.

    • A.

      Application

    • B.

      Work group

    • C.

      Operator

    • D.

      Organization

    • E.

      Access group

    Correct Answer(s)
    A. Application
    E. Access group
    Explanation
    When configuring a production ruleset, two record types that are involved are the "Application" and "Access group" record types. The "Application" record type is used to define the application or system that the ruleset belongs to. It includes information such as the application name, version, and description. The "Access group" record type is used to control user access and permissions within the application. It defines the users or groups who have access to the ruleset and the level of access they have.

    Rate this question:

  • 9. 

    A claims framework contains two rulesets, ClaimsFW and ClaimsFWInt, and an application built on the framework contains two rulesets, Claims and ClaimsInt. Which statement is false if all the rulesets are configured as Application Validation?

    • A.

      Rules in Claims can reference rules in ClaimsFW

    • B.

      Rules in ClaimsFWInt can reference rules in ClaimsFW

    • C.

      Rules in ClaimsInt can reference rules in Claims

    • D.

      Rules in ClaimsFW can reference rules in Claims

    Correct Answer
    D. Rules in ClaimsFW can reference rules in Claims
  • 10. 

    A claims application contains two organizational and two application rulesets. The organizational rulesets MyCo and MyCoInt are configured as Ruleset Validation, where the prerequisite for MyCo is MyCoInt and the prerequisite for MyCoInt is Pega-ProcessCommander. The two application rulesets Claims and ClaimsInt are configured as Application Validation. Which of the following statements is false?

    • A.

      Rules in ClaimsInt can reference rules in Claims

    • B.

      Rules in MyCo can reference rules in MyCoInt

    • C.

      Rules in MyCo can reference rules in Claims

    • D.

      Rules in Claims can reference rules in MyCo

    Correct Answer
    C. Rules in MyCo can reference rules in Claims
    Explanation
    Rules in MyCo can reference rules in Claims is the false statement. According to the given information, the prerequisite for MyCo is MyCoInt, and the prerequisite for MyCoInt is Pega-ProcessCommander. This means that MyCo can only reference rules in MyCoInt, not in Claims.

    Rate this question:

  • 11. 

    An application contains the following rulesets. AccountManagement contains the rules for administering checking and savings accounts. AccountManagementInt contains supporting rules for integrating with other applications. BankCorp contains rules shared across the entire organization. BankCorpInt contains supporting rules for integrations shared with other internal applications. CreditCheck contains rules for processing a credit check and is shared with another Pega application to administer loans. Which two rulesets can be configured to use application validation, according to best practices? (Choose Two)

    • A.

      BankCorpInt

    • B.

      BankCorp

    • C.

      CreditCheck

    • D.

      AccountManagement

    • E.

      AccountManagementInt

    Correct Answer(s)
    D. AccountManagement
    E. AccountManagementInt
    Explanation
    The rulesets AccountManagement and AccountManagementInt can be configured to use application validation according to best practices. This is because these rulesets contain the rules for administering checking and savings accounts, which are critical functions in the application. By applying application validation to these rulesets, it ensures that the rules are properly validated and adhere to the defined business rules and requirements. This helps in maintaining the integrity and accuracy of the account management processes.

    Rate this question:

  • 12. 

    Which two of the following prerequisites would you choose to create a branch rule for parallel development? (Choose Two)

    • A.

      Give team members access to the team application

    • B.

      Save a copy of the original rule into the base ruleset

    • C.

      Circumstance the original rule

    • D.

      Create a team application

    Correct Answer(s)
    A. Give team members access to the team application
    D. Create a team application
    Explanation
    To create a branch rule for parallel development, it is necessary to give team members access to the team application so that they can collaborate and work on the rule together. Additionally, creating a team application is important as it provides a dedicated space for the team to develop and test their changes in parallel. This allows for efficient and organized development, ensuring that the original rule remains unaffected while the team works on their branch rule.

    Rate this question:

  • 13. 

    A branch ruleset is a ruleset that ___________. (Choose Two)

    • A.

      Is designed for large projects

    • B.

      Contains rules that are not in active development

    • C.

      Prevents developers from seeing work of all team members

    • D.

      Is based off of another ruleset

    Correct Answer(s)
    A. Is designed for large projects
    D. Is based off of another ruleset
    Explanation
    A branch ruleset is designed for large projects because it allows for the management and organization of rules specific to a particular project. It helps to keep the ruleset focused and relevant to the project's requirements. Additionally, a branch ruleset is based off of another ruleset, meaning it inherits rules from a parent ruleset. This allows for easier maintenance and updates, as changes made to the parent ruleset can be propagated to the branch ruleset.

    Rate this question:

  • 14. 

     Which two of the following steps do you perform after you develop branch rules and before you merge a ruleset? (Choose Two)

    • A.

      Review conflicts and warnings

    • B.

      Check in rules to merge

    • C.

      Check out rules to merge

    • D.

      Use DB trace to identify conflicts

    Correct Answer(s)
    A. Review conflicts and warnings
    B. Check in rules to merge
    Explanation
    After developing branch rules, the first step is to review conflicts and warnings. This involves identifying any conflicts or potential issues that may arise when merging the branch rules with the main ruleset. The second step is to check in the rules to merge, which means saving the changes made in the branch rules and making them available for merging with the main ruleset. Checking out rules to merge is not necessary as the rules are already developed in the branch. Using DB trace to identify conflicts is not mentioned as a step in the process.

    Rate this question:

  • 15. 

    Which of the following statements is true about the rule resolution process?

    • A.

      The class (context) of a rule takes precedence over the availability of the rule.

    • B.

      Rule resolution applies to rules that are instances of classes derived from the Rule- and Work- base classes

    • C.

      If a user does not have access to the selected rule, the system sends a message that it could not find an appropriate rule to execute.

    • D.

      If the system finds more than one rule instance during rule resolution, users are provided with a choice of which rule to use depending on context.

    Correct Answer
    C. If a user does not have access to the selected rule, the system sends a message that it could not find an appropriate rule to execute.
    Explanation
    The statement "If a user does not have access to the selected rule, the system sends a message that it could not find an appropriate rule to execute" is true because in the rule resolution process, if a user does not have the necessary access rights to a rule, the system will not be able to execute that rule. In such cases, the system will inform the user by sending a message indicating that it could not find an appropriate rule to execute. This ensures that only users with the required permissions can execute specific rules.

    Rate this question:

  • 16. 

    Which rule availability setting can you use to force the system to look for an instance of the rule in the next highest class or ruleset?

    • A.

      Withdrawn

    • B.

      Final

    • C.

      Blocked

    • D.

      Not Available

    Correct Answer
    A. Withdrawn
    Explanation
    The rule availability setting "Withdrawn" can be used to force the system to look for an instance of the rule in the next highest class or ruleset. This means that if the rule is not available in the current class or ruleset, the system will search for it in the next highest class or ruleset.

    Rate this question:

  • 17. 

    Adding parameters to a rule enables you to _____________________.

    • A.

      Define the values used in a circumstance

    • B.

      Separate the functional behavior of a rule from specific business contexts

    • C.

      Help improve business users' ability to adapt to changing business conditions

    • D.

      Copy data from a data page option on a property

    Correct Answer
    B. Separate the functional behavior of a rule from specific business contexts
    Explanation
    Adding parameters to a rule allows you to separate the functional behavior of the rule from specific business contexts. This means that by adding parameters, you can define the values used in different circumstances and adapt the rule to changing business conditions. It helps in making the rule more flexible and reusable, as the same rule can be applied to different contexts by simply changing the parameter values. This improves the business users' ability to adapt and make changes to the rule without affecting its core functionality.

    Rate this question:

  • 18. 

    Use the ________________ keyword to reference a parameter in the same rule in which the parameter is defined.

    • A.

      Parent

    • B.

      Param

    • C.

      THIS

    • D.

      Local

    Correct Answer
    B. Param
    Explanation
    The keyword "Param" is used to reference a parameter in the same rule in which the parameter is defined.

    Rate this question:

  • 19. 

    Which two fields are required when adding a parameter to a rule? (Choose Two)

    • A.

      Default value

    • B.

      Name

    • C.

      Required

    • D.

      Data type

    Correct Answer(s)
    B. Name
    D. Data type
    Explanation
    When adding a parameter to a rule, the two required fields are the Name and Data type. The Name field is necessary to give the parameter a unique identifier, allowing it to be referenced and used within the rule. The Data type field is essential to specify the type of data that the parameter will hold, such as text, number, or date. These two fields are crucial for accurately defining and utilizing parameters within a rule.

    Rate this question:

  • 20. 

     When a process is configured to create temporary cases, which of the following occurs when a user creates a case?

    • A.

      The system creates an object ID and stores the case in the database.

    • B.

      The system stores case data on a clipboard page specifically for temporary cases.

    • C.

      The case is stored in memory.

    • D.

      Data is stored in the database.

    Correct Answer
    C. The case is stored in memory.
    Explanation
    When a process is configured to create temporary cases, the system does not create an object ID or store the case in the database. Instead, it stores the case in memory. This means that the case data is temporarily stored in the system's memory and is not persisted in the database. This allows for faster processing and reduces the need for database storage.

    Rate this question:

  • 21. 

     What task must you perform in order to persist a temporary case?

    • A.

      Add a Persist Case SmartShape to the process.

    • B.

      Add an object ID to the case.

    • C.

      Add a persistence condition to the case type.

    • D.

      Configure pyStartCase to persist a case.

    Correct Answer
    A. Add a Persist Case SmartShape to the process.
    Explanation
    To persist a temporary case, you need to add a Persist Case SmartShape to the process. This SmartShape allows the case to be saved permanently in the system, ensuring that the case data is retained even after the process execution is completed. By adding this SmartShape, the temporary case will be converted into a permanent case, making it available for future reference and processing.

    Rate this question:

  • 22. 

     You have added weighted conditions to  duplicate case search in a case type. How do you configure the  condition fields to differentiate between fields on the current case and fields on the existing case? 

    • A.

      Prefix the keyword Primary to the value used in the current case.

    • B.

      Prefix the keyword Primary to the value used in the existing case.

    • C.

      Suffix the keyword Primary to the value used in the current case.

    • D.

      Suffix the keyword Primary to the value used in the existing case

    Correct Answer
    A. Prefix the keyword Primary to the value used in the current case.
  • 23. 

    You  want to evaluate cases as potential duplicates when the existing cases and the current case have the  same create operator. How would you ensure that only cases with the same create operator are evaluated?

    • A.

      Add a must match condition using the create operator value and apply a weight of 100.

    • B.

      Dd a weighted condition using the create operator value, an equals operator, and a weight of 100.

    • C.

      Add a weighted condition using the create operator value in both condition fields, an equals operation, and weight of 0.

    • D.

      Add a must match condition where the create operator in an existing case is the same as in the current case

    Correct Answer
    D. Add a must match condition where the create operator in an existing case is the same as in the current case
    Explanation
    To ensure that only cases with the same create operator are evaluated, you should add a must match condition where the create operator in an existing case is the same as in the current case. This means that the create operator value must match exactly in order for the cases to be considered potential duplicates.

    Rate this question:

  • 24. 

    Management reports that have an unacceptably large number of cases are incorrectly identified as duplicate cases. Which two approaches could you use to  modify the duplicate case search process so that it produces fewer invalid duplicates? (Choose Two)

    • A.

      Add a Persist Case step after the Duplicate Search step.

    • B.

      Do not use a must match condition.

    • C.

      Adjust the threshold value.

    • D.

      Adjust the condition weights.

    Correct Answer(s)
    C. Adjust the threshold value.
    D. Adjust the condition weights.
    Explanation
    To reduce the number of invalid duplicates in the duplicate case search process, adjusting the threshold value and adjusting the condition weights can be effective approaches. Adjusting the threshold value allows for a stricter or looser matching criteria, depending on the desired outcome. By increasing the threshold value, only highly similar cases will be considered duplicates, reducing the chances of false positives. Adjusting the condition weights allows for prioritizing certain criteria in the matching process, giving more importance to relevant factors and reducing the chances of incorrect duplicate identification.

    Rate this question:

  • 25. 

     Field values enable you to _________________.

    • A.

      Test the validity of an input value

    • B.

      Define the values used in a circumstance template

    • C.

      Set default values for a property

    • D.

      Customize a list of allowed values for a property based on the context of the property

    Correct Answer
    D. Customize a list of allowed values for a property based on the context of the property
    Explanation
    Field values enable you to customize a list of allowed values for a property based on the context of the property. This means that you can specify specific values that are valid for a particular property, ensuring that only those values can be entered or selected. This allows for more control and accuracy in data entry, as well as ensuring that the data is consistent and conforms to the desired criteria.

    Rate this question:

  • 26. 

    How do you customize the allowed values for a property based on the context of the property using field values?

    • A.

      Create a field value record and a unique property record for each allowed value in each context.

    • B.

      Create a ruleset for each context, then create a field value record for each value and add the field value record to the appropriate ruleset.

    • C.

      Create a field value record for each value and set the context using the Apply to: field.

    • D.

      Create a base field value record, then create a circumstance of the base record for each allowed value.

    Correct Answer
    C. Create a field value record for each value and set the context using the Apply to: field.
    Explanation
    To customize the allowed values for a property based on the context of the property using field values, you need to create a field value record for each value and set the context using the Apply to: field. This allows you to specify different allowed values for the property based on different contexts. By creating separate field value records for each value and setting the appropriate context, you can customize the allowed values for the property in different scenarios.

    Rate this question:

  • 27. 

    Sourcing a data page directly from a UI control is an example of which pattern?

    • A.

      System of Record (SoR) pattern

    • B.

      Reference pattern

    • C.

      Snapshot pattern

    • D.

      Alias pattern

    Correct Answer
    B. Reference pattern
    Explanation
    Sourcing a data page directly from a UI control refers to the Reference pattern. In this pattern, the data is obtained by referencing a specific location or source, such as a data page, rather than creating a separate copy or snapshot of the data. This allows for real-time access to the most up-to-date information and avoids redundancy or inconsistency that may occur with snapshot patterns or alias patterns. The Reference pattern is commonly used in systems where data integrity and accuracy are crucial.

    Rate this question:

  • 28. 

    Which feature would you use to implement the System of Record (SoR) pattern?

    • A.

      No specific feature — just use a data page directly in the application

    • B.

      The refer to a data page option on a property

    • C.

      The copy data from a data page option on a property

    • D.

      The Property-Ref activity method

    Correct Answer
    B. The refer to a data page option on a property
    Explanation
    The "refer to a data page" option on a property would be used to implement the System of Record (SoR) pattern. This option allows a property to reference a data page, which serves as the source of truth for that property's value. By referencing a data page, any changes made to the data page will automatically reflect in the property, ensuring that the property always holds the most up-to-date information from the SoR. This helps maintain data consistency and avoids the need to directly manipulate the data page within the application.

    Rate this question:

  • 29. 

    Which feature would you use to implement the alias pattern?

    • A.

      The Property-Ref activity method

    • B.

      No specific feature — just use a data page directly in the application

    • C.

      The copy data from a data page option on a property

    • D.

      The refer to a data page option on a property

    Correct Answer
    A. The Property-Ref activity method
    Explanation
    The Property-Ref activity method would be used to implement the alias pattern. This method allows referencing a property from another class or page, enabling the use of aliases to access data.

    Rate this question:

  • 30. 

     You add a new work group to an application. Which two organization rules do you need to update? (Choose Two)

    • A.

      Class groups

    • B.

      Operator ID

    • C.

      Workbasket

    • D.

      Unit

    Correct Answer(s)
    B. Operator ID
    C. Workbasket
    Explanation
    When adding a new work group to an application, you need to update the organization rules for both the Operator ID and the Workbasket. The Operator ID organization rule determines the access and permissions for individual users within the work group, while the Workbasket organization rule determines how work items are assigned and distributed among the work group members. By updating both of these organization rules, you ensure that the new work group is properly configured and able to function within the application.

    Rate this question:

  • 31. 

    Which requirement causes you to consider using Dynamic Class Referencing (DCR)?

    • A.

      To ensure that flows copied into the implementation layer use workbaskets in the framework layer.

    • B.

      To route work to a workbasket that is given by the operator’s work group

    • C.

      To reuse a flow from the framework in the implementation layer

    • D.

      To initiate implementation layer case types from the framework

    Correct Answer
    C. To reuse a flow from the framework in the implementation layer
    Explanation
    Dynamic Class Referencing (DCR) allows you to reuse a flow from the framework in the implementation layer. This means that you can reference and use a flow that is defined in the framework layer without having to duplicate or recreate it in the implementation layer. This helps to ensure consistency and maintainability of the application by promoting code reuse and reducing redundancy.

    Rate this question:

  • 32. 

     The TGB organization structure has a Sales unit, and it belongs to a Marketing division. TGB plans to add new units for the East, Central, and West geographical sales regions. These regional units report to the Sales unit. How do you configure the organizational hierarchy to support the new structure?

    • A.

      Add a new Regional unit to the Marketing division and add the East, Central, and West regional units as child units to the Regional unit.

    • B.

      Add the regional units as sub-units to the Sales unit.

    • C.

      Add the regional units to the Marketing division.

    • D.

      Add the regional units to the TGB organization.

    Correct Answer
    B. Add the regional units as sub-units to the Sales unit.
    Explanation
    The correct answer is to add the regional units as sub-units to the Sales unit. This configuration ensures that the regional units report directly to the Sales unit, which is their immediate superior. Adding the regional units as sub-units to the Sales unit maintains the hierarchical structure and clearly defines the reporting relationships within the organization.

    Rate this question:

  • 33. 

    You configure a cascading approval step for insurance claims. The request requires approval from the submitter's manager. However, approval from operators in other units in the organization may be required. Which approval model would you use?

    • A.

      Work queue

    • B.

      Approval level

    • C.

      Reporting structure

    • D.

      Authority matrix

    Correct Answer
    A. Work queue
    Explanation
    In this scenario, the best approval model to use would be the work queue. This model allows the insurance claims to be routed to the submitter's manager for initial approval. If additional approval is required from operators in other units, the claims can be easily assigned to their work queues for review. This ensures that the approval process is efficient and allows for flexibility in involving multiple stakeholders in the decision-making process.

    Rate this question:

  • 34. 

    You have added a cascading approval step that uses an authority matrix. You have specified a decision table to determine the approvers for each case. You have confirmed that the conditions in the decision table are configured correctly. You test the configuration by entering requests that require multiple approvers. However, the system routes all requests to only one approver. Which of the following actions would you take to correct this issue?

    • A.

      Specify a page list for the authority matrix.

    • B.

      Set the decision table to evaluate all rows.

    • C.

      Add a row to the decision table that evaluates the submitter's workgroup manager.

    • D.

      Add an approval level for each approver.

    Correct Answer
    B. Set the decision table to evaluate all rows.
    Explanation
    By setting the decision table to evaluate all rows, the system will consider all the conditions specified in the decision table and route requests to multiple approvers as required. This will ensure that the cascading approval step functions correctly and requests are not routed to only one approver.

    Rate this question:

  • 35. 

    Your application requires a cascading approval for expense reports. Approvals must follow the submitter's reporting structure, with the following thresholds. A manager must approve expense reports up to USD500. A director must approve expense reports up to USD1500. A vice president must approve expense reports of USD1500 or greater. How do you configure the approval process?

    • A.

      Select the reporting structure configuration, then select All levels.

    • B.

      Select the authority matrix configuration option.

    • C.

      Select the reporting structure configuration with custom levels, then configure when rules to determine the number of levels.

    • D.

      Select the reporting structure configuration with custom levels, then configure a decision table to determine the number of levels.

    Correct Answer
    C. Select the reporting structure configuration with custom levels, then configure when rules to determine the number of levels.
    Explanation
    The correct answer is to select the reporting structure configuration with custom levels and configure when rules to determine the number of levels. This means that the approval process will be based on specific rules that determine how many levels of approval are required based on the amount of the expense report. The rules will specify that a manager must approve reports up to USD500, a director must approve reports up to USD1500, and a vice president must approve reports of USD1500 or greater. This allows for a cascading approval process that follows the submitter's reporting structure and ensures that the appropriate level of approval is obtained for each expense report.

    Rate this question:

  • 36. 

     Your team is building an application for a contact center that handles a variety of customer requests. Business policies require that each customer interaction be conducted with the most appropriate next available Customer Service Representative (CSR). What is the best way to implement this requirement?

    • A.

      Use a ToWorkGroup router and Pega's Get Next Work functionality

    • B.

      Use a ToLeveledGroup router and Pega's Get Next Work functionality

    • C.

      Use a ToWorkbasket router and Pega's Get Next Work functionality

    • D.

      Use a ToWorklist router and Pega's Get Next Work functionality

    Correct Answer
    C. Use a ToWorkbasket router and Pega's Get Next Work functionality
    Explanation
    The best way to implement the requirement of conducting each customer interaction with the most appropriate next available CSR is to use a ToWorkbasket router and Pega's Get Next Work functionality. This approach allows the application to route work items to specific workbaskets based on the skills and availability of CSRs. The Get Next Work functionality ensures that the work item is assigned to the most appropriate CSR in the selected workbasket.

    Rate this question:

  • 37. 

    You are tasked with configuring the Get Next Work functionality for an application. The requirement states that the workbaskets a user is associated with must be checked first, and all eligible assignments must be consolidated into a single list before being filtered and sorted. Which two of the following options do you select on an Operator ID record to configure the Get Next Work functionality to meet this requirement? (Choose Two)

    • A.

      Get from workbaskets first

    • B.

      Merge workbaskets

    • C.

      This is an unattended operator

    • D.

      Operator is available to receive work

    Correct Answer(s)
    A. Get from workbaskets first
    B. Merge workbaskets
    Explanation
    To configure the Get Next Work functionality to meet the requirement of checking the workbaskets first and consolidating eligible assignments into a single list before filtering and sorting, the two options that need to be selected on the Operator ID record are "Get from workbaskets first" and "Merge workbaskets". These options ensure that the assignments from the user's associated workbaskets are retrieved first and then merged into a single list for further processing.

    Rate this question:

  • 38. 

    What effect does the Use all workbasket assignments in user’s work group option have on how workbaskets are searched when using the Get Next Work functionality?

    • A.

      The workbaskets associated with the user are checked first. If no assignments are found in the user's workbaskets, the user's worklist is checked.

    • B.

      This option organizes all assignments in all of the workbaskets the user is associated with into a single list before the list is filtered and sorted.

    • C.

      This option limits the workbasket search to only those workbaskets defined in the user's work group.

    • D.

      When a user clicks the Next Assignment link, the system checks the user's worklist. If assignments are available in the user's worklist, the assignments are filtered and sorted.

    Correct Answer
    C. This option limits the workbasket search to only those workbaskets defined in the user's work group.
    Explanation
    The "Use all workbasket assignments in user's work group" option limits the search for workbaskets to only those that are defined in the user's work group. This means that when using the "Get Next Work" functionality, the system will only search for assignments in the workbaskets that are associated with the user's work group. If no assignments are found in these workbaskets, the user's worklist will be checked instead. This option helps to streamline and prioritize the search for assignments based on the user's work group.

    Rate this question:

  • 39. 

    What two artifacts should you prepare in advance before delegating a rule? (Choose Two)

    • A.

      An unlocked ruleset added to the Application rule as a production ruleset

    • B.

      A separate Operator ID that has access to the delegated rules

    • C.

      An Access Group that has access to the production ruleset

    • D.

      An Access Role that has access to the production ruleset

    Correct Answer(s)
    A. An unlocked ruleset added to the Application rule as a production ruleset
    C. An Access Group that has access to the production ruleset
    Explanation
    Before delegating a rule, it is important to prepare two artifacts in advance. Firstly, an unlocked ruleset should be added to the Application rule as a production ruleset. This allows for changes to be made to the delegated rule if necessary. Secondly, an Access Group that has access to the production ruleset should be prepared. This ensures that the appropriate users have the necessary permissions to access and execute the delegated rule.

    Rate this question:

  • 40. 

     Select two benefits of adopting a rule delegation strategy. (Choose Two)

    • A.

      Adopting a rule delegation strategy allows business users to change business policies more quickly by avoiding long approval processes.

    • B.

      Adopting a rule delegation strategy can help improve the business' ability to adapt to changing business conditions.

    • C.

      Adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance.

    • D.

      Adopting a rule delegation strategy can help lower the overall costs of building and maintaining business applications because fewer architects are required if business users can make changes to the application on their own.

    Correct Answer(s)
    B. Adopting a rule delegation strategy can help improve the business' ability to adapt to changing business conditions.
    C. Adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance.
    Explanation
    Adopting a rule delegation strategy allows business users to change business policies more quickly by avoiding long approval processes. This is beneficial because it increases agility and responsiveness to changing market conditions. Additionally, adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance. This improves efficiency and productivity by reducing the burden on architects and enabling them to concentrate on their core responsibilities.

    Rate this question:

  • 41. 

    Select two reasons for organizing delegated rules in a separate, unlocked ruleset. (Choose Two)

    • A.

      A separate, unlocked ruleset allows for versioning control of the individual delegated rules in case you want to roll back changes.

    • B.

      A separate, unlocked ruleset is necessary because changes cannot be made to rules in a locked ruleset.

    • C.

      A separate ruleset can help prevent accidental or unauthorized changes to critical elements of the application.

    • D.

      A separate, unlocked ruleset allows you to organize the business users responsible for managing the delegated rules.

    Correct Answer(s)
    B. A separate, unlocked ruleset is necessary because changes cannot be made to rules in a locked ruleset.
    C. A separate ruleset can help prevent accidental or unauthorized changes to critical elements of the application.
    Explanation
    One reason for organizing delegated rules in a separate, unlocked ruleset is that changes cannot be made to rules in a locked ruleset. This ensures that the delegated rules remain flexible and can be modified as needed without any restrictions. Additionally, having a separate ruleset can help prevent accidental or unauthorized changes to critical elements of the application. By separating the delegated rules, it provides a level of control and security, ensuring that only authorized users can make changes to these important rules.

    Rate this question:

  • 42. 

    Your application contains a top-level case type named Purchase Request and a Purchaser Order child case. The company has determined that only one user may open and work on a case at one time. However, users working on purchase orders should not lock out users working on the parent purchase request cases. How would you configure the lock settings among the case types?

    • A.

      Set default locking on purchase requests and set the do not lock the parent option on purchase orders.

    • B.

      Set default locking and the do not lock the parent option on purchase orders.

    • C.

      Set default locking and the do not lock the parent option on purchase requests.

    • D.

      Set optimistic locking on purchase requests and the do not lock the parent option on purchase orders.

    Correct Answer
    A. Set default locking on purchase requests and set the do not lock the parent option on purchase orders.
    Explanation
    The correct answer is to set default locking on purchase requests and set the "do not lock the parent" option on purchase orders. This configuration ensures that only one user can work on a purchase request at a time, but users working on purchase orders will not be locked out from working on the parent purchase request cases. This allows for efficient collaboration and prevents unnecessary locking of cases.

    Rate this question:

  • 43. 

     In a prepare job offer process, you  configured a Split For Each shape. The shape runs a compensation approval subprocess to a list containing four managers. The prepare job offer process resumes as soon as one manager completes the approval process. Which join condition in the Split For Each shape supports this requirement? 

    • A.

      An All join condition

    • B.

      A Some join condition

    • C.

      An Iterate join condition

    • D.

      An Any join condition

    Correct Answer
    D. An Any join condition
    Explanation
    The Any join condition in the Split For Each shape supports the requirement of the prepare job offer process to resume as soon as one manager completes the approval process. With the Any join condition, the process will continue as soon as any one of the four managers completes the approval process, without waiting for all of them.

    Rate this question:

  • 44. 

     An order fulfillment process  includes a request for quotes from multiple shippers. You want the system to automatically call a quote request subprocess for each vendor. How would you configure your process?

    • A.

      Add a Split Join shape and run the request subprocess for each vendor on a page list.

    • B.

      Add a Split For Each shape and run the request subprocess for each vendor on a page list.

    • C.

      Add a Split For Each step to the case lifecycle and run the subprocess for each vendor on a page list.

    • D.

      Add a Subprocess shape for the request subprocess and specify the Spinoff option.

    Correct Answer
    B. Add a Split For Each shape and run the request subprocess for each vendor on a page list.
    Explanation
    To configure the process, you would add a Split For Each shape and run the request subprocess for each vendor on a page list. This means that the system will automatically call the quote request subprocess for each vendor individually, allowing for multiple quotes to be obtained from different shippers. Using a Split For Each shape ensures that the subprocess is executed for each vendor in the list, enabling efficient and automated processing of the quote requests.

    Rate this question:

  • 45. 

    You are tasked with configuring a screen flow. The requirement states that every step in the screen flow must be executed sequentially. Which of the following two options do you select on each assignment shape to configure the screen flow to meet this requirement? (Choose Two)

    • A.

      Save on last step

    • B.

      Enable navigation link

    • C.

      Perform post-processing when navigating away from step

    • D.

      Only allow navigating back to this step

    Correct Answer(s)
    B. Enable navigation link
    D. Only allow navigating back to this step
    Explanation
    To configure the screen flow to meet the requirement of executing every step sequentially, you would select "Enable navigation link" and "Only allow navigating back to this step" on each assignment shape. By enabling the navigation link, users will be able to move forward to the next step in the flow. And by only allowing navigation back to the current step, users will not be able to skip or jump ahead to other steps, ensuring that the flow is followed sequentially.

    Rate this question:

  • 46. 

    Which answer best describes the benefit of using screen flows?

    • A.

      Screen flows help a single user complete complex tasks by presenting multiple screens in a logical sequence.

    • B.

      Screen flows provide an easy way to add a step to a process that is preconfigured with functionality, such as sending an email or creating a case.

    • C.

      Screen flows provide a way to add an assignment to a process that is preconfigured with one or more actions a user can take.

    • D.

      Screen flows help you organize separate tasks into steps so you can control how, when, and by whom work is performed for each step.

    Correct Answer
    A. Screen flows help a single user complete complex tasks by presenting multiple screens in a logical sequence.
    Explanation
    Screen flows are beneficial because they allow a single user to complete complex tasks by presenting multiple screens in a logical sequence. This means that the user can easily navigate through different screens, ensuring that they follow a logical order and complete all necessary steps. By using screen flows, the user's experience is streamlined, making it easier for them to complete complex tasks efficiently and effectively.

    Rate this question:

  • 47. 

    When configuring a screen flow, you identify a single harness to define the navigation style for the screen flow. Where is the harness identified?

    • A.

      On the Flow Action connectors

    • B.

      On the Start shape

    • C.

      On the Design tab of the screen flow

    • D.

      On each Assignment shape

    Correct Answer
    B. On the Start shape
    Explanation
    In a screen flow, the harness that defines the navigation style is identified on the Start shape. The Start shape is the initial shape in the screen flow and it determines the starting point of the flow. By identifying the harness on the Start shape, it ensures that the navigation style defined in the harness is applied throughout the entire screen flow process.

    Rate this question:

  • 48. 

     A new system architect  questions the value of allowing attachments to cases. What would be your best response?

    • A.

      Adding attachments to cases is the method of choice for storing case documentation.

    • B.

      Case flow is dependent on attachments because attachments provide information essential to a case.

    • C.

      Attachments can provide additional information required to process a case.

    • D.

      Pega provides attachment functionality out-of-the-box, so it must be important.

    Correct Answer
    C. Attachments can provide additional information required to process a case.
    Explanation
    Attachments can provide additional information required to process a case.

    Rate this question:

  • 49. 

    Pega provides a feature to upload attachments out-of-the box. Which attachment feature must be configured by a system architect?

    • A.

      The uploaded attachments are read-only

    • B.

      User access to attachments and document security

    • C.

      The steps in which attachments are allowed

    • D.

      The attachment rule set

    Correct Answer
    B. User access to attachments and document security
    Explanation
    A system architect must configure the user access to attachments and document security in Pega. This involves setting up permissions and restrictions on who can view, edit, and delete attachments, as well as ensuring that the attachments are secure and protected from unauthorized access. By configuring these settings, the system architect can ensure that the attachment feature is used in a controlled and secure manner.

    Rate this question:

  • 50. 

     A new system architect asks you how user access to attachments is managed. In your response, you indicate there are two ways to configure attachment access. Which statement is the best next sentence of your response?

    • A.

      User access can be configured by attachment class.

    • B.

      User access can be configured by privilege and/or when rule.

    • C.

      User access can be configured by when rule or case type.

    • D.

      User access can be configured by circumstancing the attachment category.

    Correct Answer
    B. User access can be configured by privilege and/or when rule.
    Explanation
    User access to attachments can be configured by privilege and/or when rule. This means that access to attachments can be controlled based on the user's privileges or specific conditions defined in a when rule.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 27, 2019
    Quiz Created by
    Patricklafunk

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.