1.
You have a requirement to create an email correspondence that can be reused by other applications. In which two layers of the Enterprise Class Structure could you apply the email correspondence rule?
Correct Answer(s)
B. Organization
D. Division
Explanation
The email correspondence rule can be applied in the Organization and Division layers of the Enterprise Class Structure. The Organization layer represents a specific business unit or department within the enterprise, and applying the email correspondence rule at this layer allows for the reuse of the rule across different applications within that business unit. The Division layer represents a specific division or team within the organization, and applying the rule at this layer allows for further customization and reuse within that specific division or team.
2.
Which layer of the Enterprise Class Structure contains assets that cannot be reused in other applications?
Correct Answer
A. Implementation
Explanation
The layer of the Enterprise Class Structure that contains assets that cannot be reused in other applications is the Implementation layer. This layer is responsible for implementing specific functionalities and features that are unique to a particular application. The assets created at this layer are tightly coupled with the application and cannot be easily reused in other applications.
3.
Which layer of the Enterprise Class Structure contains generalized assets that are then extended by specific implementations?
Correct Answer
B. Framework
Explanation
The correct answer is Framework. In the Enterprise Class Structure, the Framework layer contains generalized assets that serve as a foundation for specific implementations. This layer provides a structure and set of guidelines for developing and extending functionalities. It helps in promoting consistency, reusability, and efficiency across different implementations within the organization.
4.
When creating a new ruleset version, what extra step must the system architect perform?
Correct Answer
A. There are no extra steps if the ruleset version is up-to-date.
Explanation
When creating a new ruleset version, if the ruleset version is already up-to-date, there are no extra steps required by the system architect. This means that the existing ruleset version is already the latest version and there is no need to make any changes or updates.
5.
What is the importance of application versioning?
Correct Answer
D. Application versioning preserves prior application versions.
Explanation
Application versioning is important because it allows for the preservation of prior application versions. This means that if any issues or bugs arise in the latest version, the previous versions can still be accessed and used. It provides a safety net in case any changes or updates in the current version cause any problems. By preserving prior versions, application versioning ensures that users have the option to revert back to a stable and functional version if needed.
6.
What advantage does skimming provide over lock and roll as a versioning option?
Correct Answer
C. Skimming is most efficient for major and minor updates. Lock and roll is most useful for patches.
Explanation
Skimming provides an advantage over lock and roll as a versioning option because it is most efficient for major and minor updates. On the other hand, lock and roll is most useful for patches. Skimming carries blocked rules forward, while lock and roll does not. Additionally, skimming saves checked out rules, whereas lock and roll does not save checked out rules.
7.
A user is granted access to an application which lists HRApps:02-02 under Application rulesets. The ruleset contains rules in the versions below. Which of the following rules can the user access?
Correct Answer
B. Rule_B, Rule_C, and Rule_D
Explanation
The user can access Rule_B, Rule_C, and Rule_D because they are all part of the HRApps:02-02 ruleset, which the user has been granted access to.
8.
Select two record types that are involved when configuring a production ruleset.
Correct Answer(s)
A. Application
E. Access group
Explanation
When configuring a production ruleset, two record types that are involved are the "Application" and "Access group" record types. The "Application" record type is used to define the application or system that the ruleset belongs to. It includes information such as the application name, version, and description. The "Access group" record type is used to control user access and permissions within the application. It defines the users or groups who have access to the ruleset and the level of access they have.
9.
A claims framework contains two rulesets, ClaimsFW and ClaimsFWInt, and an application built on the framework contains two rulesets, Claims and ClaimsInt. Which statement is false if all the rulesets are configured as Application Validation?
Correct Answer
D. Rules in ClaimsFW can reference rules in Claims
10.
A claims application contains two organizational and two application rulesets. The organizational rulesets MyCo and MyCoInt are configured as Ruleset Validation, where the prerequisite for MyCo is MyCoInt and the prerequisite for MyCoInt is Pega-ProcessCommander. The two application rulesets Claims and ClaimsInt are configured as Application Validation. Which of the following statements is false?
Correct Answer
C. Rules in MyCo can reference rules in Claims
Explanation
Rules in MyCo can reference rules in Claims is the false statement. According to the given information, the prerequisite for MyCo is MyCoInt, and the prerequisite for MyCoInt is Pega-ProcessCommander. This means that MyCo can only reference rules in MyCoInt, not in Claims.
11.
An application contains the following rulesets.
AccountManagement contains the rules for administering checking and savings accounts.
AccountManagementInt contains supporting rules for integrating with other applications.
BankCorp contains rules shared across the entire organization.
BankCorpInt contains supporting rules for integrations shared with other internal applications.
CreditCheck contains rules for processing a credit check and is shared with another Pega application to administer loans.
Which two rulesets can be configured to use application validation, according to best practices? (Choose Two)
Correct Answer(s)
D. AccountManagement
E. AccountManagementInt
Explanation
The rulesets AccountManagement and AccountManagementInt can be configured to use application validation according to best practices. This is because these rulesets contain the rules for administering checking and savings accounts, which are critical functions in the application. By applying application validation to these rulesets, it ensures that the rules are properly validated and adhere to the defined business rules and requirements. This helps in maintaining the integrity and accuracy of the account management processes.
12.
Which two of the following prerequisites would you choose to create a branch rule for parallel development? (Choose Two)
Correct Answer(s)
A. Give team members access to the team application
D. Create a team application
Explanation
To create a branch rule for parallel development, it is necessary to give team members access to the team application so that they can collaborate and work on the rule together. Additionally, creating a team application is important as it provides a dedicated space for the team to develop and test their changes in parallel. This allows for efficient and organized development, ensuring that the original rule remains unaffected while the team works on their branch rule.
13.
A branch ruleset is a ruleset that ___________. (Choose Two)
Correct Answer(s)
A. Is designed for large projects
D. Is based off of another ruleset
Explanation
A branch ruleset is designed for large projects because it allows for the management and organization of rules specific to a particular project. It helps to keep the ruleset focused and relevant to the project's requirements. Additionally, a branch ruleset is based off of another ruleset, meaning it inherits rules from a parent ruleset. This allows for easier maintenance and updates, as changes made to the parent ruleset can be propagated to the branch ruleset.
14.
Which two of the following steps do you perform after you develop branch rules and before you merge a ruleset? (Choose Two)
Correct Answer(s)
A. Review conflicts and warnings
B. Check in rules to merge
Explanation
After developing branch rules, the first step is to review conflicts and warnings. This involves identifying any conflicts or potential issues that may arise when merging the branch rules with the main ruleset. The second step is to check in the rules to merge, which means saving the changes made in the branch rules and making them available for merging with the main ruleset. Checking out rules to merge is not necessary as the rules are already developed in the branch. Using DB trace to identify conflicts is not mentioned as a step in the process.
15.
Which of the following statements is true about the rule resolution process?
Correct Answer
C. If a user does not have access to the selected rule, the system sends a message that it could not find an appropriate rule to execute.
Explanation
The statement "If a user does not have access to the selected rule, the system sends a message that it could not find an appropriate rule to execute" is true because in the rule resolution process, if a user does not have the necessary access rights to a rule, the system will not be able to execute that rule. In such cases, the system will inform the user by sending a message indicating that it could not find an appropriate rule to execute. This ensures that only users with the required permissions can execute specific rules.
16.
Which rule availability setting can you use to force the system to look for an instance of the rule in the next highest class or ruleset?
Correct Answer
A. Withdrawn
Explanation
The rule availability setting "Withdrawn" can be used to force the system to look for an instance of the rule in the next highest class or ruleset. This means that if the rule is not available in the current class or ruleset, the system will search for it in the next highest class or ruleset.
17.
Adding parameters to a rule enables you to _____________________.
Correct Answer
B. Separate the functional behavior of a rule from specific business contexts
Explanation
Adding parameters to a rule allows you to separate the functional behavior of the rule from specific business contexts. This means that by adding parameters, you can define the values used in different circumstances and adapt the rule to changing business conditions. It helps in making the rule more flexible and reusable, as the same rule can be applied to different contexts by simply changing the parameter values. This improves the business users' ability to adapt and make changes to the rule without affecting its core functionality.
18.
Use the ________________ keyword to reference a parameter in the same rule in which the parameter is defined.
Correct Answer
B. Param
Explanation
The keyword "Param" is used to reference a parameter in the same rule in which the parameter is defined.
19.
Which two fields are required when adding a parameter to a rule? (Choose Two)
Correct Answer(s)
B. Name
D. Data type
Explanation
When adding a parameter to a rule, the two required fields are the Name and Data type. The Name field is necessary to give the parameter a unique identifier, allowing it to be referenced and used within the rule. The Data type field is essential to specify the type of data that the parameter will hold, such as text, number, or date. These two fields are crucial for accurately defining and utilizing parameters within a rule.
20.
When a process is configured to create temporary cases, which of the following occurs when a user creates a case?
Correct Answer
C. The case is stored in memory.
Explanation
When a process is configured to create temporary cases, the system does not create an object ID or store the case in the database. Instead, it stores the case in memory. This means that the case data is temporarily stored in the system's memory and is not persisted in the database. This allows for faster processing and reduces the need for database storage.
21.
What task must you perform in order to persist a temporary case?
Correct Answer
A. Add a Persist Case SmartShape to the process.
Explanation
To persist a temporary case, you need to add a Persist Case SmartShape to the process. This SmartShape allows the case to be saved permanently in the system, ensuring that the case data is retained even after the process execution is completed. By adding this SmartShape, the temporary case will be converted into a permanent case, making it available for future reference and processing.
22.
You have added weighted conditions to duplicate case search in a case type. How do you configure the condition fields to differentiate between fields on the current case and fields on the existing case?
Correct Answer
A. Prefix the keyword Primary to the value used in the current case.
23.
You want to evaluate cases as potential duplicates when the existing cases and the current case have the same create operator. How would you ensure that only cases with the same create operator are evaluated?
Correct Answer
D. Add a must match condition where the create operator in an existing case is the same as in the current case
Explanation
To ensure that only cases with the same create operator are evaluated, you should add a must match condition where the create operator in an existing case is the same as in the current case. This means that the create operator value must match exactly in order for the cases to be considered potential duplicates.
24.
Management reports that have an unacceptably large number of cases are incorrectly identified as duplicate cases. Which two approaches could you use to modify the duplicate case search process so that it produces fewer invalid duplicates? (Choose Two)
Correct Answer(s)
C. Adjust the threshold value.
D. Adjust the condition weights.
Explanation
To reduce the number of invalid duplicates in the duplicate case search process, adjusting the threshold value and adjusting the condition weights can be effective approaches. Adjusting the threshold value allows for a stricter or looser matching criteria, depending on the desired outcome. By increasing the threshold value, only highly similar cases will be considered duplicates, reducing the chances of false positives. Adjusting the condition weights allows for prioritizing certain criteria in the matching process, giving more importance to relevant factors and reducing the chances of incorrect duplicate identification.
25.
Field values enable you to _________________.
Correct Answer
D. Customize a list of allowed values for a property based on the context of the property
Explanation
Field values enable you to customize a list of allowed values for a property based on the context of the property. This means that you can specify specific values that are valid for a particular property, ensuring that only those values can be entered or selected. This allows for more control and accuracy in data entry, as well as ensuring that the data is consistent and conforms to the desired criteria.
26.
How do you customize the allowed values for a property based on the context of the property using field values?
Correct Answer
C. Create a field value record for each value and set the context using the Apply to: field.
Explanation
To customize the allowed values for a property based on the context of the property using field values, you need to create a field value record for each value and set the context using the Apply to: field. This allows you to specify different allowed values for the property based on different contexts. By creating separate field value records for each value and setting the appropriate context, you can customize the allowed values for the property in different scenarios.
27.
Sourcing a data page directly from a UI control is an example of which pattern?
Correct Answer
B. Reference pattern
Explanation
Sourcing a data page directly from a UI control refers to the Reference pattern. In this pattern, the data is obtained by referencing a specific location or source, such as a data page, rather than creating a separate copy or snapshot of the data. This allows for real-time access to the most up-to-date information and avoids redundancy or inconsistency that may occur with snapshot patterns or alias patterns. The Reference pattern is commonly used in systems where data integrity and accuracy are crucial.
28.
Which feature would you use to implement the System of Record (SoR) pattern?
Correct Answer
B. The refer to a data page option on a property
Explanation
The "refer to a data page" option on a property would be used to implement the System of Record (SoR) pattern. This option allows a property to reference a data page, which serves as the source of truth for that property's value. By referencing a data page, any changes made to the data page will automatically reflect in the property, ensuring that the property always holds the most up-to-date information from the SoR. This helps maintain data consistency and avoids the need to directly manipulate the data page within the application.
29.
Which feature would you use to implement the alias pattern?
Correct Answer
A. The Property-Ref activity method
Explanation
The Property-Ref activity method would be used to implement the alias pattern. This method allows referencing a property from another class or page, enabling the use of aliases to access data.
30.
You add a new work group to an application. Which two organization rules do you need to update? (Choose Two)
Correct Answer(s)
B. Operator ID
C. Workbasket
Explanation
When adding a new work group to an application, you need to update the organization rules for both the Operator ID and the Workbasket. The Operator ID organization rule determines the access and permissions for individual users within the work group, while the Workbasket organization rule determines how work items are assigned and distributed among the work group members. By updating both of these organization rules, you ensure that the new work group is properly configured and able to function within the application.
31.
Which requirement causes you to consider using Dynamic Class Referencing (DCR)?
Correct Answer
C. To reuse a flow from the framework in the implementation layer
Explanation
Dynamic Class Referencing (DCR) allows you to reuse a flow from the framework in the implementation layer. This means that you can reference and use a flow that is defined in the framework layer without having to duplicate or recreate it in the implementation layer. This helps to ensure consistency and maintainability of the application by promoting code reuse and reducing redundancy.
32.
The TGB organization structure has a Sales unit, and it belongs to a Marketing division. TGB plans to add new units for the East, Central, and West geographical sales regions. These regional units report to the Sales unit. How do you configure the organizational hierarchy to support the new structure?
Correct Answer
B. Add the regional units as sub-units to the Sales unit.
Explanation
The correct answer is to add the regional units as sub-units to the Sales unit. This configuration ensures that the regional units report directly to the Sales unit, which is their immediate superior. Adding the regional units as sub-units to the Sales unit maintains the hierarchical structure and clearly defines the reporting relationships within the organization.
33.
You configure a cascading approval step for insurance claims. The request requires approval from the submitter's manager. However, approval from operators in other units in the organization may be required. Which approval model would you use?
Correct Answer
A. Work queue
Explanation
In this scenario, the best approval model to use would be the work queue. This model allows the insurance claims to be routed to the submitter's manager for initial approval. If additional approval is required from operators in other units, the claims can be easily assigned to their work queues for review. This ensures that the approval process is efficient and allows for flexibility in involving multiple stakeholders in the decision-making process.
34.
You have added a cascading approval step that uses an authority matrix. You have specified a decision table to determine the approvers for each case. You have confirmed that the conditions in the decision table are configured correctly. You test the configuration by entering requests that require multiple approvers. However, the system routes all requests to only one approver. Which of the following actions would you take to correct this issue?
Correct Answer
B. Set the decision table to evaluate all rows.
Explanation
By setting the decision table to evaluate all rows, the system will consider all the conditions specified in the decision table and route requests to multiple approvers as required. This will ensure that the cascading approval step functions correctly and requests are not routed to only one approver.
35.
Your application requires a cascading approval for expense reports. Approvals must follow the submitter's reporting structure, with the following thresholds. A manager must approve expense reports up to USD500. A director must approve expense reports up to USD1500. A vice president must approve expense reports of USD1500 or greater. How do you configure the approval process?
Correct Answer
C. Select the reporting structure configuration with custom levels, then configure when rules to determine the number of levels.
Explanation
The correct answer is to select the reporting structure configuration with custom levels and configure when rules to determine the number of levels. This means that the approval process will be based on specific rules that determine how many levels of approval are required based on the amount of the expense report. The rules will specify that a manager must approve reports up to USD500, a director must approve reports up to USD1500, and a vice president must approve reports of USD1500 or greater. This allows for a cascading approval process that follows the submitter's reporting structure and ensures that the appropriate level of approval is obtained for each expense report.
36.
Your team is building an application for a contact center that handles a variety of customer requests. Business policies require that each customer interaction be conducted with the most appropriate next available Customer Service Representative (CSR). What is the best way to implement this requirement?
Correct Answer
C. Use a ToWorkbasket router and Pega's Get Next Work functionality
Explanation
The best way to implement the requirement of conducting each customer interaction with the most appropriate next available CSR is to use a ToWorkbasket router and Pega's Get Next Work functionality. This approach allows the application to route work items to specific workbaskets based on the skills and availability of CSRs. The Get Next Work functionality ensures that the work item is assigned to the most appropriate CSR in the selected workbasket.
37.
You are tasked with configuring the Get Next Work functionality for an application. The requirement states that the workbaskets a user is associated with must be checked first, and all eligible assignments must be consolidated into a single list before being filtered and sorted. Which two of the following options do you select on an Operator ID record to configure the Get Next Work functionality to meet this requirement? (Choose Two)
Correct Answer(s)
A. Get from workbaskets first
B. Merge workbaskets
Explanation
To configure the Get Next Work functionality to meet the requirement of checking the workbaskets first and consolidating eligible assignments into a single list before filtering and sorting, the two options that need to be selected on the Operator ID record are "Get from workbaskets first" and "Merge workbaskets". These options ensure that the assignments from the user's associated workbaskets are retrieved first and then merged into a single list for further processing.
38.
What effect does the Use all workbasket assignments in user’s work group option have on how workbaskets are searched when using the Get Next Work functionality?
Correct Answer
C. This option limits the workbasket search to only those workbaskets defined in the user's work group.
Explanation
The "Use all workbasket assignments in user's work group" option limits the search for workbaskets to only those that are defined in the user's work group. This means that when using the "Get Next Work" functionality, the system will only search for assignments in the workbaskets that are associated with the user's work group. If no assignments are found in these workbaskets, the user's worklist will be checked instead. This option helps to streamline and prioritize the search for assignments based on the user's work group.
39.
What two artifacts should you prepare in advance before delegating a rule? (Choose Two)
Correct Answer(s)
A. An unlocked ruleset added to the Application rule as a production ruleset
C. An Access Group that has access to the production ruleset
Explanation
Before delegating a rule, it is important to prepare two artifacts in advance. Firstly, an unlocked ruleset should be added to the Application rule as a production ruleset. This allows for changes to be made to the delegated rule if necessary. Secondly, an Access Group that has access to the production ruleset should be prepared. This ensures that the appropriate users have the necessary permissions to access and execute the delegated rule.
40.
Select two benefits of adopting a rule delegation strategy. (Choose Two)
Correct Answer(s)
B. Adopting a rule delegation strategy can help improve the business' ability to adapt to changing business conditions.
C. Adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance.
Explanation
Adopting a rule delegation strategy allows business users to change business policies more quickly by avoiding long approval processes. This is beneficial because it increases agility and responsiveness to changing market conditions. Additionally, adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance. This improves efficiency and productivity by reducing the burden on architects and enabling them to concentrate on their core responsibilities.
41.
Select two reasons for organizing delegated rules in a separate, unlocked ruleset. (Choose Two)
Correct Answer(s)
B. A separate, unlocked ruleset is necessary because changes cannot be made to rules in a locked ruleset.
C. A separate ruleset can help prevent accidental or unauthorized changes to critical elements of the application.
Explanation
One reason for organizing delegated rules in a separate, unlocked ruleset is that changes cannot be made to rules in a locked ruleset. This ensures that the delegated rules remain flexible and can be modified as needed without any restrictions. Additionally, having a separate ruleset can help prevent accidental or unauthorized changes to critical elements of the application. By separating the delegated rules, it provides a level of control and security, ensuring that only authorized users can make changes to these important rules.
42.
Your application contains a top-level case type named Purchase Request and a Purchaser Order child case. The company has determined that only one user may open and work on a case at one time. However, users working on purchase orders should not lock out users working on the parent purchase request cases. How would you configure the lock settings among the case types?
Correct Answer
A. Set default locking on purchase requests and set the do not lock the parent option on purchase orders.
Explanation
The correct answer is to set default locking on purchase requests and set the "do not lock the parent" option on purchase orders. This configuration ensures that only one user can work on a purchase request at a time, but users working on purchase orders will not be locked out from working on the parent purchase request cases. This allows for efficient collaboration and prevents unnecessary locking of cases.
43.
In a prepare job offer process, you configured a Split For Each shape. The shape runs a compensation approval subprocess to a list containing four managers. The prepare job offer process resumes as soon as one manager completes the approval process. Which join condition in the Split For Each shape supports this requirement?
Correct Answer
D. An Any join condition
Explanation
The Any join condition in the Split For Each shape supports the requirement of the prepare job offer process to resume as soon as one manager completes the approval process. With the Any join condition, the process will continue as soon as any one of the four managers completes the approval process, without waiting for all of them.
44.
An order fulfillment process includes a request for quotes from multiple shippers. You want the system to automatically call a quote request subprocess for each vendor. How would you configure your process?
Correct Answer
B. Add a Split For Each shape and run the request subprocess for each vendor on a page list.
Explanation
To configure the process, you would add a Split For Each shape and run the request subprocess for each vendor on a page list. This means that the system will automatically call the quote request subprocess for each vendor individually, allowing for multiple quotes to be obtained from different shippers. Using a Split For Each shape ensures that the subprocess is executed for each vendor in the list, enabling efficient and automated processing of the quote requests.
45.
You are tasked with configuring a screen flow. The requirement states that every step in the screen flow must be executed sequentially.
Which of the following two options do you select on each assignment shape to configure the screen flow to meet this requirement? (Choose Two)
Correct Answer(s)
B. Enable navigation link
D. Only allow navigating back to this step
Explanation
To configure the screen flow to meet the requirement of executing every step sequentially, you would select "Enable navigation link" and "Only allow navigating back to this step" on each assignment shape. By enabling the navigation link, users will be able to move forward to the next step in the flow. And by only allowing navigation back to the current step, users will not be able to skip or jump ahead to other steps, ensuring that the flow is followed sequentially.
46.
Which answer best describes the benefit of using screen flows?
Correct Answer
A. Screen flows help a single user complete complex tasks by presenting multiple screens in a logical sequence.
Explanation
Screen flows are beneficial because they allow a single user to complete complex tasks by presenting multiple screens in a logical sequence. This means that the user can easily navigate through different screens, ensuring that they follow a logical order and complete all necessary steps. By using screen flows, the user's experience is streamlined, making it easier for them to complete complex tasks efficiently and effectively.
47.
When configuring a screen flow, you identify a single harness to define the navigation style for the screen flow. Where is the harness identified?
Correct Answer
B. On the Start shape
Explanation
In a screen flow, the harness that defines the navigation style is identified on the Start shape. The Start shape is the initial shape in the screen flow and it determines the starting point of the flow. By identifying the harness on the Start shape, it ensures that the navigation style defined in the harness is applied throughout the entire screen flow process.
48.
A new system architect questions the value of allowing attachments to cases. What would be your best response?
Correct Answer
C. Attachments can provide additional information required to process a case.
Explanation
Attachments can provide additional information required to process a case.
49.
Pega provides a feature to upload attachments out-of-the box. Which attachment feature must be configured by a system architect?
Correct Answer
B. User access to attachments and document security
Explanation
A system architect must configure the user access to attachments and document security in Pega. This involves setting up permissions and restrictions on who can view, edit, and delete attachments, as well as ensuring that the attachments are secure and protected from unauthorized access. By configuring these settings, the system architect can ensure that the attachment feature is used in a controlled and secure manner.
50.
A new system architect asks you how user access to attachments is managed. In your response, you indicate there are two ways to configure attachment access. Which statement is the best next sentence of your response?
Correct Answer
B. User access can be configured by privilege and/or when rule.
Explanation
User access to attachments can be configured by privilege and/or when rule. This means that access to attachments can be controlled based on the user's privileges or specific conditions defined in a when rule.