Ian Lucas
Test por , creado hace más de 1 año

All the questions from LSA mission tests on Pega Academy.

1531
0
0
Ian Lucas
Creado por Ian Lucas hace casi 3 años
Cerrar

Pega Certified Lead System Architect (Tests)

Pregunta 1 de 89

1

Which user type would exclusively use App Studio?

Selecciona una de las siguientes respuestas posibles:

  • Lead system architects

  • Low Code developers

  • Technical architects

  • Application developers

Explicación

Pregunta 2 de 89

1

Which of the following statements are true about Specialization layers?

Selecciona una de las siguientes respuestas posibles:

  • A specialization layer can be built on only one application

  • A specialization layer can be built on multiple applications

  • A specialization layer must use a framework as a built-on application

  • An implementation cannot be a specialization layer

Explicación

Pregunta 3 de 89

1

Which two of the following statements are true related to Predictive Diagnostic Cloud (PDC) and Autonomic Event Services (AES)?

Selecciona una o más de las siguientes respuestas posibles:

  • The AES application only reads data from, and does not communicate back, to the monitored system

  • The PDC application communicates with the monitored system in a two-way fashion

  • The AES application communicates with the monitored system in a two-way fashion

  • PDC only reads data from, and does not communicate back, to the monitored system

Explicación

Pregunta 4 de 89

1

Which two of the following statements are true about building an implementation-only application?

Selecciona una o más de las siguientes respuestas posibles:

  • The enterprise does not span multiple regions where business rules vary dramatically

  • The enterprise clearly wants to extend the application across multiple regions

  • The application case types are reused and modified across the enterprise

  • The enterprise does not need or want to extend the application

Explicación

Pregunta 5 de 89

1

When App Studio is used, in which schema is a data type table created?

Selecciona una de las siguientes respuestas posibles:

  • PegaRULES schema

  • PegaDATA schema

  • ClientData schema

  • CustomerData schema

Explicación

Pregunta 6 de 89

1

What are two methods you can use to generate mashup code in Pega Platform?

Selecciona una o más de las siguientes respuestas posibles:

  • Using Channels and interfaces in App Studio

  • Using Resources in Admin Studio

  • Using Case Designer in App Studio

  • Using Case Designer in Dev Studio

Explicación

Pregunta 7 de 89

1

In which two of the following ways can App Studio accelerate projects?

Selecciona una o más de las siguientes respuestas posibles:

  • Standardization through UI templates

  • Improved application structuring

  • Direct inheritance automation

  • Leverages company's IT reusable assets

Explicación

Pregunta 8 de 89

1

What are two options you can use to monitor the status of nodes in the cluster of Pega Platform?

Selecciona una o más de las siguientes respuestas posibles:

  • Dev Studio

  • App Studio

  • ADMIN Studio

  • Pega Predictive Diganostic Cloud (PDC)

Explicación

Pregunta 9 de 89

1

Which two statements are true about the component applications?

Selecciona una o más de las siguientes respuestas posibles:

  • Do not contain case types

  • Designed to be used as built on applications

  • Can be composed of other components

  • Can be used as a production application

Explicación

Pregunta 10 de 89

1

Which two of the following are the best practices for using multiple built-on applications?

Selecciona una o más de las siguientes respuestas posibles:

  • Use branch IDs that span several applications

  • Avoid using different versions of same application in the application stack

  • Use the same ruleset in multiple applications

  • Limit development to rulesets in the top-most application

Explicación

Pregunta 11 de 89

1

If you need to extend an existing application for a new division, which of the following options do you recommend?

Selecciona una de las siguientes respuestas posibles:

  • Define a set of plausible viable alternatives and then compare the advantages and disadvantages of each. Make a recommendation based on the requirements

  • Use the existing application as a built-on application and create a new divisional layer application

  • Extract all the case types from the existing application and refactor them into a series of modular microservices based applications that can be used as built-on applications for the new implementation

  • Refactor the existing application into a framework, and then create the new application as an implementation of the refactored framework

Explicación

Pregunta 12 de 89

1

Which two of the following options are reasons to version an application?

Selecciona una o más de las siguientes respuestas posibles:

  • If an application is using upgraded built-on application versions

  • If you need to move Utility code to a specialized ruleset

  • If you need to add rules that do not impact built on applications

  • If the rulesets in the application ruleset list have been versioned

Explicación

Pregunta 13 de 89

1

Which three of the following items make sense to be packaged as components?

Selecciona una o más de las siguientes respuestas posibles:

  • Correspondence

  • Case types

  • Application rules

  • Integration assets

  • Function library

Explicación

Pregunta 14 de 89

1

What two reasons justify using subcases when designing a case hierarchy?

Selecciona una o más de las siguientes respuestas posibles:

  • To simplify reporting, security, and auditing

  • When parallel processing of cases is optional

  • When multiple units of work must be completed simultaneously and independently

  • When optimistic locking is required

Explicación

Pregunta 15 de 89

1

In a scenario where you need to specialize rules for a particular region, which two of the following options can be?

Selecciona una o más de las siguientes respuestas posibles:

  • Dependent roles

  • Pattern inheritance

  • Circumstancing

  • Branching

Explicación

Pregunta 16 de 89

1

The initial behavior of the case type is always the same. The case type must ultimately change based on the type of data instance it is associated with. The data instance's type is not known when the case is created. How do you implement this scenario?

Selecciona una de las siguientes respuestas posibles:

  • Pattern inherit the case type class for each data instance type. Define type-specific behavior in each specialized class

  • Circumstance every rule in the case life-cycle beyond the point that the data instance's type is determined

  • For each data instance type create a subcase. Use a Decision shape to select the appropriate create case flow shape

  • For each data instance type create a subflow. Use a Decision shape to select the appropriate subflow shape

Explicación

Pregunta 17 de 89

1

When specializing a case using class inheritance, which two of the following options are correct?

Selecciona una o más de las siguientes respuestas posibles:

  • Use pattern inheritance for case specialization within an application

  • Use direct inheritance for case specialization across applications

  • Use direct inheritance for case specialization within an application

  • Use pattern inheritance for case specialization across applications

Explicación

Pregunta 18 de 89

1

Which two of the following statements are true regarding circumstanced case type rules?

Selecciona una o más de las siguientes respuestas posibles:

  • The rule resolution algorithm does not apply to circumstanced case type rules

  • Circumstanced case type rules are active only when a case instance is opened

  • Case Designer supports viewing circumstanced case type rules, the base rule and its circumstanced variations, side-by-side

  • Case workers can select which circumstanced variation of the case type rules to run

Explicación

Pregunta 19 de 89

1

In which three of the following ways can an application be specialized?

Selecciona una o más de las siguientes respuestas posibles:

  • Use branching

  • Circumstancing

  • Release toggles

  • Use decision rules

  • Class inheritance

  • Ruleset overriding

Explicación

Pregunta 20 de 89

1

Which two of the following statements are true about component applications?

Selecciona una o más de las siguientes respuestas posibles:

  • Component application cannot be self-testable

  • Are designed to be used as built-on applications

  • Do not contain case type

  • Can be composed of other components

Explicación

Pregunta 21 de 89

1

At a certain point in its life cycle, a case is required to capture the list of data instances viewed by the user from which one was selected. The data instance would be classified as reference data, values associated to a unique key rarely, if ever, changing. What is the best way to implement this requirement in Pega taking into consideration performance and extensibility?

Selecciona una de las siguientes respuestas posibles:

  • Define a data page using the Snapshot pattern to copy the list and define a Declare Index that creates a separate database table

  • Define a report definition that uses the Reference pattern against a database view

  • Define a data page using the Reference pattern and populate a field group list with the keys to the reference data instances

  • Define a Link class with two keys, one pointing to the reference data instance, the other pointing to the case

Explicación

Pregunta 22 de 89

1

Which two statements are true with regards to industry foundation data model?

Selecciona una o más de las siguientes respuestas posibles:

  • Data pages provided by the industry foundation data model need to be extended for each external integration

  • A best practice is to use the industry foundation data model as-is, as much as possible

  • The industry foundation data model can only be used as built-on application in conjunction with Pega applications

  • Pega's industry foundation data simplifies the complexity of many-to-many relationships

Explicación

Pregunta 23 de 89

1

Greenfield Data Modeling follows the three-level approach. What is the order of applying this three-level approach?

Selecciona una de las siguientes respuestas posibles:

  • Conceptual, Logical, Physical

  • Physical, Conceptual, Logical

  • Logical, Conceptual, Physical

  • Logical, Physical, Conceptual

Explicación

Pregunta 24 de 89

1

What are the two ways to minimize or avoid data integrity issues?

Selecciona una o más de las siguientes respuestas posibles:

  • Do not persist values that are derivable such as counts and categorizations and that are subject to change

  • Avoid using properties that represent a version or as-of-date

  • Store critical data within multiple tables to prevent data loss

  • Follow the single source of truth principle (SSOT)

Explicación

Pregunta 25 de 89

1

What are two key benefits of using a Pega industry foundation data model?

Selecciona una o más de las siguientes respuestas posibles:

  • The industry foundation provides data pages that separate business logic from the source of the data (interface)

  • Provides a robust starting point for data properties and classes

  • The industry foundation data model can replace the customer's data model

  • The industry foundation provides data pages that consolidate both business logic and the source of the data (interface)

Explicación

Pregunta 26 de 89

1

What are three different ways to accommodate temporal data?

Selecciona una o más de las siguientes respuestas posibles:

  • Use a custom rule

  • Use a data class with an as-of date property

  • Declare the data class as abstract

  • Leverage the History-Rule class

  • Use a data class with a version property

Explicación

Pregunta 27 de 89

1

How is polymorphism implemented when defining a data relationship field type during data modelling?

Selecciona una de las siguientes respuestas posibles:

  • Map a field type to a class at design-time and allow its actual type to be determined by Direct inheritance at runtime

  • Map a field type to an abstract class at design-time and allow its actual type to be determined at runtime

  • Map a field type to a class at design-time and allow its actual type to be determined by Pattern inheritance at runtime

  • Map a field type to a concrete class at design-time and allow its actual type to be determined at run time

Explicación

Pregunta 28 de 89

1

Which of the following is true about data classes?

Selecciona una de las siguientes respuestas posibles:

  • Persisting a derived value, such as a date-dependent historical price, is acceptable for performance reasons provided it is reproducible

  • Every data class should be defined at the Enterprise layer under Org-Data-, then extended to higher layers

  • Reference data must be embedded within a case's BLOB

  • A reference data class must not possess a BLOB column

Explicación

Pregunta 29 de 89

1

Which of the following statements best describes data model design?

Selecciona una de las siguientes respuestas posibles:

  • It is a discussion on organizing and designing the data

  • It is a discussion on operations performed on the data while working on a case

  • It is a discussion on operations performed on the data

  • It is a discussion on designing the data but not organizing the data

Explicación

Pregunta 30 de 89

1

What is the primary difference between push routing and pull routing?

Selecciona una de las siguientes respuestas posibles:

  • The behavior of push routing is configured in Rule-System-Settings, and pull routing is not

  • Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing

  • Push routing activity names begin with "To" and pull routing activity names begin with either "Get" or "Find"

  • The security type value for push routing activities is "Route" and the security type value for pull routing activities is "Activity"

Explicación

Pregunta 31 de 89

1

After deploying a flow change to production which affects in flight cases, which three activities can be used to avoid orphaned assignments?

Selecciona una o más de las siguientes respuestas posibles:

  • pxRestartStage

  • pxAdjustSLA

  • OpenAndLockWork

  • SetTicket

  • pxRestartRun

Explicación

Pregunta 32 de 89

1

A Low code developer can select which tow of the following participants that are associated to user account within the application?

Selecciona una o más de las siguientes respuestas posibles:

  • Reporting manager

  • Org Unit manager

  • Workgroup manager

  • Current user

Explicación

Pregunta 33 de 89

1

Which of the following techniques is the most recommended for handling changes to processes when there are existing open cases in production?

Selecciona una de las siguientes respuestas posibles:

  • There is no recommended approach, as a best practice, you should never modify existing processes once deployed to production

  • There is no ideal technique as every approach has advantages and disadvantages, the best approach depends on the requirements and the environments

  • The recommended approach is to circumstance the flow and case type rules and use tickets to control processing of existing assignments

  • The recommended approach is to require users to switch between the old and new versions of the processes by switching between application versions

Explicación

Pregunta 34 de 89

1

A case is routed to a work queue after creation in a Fraud application. The fraud analyst picks-up the work using GetNextWork functionality. If the fraud analyst cannot complete the assignment, the analyst clicks Cancel so that another fraud analyst can work on the assignment. Which item can be configured to implement the above requirement?

Selecciona una de las siguientes respuestas posibles:

  • GetNextWorkCriteria

  • Assign-Workbasket.GetNextWork

  • MoveToWorkList

  • GetNextWork_MoveAssignmentToWorklist

Explicación

Pregunta 35 de 89

1

An existing process uses an integrator shape to exchange data with an external system.
Which of the following flows is used to send email correspondence for exception that occur with the integrator shape?

Selecciona una de las siguientes respuestas posibles:

  • ConnectionProblem

  • FLowProblems

  • pzStageProblems

  • ProblemFlow

Explicación

Pregunta 36 de 89

1

What are the three ways that you change the Get Next Work priorization without customizing the GetNextWork and GetNextWorkCriteria rules?

Selecciona una o más de las siguientes respuestas posibles:

  • Adjust the assigment urgency

  • Override the ToWorklist routing activity

  • Increase case urgency

  • Update operator skills

  • Override one or more GetNextWork related application settings rules

Explicación

Pregunta 37 de 89

1

Which three of the following options are flow-related assignment properties that can be used to identify assignments for cases in flight?

Selecciona una o más de las siguientes respuestas posibles:

  • pxTaskName

  • pyFlowType

  • pyLockInterval

  • UrgencyAdjust

  • pyInterestPageClass

Explicación

Pregunta 38 de 89

1

A process with three assignments exists in production. After redesign, one of the assignments is removed. After the deployment, in flight cases should use the old assignment for processing

Which one of the following approaches can be used for the above requirement?

Selecciona una de las siguientes respuestas posibles:

  • Processing existing assignments in parallel with the new flow

  • Switching the application version of in flight cases

  • As-of-date circumstancing the flow

  • Moving existing assignments

Explicación

Pregunta 39 de 89

1

Which two of the following routing activities leverage the @pickBalancedOperator() function?

Selecciona una o más de las siguientes respuestas posibles:

  • ToSkilledGroup

  • ToWorkGroup

  • ToSkilledWorkbasket

  • ToLeveledGroup

Explicación

Pregunta 40 de 89

1

You need to automate a claim adjudication process in which files containing claims are parsed, verified, adjudicated. Claims which pass those initial steps are automatically created for further processing. A single file containing up to 1,000 claims is received daily before 5:00 PM. Claim verification is simple and takes a few milliseconds, but claim adjudication might take up to five minutes. Which two design options best fit for this solution?

Selecciona una o más de las siguientes respuestas posibles:

  • Create Job Scheduler to fetch all the claims with status as Pending-Adjudication and process for calculation

  • Create an advanced agent to identify all the cases for adjudication with status as Pending-Adjudication

  • Create a Queue Processor to perform the calculation, use "Run in Background" to call the Queue Processor, pause the case processing, and wait for the Queue Processor to complete processing

  • In an activity, invoke the Queue-For-Processing method against each claim

  • Create a standard agent to perform the case processing and calculation

Explicación

Pregunta 41 de 89

1

What are the two reasons why you tune some of the Pega out-of-the-box default agents in a production environment?

Selecciona una o más de las siguientes respuestas posibles:

  • The agent is preconfigured to run at an optimal time by default

  • The agent runs based on node classification

  • The agent runs more frequently than needed

  • The agent should not run in production

Explicación

Pregunta 42 de 89

1

In which situation do you consider calling external services asynchronously?

Selecciona una de las siguientes respuestas posibles:

  • When the response may return an error condition

  • When the response is required exactly after one hour

  • When the response is not immediately required

  • When the response is immediately required

Explicación

Pregunta 43 de 89

1

In which two scenarios the access group context can be changed for Queue Processors?

Selecciona una o más de las siguientes respuestas posibles:

  • Queue-For-Processing

  • Run immediately

  • Queue Schedule

  • Run in background

Explicación

Pregunta 44 de 89

1

By default, queue processors run in the security context of which requestor type?

Selecciona una de las siguientes respuestas posibles:

  • App

  • Background

  • AsyncProcessor

  • System Runtime Context

Explicación

Pregunta 45 de 89

1

ABC Company is a distributor of discount wines and uses Pega Platform for order tracking. There are up to 100 orders per day, with up to 40 different line items in each order specifying the product and quantity. There are up to 5,000 varieties of wines that continuously change over time as new wines are added to and dropped from the list. ABC Company want to extend the functionality of the order tracking application to determine recent hot-selling items by recording the top 10 items ordered by volume each day. This information is populated in a table and used to ease historical reporting. Select a design solution to support this

Selecciona una de las siguientes respuestas posibles:

  • The job scheduler should leverage a report to easily retrieve and sort the number of items ordered in a day and a record values in the historical table

  • Create an advanced agent to identify the list of orders to be processed

  • Create a standard agent to perform the orders to be processed

  • Use a queue processor to identify the list of orders to be processed

Explicación

Pregunta 46 de 89

1

In asynchronous service processing, which rule decides the queuing and dequeuing option?

Selecciona una de las siguientes respuestas posibles:

  • Connect response processor

  • Connect request processor

  • Service request processor

  • Service response processor

Explicación

Pregunta 47 de 89

1

When integrating with multiple independent services with long response times, which option can improve user experience?

Selecciona una de las siguientes respuestas posibles:

  • Use a spin-off subflow

  • Use a subcase

  • Use the run-in-parallel option

  • Use the Append and Map to action in a data transform

Explicación

Pregunta 48 de 89

1

As part of an underwriting process, the application must generate a risk factor for a loan and insert the risk factor into the Loan case. The risk factor generation is an intensive calculation that requires several minutes to run. The calculation slows down the environment. You want to have all risk factor calculations run automatically between the hours of 10:00 PM and 6:00 AM to avoid the slowdown during daytime working hours. Which two design options best fit for this solution?

Selecciona una o más de las siguientes respuestas posibles:

  • Use standard agent to process the queued Loan cases

  • Use a standard queue processor to perform the calculation, pause the case until 10 PM and include a step in the flow to queue the case for the queue processor

  • Use an advanced agent to fetch and process the Loan Risk factors

  • Use a delayed dedicated queue processor and set the DateTime for processing to 10 PM using the run in background shape

  • Use a job scheduler to fetch all the Loan cases with status Pending-RiskCalculation and then calculate risk factor and call Resume Flow

Explicación

Pregunta 49 de 89

1

Which two of the following actions need to be configured for a job scheduler activity?

Selecciona una o más de las siguientes respuestas posibles:

  • Transaction management

  • On which node to run

  • Record locking

  • System runtime context

Explicación

Pregunta 50 de 89

1

Which three statements are true regarding attribute-based access control (ABAC)?

Selecciona una o más de las siguientes respuestas posibles:

  • Must reference at least one type of RBAC rule to enforce security

  • Access Control Policy rules cannot be turned off once defined

  • Allows only certain properties within a class to be masked

  • Does not need to reference role-based access control (RBAC) rules to enforce security

  • Does not support encryption at the property level

  • Possible to prevent an Access Control Policy from being overridden

  • The Applies-To class for every rule used by an Access Control Policy Rule must extend either Work- or Data-

Explicación

Pregunta 51 de 89

1

Which two of the following security risks can be identified by the Rule security analyzer?

Selecciona una o más de las siguientes respuestas posibles:

  • Custom-written Java code

  • Unsecured rulesets or unlocked ruleset versions

  • Properties with incorrect type

  • Vulnerabilities in stream rules

Explicación

Pregunta 52 de 89

1

Which access is granted if there are several dependent access roles defined for a dependent access role?

Selecciona una de las siguientes respuestas posibles:

  • Only the most generic dependent role is considered

  • Only the most specialized dependent role is considered

  • All dependent role names are considered and the conditions are joined with OR

  • All dependent role names are considered and the conditions are joined with AND

Explicación

Pregunta 53 de 89

1

Select the best practices that can help minimize security vulnerabilities in the custom HTML rule

Selecciona una o más de las siguientes respuestas posibles:

  • Use of hidden elements (type=hidden)

  • Minimize the use of mode=literal

  • Use the StringUtils.crossScriptingFilter method when using parameters in Pega Platform reference tag

  • Use dynamic SQL statements instead of prepared statements to prevent possible SQL injection

  • Use the SafeURL function to generate Pega Platform request URLs in custom JavaScript

Explicación

Pregunta 54 de 89

1

What are the supported Rule Security Mode settings on the access group which helps enforce a deny first policy?

Selecciona una o más de las siguientes respuestas posibles:

  • Reject

  • Warn

  • Accept

  • Deny

  • Allow

  • Approve

Explicación

Pregunta 55 de 89

1

Which three of the following application rule properties can you use within an access when rule to restrict access between applications hosted in the same database and sharing the same work and assignment table?

Selecciona una o más de las siguientes respuestas posibles:

  • pyOrigDivision

  • pyOwningOrganization

  • pyOwningUnit

  • pyOrigOrg

  • pyOwningDivision

  • pyOrigOrgUnit

Explicación

Pregunta 56 de 89

1

By default, Queue Processors run in the security context of the which requestor type?

Selecciona una de las siguientes respuestas posibles:

  • Syncprocessor

  • AsyncProcessor

  • Background

  • Batch

Explicación

Pregunta 57 de 89

1

Which authorization model do you use to implement the data privacy requirements of the European Union's General Data Protection Regulation (GDPR) and similar regulations?

Selecciona una de las siguientes respuestas posibles:

  • Attribute-based access control (ABAC)

  • Role-based access control (RBAC)

  • Client-based access control (CBAC)

  • Privileged based access control (PBAC)

Explicación

Pregunta 58 de 89

1

Select three best practices that can protect against the cross-site scripting (XSS) attacks

Selecciona una o más de las siguientes respuestas posibles:

  • Filter all inputs

  • Write custom JavaScript

  • PublicAPI methods for XSS filtering

  • Filter HTML and XML outputs

  • PrivateAPI methods for XSS filtering

Explicación

Pregunta 59 de 89

1

Select the four authentication protocols supported by Pega

Selecciona una o más de las siguientes respuestas posibles:

  • SAML 2.0

  • PRSecuredBasic

  • Token credentials

  • Session Management

  • PRBasic

  • Basic credentials

  • OpenID Connect

Explicación

Pregunta 60 de 89

1

XYZ Corp orders office supplies through multiple suppiers. XYZ Corp wants to see detail about the least expensive line items purchased through each supplier. XYZ has Order cases that have LineItem subcases. LineItem detail is stored in a separate table. Which of the following approaches should be used as part of the solution?

Selecciona una de las siguientes respuestas posibles:

  • Define a subreport that obtains supplier ID and min(Price) from the line item table and within the main report query the line item table joining to the subreport by product ID

  • Define a subreport that obtains supplier ID and max(Price) from the line item table and within the main report query the line item table joining to the subreport by supplier ID

  • Define a subreport that obtains supplier ID and min(Price) from the line item table and within the main report query the line item table joining to the subreport by supplier ID

  • Define a subreport that obtains supplier ID and max(Price) from the line item table and within the main report query the line item table joining to the subreport by product ID

Explicación

Pregunta 61 de 89

1

A report must have a list of all operators with the following columns: Operator Last Name, Operator First Name, Count of Assignments. What report is best suited for this requirement?

Selecciona una de las siguientes respuestas posibles:

  • Summary Report in the Operator class

  • Summary Report in the Worklist Assignment class

  • List Report in the Operator classs with a subreport

  • List Report in the Worklist Assignment Class

Explicación

Pregunta 62 de 89

1

Which of the following statements is true about reports database in Pega?

Selecciona una de las siguientes respuestas posibles:

  • Pega automatically replicates data on to Reports database schema

  • A table in a reports database need not have the same structure (columns, etc.) as its counterpart table in the PegaRULES database

  • Reports database schema and Pega database schema must be on the same database server

  • A table in a reports database must have the same structure (such as columns) as its counterpart table in the PegaRULES database

Explicación

Pregunta 63 de 89

1

Which JOIN condition is the most efficient in a report definition?

Selecciona una de las siguientes respuestas posibles:

  • Only include matching rows

  • Only include unmatched rows

  • Include all rows in joined class

  • Include all rows

Explicación

Pregunta 64 de 89

1

What are two issues that can result if large data sets are generated by a report and sent to another user?

Selecciona una o más de las siguientes respuestas posibles:

  • Hardware failure

  • Testing issues

  • Out-of-memory issues

  • Network issues

Explicación

Pregunta 65 de 89

1

Which of the following is a benefit of table partitioning?

Selecciona una de las siguientes respuestas posibles:

  • Take less space for storage

  • Improve the query performance

  • Improve guardrail score

  • Can create index automatically for better results

Explicación

Pregunta 66 de 89

1

Which of the following best describes the function of BIX?

Selecciona una de las siguientes respuestas posibles:

  • To extract Pega data for loading into a data warehouse

  • To extract non-Pega data for loading into Pega

  • To configure reports on both Pega and non-Pega data

  • To transform data within the Pega database

Explicación

Pregunta 67 de 89

1

Which column can be removed from Declare Index tables to improve performance?

Selecciona una de las siguientes respuestas posibles:

  • pxPvStream

  • pwPvStream

  • pyPvStream

  • pzPvStream

Explicación

Pregunta 68 de 89

1

Which of the following setups most likely requires the use of a subreport?

Selecciona una de las siguientes respuestas posibles:

  • Columns-Operator Name, Operator Division, Count of Purchase Requests created, 1 row for every operator excluding Purchase Requests being audited

  • Columns-Operator Name, Count of Purchase Requests created, 1 row for every operator

  • Columns-Operator Name, Operator Division, 1 row for every operator

  • Columns-Operator Name, Operator Division, Count of Purchase Requests created, 1 row for every operator

Explicación

Pregunta 69 de 89

1

Which report definition data access method should be used to include Work Parties?

Selecciona una de las siguientes respuestas posibles:

  • Association

  • Join

  • Declare index

  • Sub Reportt

Explicación

Pregunta 70 de 89

1

Design teams are primarily responsible for user experience

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 71 de 89

1

Good UX design can save a company money because it helps define and scope a team's work

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 72 de 89

1

While designing an application for large set of users working across regions on a large set of data, which three of the following points have to taken into consideration to improve the user experience?

Selecciona una o más de las siguientes respuestas posibles:

  • Capture all the data required from user in a single form

  • Leverage asynchronous and background processing

  • Leverage case management to divide complex cases

  • Use the deferred data loading technique

  • Maximize server-side expressions, calculations, and validation

Explicación

Pregunta 73 de 89

1

Business-to-Consumer (B2C) apps tend to focus on a specific business process

Selecciona uno de los siguientes:

  • VERDADERO
  • FALSO

Explicación

Pregunta 74 de 89

1

For which three conditions are client-side expressions better than the server-side expressions?

Selecciona una o más de las siguientes respuestas posibles:

  • Edit-Validate

  • Required conditions

  • Obj-Validate

  • Disabled conditions

  • Visibility conditions

  • Edit-Input

Explicación

Pregunta 75 de 89

1

When do you perform usability testing?

Selecciona una de las siguientes respuestas posibles:

  • Conducted periodically throughout the user acceptance testing phase

  • Conducted periodically throughout the design phase

  • Conducted periodically throughout the software development life cycle

  • Conducted at the end the development phase

Explicación

Pregunta 76 de 89

1

Usability testing is a method for determining how easy an application is performed by the

Selecciona una de las siguientes respuestas posibles:

  • developer

  • application user

  • business architect

  • project manager

Explicación

Pregunta 77 de 89

1

While the user is busy reading a screen or completing another task, the application can perform required tasks in another requestor session, apart from the user's requestor session. Which two tasks can improve the user experience?

Selecciona una o más de las siguientes respuestas posibles:

  • Use synchronous connectors

  • Use defer load

  • Use large data sets

  • Use Load-DataPage method

Explicación

Pregunta 78 de 89

1

Autocomplete controls negatively impact the user experience if

Selecciona una o más de las siguientes respuestas posibles:

  • the potential result set is larger than 50 rows

  • if all the results in the list end with the same three characters

  • the potential result set is larger than 100 rows

  • if all the results in the list start with the same three characters

Explicación

Pregunta 79 de 89

1

According to Nielsen, at what stage does iterative design first become a part of company culture?

Selecciona una de las siguientes respuestas posibles:

  • Managed usability

  • Systematic user-centered design process

  • Integrated user-centric design

  • Skunkworks

Explicación

Pregunta 80 de 89

1

Which two of the following items are consistent with branch development?

Selecciona una o más de las siguientes respuestas posibles:

  • Performing merges

  • Using a customized rule check-in approval process

  • Bypassing conflict detection

  • Conducting reviews

  • Versioning access groups

Explicación

Pregunta 81 de 89

1

What are the four developer activities in DevOps Release pipeline?

Selecciona una o más de las siguientes respuestas posibles:

  • Unit testing

  • Testing new features

  • Configure toggles

  • Accepting the software and deploying to production

  • Sharing changes with other developers

  • Making sure existing features still work as expected

  • Ensuring changes do not conflict with other developer's changes

Explicación

Pregunta 82 de 89

1

Which two of the following items are normally performed when implementing a custom guardrail warning?

Selecciona una o más de las siguientes respuestas posibles:

  • Use a customized rule check-in approval process

  • Override the Embed-Warning.ShowWarningOnForm decision tree

  • Use the @baseclass.pxAddGuardrailMessage activity

  • Override the @baseclass.CheckForCustomWarning activity

Explicación

Pregunta 83 de 89

1

Which load testing tool do you recommend to the client?

Selecciona una de las siguientes respuestas posibles:

  • Performance Analyzer

  • Any client-preferred web application load-testing tool

  • Loadrunner

  • JMeter

Explicación

Pregunta 84 de 89

1

Which two of the following tools can be used to determine how to best address rule conflicts?

Selecciona una o más de las siguientes respuestas posibles:

  • Compare Rules

  • Live UI

  • Performance Analyzer

  • Alert logs

  • Merge branch wizard

Explicación

Pregunta 85 de 89

1

Which two of the following items best describe technical debt?

Selecciona una o más de las siguientes respuestas posibles:

  • Allowing only carefully reviewed and thoroughly tested changes to move through a release pipeline

  • Pattern of allowing low-quality features into your production environment

  • You spend more time fixing bugs than working on new features that add business value

  • The debt incurred due to postponing the implementation of a technical requirement

Explicación

Pregunta 86 de 89

1

What are the three end-user activities in a DevOps Release pipeline?

Selecciona una o más de las siguientes respuestas posibles:

  • Unit testing

  • Testing new features

  • Accepting the software and deploying to production

  • Ensuring changes do not conflict with other developer's changes

  • Sharing changes with other developers

  • Making sure existing features still work as expected

Explicación

Pregunta 87 de 89

1

What two benefits do you receive by running appropriate tests at each stage of a release pipeline?

Selecciona una o más de las siguientes respuestas posibles:

  • Fewer design issues within the application

  • Reinforcement of testing best practices

  • Better performance

  • Timely feedback

Explicación

Pregunta 88 de 89

1

Which statement is true about Guardrail wanings?

Selecciona una de las siguientes respuestas posibles:

  • A Guardrail warning prevents the role from saving

  • Only one Guardrail warning is shown on the rule form

  • Guardrail warnings are stored in the pc_rule_declare database table

  • A rule with a Guardrail warning can be executed

Explicación

Pregunta 89 de 89

1

In which two situations do you typically use rule check-in approval?

Selecciona una o más de las siguientes respuestas posibles:

  • To coordinate efforts of a large development team

  • When business logic requires a manager to review a case

  • To track interface changes for connectors

  • To control changes to a framework application

Explicación