Which two configurations are required when adding a Split for Each shape to your case life cycle? (Choose Two)
A. Enter a rule that stores the audit note that you want to include in the subprocess
B. Define when the parent process resumes processing
C. Enter the Page List or Page Group property that is the basis of the split
D. Enable users to get back to the subprocess after the case moves forward
Which two configurations can you use to include access groups into your Product rule? (Choose Two)
A. Associate the access groups with a ruleset included in the application.
B. Export the access groups using the Access Manager.
C. Add the access groups to the application definition.
D. Add the access group to the Product record in the Individual instances to include section.
There are five instances of a rule in the rules cache. The only differences between these are the circumstance settings and ruleset version. The operator's access group has access to all ruleset versions. On 1 June 2020, which instance is chosen by rule resolution if .Country = Algeria?
A. SelfService:01-01-03 (Circumstance: None, Base Rule checked)
B. SelfService:01-01-01 (Circumstance: .Country=Algeria)
C. SelfService:01-01-02 (Circumstance: Start Date = 1 January 2020; End Date = 31 December 2020)
D. SelfService:01-01-01 (No Circumstance)
E. SelfService:01-01-05 (No Circumstance)
In the following example, the Homelns, Homelnslnt, and Customer rulesets are configured for application validation. MyCo and MyCoInt are configured for ruleset validation. MyCo lists MyCoInt and Customer as its prerequisites, and the prerequisite for MyCoInt is Pega- ProcessCommander.
Which of the following statements is correct?
A. Rules in MyCo can reference rules in Homelnslnt.
B. Rules in MyCo can reference rules in Homelns.
C. Rules in Customer can reference rules in Homelns.
D. Rules in MyCoInt can reference rules in Customer.
Which three options do you consider when deciding to use post-processing actions on a flow action? (Choose Three)
A. The effect if the flow action is reloaded
B. The sequence in which the system runs different actions
C. The timing of the commit for the flow action
D. The security setting for the flow action
E. The potential reuse of the flow action
In which scenario would a Declare OnChange rule be appropriate?
A. During a nightly backup process, only updated fields are backed up.
B. When a developer changes a view, the change is checked into a development branch.
C. When a user updates their address, the active case is suspended until the address can be confirmed.
D. When a manager approves a case, the case is routed back to the appropriate case worker.
What is the purpose of the Policy Verification landing page when configuring a security solution in Pega Platform?
A. To test if a user has the required access to a case
B. To manually authenticate a specific user on an integrated external database
C. To test if a user's channel-specific password meets defined property requirements
D. To configure mapping of access control attributes
Which two actions do you perform when using the Performance Analyzer (PAL) to ensure that you obtain accurate performance data? (Choose Two)
A. Run the process to completion first to perform needed rule assembly and avoid skewed results.
B. Capture PAL readings after significant changes to a process to identify any performance impact.
C. Capture a PAL reading for a process with good performance to establish a benchmark for comparison.
D. Run PAL as an end user to account for any performance differences due to the portal itself.
Select the three Pega best practices for developing activities. (Choose Three)
A. Keep activities short. Limit your activities to fewer than 15 steps.
B. Limit activity calls to at most three to prevent performance problems.
C. Limit custom Java steps whenever possible.
D. Use only activities to support queue processing and interfaces.
E. Limit the use of activities. Use alternative rule types such as data transforms whenever possible.
Which three mobile device features can you leverage by using Pega Mobile Client? (Choose Three)
A. Barcode scanning
B. Text messages
C. Biometric identification
D. Push notifications
E. Phone calls