Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two benefits does the Search and Reporting Service offer over embedded Elasticsearch? (Choose Two)

A.

Eliminates issues with potential loss of data indices when Util nodes crash.

B.

Improved row-level security.

C.

Independent release cycles for Pega Platform updates.

D.

Helps in connecting with any full-text search engines.

In a flight schedule management application, the initiation of a scheduled flight case triggers both pre-flight check and flight catering service processes. These processes require access to flight information, such as flight number, cabin class, number of seats, departure date and time, while also maintaining process-specific data elements. Which one of the following options best describes the optimal data model for meeting this requirement?

A.

Set Schedule Flight as the parent case type, with the triggered processes as child case types. Store flight data within the Schedule Flight case. This data will then bepropagated to the child cases upon their creation.

B.

Set Schedule Flight as the parent case type, with the triggered processes as child case types. Place flight data in the travel management enterprise layer and create data classes specific to each child case type, inheriting directly from the travel management enterprise layer.

C.

Set Schedule Flight as the parent case type, with the triggered processes as child case types. Place flight data within the Schedule Flight class and develop data classes specific to each child case type.

D.

Set Schedule Flight as the parent case type, with the triggered processes as child case types. Place flight data within the work pool class, allowing all three case types to inherit properties from the work pool class.

How can you configure a flow to resume from the point of failure after an error is resolved?

A.

By using the Resume flow option in the Actions menu.

B.

By using the Ticket shape and setting the ticket name to pyRestartFlow.

C.

By using the Subprocess shape and calling the pyRestartFlow flow.

D.

By using the Assignment shape and setting the assignment type to Resume.

XYZ Corp wants to streamline its business processes across various divisions and units. The goal is to develop a Pega application structure that efficiently uses resourceswhile promoting a modular reuse architecture. Given this scenario, which of the following options is the correct approach?

A.

Create an enterprise application with a framework application structure, and then create the required division and unit applications as implementation application structures.

B.

Create an enterprise application with an implementation application structure. Then, create the required division and unit applications as implementation application structures.

C.

Create an enterprise application with both framework and implementation application structures, and then create the required division and unit applications as implementation application structures on top of the framework structure.

D.

Create separate implementation application structures for each division and unit. Each application communicates with another by using DX APIs.

In the context of software system design and architecture, which two of the following statements accurately describe the Center-out business architecture approach used in Pega applications? (Choose Two)

A.

The Center-out approach avoids the mistakes of the top-down and bottom-up approaches to deliver customer and business outcomes quickly and sustain the architecture into the future.

B.

The Center-out approach focuses on designing applications specific to channels of interaction, which often leads to the implementation of the same presentation layer logic multiple times.

C.

The Center-out approach focuses on Microjourney objectives, identifies when engagement with a channel is needed to complete a step, and determines what data isnecessary to complete a step or updates on the completion of a step.

D.

The Center-out approach designs product-centric implementations, and each system has its own view of the data used by its applications.

What is the main difference between a Data Flow and a Queue Processor?

A.

Queue Processors can process a single item immediately, while Data Flows cannot.

B.

Data Flows can process data asynchronously, while Queue Processors cannot.

C.

Data Flows can be scheduled to run at specific times, while Queue Processors cannot.

D.

Queue Processors can process large volumes of data, while Data Flows cannot.

A claims adjuster is working through a backlog of cases using a newly updated Pega insurance application. The adjuster is tasked with entering detailed information into a digital claims form for each case. However, as they proceed from one input field to another, they encounter noticeable delays in data rendering, and occasionally, the application becomes unresponsive, significantly slowing down their workflow. Given this situation, which two of the following are likely causes for the poor user experience observed by the claims adjuster? (Choose Two)

A.

The Use single page option is active for the data pages that are responsible for rendering the claims form, which might affect performance.

B.

The application retrieves a larger set of data from the system of record than is necessary for the claims form.

C.

The Reload once per interaction option is not active for data pages at the requestor and thread levels, which leads to unnecessary data reloads.

D.

The application pauses to wait for data fetched through integrations instead of processing these data fetches in the background.

You are a Lead System Architect working on a booking application for a travel agency. You want to send email notifications to different participants (such as customers or sales coordinators) with custom messages based on their roles. You also want to ensure that the email-sending process does not affect the performance or responsiveness of the application. Which design option would you choose to implement this requirement?

A.

Standard agent

B.

Standard queue processor

C.

Advanced agent

D.

Job scheduler

The ABC trip planner company offers a variety of services, for example, hotel bookings, flight bookings, and train bookings, all on a single platform. All the services offered havetheir invoice processing managed by a dedicated team of accounting specialists from the XYZ financial accounting organization. Every booking made by a customer creates a "Booking" case, which manages the booking of the required service. An "Invoice" case is also created for the verification and validation of all payments to the various stakeholders involved. For security reasons, the Invoice case contains limited information and cannot be a child case of Booking. Both are siblings that update each other. Which one of the following is the best possible solution to implement this requirement?

A.

Have a data object that connects both the sibling cases. Use a Job Scheduler that runs every one minute to query records from the data object and update the sibling case as required. Use system context to gain access to the sibling case.

B.

Have a data object that connects both the sibling cases. Use a Job Scheduler that runs every one minute to query records from the data object and update the sibling case as required.

C.

Have a data object that connects both the sibling cases. Use a queue processor (Dedicated/Standard) to process the record for status updates. Update the security context while queuing with the appropriate access group to gain access to the sibling case.

D.

Have a data object that connects both the sibling cases. Use a queue processor (Dedicated/Standard) to process the record for status updates. Use the current operator access group context while queuing to update the case.

A software development company is planning to deploy its application for a new client. The client has unique security concerns and requires full control over their resources. Which architecture would be most suitable for this scenario, considering customization, security, and performance?

A.

Design with the multitenancy architecture.

B.

Define an architecture that uses single tenancy.

C.

Blueprint the application architecture with shared tenancy.

D.

Design with the architecture that defines isolated tenancy.