Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

XYZ Corporate wants to perform extensive analysis on work party information across various case types in real time at any time of the day. At the same time, xyz wants to minimize the impact this analysis has case worker using Pega applications.

Which solution do you recommend?

A.

Invoke BIX to export Index-WorkPartyUri data to the report database.

B.

Impalement a REST Service that persists index-WorkPartyUri data within the report database.

C.

Define additional database indexes against index-WorlParyUri.

D.

Configure the Index-WorkpartyUri Data_admin_DB_table record to write to the reports database.

You need to create custom workspaces for the manager and for the Customer service representative (CSR), Also, you are asked to display some properties in custom formats that arc not supported by Pega.

Which approach satisfies these requirements?

A.

Each access group can use separate portals, harnesses, and sections. Use Specialty Components and use XML to pass data.

B.

Level age the Case Manager and Case Worker as reference points to create new portals, if required. Use Special Components and use JSON to pass data.

C.

Create different harnesses for each user's workspace. New portal rules are not needed. Define Specialty Components and use JSON to pass data.

D.

Identify the functionality required for each portal. Customize the portal either by modifying the section or harness. Use Specialty Components and use XML to pass data.

You deplyed a pega web mashup implementation into production and are using IACAuthentication.

which two action ensure that the external authentication module, and not another source, has validated the user?

A.

In the IACAuthentication service, map a passoword attribute form the LDAP server used by the external

B.

In an IAC authentication activity, add a step to idenify the security token provied by the external authentication module.

C.

in the IACAuthentication service, specify the appropriate bind password used by the host system

D.

In an IAC authentication activity, add steps that return the security token to the external authentication module for verification.

In a product management application, the configuration of a flow rule must be different for two products from the hundreds

of other products.

A Pega COE team has been evaluating the specialization design considerations for this requirement.

Which of the following approaches is best suited to this scenario?

A.

Class specialization is the best approach, because it takes precedence in the rule resolution algorithm and helps to pick up correct flow rule.

B.

Creating two different flow rules appended with the product name is the best design approach.

C.

Application specialization is the best specialization design approach, so that every product can be managed separately.

D.

Circumstancing the flow rule is the best specialization design approach, as it is only for two products.

You are configuring a new version of a data transform that is partially complete. During testing, you want to be able to use previous of the rule.

select the rule configuration that enable you to save ans check in the record with validation error and allows previous versions of the rule to execute.

A.

Set the availability of the record to Not AvailableB. set the status of the record to Template

B.

set the availability of the record to Blocked

C.

set the availability of the record to withdrawn

A local ferry service offers a passenger boat trip that travels from Port A to Port B, and then back again, once a day. Passengers can book tickets using an app, and they often try to make last-minute reservations for the outbound trip. The ferry service wants their app to place a passenger on a waiting list for the first trip, while guaranteeing them a reservation for the second trip.

Which two case design patterns apply to this scenario? (Choose Two)

A.

Limited Availability and Concurrency

B.

Parallel Case Processing

C.

Divide and Conquer

D.

Data Instance First

U+ Bank's marketing department wants to use the always-on outbound approach to send promotional emails about credit card offers to qualified customers. As a part of this promotion, the bank wants to identify the starting population by defining a few high-level criteria in a segment.

For each condition below, select which Two conditions should be defined in Segment and which three conditions should be defined in Engagement policy as best practice.

A queue processor is configured with the value of the Max attempts field is 4, the value of the Initial delay field is 2 minutes and the the value of the Delay factor field is 2 for processing retries.

What is the delay between the second and third attempt, assuming each previous attempt fails?

A.

8 minutes

B.

4 minutes

C.

2 minutes

D.

6 minutes

users complain of difficulty creating a customer service request through facebook massenger. how do you address this issue?

A.

add approximate matches to the response commands for the channel.

B.

add approximate matches to the create case command (s) for the channel.

C.

change the text analyzer configured for the channel.

D.

add response commands to the channel

What are two valid reasons for defining a case type within a case type-specific ruleset? (Choose two)

A.

Case-specific rulesets make it easier to rebase ruleset versions.

B.

Each branch ruleset can be associated to case-specific user stories.

C.

The ruleset can be added to the ruleset stack for multiple applications.

D.

The case type might be converted to a component application in the future.