Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which two tasks are required to build a mobile app from a Pega Platform application? (Choose Two)

A.

Create a certificate set.

B.

Configure access to the Pega Mobile Build Server.

C.

Configure access to Dev Studio.

D.

Set up push notifications to developers.

A Pega Platform™ application has just been integrated with an external data source.

Which of the following tests do you perform to ensure that the integration passes data as expected?

A.

Scenario test

B.

Automation test

C.

Performance test

D.

Unit test

A city resident can report potholes to the Department of Transportation by logging in to a mobile Pega Platform application that utilizes the Pega API.

Which two Pega API interactions do you use to facilitate this? (Choose two.)

A.

Submit the report using POST/cases

B.

Access the related case type to report using GET/casetypes

C.

Update the report using GET/cases

D.

Log into the application using PUT/authenticate

Offline support requires which two configurations? (Choose two.)

A.

Access groups set up to allow offline access to users.

B.

Appropriate case types configured for offline processing.

C.

An authorization activity to manage offline permissions.

D.

A set of privileges to run sections in an offline environment.

Which requirement is a prerequisite for configuring a Pega Web Mashup?

A.

No outstanding Guardrail violations

B.

A web server to test your host page

C.

At least one work queue in your application

D.

At least one Access control policy rule

Which two statements are true about database tables in Pega Platform? (Choose Two)

A.

The PegaRULES database contains rules while PegaDATA contains work instances.

B.

The Database Table rule allows configuration of a connection to a specific table.

C.

The History record table contains a record of when each user logged in to the system.

D.

The report definition rule should only be used against one table for performance reasons.

A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.

♦ Patients access cases on a read-only basis.

♦ Patients can only access their own cases.

♦ Doctors and nurses can modify cases throughout the case life cycle.

♦ Only doctors are allowed to write prescriptions.

Which configuration allows doctors and nurses to modify cases while complying with all identified security requirements?

A.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 5.

B.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 1.

C.

Create a single access role for both doctors and nurses, and set the modify action to 5.

D.

Create a single access role for both doctors and nurses, and set the modify action to 1.

Which two use cases correctly describe controlling access to an attachment category? (Choose Two)

A.

Configure the When condition "IsCurrentStageTesting" to allow users to view an attachment if the rule returns true.

B.

Configure a Visible when condition called "IsDocumentPrivate" to allow users to view an attachment if the rule returns false.

C.

Configure the privilege "DeleteOwn" and assign it to a user so that a user can delete their own attachments.

D.

Configure Client-based access control on the class where the attachment category exists to restrict access to the attachment.

Which two statements describe the role of the cache manifest in a mobile app? (Choose two.)

A.

Allows downloading of rules for offline use with a mobile app.

B.

Provides access to static resources such as HTML files, image files, or JS files.

C.

Enables users to continue interacting with mobile apps while offline.

D.

Supports debugging efforts by providing a run-time view of the rules accessed by the app.

You have identified an activity that does not perform well. You need to find out exactly which steps in the activity are causing the poor performance.

Which tool allows you to identify the cause of the performance issue?

A.

Database Trace

B.

Performance Analyzer (PAL)

C.

Tracer

D.

Performance Profiler