Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

you are configuring authentication for a pega web mashup implementation.

how do you ensure the host system origin is trusted?

A.

in the authentication service JNDI binding parameters, specify the protocol, host, and port.

B.

in the authentication service spaecify the IACAuthverification activity

C.

in the application definition, specify the protocol, host, and port

D.

in the content security policy record specify the website as allowed

An application include two case types: expense report and purchase requests which two steps are required to enable support for both case type for offline user on a mobile device ?

A.

Configure the application record to enable offline access

B.

Configure the user's access group to enable offline access.

C.

configure both case type to enable offline access

D.

Configure the application to build a custom mobile app

An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner

how do you implement this requirement?

A.

create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.

B.

create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.

C.

create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.

D.

create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access

when a customer submits a credit card dispute, the application connects to an external service to retrieve all transaction made by the customer. the external service returns transactions ordered by date of transaction, in a descending, chronological order when a case worker reviews the dispute the application displays the 10 most recent transactions.

if the case worker does not see the disputed transaction in the list, the case worker can search for additional transaction the caseworker can filter search results on transaction date the transaction amount or the merchant name the search results display the 10 most recent transactions that satisfy the filter criteria. the case worker cannot paginate through the results.

how do you configure the response data transform to satisfy all of the requirements in the scenario?

A.

configure the data transform to copy only the first 10 matching records to a page list property

B.

configure the data transform to copy all of the records to a page list property

C.

configure the data transform to copy all of the records to the data page

D.

configure the data transform to use the first x pagination setting to copy only the first 10 results to the data page

A case can be withdrawn using a local action. You want to restrict the ability to withdraw a

case to the user who created the case or any work group manager of the user. Select three

rule types used in combination to achieve this functionality. (choose three)

A.

Access Deny

B.

Access When

C.

Access Control Policy

D.

Access of Role to Object

E.

Privilege

You are managing distributed, geographically dispersed, development teams A, B and C. Team A is ready to merge changes into their development environment to make available changes to Team B’s Team C’s.

To ensure all development teams are working with the latest version of shared rule base, select and move all of the following tasks to the tasks List Order column and place them in the correct order.

You oversee a medium-size development team. Some of the team members and new to Pega and are working on features in a separate branch.

What are two ways you can ensure that the rules the team creates adhere to best practices? (Choose Two)

A.

Run 1 rarer on each new rule in the branch that new team members check in to identify any failures in rule execution.

B.

Leverage the branch review feature to have senior team members validate the branch contents.

C.

Use Pega Log Analyzer to locate any exceptions in the branch associated with the new team members.

D.

Review the branch quality to identify any rules with guardrail warnings.

You imported a rule-admin-product (RAP) file that contains new features into a user acceptance testing(UAT) environment. Select the option that ensures basic functionality behaves as expected before inviting users to start acceptance testing.

A.

Create a smoke test suite. Run the test suite using the pre-import process.

B.

Create an ad hoc test suite. Run the test suite using the post-import process.

C.

Create an integration test suite. Run the test suite using the Execute Test REST service

D.

Create a regression test suite. Run the test suite using the automation server.

You manage a 30-person development team with members located across the globe.

Which Pega Cloud environment best supports the needs of your team?

A.

Large sandbox

B.

Standard sandbox

C.

Large development instance

D.

Preproduction instance

Identify the two correct statements regarding Localization wizard capabilities. (Choose Two)

A.

Extracts the string values from all application field values, paragraphs, and correspondence records.

B.

Creates field value rules for all labels used in the application.

C.

Automatically sets the locale, base currency, and time zones based on the user's language.

D.

Generates a package for French even though Pega provides an associated language pack.