Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Application Settings allow you to____________.

A.

simulate data in an environment for testing purposes

B.

automate the application migration process

C.

execute connectors in parallel to improve performance

D.

store references to an external system connected to an application

If a customer reports an issue with their order, an Investigation case is created. All investigation cases are higher priority than other case types.

What configuration supports this requirement?

A.

Create a service-level agreement (SLA) rule and ensure that the assignment is ready immediately.

B.

Create a service-level agreement (SLA) rule and increase the initial urgency.

C.

Increase the initial urgency on the case type settings.

D.

Configure an optional action to enable manual changes to case urgency.

You configure a child case to override the locking strategy of the parent case. The parent case has a time-out value of one hour.

Which time-out value option is recommended for the child case?

A.

Set the Access time-out value equal to the parent case time-out value.

B.

Set the Access time-out value less than the parent case time-out value.

C.

Set the Access time-out value greater than the parent case time-out value.

D.

The Access time-out value on the child case cannot be changed.

Which two actions do you perform when using the Performance Analyzer (PAL) to ensure that you obtain accurate performance data? (Choose Two)

A.

Run the process to completion first to perform needed rule assembly and avoid skewed results.

B.

Capture PAL readings after significant changes to a process to identify any performance impact.

C.

Capture a PAL reading for a process with good performance to establish a benchmark for comparison.

D.

Run PAL as an end user to account for any performance differences due to the portal itself.

A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.

♦ Patients access cases on a read-only basis.

♦ Patients can only access their own cases.

♦ Doctors and nurses can modify cases throughout the case life cycle.

♦ Only doctors are allowed to write prescriptions.

What two steps, when performed together, allow you to ensure that patients can read, but not edit, cases? (Choose Two)

A.

Configure an Access of Role to Object rule with the open case action set to 5.

B.

Configure an Access Role to Object rule with the open case action set to 1.

C.

Configure an access control policy condition to test whether the user is a patient.

D.

Create an access group unique to patients.

Which two statements are valid about configuring Pega Web Mashup? (Choose Two)

A.

Only create one DIV element in the hosting web page for each Pega gadget.

B.

Add a list of trusted domains in your applications in which you want to use the mashup.

C.

Use the Integration wizard to generate mashup code for use in other systems.

D.

Keep the original names of default actions in the mashup code to prevent security risks.

You are analyzing application performance and identify a data transform exceeding preferred performance parameters. Which performance tool do you use to help troubleshoot the issue?

A.

Performance Profiler

B.

Database Trace

C.

Performance Analyzer (PAL)

D.

Tracer

A developer has identified resource-intensive queue processors as the source of performance issues that application users are experiencing.

Which two actions do you perform to resolve the performance issues? (Choose Two)

A.

Associate the queue processors with the appropriate node types.

B.

Select the Include in background processing option on the application rule.

C.

Configure the queue processors to run multiple times a day.

D.

Configure the application nodes with node types.

What are three valid ways to exchange data through a Pega Web Mashup? (Choose Three)

A.

Use an action object configured as a script to perform additional actions on a web mashup gadget.

B.

Use the Javascript function doAction() to set or read data values through the hosting web page.

C.

Use an SQL call to exchange data between the mashup and hosting web page.

D.

Use a queue processor to pass updated attributes to the gadget on the hosting web page.

E.

Use the data-pega-event-onpagedata attribute to configure the default value for the gadget.

You perform a major skim on the ruleset ABC:02-02 to ABC:03-01.

In the Answer area, select the ruleset versions that the skim operation uses.