Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You want to allow users to use an application on a mobile device, even if the device is not connected to a network.

Which configuration option supports this requirement?

A.

Simulate external data sources when the application is offline.

B.

Source repeating layouts using report definitions.

C.

Configure UI elements to use native controls on mobile devices.

D.

Source drop-down lists using data pages.

Organize the classes and associated rules in the appropriate Enterprise Class Structure (ECS) layer.

Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)

A.

Leverage the standard authentication service IACAuthentication and update the authentication activities.

B.

Add an access group for the application rules that need to be accessed from the external system.

C.

Configure a node-level data page to hold security access information about the external system.

D.

Configure the application permissions by specifying a list of trusted domains in the application rule.

An application contains a flow action with an Apply to: class of TRB-HRApps-Work-Feedback in a locked ruleset. When updating the application, you save the existing flow action into a new minor version of the ruleset this time applied to TRB'HRApps-Work so it can be used by more than one case type.

How do you prevent the application from using the rule in TRB-HRApps-Work-Feedback?

A.

Save an additional new version of the flow action applied to TRB-HRApps-Work-Feedback and set the availability to "Blocked".

B.

Save an additional new version of the flow action applied to TRB-HRApps-Work-Feedback and set the availability to "Withdrawn".

C.

Save an additional new version of the flow action applied to TRB-HRApps-Work-Feedback and set the availability to "Not available".

D.

Save an additional new version of the flow action applied to TRB-HRApps-Work and set the availability to "Final".

Which three mobile device features can you leverage by using Pega Mobile Client? (Choose Three)

A.

Barcode scanning

B.

Text messages

C.

Biometric identification

D.

Push notifications

E.

Phone calls

How do you ensure that only a manager can run a specific flow action?

A.

Add a pre-processing activity to the flow action form to determine whether the user is a manager.

B.

Add a privilege to the flow action form, then add the privilege to a role assigned to the access group for managers.

C.

Add an Access When condition to the flow action to determine whether the user is a manager.

D.

Add a validate rule to the flow action form to determine whether the user is a manager.

You are updating a system of record using a SOAP connector. If the system of record is unavailable, you want to retry after an hour. If it is still unavailable after an hour, a notification should be sent to a system administrator.

How do you implement this requirement?

A.

Implement the logic in the data page's response data transform.

B.

Implement the logic in the connector's error handler flow.

C.

Customize the standard pxErrorHandlingTemplate data transform.

D.

Use a transition condition in the activity step invoking the connector.

As a best practice, in which situation do you use a keyed data page?

A.

A user selects an emoji from a short list that updates often.

B.

A user selects a replacement part from a long list that seldom changes.

C.

A user selects a delivery option from a short list that rarely changes.

D.

A user selects an image from a long list that updates often.

A view has a part number field that requires the first two characters are letters, and the last four are digits (for example, AB1234).

How do you ensure that the correct pattern is entered when the user exits the field?

A.

Configure a validate rule on the flow action to validate the field with boolean logic.

B.

Configure an edit validate rule and call it from a validate rule in the relevant flow action.

C.

Configure an edit validate rule and reference it from the property rule for the field.

D.

Configure a validate rule to use input-qualified validation configuration.

Which three options do you consider when deciding to use post-processing actions on a flow action? (Choose Three)

A.

The effect if the flow action is reloaded

B.

The sequence in which the system runs different actions

C.

The timing of the commit for the flow action

D.

The security setting for the flow action

E.

The potential reuse of the flow action