Pass the Pegasystems Certified Senior System Architect PEGACPSSA23V1 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two statements are valid about configuring Pega Web Mashup? (Choose Two)

Options:

A.

Only create one DIV element in the hosting web page for each Pega gadget.


B.

Add a list of trusted domains in your applications in which you want to use the mashup.


C.

Use the Integration wizard to generate mashup code for use in other systems.


D.

Keep the original names of default actions in the mashup code to prevent security risks.


Questions # 2:

Drag the error type on the left to its description on the right.

Question # 2


Questions # 3:

Your application contains the following versions of a service level named AuthorizeClaim.

Question # 3

The application is being updated with a new version of the AccountManage ruleset. As part of the update, the service level is no longer circumstanced for AccountOpen cases. The update must retain the circumstancing for the other case types in the application.

Which option do you use to reset the circumstancing for the AccountOpen case type?

Options:

A.

Copy the non-circumstanced rule to the AccountOpen class and select the base rule option.


B.

Make the circumstanced rules in the AccountOpen class unavailable.


C.

Withdraw the circumstanced rules in the AccountOpen class.


D.

Block the circumstanced rules in the AccountOpen class.


Questions # 4:

An assignment service-level agreement (SLA) is configured with the following details:

♦ Initial urgency: 20

♦ Assignment ready: Timed delay of 1 hour

♦ Goal: 5 hours and increase urgency by 10

♦ Deadline: 8 hours and increase urgency by 20

♦ Passed deadline: 2 hours, increase urgency by 20, and limit events to 5

Assuming no other urgency adjustments, what is the assignment urgency 16 hours after the case reaches the assignment.

Options:

A.

100


B.

130


C.

70


D.

90


Questions # 5:

Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)

Options:

A.

Leverage the standard authentication service IACAuthentication and update the authentication activities.


B.

Add an access group for the application rules that need to be accessed from the external system.


C.

Configure a node-level data page to hold security access information about the external system.


D.

Configure the application permissions by specifying a list of trusted domains in the application rule.


Questions # 6:

Place the steps in the order in which a service processes a request.

Question # 6


Questions # 7:

A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.

♦ Patients access cases on a read-only basis.

♦ Patients can only access their own cases.

♦ Doctors and nurses can modify cases throughout the case life cycle.

♦ Only doctors are allowed to write prescriptions.

What two steps, when performed together, allow you to ensure that patients can read, but not edit, cases? (Choose Two)

Options:

A.

Configure an Access of Role to Object rule with the open case action set to 5.


B.

Configure an Access Role to Object rule with the open case action set to 1.


C.

Configure an access control policy condition to test whether the user is a patient.


D.

Create an access group unique to patients.


Questions # 8:

A view has a part number field that requires the first two characters are letters, and the last four are digits (for example, AB1234).

How do you ensure that the correct pattern is entered when the user exits the field?

Options:

A.

Configure a validate rule on the flow action to validate the field with boolean logic.


B.

Configure an edit validate rule and call it from a validate rule in the relevant flow action.


C.

Configure an edit validate rule and reference it from the property rule for the field.


D.

Configure a validate rule to use input-qualified validation configuration.


Questions # 9:

A developer has identified resource-intensive queue processors as the source of performance issues that application users are experiencing.

Which two actions do you perform to resolve the performance issues? (Choose Two)

Options:

A.

Associate the queue processors with the appropriate node types.


B.

Select the Include in background processing option on the application rule.


C.

Configure the queue processors to run multiple times a day.


D.

Configure the application nodes with node types.


Questions # 10:

Which two situations are likely to negatively impact application performance? (Choose Two)

Options:

A.

A report definition generates report data based on several properties stored in the BLOB.


B.

Business architects have delegated a large number of rules to process owners.


C.

A developer uses an SQL query tool or activities to archive case data before purging tables.


D.

Several applications on the system write cases to the pr_other table in the database.


Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions