Prueba De Refuerzo 2

18 Questions | Total Attempts: 18

SettingsSettingsSettings
Please wait...
Prueba De Refuerzo 2

Test


Questions and Answers
  • 1. 
    You want to write all errors detected when loading a data page to a log file. How would you do that?
    • A. 

      Use an existing function in the error handling data transform

    • B. 

      Use the error handling flow.

    • C. 

      Use a transition condition.  

    • D. 

      Invoke the error handler from the post processing activity in a data page.

  • 2. 
    An agent runs every day at 7:00 A.M. You have been asked to update the agent so that it runs once every 300 seconds. How would you modify the agent schedule to meet this requirement?
    • A. 

      Change the Periodic pattern to Recurring. Open the Parameters dialog and update the schedule.

    • B. 

      Change the Recurring pattern to Periodic and enter the Interval value.

    • C. 

      Keep the Periodic pattern. In the Parameters dialog, update the schedule. 

    • D. 

      Keep the Recurring pattern and update the Interval value.  

  • 3. 
    You have configured an agent to automatically send correspondence. The agent runs in standard mode using AQM. As of the last agent run, entries failed to commit and the correspondence was not sent. Which two approaches could you take to troubleshoot the issue? (Choose Two)
    • A. 

      Open the Requestor Management screen in SMA, select the requestor with a waiting message, and run the Tracer. 

    • B. 

      Open the Requestor Management screen in SMA, select the requestor with a waiting message, and display the error message and stack trace information.

    • C. 

      Open the Broken Process queue, select an item, and run the Tracer.

    • D. 

      Open the Broken Process queue, select the entry, and view the error message and stack trace information.

  • 4. 
    Which two statements accurately describe the use of a symbolic index? (Choose two.)
    • A. 

      <LAST> sets or retrieves an element value from the end of a value list or page list property.

    • B. 

      <PREPEND> inserts a new element in a value list or page list property as the first element.

    • C. 

      <APPEND> adds an element at a designated location in a value list or page list property. 

    • D. 

      <CURRENT> inserts a new element in a value list or page list property at the currently referenced index.

  • 5. 
    Field values enable you to _________________.
    • A. 

      Customize a list of allowed values for a property based on the context of the property 

    • B. 

      Set default values for a property   

    • C. 

      Test the validity of an input value 

    • D. 

      Define the values used in a circumstance template

  • 6. 
    An order fulfillment process includes a request for quotes from multiple shippers. You want the system to automatically call a quote request subprocess for each vendor. How would you configure your process?
    • A. 

      Add a Subprocess shape for the request subprocess and specify the Spinoff option.

    • B. 

      Add a Split For Each shape and run the request subprocess for each vendor on a page list.

    • C. 

      Add a Split Join shape and run the request subprocess for each vendor on a page list.

    • D. 

      Add a Split For Each step to the case lifecycle and run the subprocess for each vendor on a page list.

  • 7. 
    Which two options do you configure on a portal record? (Choose Two)
    • A. 

      Identify the user role of the type of user who would access the portal.

    • B. 

      Determine which skin to use to apply branding to the portal.

    • C. 

      Change the application(s) available to users.

    • D. 

      Configure the positioning of the navigation pane within the portal. 

  • 8. 
    Select two benefits of adopting a rule delegation strategy. (Choose Two)
    • A. 

      Adopting a rule delegation strategy allows business users and architects to focus on their specific tasks related to application development and maintenance. 

    • B. 

       Adopting a rule delegation strategy allows business users to change business policies more quickly by avoiding long approval processes. 

    • C. 

      Adopting a rule delegation strategy can help lower the overall costs of building and maintaining business applications because fewer architects are required if business users can make changes to the application on their own.

    • D. 

      Adopting a rule delegation strategy can help improve the business' ability to adapt to changing business conditions. 

  • 9. 
    Which two configurations can you use to include access groups into your Product rule? (Choose two.)
    • A. 

      Export the access groups using the Access Manager. 

    • B. 

      Add the access groups to the application record.

    • C. 

      Add the access group to the Product record in the Individual instances to include section.

    • D. 

      Associate the access groups with a ruleset included in the application. 

  • 10. 
    Your application contains a top-level case type named Purchase Request and a Purchaser Order child case. The company has determined that only one user may open and work on a case at one time. However, users working on purchase orders should not lock out users working on the parent purchase request cases. How would you configure the lock settings among the case types?
    • A. 

      Set default locking on purchase requests and set the do not lock the parent option on purchase orders. 

    • B. 

      Set default locking and the do not lock the parent option on purchase orders.  

    • C. 

      Set optimistic locking on purchase requests and the do not lock the parent option on purchase orders.

    • D. 

      Set default locking and the do not lock the parent option on purchase requests. 

  • 11. 
    What two artifacts should you prepare in advance before delegating a rule? (Choose Two)
    • A. 

      An Access Group that has access to the production ruleset 

    • B. 

      An Access Role that has access to the production ruleset

    • C. 

      An unlocked ruleset added to the Application rule as a production ruleset

    • D. 

      A separate Operator ID that has access to the delegated rules 

  • 12. 
    You want to evaluate cases as potential duplicates when the existing cases and the current case have the same create operator. How would you ensure that only cases with the same create operator are evaluated?
    • A. 

      Add a must match condition where the create operator in an existing case is the same as in the current case

    • B. 

      Add a weighted condition using the create operator value in both condition fields, an equals operation, and weight of 0.

    • C. 

      Add a weighted condition using the create operator value, an equals operator, and a weight of 100.

    • D. 

      Add a must match condition using the create operator value and apply a weight of 100.

  • 13. 
    Your application is deployed to the cloud. A data source outside your application populates a data page by using your data access pattern configuration. You receive complaints that the system takes a long time to fetch data each time the case worker accesses information for a different customer. Which approach solves this performance issue?
    • A. 

      Move to local installation because network traffic in cloud deployment is often slow.

    • B. 

      Change snapshot data access method to reference pattern data access method. 

    • C. 

      Fetch only the targeted data from the database each time data is needed so access is faster.  

    • D. 

      Access data page with a predefined key so that, once loaded, data access is faster.

  • 14. 
    For what reason would you configure an Access Deny record?
    • A. 

      To prevent users from updating cases during a particular stage of the case life cycle. 

    • B. 

      To prevent users from deleting attachments to a case.

    • C. 

      To prevent users from performing a specific flow action.  

    • D. 

      To explicitly prevent users from deleting cases to satisfy a company policy. 

  • 15. 
    In which of the following situations would you simulate a data page?
    • A. 

      When the interface definition is not finalizedOption 1

    • B. 

      When the connector is available for the integrationOption 2

    • C. 

      When the data page writes data to the external system  Option 3

    • D. 

      When a large amount of data needs to be simulated Option 4

  • 16. 
    Based on the information in the chart. If you execute the rule when .Dept=Engineering. which version does Pega use?
    • A. 

      01-01-01, .Dept=Engineering

    • B. 

      01-01-35

    • C. 

      01-01-01, None

    • D. 

      01-01-20, .Dept=Engineering

  • 17. 
    You create a report in a work class that displays the assigned operator and task name for each open case. Which two ways can you combine data in the Assign-Worklist class for your report? (Choose Two)
    • A. 

      Use a class join to the Assign-Worklist class. Specify a join filter where the Worklist Assignment association rule is equal to an object identifier in the work class.

    • B. 

      Use a class join to the Assign-Worklist class. Specify a join filter where the pxRefObjectKey in the join class is equal to an object identifier in the work class.

    • C. 

      Use a Worklist Assignment association rule to join to the Assign-Worklist class. Specify a join filter where the pxRefObjectKey in the join class is equal to an object identifier in the work class.

    • D. 

      Use a Worklist Assignment association rule to join the Work class to the Assign-Worklist class.

  • 18. 
    You have configured an agent to automatically send correspondence. The agent runs in standard mode using AQM. As of the last agent run, entries failed to commit and the correspondence was not sent. Which two approaches could you take to troubleshoot the issue? (Choose Two)
    • A. 

      Open the Broken Process queue, select the entry, and view the error message and stack trace information.

    • B. 

      Open the Broken Process queue, select an item, and run the Tracer

    • C. 

      Open the Requestor Management screen in SMA, select the requestor with a waiting message, and display the error message and stack trace information.

    • D. 

      Open the Requestor Management screen in SMA, select the requestor with a waiting message, and run the Tracer.

Back to Top Back to top