Las preguntas que encuentras en este formulario son las mismas que se encuentran en la formacion SSA de Pega.
Una vez hayas finalizado la formacion, puedes realizar este cuestionario para entranarte.
Cada dia agrego nuevas preguntas y respuestas conforme voy avanzando en la formacion
The initial application created by the New Application wizard contains a set of rulesets for the application and organizational assets. True False. You create the initial application rulesets using the New Application wizard. Which application ruleset is used for rules related to integration? MyTownAppInt MyTownApp HRApps GogoRoadApp. When configuring application rulesets, what should you consider about ruleset validation? (Choose Two) Ruleset validation does not affect rule resolution at run time but is applied only at design time. The rulesets that contain the application rules are set to Application Validation (AV) mode. Validation mode applies only to major versions of the ruleset. The organizational rulesets created by the New Application wizard are set to Application Validation (AV). Drag each validation mode on the right to the correct mode requirement on the left. Only rules in the ruleset versions that are specified as prerequisites (and their prerequisites) can be referenced from the ruleset. Rules in the ruleset can reference all rules in the rulesets defined in the same application. Ruleset prerequisites cannot be cyclic. If your ruleset does not have any prerequisite ruleset you need to specify the base product ruleset Pega-ProcessCommander as a prerequisite. Rules in the ruleset cannot reference rules outside the current application stack or above the defining application. Rules in the ruleset can reference all rules in rulesets belonging to any built-on application. Which two of the following statements about ruleset lists are correct? (Choose Two) The ruleset list indicates the rulesets that are available to the application for an operator session. The ruleset list indicates the rulesets that are available to the application for all operators. Rulesets at the top of the ruleset list take higher precedence. All rulesets have the same precedence, regardless of their order in the ruleset list. Select two record types that are involved when configuring a production ruleset. (Choose Two) Application Work group Operator Access group. A claims framework contains two rulesets, ClaimsFW and ClaimsFWInt.
An application built on the framework also contains two rulesets, Claims and ClaimsInt.
Which statement is false if all the rulesets are configured as Application Validation? Rules in ClaimsFW can reference rules in Claims Rules in Claims can reference rules in ClaimsFW Rules in ClaimsInt can reference rules in Claims Rules in ClaimsFWInt can reference rules in ClaimsFW. A claims application contains two organizational and two application rulesets.
The organizational rulesets MyCo and MyCoInt are configured as Ruleset Validation,
where the prerequisite for MyCo is MyCoInt
and the prerequisite for MyCoInt is Pega-Platform.
The two application rulesets Claims and ClaimsInt are configured as Application Validation.
Which of the following statements is false? Rules in ClaimsInt can reference rules in Claims Rules in MyCo can reference rules in MyCoInt Rules in Claims can reference rules in MyCo Rules in MyCo can reference rules in Claims. Which statement describes a benefit of parallel development with branches? Developers cannot check in an updated rule until the rule is unit tested. Updated rules are reviewed for guardrail warnings before they can be checked in. A team of developers can implement application functionality without impacting developers in other teams. Developers cannot update rules in rulesets that have been released to production. Team A and Team B are developing features for an insurance application. Team A is assigned a user story to improve the user experience when users enter personal and bank account details. Team B is assigned to build a declare expression to calculate the total premium amount. Both teams used branches for development.
What step does each team need to take before merging their changes to the main application? Both teams must resolve conflicts that the system detects between their branch and the application. Only Team B should resolve conflicts, and Team A can directly merge changes to the main application. Neither team is required to resolve any conflicts and can directly merge the changes to the main application. Only team A should resolve conflicts and team B can directly merge changes to the main application. Which two of the following are prerequisites for creating a branch rule for parallel development? (Choose Two) Save a copy of the original rule into the base ruleset. Create a team application. Create an access group that references the team application. Add developers to the access group. Circumstance the original rule. A branch ruleset is a ruleset that ______________ and __________. (Choose Two) prevent developers from seeing work of all team members is based on another ruleset contains rules that are not in active development is designed for large projects. Which two steps do you perform after you develop branch rules and before you merge a ruleset? (Choose Two) Check in rules to merge Review conflicts and warnings Use DB trace to identify conflicts Check out rules to merge. Pega UI Kit is the most advanced, feature-rich, low-code option for creating a new application in Pega Platform. True False. Which layer of the Enterprise Class Structure (ECS) contains generalized assets that are then extended by specific implementations? Organization Implementation Division Framework. You have a requirement to create an email correspondence that can be reused by other applications. In which two layers of the Enterprise Class Structure could you apply the email correspondence rule? (Choose Two) Implementation Division Pega Platform Organization. What is the purpose of the Enterprise Class Structure (ECS)? ECS is used to alter the performance of the Pega Platform. ECS provides a structure supporting rule reuse. ECS documents industry or enterprise standards that applications must contain. ECS references single-value properties and complex properties. . When preparing for application versioning, it is a best practice to leave all of the RuleSets unlocked. True False. Based on the information given for each patch, when a user runs the application, which rules are used for each patch? Drag the rules to the correct patch. (Choose Three rules per patch) Rule A: 01-01-01 Rule B: 01-01-01 Rule C: 01-01-01 Rule A: 01-01-02 Rule B: 01-01-02 Rule C: 01-01-02 Rule A: 01-01-03 Rule B: 01-01-03 Rule C: 01-01-03 Rule B: 01-01-04. A ruleset contains rules in 01-01-01, 01-01-02, and 01-01-03. Ruleset versions 01-01-02 and 01-01-03 contain primarily updates to existing rules in 01-01-01. The original rules for version 01-01-01 and all rule versions through 01-01-03 are saved in a new 01-02-01 version. This is an example of Skimming. True False. Which description is most accurate for skimming and lock and roll versioning options? Skimming is the most efficient for major and minor updates. Lock and roll is most useful for patches. Pega provides a skimming wizard but not a lock and roll wizard. Skimming saves checked out rules. Lock and roll does not save checked out rules. Skimming carries blocked rules forward. Lock and roll does not carry blocked rules forward. Why is application versioning important? Application versioning preserves prior application versions. Application versioning provides a means to organize applications by priority. Application versioning provides the ability to clone rules. Application versioning provides the ability to version data classes without impacting existing data classes. The lock and roll versioning method ______________ and ____________________. (Choose Two) ensures older versions of application rulesets are preserved unchanged. minimizes the rule data that is carried to a higher version of your application. filters out rules that are unavailable for rule resolution. is used for small changes or patches. . Circumstancing allows you to customize the behavior of your application to address condition exceptions using a single complex rule. True False. Which one of the following statements are true about single variable rule circumstancing? The base rule is created by removing the circumstancing condition from a rule. The base rule is a backup rule in case the circumstanced rule is deleted. The name of the circumstanced rule remains the same as the name of the base rule. A circumstanced rule is always created in the next higher ruleset version. Which two of the following requirements are satisfied by configuring single-variable circumstancing of a rule? (Choose Two) During an auto insurance claim, if a customer is located in Canada, it is required that a collect information form prompts an agent to enter a date of last service. If an expense request exceeds USD1000, it is routed to the Business Manager. If the request exceeds USD10000, it is routed to the Vice President of Finance. Silver-level customers have a guaranteed response time of 24 hours, whereas Gold-level customers have a guaranteed response time of 12 hours. Contractors located in the United States are sent Form 1A, contractors located in Canada are sent Form 1B, and contractors located in the United Kingdom are sent Form 1C. . Circumstancing provides a way to configure a complex rule with numerous permutations as several targeted, less-complex rules. True False. Select and drag the circumstancing tasks to the drop areas, placing them in the correct order. Task #1 Task #2 Task #3. Which of the following statements is true about circumstancing? .OrderDate is not a valid property to circumstance. You need a template for circumstancing on more than one property. Multivariate circumstancing on start date and end date properties cannot also include additional circumstancing on a time property. When a circumstanced rule is withdrawn, rule resolution selects the next non-circumstanced rule in a higher ruleset version. . In which of the following two situations do you use circumstancing? (Choose Two) The sales tax rate changes at the first of next year. Employee PTO accrual rate varies by number of years in service. A new manager is assigned to the team from the first of next month until the end of the quarter. Attach PDF file of expense list to approval request when total amount is more than USD1,000. Format requirements change for postal code address when a user selects United States or Canada. . Which of the following statements is true about the relationship between base rules and circumstanced rules? A base rule is created by removing circumstancing condition from a rule. The name of circumstanced rule remains same as the base rule. A base rule is needed as a backup if a circumstanced rule gets deleted. A new circumstanced rule always gets created in next higher ruleset version. The circumstance template is the rule that defines the properties used to determine if the circumstance is applicable, whereas the circumstance definition defines values. True False. Based on the information below, if you execute the rule when .Dept=Accounting, which version does Pega Platform™ use?
Rule Version Circumstance
01-01-25 None, base rule selected
01-01-35 None 01-01-01, .Dept=Accounting 01-01-30, .Dept=Accounting 01-01-01, None 01-01-25, None, base rule selected. Based on the information below, if you execute the rule when .Dept=Engineering, which version does Pega Platform™ use?
Rule Version Circumstance
01-01-25 None, base rule selected
01-01-35 None 01-01-01, None 01-01-35, None 01-01-20, .Dept=Engineering 01-01-01, .Dept=Engineering. The rule resolution algorithm inputs rule instances and outputs a rule identifier, such as a the rule type and class, to process a case. True False. Choose the correct statement. The rule resolution algorithm removes rule instances from the rule cache when a rule instance is updated. The rule resolution algorithm inherits input from the rule cache to identify a rule instance. The rule resolution algorithm populates the rules cache with appropriate rule instances. Choose the correct statement. When you create new rule instances, the rule instances are added to the rules cache. When you create new rule instances, the key parts of the rule instance are used during rule resolution. When you create new rule instances, the rule resolution process ranks the rule instance against existing rules. Choose the correct statement. Rule resolution applies to the following rule instances: a Customer Information data page, the Product Review section, and the Mortgage Preapproval case type. Rule resolution applies to the following rule instances: the Product Review section, the Employee Review case type, and a new employee operator. Rule resolution applies to the following rule instances: the Account Status declare expression, a Medical Records Request case, and a Customer zip code property. Select the correct statement. During rule resolution, the rule resolution algorithm discards rules that are unavailable and undefined in the class hierarchy. During rule resolution, the rule resolution algorithm considers rules from all major and minor versions of rulesets in the user's ruleset list. During rule resolution, the rule resolution algorithm discards rules with the same rule name and rule type. During rule resolution, the rule resolution algorithm creates a list of all rules that match the rule name. The default rule candidate has no qualifiers and is the first rule to be executed. True False. Based on the information in the table above, if you execute the rule when .Product = Available, which version does Pega Platform use? 02-01-15, .Product = Available 02-01-20, None 02-01-10, .Product = Restricted 02-01-05, .Product = Not Available 02-01-10, .Product = Available 02-01-05, .Product = Available. Which two of the following statements about rule resolution are true? (Choose Two) When a rule is marked as Withdrawn, any rule with the same purpose and a lower version number is not considered. If a rule marked as Blocked is selected during rule resolution, an error message is logged and execution continues. The Availability setting is used to determine if a rule is available for use during rule resolution. To copy a rule, it must be marked as Available. Which two of the following statements are true about the rule resolution process? (Choose Two) The rule purpose takes precedence over the rule availability. If the system finds more than one rule instance during rule resolution, users are provided with a choice of which rule to use depending on context. If a user does not have access to the selected rule, the system sends a message that the rule is not authorized for execution. Rule resolution applies to rules that are instances of classes derived from the Rule- and Work- base classes. Which rule availability setting can you use to force the system to look for an instance of the rule in the next highest class or ruleset? Blocked Available Final Withdrawn. Based on the image, given that Primary Page Class = MyCo-PL-Loan and Clipboard Value of Risk Property = High Risk, which rule executes? None. An error is logged. 2 4 5. Based on the image, given that Primary Page Class = MyCo-PL-Loan and Clipboard Value of Risk Property = "", which rule executes? None. An error is logged. 2 4 5. Can a concrete class be mapped to a database table? True False. Which set of class properties are commonly used to generate reports? Work, Data, Rule @baseclass, Work, Assignment Work, Assignment, and History @baseclass, Assignment, Rule. An online retailer has received feedback about declining product quality. For each month, you want to display the number of orders and the number of one-star rated orders where quality issues are the primary complaint. How do you satisfy this use case? Configure a report that uses an association rule. Configure appropriate report categories. Configure a report that uses a class join. Configure a report that references a subreport. . You create a report that uses data from two classes. Which of the following reporting requirements requires the use of a subreport? Columns to display are: Manager, Name, and Count of operators that report to each manager. Filter by Managers with more than five direct reports. Columns to display are: Operator Name, Operator Division, and Count of Purchase Requests created by the operator. Filter the results by unresolved status. Columns to display are: Operator Name, Last updated Case ID, Last updated Case Status, and Update Date. Columns to display are: Operator Name, Operator Division, Count of Purchase Requests created. You create a report in a work class that displays the assigned operator and task name for each open case. Which two ways can you combine data in the Assign-Worklist class for your report? (Choose Two) Use a Worklist Assignment association rule to join to the Assign-Worklist class. Specify a join filter where the pxRefObjectKey in the join class is equal to an object identifier in the work class. Use a class join to the Assign-Worklist class. Specify a join filter where the pxRefObjectKey in the join class is equal to an object identifier in the work class. Use a class join to the Assign-Worklist class. Specify a join filter where the Worklist Assignment association rule is equal to an object identifier in the work class. Use a Worklist Assignment association rule to join the Work class to the Assign-Worklist class. Which report requires joining classes? A list of all worklist assignments grouped by the operator who is performing the action A list of all child cases showing the work urgency of their parent case A list of all cases created by the operator along with the work status of each case A list of flow actions and average turnaround time, categorized by Performer. An access group includes three access roles.
1. Role A grants users the ability to run reports.
2. Role D does not grant users the ability to run reports.
3. Role O grants users the ability to run reports.
Based on the permissions allocated to the three roles in this access group, which users can run reports? All members of the access group except for members of roles A and O can run reports. All members of the access group can run reports. All members of the access group except for those in role D can run reports. What is the role of privileges in role-based access control? Privileges are used to determine whether a user can use a specific rule. Privileges are used to authenticate users. Privilege are used to grant application access by channel, such as web and mobile. Privileges are used to control core operations such as creating, deleting, or updating cases. Service Agents at a marina belong to two access groups that inherit permissions from different dependent roles: Service Agents inherit permissions from the PegaRULES: User1, and Service Managers inherit from PegaRULES: WorkMgr4.
Application requirements state that Service Agents and Managers can view data in Marina-Service-Data-Painting and Marina-Service-Data-Repair. Only the Service Managers can delete data from Marina-Service-Data-Painting and Marina-Service-Data-Repair.
What is the best approach to implement this requirement? Configure a Privilege record for the delete feature in both Marina-Service-Data-Painting and Marina-Service-Data-Repair and reference the Service Manager user role. Configure an Access of Role to Object (ARO) record in Marina-Service-Data- class to include the Service Manager's delete permissions. Configure an Access Deny record for the delete feature in both Marina-Service-Data-Painting and Marina-Service-Data-Repair and reference the Service Agent user role. Configure the Access of Role to Object (ARO) records on both Marina-Service-Data-Painting and Marina-Service-Data-Repair to include Service Manager's delete permissions. . You want to restrict access to a specific flow action to certain users. Which two steps must you perform? (Choose Two) Add the privilege to the flow action record. Add the privilege to the users’ access group. Add the privilege to a user role that is available to the users’ access group. Override the Access Deny record to the flow action. Which of the following requirements satisfy the inheritence of permissions from parent class? Auditors must have read only access to cases in the Work-Claims-VehicleDamage and Work-Claims-BodilyInjury classes. Users can create cases in Work-Claims-BodilyInjury but not in Work-Claims-VehicleDamage. Managers can edit cases in Work-Claims-VehicleDamage but not in Work-Claims-BodilyInjury classes. Users can modify cases in Work-Claims-BodilyInjury but not in Work-Claims-VehicleDamage. For what reason would you configure an Access Deny record? To prevent users from updating cases during a particular stage of the case life cycle. To prevent users from deleting attachments to a case. To explicitly prevent users from deleting cases to satisfy a company policy. To prevent users from performing a specific flow action. Which of the following two statements about Attribute-based access control (ABAC) are true? (Choose Two) ABAC control access to objects by comparing attributes assigned to users and an objects. Once you disable ABAC, you cannot re-enable it and must use Role-based attribute control (RBAC). ABAC allows you to control access based on a user's membership in access groups. ABAC can leverage inheritance. . Which requirement do you implement with an access control policy? Only an administrator can delete a duplicate address change request. Only a manager can authorize a refund exceeding USD1000. Only a customer service representative can view an unmasked account number. Only a specialized appraiser can provide an appraisal of art for a homeowner’s insurance policy. A case type includes the following security requirement: After a transaction dispute enters the Review stage, only the customer or the case manager assigned to the dispute can cancel the dispute. Before the Review stage, the customer or the customer service representative who created the case can cancel the transaction dispute. Which three types of rules are needed to configure the security requirement? (Choose Three) Privilege Access control policy condition Access control policy Access when When. Which three actions can a developer configure in a GDPR-compliant application for customers to perform? (Choose Three) Access data Rectify data Erase data Share data Aggregate data. You are developing a case type to facilitate online purchases where you want to encrypt the properties associated with the customer's payment information. How do you achieve this? You open the database table associated with the purchase case type. You create a PropertyEncrypt access control policy. You change the property type on all relevant properties to TextEncrypt. You are developing a case type to facilitate online purchases where you want to encrypt the properties associated with the customer's payment information. How do you achieve this? On the PropertyEncrypt access control policy, you list the properties associated with the customer's payment information. On the purchase case type database table, you enable the option to encrypt the entire BLOB column. As a developer for a banking application, you configure a client-based access control (CBAC) rule that has four properties with personally identifiable information: Account ID, Name, Phone number, and Email. Which privilege do you select so that a customer can change their email but cannot delete it? Erase data Rectify data Read data Access data. As a developer for an online shopping application, you decide to encrypt credit card details that customers enter in an order case type. Which data encryption approach do you choose to encrypt the data? Property level Application level Case level Class level. What are two benefits of data encryption? (Choose Two) Data encryption maintains data integrity. Data encryption provides security for data while being stored and transported. Data encryption improves data access time. Data encryption reduces data storage complexity. Which are two principles of General Data Protection Regulation (GDPR)? (Choose Two) Ensure data integrity and confidentiality Share personal data without restriction Process data transparently Maximize personal data collection. In a job application case, applicants must attach their resume as a PDF. Individuals in the human resources (HR) department and members of the interview team can view only the resume file. Which three configurations do you use in combination to achieve this? (Choose Three) Add the IsInterviewer when rule for View permission. Configure the appropriate roles with View permission. Create a Resume attachment category. Enable attachment-level security. Identify the work group for the interview team. Applicants must attach four different files to their passport application: a PDF of a completed application form, a scan of a birth certificate or social security card, a scan of a valid photographic identification, and a scan of a recent photograph. One file of each type must be attached to advance the case to an agent for review and approval. An authorized passport agent can review all attachments only.
How many attachment categories do you create to satisfy this requirement? Two attachment categories, one for application form PDFs and one for scanned documents None, you can use the out-of-the-box PDF and Scanned document attachment categories Four attachment categories, one for each file type One attachment category for all passport application-related files. In a rental application, prospective tenants must attach a bank statement from the past three months. You want to ensure that members of the Rental Agency work queue can view the attachment, but no one can delete attachments.
What two configuration settings, when used in combination on the attachment category, achieve this behavior? (Choose Two) Add the Never when rule and select the Delete any action. Add the RentalAgencyWorkQueue privilege and select the Edit action. Add the Always when rule and select the Delete any action. Add the RentalAgencyWorkQueue privilege and select the View action. Which two of the following statements about Declare OnChange rules are true? (Choose Two) Automatic forward chaining can be achieved using Declare OnChange Rule. An activity is not automatically executed when the specified property changes All processing of a work item can be suspended using Declare OnChange rules. In a Declare OnChange rule, a when condition based on a boolean result can call only one activity. . Which two of the following statements about the Declare OnChange rule are true? (Choose Two) A Declare OnChange rule with the Suspend work object action can use When rules. A Declare OnChange rule provides forward chaining because they are declarative. A Declare OnChange rule with Call data transform action may result in automatic forward chaining. A Declare OnChange rule with the Suspend work object action suspends all work on the server until the Declare OnChange rule is complete. A Declare Onchange activity can call or branch to other activities, but only if they have an activity type of _______. Rule Connect Onchange Assign Activity. Drag each log to the matching scenario. Logs may match more than one scenario. A node was shut down for an update A database query exceeded the performance threshold A login attempt failed due to an incorrect password An attempt to access a third-party service failed due to an incorrect user name. A SECU0006 alert is generated with the message PRPC detected excessive failed login attempts for the user:XXXX from IP:192.168.100.100. Brute force attack prevention measures were invoked. What three pieces of information do the alert ID and message provide? (Choose Three) The alert type The requestor type It is a performance-related alert A description of the alert It is a security-related alert. A user reports that your application requires more than 10 seconds to load and display the contents of a form. The performance threshold for displaying the contents of a form is one second. Which option allows you to determine the cause of the performance issue experienced by the user? The Clipboard tool The PEGA log The Tracer tool The My Alerts display. Each appender records events that match or exceed the specified logging level to a corresponding file log. The PEGA appender records system events such as errors, while the ALERT appender records events that affect performance. true false.