Which requirement is a prerequisite for configuring a Pega Web Mashup?
In MLP2, the business asks you to create a mobile app for an existing Pega Platform application.
Which two of the following actions are required to create the mobile app? (Choose Two)
Which two methods allow you to identify the Pega Platform application type? (Choose Two)
Select the three Pega best practices for developing activities. (Choose Three)
A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.
♦ Patients access cases on a read-only basis.
♦ Patients can only access their own cases.
♦ Doctors and nurses can modify cases throughout the case life cycle.
♦ Only doctors are allowed to write prescriptions.
What two steps, when performed together, allow you to ensure that patients can read, but not edit, cases? (Choose Two)
You should consider using a field value when the list of allowed values is
You are preparing to create a new major version of an application ruleset in which there are multiple minor and patch versions.
How do you create the new ruleset version?
When deploying mashup code in a webpage, which option is necessary to ensure that Pega Platform accepts incoming requests?
In the Answer Area, drag each log name on the left to its intended purpose on the right.
A developer has identified resource-intensive queue processors as the source of performance issues that application users are experiencing.
Which two actions do you perform to resolve the performance issues? (Choose Two)
A view has a part number field that requires the first two characters are letters, and the last four are digits (for example, AB1234).
How do you ensure that the correct pattern is entered when the user exits the field?
When designing reports with multiple data sources, in which two ways is an association rule different from a class join? (Choose two.)
Which two situations are likely to negatively impact application performance? (Choose Two)
A user reports that an application takes five seconds to complete a step and present the next step in a process. Which tool allows you to gather and analyze performance data for the form submission?
A Fulfillment report needs to list the user ID of the employee who packages the items to ship in an Order case. The report provides information from the MyCo-Orders-Work-Ship and Data-Admin-Operator-ID classes.
Which two options independently satisfy the report requirements? (Choose two.)
Several development teams work on different enhancements. The release date for each enhancement is uncertain. Which two options, when performed together, allow each team to keep its work separate? (Choose Two)
A medium-size toymaker wants to fulfill orders received during the peak season in December and process the orders in batches multiple times a day.
How do you implement this use case?
A courier company wants a mobile app to scan and track the parcels collected from remote areas with no internet access.
Which mobile app do you develop to fulfill the requirement?
A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.
♦ Patients access cases on a read-only basis.
♦ Patients can only access their own cases.
♦ Doctors and nurses can modify cases throughout the case life cycle.
♦ Only doctors are allowed to write prescriptions.
Which configuration allows doctors and nurses to modify cases while complying with all identified security requirements?
In an online shopping application, you enable class-level encryption for the entire case type and optimize First Name, Last Name, Social Security number (SSN), Total Cart, and Account Number properties for reporting.
To secure sensitive data, how do you enable property-level encryption for SSN and Account Number?
You are sending information to an external system of record by using a connector. What do you use to implement this requirement?
Which two requirements are supported by Attribute-based access control (ABAC)? (Choose Two)
In the following example, the Homelns, Homelnslnt, and Customer rulesets are configured for application validation. MyCo and MyCoInt are configured for ruleset validation. MyCo lists MyCoInt and Customer as its prerequisites, and the prerequisite for MyCoInt is Pega-ProcessCommander.
Which of the following statements is correct?
Which two statements are valid about configuring Pega Web Mashup? (Choose Two)
You configure a child case to override the locking strategy of the parent case. The parent case has a time-out value of one hour.
Which time-out value option is recommended for the child case?
Which three options do you consider when deciding to use post-processing actions on a flow action? (Choose Three)
Which two statements are valid regarding Pega Web Mashups? (Choose two.)
Which two actions do you perform when using the Performance Analyzer (PAL) to ensure that you obtain accurate performance data? (Choose Two)
Graduate school students create and submit project proposals to their advisors. During the proposal phase, the advisor and the student can each edit the draft proposal.
How do you ensure the advisor and the student can simultaneously edit the proposal, and the application can check the proposal for changes before committing them?
On which type of rule can you configure edit validate rules?
Which three statements about the guardrail score are true? (Choose Three)
The primary purpose of a production ruleset is to allow rules to be
An application contains the class group MyCo-HR-SelfService-Work. There are two classes derived from Work- class:
If a report is created in MyCo-HR-SelfService-Work, what instances will the report return?
How do you enable field-level auditing for properties?
What are the two most common ways to expose your application to an external system? (Choose Two)
If a customer reports an issue with their order, an Investigation case is created. All investigation cases are higher priority than other case types.
What configuration supports this requirement?
Drag the name of the Pega Platform log file appender from the left to the matching use case on the right.
You perform a major skim on the ruleset ABC:02-02-01 to ABC:03-01-01.
In the Answer area, select the ruleset versions that the skim operation uses to copy rules into ABC:03-01-01.
Which two statements about guardrails are true? (Choose Two)
How do you ensure that only a manager can run a specific flow action?
Which three items are generated and displayed in the compliance score of an application? (Choose three.)
As a best practice, in which situation do you use a keyed data page?
A company with multiple applications spanning different business units wants to send a standard confirmation email to customers whenever a case is created.
Which is the appropriate layer of the Enterprise Class Structure (ECS) for the email correspondence?