Ian Lucas
Quiz by , created more than 1 year ago

All the questions from LSA mission tests on Pega Academy.

1657
0
0
Ian Lucas
Created by Ian Lucas over 3 years ago
Close

Pega Certified Lead System Architect (Tests)

Question 1 of 89

1

Which user type would exclusively use App Studio?

Select one of the following:

  • Lead system architects

  • Low Code developers

  • Technical architects

  • Application developers

Explanation

Question 2 of 89

1

Which of the following statements are true about Specialization layers?

Select one of the following:

  • A specialization layer can be built on only one application

  • A specialization layer can be built on multiple applications

  • A specialization layer must use a framework as a built-on application

  • An implementation cannot be a specialization layer

Explanation

Question 3 of 89

1

Which two of the following statements are true related to Predictive Diagnostic Cloud (PDC) and Autonomic Event Services (AES)?

Select one or more of the following:

  • The AES application only reads data from, and does not communicate back, to the monitored system

  • The PDC application communicates with the monitored system in a two-way fashion

  • The AES application communicates with the monitored system in a two-way fashion

  • PDC only reads data from, and does not communicate back, to the monitored system

Explanation

Question 4 of 89

1

Which two of the following statements are true about building an implementation-only application?

Select one or more of the following:

  • The enterprise does not span multiple regions where business rules vary dramatically

  • The enterprise clearly wants to extend the application across multiple regions

  • The application case types are reused and modified across the enterprise

  • The enterprise does not need or want to extend the application

Explanation

Question 5 of 89

1

When App Studio is used, in which schema is a data type table created?

Select one of the following:

  • PegaRULES schema

  • PegaDATA schema

  • ClientData schema

  • CustomerData schema

Explanation

Question 6 of 89

1

What are two methods you can use to generate mashup code in Pega Platform?

Select one or more of the following:

  • Using Channels and interfaces in App Studio

  • Using Resources in Admin Studio

  • Using Case Designer in App Studio

  • Using Case Designer in Dev Studio

Explanation

Question 7 of 89

1

In which two of the following ways can App Studio accelerate projects?

Select one or more of the following:

  • Standardization through UI templates

  • Improved application structuring

  • Direct inheritance automation

  • Leverages company's IT reusable assets

Explanation

Question 8 of 89

1

What are two options you can use to monitor the status of nodes in the cluster of Pega Platform?

Select one or more of the following:

  • Dev Studio

  • App Studio

  • ADMIN Studio

  • Pega Predictive Diganostic Cloud (PDC)

Explanation

Question 9 of 89

1

Which two statements are true about the component applications?

Select one or more of the following:

  • Do not contain case types

  • Designed to be used as built on applications

  • Can be composed of other components

  • Can be used as a production application

Explanation

Question 10 of 89

1

Which two of the following are the best practices for using multiple built-on applications?

Select one or more of the following:

  • Use branch IDs that span several applications

  • Avoid using different versions of same application in the application stack

  • Use the same ruleset in multiple applications

  • Limit development to rulesets in the top-most application

Explanation

Question 11 of 89

1

If you need to extend an existing application for a new division, which of the following options do you recommend?

Select one of the following:

  • Define a set of plausible viable alternatives and then compare the advantages and disadvantages of each. Make a recommendation based on the requirements

  • Use the existing application as a built-on application and create a new divisional layer application

  • Extract all the case types from the existing application and refactor them into a series of modular microservices based applications that can be used as built-on applications for the new implementation

  • Refactor the existing application into a framework, and then create the new application as an implementation of the refactored framework

Explanation

Question 12 of 89

1

Which two of the following options are reasons to version an application?

Select one or more of the following:

  • If an application is using upgraded built-on application versions

  • If you need to move Utility code to a specialized ruleset

  • If you need to add rules that do not impact built on applications

  • If the rulesets in the application ruleset list have been versioned

Explanation

Question 13 of 89

1

Which three of the following items make sense to be packaged as components?

Select one or more of the following:

  • Correspondence

  • Case types

  • Application rules

  • Integration assets

  • Function library

Explanation

Question 14 of 89

1

What two reasons justify using subcases when designing a case hierarchy?

Select one or more of the following:

  • To simplify reporting, security, and auditing

  • When parallel processing of cases is optional

  • When multiple units of work must be completed simultaneously and independently

  • When optimistic locking is required

Explanation

Question 15 of 89

1

In a scenario where you need to specialize rules for a particular region, which two of the following options can be?

Select one or more of the following:

  • Dependent roles

  • Pattern inheritance

  • Circumstancing

  • Branching

Explanation

Question 16 of 89

1

The initial behavior of the case type is always the same. The case type must ultimately change based on the type of data instance it is associated with. The data instance's type is not known when the case is created. How do you implement this scenario?

Select one of the following:

  • Pattern inherit the case type class for each data instance type. Define type-specific behavior in each specialized class

  • Circumstance every rule in the case life-cycle beyond the point that the data instance's type is determined

  • For each data instance type create a subcase. Use a Decision shape to select the appropriate create case flow shape

  • For each data instance type create a subflow. Use a Decision shape to select the appropriate subflow shape

Explanation

Question 17 of 89

1

When specializing a case using class inheritance, which two of the following options are correct?

Select one or more of the following:

  • Use pattern inheritance for case specialization within an application

  • Use direct inheritance for case specialization across applications

  • Use direct inheritance for case specialization within an application

  • Use pattern inheritance for case specialization across applications

Explanation

Question 18 of 89

1

Which two of the following statements are true regarding circumstanced case type rules?

Select one or more of the following:

  • The rule resolution algorithm does not apply to circumstanced case type rules

  • Circumstanced case type rules are active only when a case instance is opened

  • Case Designer supports viewing circumstanced case type rules, the base rule and its circumstanced variations, side-by-side

  • Case workers can select which circumstanced variation of the case type rules to run

Explanation

Question 19 of 89

1

In which three of the following ways can an application be specialized?

Select one or more of the following:

  • Use branching

  • Circumstancing

  • Release toggles

  • Use decision rules

  • Class inheritance

  • Ruleset overriding

Explanation

Question 20 of 89

1

Which two of the following statements are true about component applications?

Select one or more of the following:

  • Component application cannot be self-testable

  • Are designed to be used as built-on applications

  • Do not contain case type

  • Can be composed of other components

Explanation

Question 21 of 89

1

At a certain point in its life cycle, a case is required to capture the list of data instances viewed by the user from which one was selected. The data instance would be classified as reference data, values associated to a unique key rarely, if ever, changing. What is the best way to implement this requirement in Pega taking into consideration performance and extensibility?

Select one of the following:

  • Define a data page using the Snapshot pattern to copy the list and define a Declare Index that creates a separate database table

  • Define a report definition that uses the Reference pattern against a database view

  • Define a data page using the Reference pattern and populate a field group list with the keys to the reference data instances

  • Define a Link class with two keys, one pointing to the reference data instance, the other pointing to the case

Explanation

Question 22 of 89

1

Which two statements are true with regards to industry foundation data model?

Select one or more of the following:

  • Data pages provided by the industry foundation data model need to be extended for each external integration

  • A best practice is to use the industry foundation data model as-is, as much as possible

  • The industry foundation data model can only be used as built-on application in conjunction with Pega applications

  • Pega's industry foundation data simplifies the complexity of many-to-many relationships

Explanation

Question 23 of 89

1

Greenfield Data Modeling follows the three-level approach. What is the order of applying this three-level approach?

Select one of the following:

  • Conceptual, Logical, Physical

  • Physical, Conceptual, Logical

  • Logical, Conceptual, Physical

  • Logical, Physical, Conceptual

Explanation

Question 24 of 89

1

What are the two ways to minimize or avoid data integrity issues?

Select one or more of the following:

  • Do not persist values that are derivable such as counts and categorizations and that are subject to change

  • Avoid using properties that represent a version or as-of-date

  • Store critical data within multiple tables to prevent data loss

  • Follow the single source of truth principle (SSOT)

Explanation

Question 25 of 89

1

What are two key benefits of using a Pega industry foundation data model?

Select one or more of the following:

  • The industry foundation provides data pages that separate business logic from the source of the data (interface)

  • Provides a robust starting point for data properties and classes

  • The industry foundation data model can replace the customer's data model

  • The industry foundation provides data pages that consolidate both business logic and the source of the data (interface)

Explanation

Question 26 of 89

1

What are three different ways to accommodate temporal data?

Select one or more of the following:

  • Use a custom rule

  • Use a data class with an as-of date property

  • Declare the data class as abstract

  • Leverage the History-Rule class

  • Use a data class with a version property

Explanation

Question 27 of 89

1

How is polymorphism implemented when defining a data relationship field type during data modelling?

Select one of the following:

  • Map a field type to a class at design-time and allow its actual type to be determined by Direct inheritance at runtime

  • Map a field type to an abstract class at design-time and allow its actual type to be determined at runtime

  • Map a field type to a class at design-time and allow its actual type to be determined by Pattern inheritance at runtime

  • Map a field type to a concrete class at design-time and allow its actual type to be determined at run time

Explanation

Question 28 of 89

1

Which of the following is true about data classes?

Select one of the following:

  • Persisting a derived value, such as a date-dependent historical price, is acceptable for performance reasons provided it is reproducible

  • Every data class should be defined at the Enterprise layer under Org-Data-, then extended to higher layers

  • Reference data must be embedded within a case's BLOB

  • A reference data class must not possess a BLOB column

Explanation

Question 29 of 89

1

Which of the following statements best describes data model design?

Select one of the following:

  • It is a discussion on organizing and designing the data

  • It is a discussion on operations performed on the data while working on a case

  • It is a discussion on operations performed on the data

  • It is a discussion on designing the data but not organizing the data

Explanation

Question 30 of 89

1

What is the primary difference between push routing and pull routing?

Select one of the following:

  • The behavior of push routing is configured in Rule-System-Settings, and pull routing is not

  • Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing

  • Push routing activity names begin with "To" and pull routing activity names begin with either "Get" or "Find"

  • The security type value for push routing activities is "Route" and the security type value for pull routing activities is "Activity"

Explanation

Question 31 of 89

1

After deploying a flow change to production which affects in flight cases, which three activities can be used to avoid orphaned assignments?

Select one or more of the following:

  • pxRestartStage

  • pxAdjustSLA

  • OpenAndLockWork

  • SetTicket

  • pxRestartRun

Explanation

Question 32 of 89

1

A Low code developer can select which tow of the following participants that are associated to user account within the application?

Select one or more of the following:

  • Reporting manager

  • Org Unit manager

  • Workgroup manager

  • Current user

Explanation

Question 33 of 89

1

Which of the following techniques is the most recommended for handling changes to processes when there are existing open cases in production?

Select one of the following:

  • There is no recommended approach, as a best practice, you should never modify existing processes once deployed to production

  • There is no ideal technique as every approach has advantages and disadvantages, the best approach depends on the requirements and the environments

  • The recommended approach is to circumstance the flow and case type rules and use tickets to control processing of existing assignments

  • The recommended approach is to require users to switch between the old and new versions of the processes by switching between application versions

Explanation

Question 34 of 89

1

A case is routed to a work queue after creation in a Fraud application. The fraud analyst picks-up the work using GetNextWork functionality. If the fraud analyst cannot complete the assignment, the analyst clicks Cancel so that another fraud analyst can work on the assignment. Which item can be configured to implement the above requirement?

Select one of the following:

  • GetNextWorkCriteria

  • Assign-Workbasket.GetNextWork

  • MoveToWorkList

  • GetNextWork_MoveAssignmentToWorklist

Explanation

Question 35 of 89

1

An existing process uses an integrator shape to exchange data with an external system.
Which of the following flows is used to send email correspondence for exception that occur with the integrator shape?

Select one of the following:

  • ConnectionProblem

  • FLowProblems

  • pzStageProblems

  • ProblemFlow

Explanation

Question 36 of 89

1

What are the three ways that you change the Get Next Work priorization without customizing the GetNextWork and GetNextWorkCriteria rules?

Select one or more of the following:

  • Adjust the assigment urgency

  • Override the ToWorklist routing activity

  • Increase case urgency

  • Update operator skills

  • Override one or more GetNextWork related application settings rules

Explanation

Question 37 of 89

1

Which three of the following options are flow-related assignment properties that can be used to identify assignments for cases in flight?

Select one or more of the following:

  • pxTaskName

  • pyFlowType

  • pyLockInterval

  • UrgencyAdjust

  • pyInterestPageClass

Explanation

Question 38 of 89

1

A process with three assignments exists in production. After redesign, one of the assignments is removed. After the deployment, in flight cases should use the old assignment for processing

Which one of the following approaches can be used for the above requirement?

Select one of the following:

  • Processing existing assignments in parallel with the new flow

  • Switching the application version of in flight cases

  • As-of-date circumstancing the flow

  • Moving existing assignments

Explanation

Question 39 of 89

1

Which two of the following routing activities leverage the @pickBalancedOperator() function?

Select one or more of the following:

  • ToSkilledGroup

  • ToWorkGroup

  • ToSkilledWorkbasket

  • ToLeveledGroup

Explanation

Question 40 of 89

1

You need to automate a claim adjudication process in which files containing claims are parsed, verified, adjudicated. Claims which pass those initial steps are automatically created for further processing. A single file containing up to 1,000 claims is received daily before 5:00 PM. Claim verification is simple and takes a few milliseconds, but claim adjudication might take up to five minutes. Which two design options best fit for this solution?

Select one or more of the following:

  • Create Job Scheduler to fetch all the claims with status as Pending-Adjudication and process for calculation

  • Create an advanced agent to identify all the cases for adjudication with status as Pending-Adjudication

  • Create a Queue Processor to perform the calculation, use "Run in Background" to call the Queue Processor, pause the case processing, and wait for the Queue Processor to complete processing

  • In an activity, invoke the Queue-For-Processing method against each claim

  • Create a standard agent to perform the case processing and calculation

Explanation

Question 41 of 89

1

What are the two reasons why you tune some of the Pega out-of-the-box default agents in a production environment?

Select one or more of the following:

  • The agent is preconfigured to run at an optimal time by default

  • The agent runs based on node classification

  • The agent runs more frequently than needed

  • The agent should not run in production

Explanation

Question 42 of 89

1

In which situation do you consider calling external services asynchronously?

Select one of the following:

  • When the response may return an error condition

  • When the response is required exactly after one hour

  • When the response is not immediately required

  • When the response is immediately required

Explanation

Question 43 of 89

1

In which two scenarios the access group context can be changed for Queue Processors?

Select one or more of the following:

  • Queue-For-Processing

  • Run immediately

  • Queue Schedule

  • Run in background

Explanation

Question 44 of 89

1

By default, queue processors run in the security context of which requestor type?

Select one of the following:

  • App

  • Background

  • AsyncProcessor

  • System Runtime Context

Explanation

Question 45 of 89

1

ABC Company is a distributor of discount wines and uses Pega Platform for order tracking. There are up to 100 orders per day, with up to 40 different line items in each order specifying the product and quantity. There are up to 5,000 varieties of wines that continuously change over time as new wines are added to and dropped from the list. ABC Company want to extend the functionality of the order tracking application to determine recent hot-selling items by recording the top 10 items ordered by volume each day. This information is populated in a table and used to ease historical reporting. Select a design solution to support this

Select one of the following:

  • The job scheduler should leverage a report to easily retrieve and sort the number of items ordered in a day and a record values in the historical table

  • Create an advanced agent to identify the list of orders to be processed

  • Create a standard agent to perform the orders to be processed

  • Use a queue processor to identify the list of orders to be processed

Explanation

Question 46 of 89

1

In asynchronous service processing, which rule decides the queuing and dequeuing option?

Select one of the following:

  • Connect response processor

  • Connect request processor

  • Service request processor

  • Service response processor

Explanation

Question 47 of 89

1

When integrating with multiple independent services with long response times, which option can improve user experience?

Select one of the following:

  • Use a spin-off subflow

  • Use a subcase

  • Use the run-in-parallel option

  • Use the Append and Map to action in a data transform

Explanation

Question 48 of 89

1

As part of an underwriting process, the application must generate a risk factor for a loan and insert the risk factor into the Loan case. The risk factor generation is an intensive calculation that requires several minutes to run. The calculation slows down the environment. You want to have all risk factor calculations run automatically between the hours of 10:00 PM and 6:00 AM to avoid the slowdown during daytime working hours. Which two design options best fit for this solution?

Select one or more of the following:

  • Use standard agent to process the queued Loan cases

  • Use a standard queue processor to perform the calculation, pause the case until 10 PM and include a step in the flow to queue the case for the queue processor

  • Use an advanced agent to fetch and process the Loan Risk factors

  • Use a delayed dedicated queue processor and set the DateTime for processing to 10 PM using the run in background shape

  • Use a job scheduler to fetch all the Loan cases with status Pending-RiskCalculation and then calculate risk factor and call Resume Flow

Explanation

Question 49 of 89

1

Which two of the following actions need to be configured for a job scheduler activity?

Select one or more of the following:

  • Transaction management

  • On which node to run

  • Record locking

  • System runtime context

Explanation

Question 50 of 89

1

Which three statements are true regarding attribute-based access control (ABAC)?

Select one or more of the following:

  • Must reference at least one type of RBAC rule to enforce security

  • Access Control Policy rules cannot be turned off once defined

  • Allows only certain properties within a class to be masked

  • Does not need to reference role-based access control (RBAC) rules to enforce security

  • Does not support encryption at the property level

  • Possible to prevent an Access Control Policy from being overridden

  • The Applies-To class for every rule used by an Access Control Policy Rule must extend either Work- or Data-

Explanation

Question 51 of 89

1

Which two of the following security risks can be identified by the Rule security analyzer?

Select one or more of the following:

  • Custom-written Java code

  • Unsecured rulesets or unlocked ruleset versions

  • Properties with incorrect type

  • Vulnerabilities in stream rules

Explanation

Question 52 of 89

1

Which access is granted if there are several dependent access roles defined for a dependent access role?

Select one of the following:

  • Only the most generic dependent role is considered

  • Only the most specialized dependent role is considered

  • All dependent role names are considered and the conditions are joined with OR

  • All dependent role names are considered and the conditions are joined with AND

Explanation

Question 53 of 89

1

Select the best practices that can help minimize security vulnerabilities in the custom HTML rule

Select one or more of the following:

  • Use of hidden elements (type=hidden)

  • Minimize the use of mode=literal

  • Use the StringUtils.crossScriptingFilter method when using parameters in Pega Platform reference tag

  • Use dynamic SQL statements instead of prepared statements to prevent possible SQL injection

  • Use the SafeURL function to generate Pega Platform request URLs in custom JavaScript

Explanation

Question 54 of 89

1

What are the supported Rule Security Mode settings on the access group which helps enforce a deny first policy?

Select one or more of the following:

  • Reject

  • Warn

  • Accept

  • Deny

  • Allow

  • Approve

Explanation

Question 55 of 89

1

Which three of the following application rule properties can you use within an access when rule to restrict access between applications hosted in the same database and sharing the same work and assignment table?

Select one or more of the following:

  • pyOrigDivision

  • pyOwningOrganization

  • pyOwningUnit

  • pyOrigOrg

  • pyOwningDivision

  • pyOrigOrgUnit

Explanation

Question 56 of 89

1

By default, Queue Processors run in the security context of the which requestor type?

Select one of the following:

  • Syncprocessor

  • AsyncProcessor

  • Background

  • Batch

Explanation

Question 57 of 89

1

Which authorization model do you use to implement the data privacy requirements of the European Union's General Data Protection Regulation (GDPR) and similar regulations?

Select one of the following:

  • Attribute-based access control (ABAC)

  • Role-based access control (RBAC)

  • Client-based access control (CBAC)

  • Privileged based access control (PBAC)

Explanation

Question 58 of 89

1

Select three best practices that can protect against the cross-site scripting (XSS) attacks

Select one or more of the following:

  • Filter all inputs

  • Write custom JavaScript

  • PublicAPI methods for XSS filtering

  • Filter HTML and XML outputs

  • PrivateAPI methods for XSS filtering

Explanation

Question 59 of 89

1

Select the four authentication protocols supported by Pega

Select one or more of the following:

  • SAML 2.0

  • PRSecuredBasic

  • Token credentials

  • Session Management

  • PRBasic

  • Basic credentials

  • OpenID Connect

Explanation

Question 60 of 89

1

XYZ Corp orders office supplies through multiple suppiers. XYZ Corp wants to see detail about the least expensive line items purchased through each supplier. XYZ has Order cases that have LineItem subcases. LineItem detail is stored in a separate table. Which of the following approaches should be used as part of the solution?

Select one of the following:

  • Define a subreport that obtains supplier ID and min(Price) from the line item table and within the main report query the line item table joining to the subreport by product ID

  • Define a subreport that obtains supplier ID and max(Price) from the line item table and within the main report query the line item table joining to the subreport by supplier ID

  • Define a subreport that obtains supplier ID and min(Price) from the line item table and within the main report query the line item table joining to the subreport by supplier ID

  • Define a subreport that obtains supplier ID and max(Price) from the line item table and within the main report query the line item table joining to the subreport by product ID

Explanation

Question 61 of 89

1

A report must have a list of all operators with the following columns: Operator Last Name, Operator First Name, Count of Assignments. What report is best suited for this requirement?

Select one of the following:

  • Summary Report in the Operator class

  • Summary Report in the Worklist Assignment class

  • List Report in the Operator classs with a subreport

  • List Report in the Worklist Assignment Class

Explanation

Question 62 of 89

1

Which of the following statements is true about reports database in Pega?

Select one of the following:

  • Pega automatically replicates data on to Reports database schema

  • A table in a reports database need not have the same structure (columns, etc.) as its counterpart table in the PegaRULES database

  • Reports database schema and Pega database schema must be on the same database server

  • A table in a reports database must have the same structure (such as columns) as its counterpart table in the PegaRULES database

Explanation

Question 63 of 89

1

Which JOIN condition is the most efficient in a report definition?

Select one of the following:

  • Only include matching rows

  • Only include unmatched rows

  • Include all rows in joined class

  • Include all rows

Explanation

Question 64 of 89

1

What are two issues that can result if large data sets are generated by a report and sent to another user?

Select one or more of the following:

  • Hardware failure

  • Testing issues

  • Out-of-memory issues

  • Network issues

Explanation

Question 65 of 89

1

Which of the following is a benefit of table partitioning?

Select one of the following:

  • Take less space for storage

  • Improve the query performance

  • Improve guardrail score

  • Can create index automatically for better results

Explanation

Question 66 of 89

1

Which of the following best describes the function of BIX?

Select one of the following:

  • To extract Pega data for loading into a data warehouse

  • To extract non-Pega data for loading into Pega

  • To configure reports on both Pega and non-Pega data

  • To transform data within the Pega database

Explanation

Question 67 of 89

1

Which column can be removed from Declare Index tables to improve performance?

Select one of the following:

  • pxPvStream

  • pwPvStream

  • pyPvStream

  • pzPvStream

Explanation

Question 68 of 89

1

Which of the following setups most likely requires the use of a subreport?

Select one of the following:

  • Columns-Operator Name, Operator Division, Count of Purchase Requests created, 1 row for every operator excluding Purchase Requests being audited

  • Columns-Operator Name, Count of Purchase Requests created, 1 row for every operator

  • Columns-Operator Name, Operator Division, 1 row for every operator

  • Columns-Operator Name, Operator Division, Count of Purchase Requests created, 1 row for every operator

Explanation

Question 69 of 89

1

Which report definition data access method should be used to include Work Parties?

Select one of the following:

  • Association

  • Join

  • Declare index

  • Sub Reportt

Explanation

Question 70 of 89

1

Design teams are primarily responsible for user experience

Select one of the following:

  • True
  • False

Explanation

Question 71 of 89

1

Good UX design can save a company money because it helps define and scope a team's work

Select one of the following:

  • True
  • False

Explanation

Question 72 of 89

1

While designing an application for large set of users working across regions on a large set of data, which three of the following points have to taken into consideration to improve the user experience?

Select one or more of the following:

  • Capture all the data required from user in a single form

  • Leverage asynchronous and background processing

  • Leverage case management to divide complex cases

  • Use the deferred data loading technique

  • Maximize server-side expressions, calculations, and validation

Explanation

Question 73 of 89

1

Business-to-Consumer (B2C) apps tend to focus on a specific business process

Select one of the following:

  • True
  • False

Explanation

Question 74 of 89

1

For which three conditions are client-side expressions better than the server-side expressions?

Select one or more of the following:

  • Edit-Validate

  • Required conditions

  • Obj-Validate

  • Disabled conditions

  • Visibility conditions

  • Edit-Input

Explanation

Question 75 of 89

1

When do you perform usability testing?

Select one of the following:

  • Conducted periodically throughout the user acceptance testing phase

  • Conducted periodically throughout the design phase

  • Conducted periodically throughout the software development life cycle

  • Conducted at the end the development phase

Explanation

Question 76 of 89

1

Usability testing is a method for determining how easy an application is performed by the

Select one of the following:

  • developer

  • application user

  • business architect

  • project manager

Explanation

Question 77 of 89

1

While the user is busy reading a screen or completing another task, the application can perform required tasks in another requestor session, apart from the user's requestor session. Which two tasks can improve the user experience?

Select one or more of the following:

  • Use synchronous connectors

  • Use defer load

  • Use large data sets

  • Use Load-DataPage method

Explanation

Question 78 of 89

1

Autocomplete controls negatively impact the user experience if

Select one or more of the following:

  • the potential result set is larger than 50 rows

  • if all the results in the list end with the same three characters

  • the potential result set is larger than 100 rows

  • if all the results in the list start with the same three characters

Explanation

Question 79 of 89

1

According to Nielsen, at what stage does iterative design first become a part of company culture?

Select one of the following:

  • Managed usability

  • Systematic user-centered design process

  • Integrated user-centric design

  • Skunkworks

Explanation

Question 80 of 89

1

Which two of the following items are consistent with branch development?

Select one or more of the following:

  • Performing merges

  • Using a customized rule check-in approval process

  • Bypassing conflict detection

  • Conducting reviews

  • Versioning access groups

Explanation

Question 81 of 89

1

What are the four developer activities in DevOps Release pipeline?

Select one or more of the following:

  • Unit testing

  • Testing new features

  • Configure toggles

  • Accepting the software and deploying to production

  • Sharing changes with other developers

  • Making sure existing features still work as expected

  • Ensuring changes do not conflict with other developer's changes

Explanation

Question 82 of 89

1

Which two of the following items are normally performed when implementing a custom guardrail warning?

Select one or more of the following:

  • Use a customized rule check-in approval process

  • Override the Embed-Warning.ShowWarningOnForm decision tree

  • Use the @baseclass.pxAddGuardrailMessage activity

  • Override the @baseclass.CheckForCustomWarning activity

Explanation

Question 83 of 89

1

Which load testing tool do you recommend to the client?

Select one of the following:

  • Performance Analyzer

  • Any client-preferred web application load-testing tool

  • Loadrunner

  • JMeter

Explanation

Question 84 of 89

1

Which two of the following tools can be used to determine how to best address rule conflicts?

Select one or more of the following:

  • Compare Rules

  • Live UI

  • Performance Analyzer

  • Alert logs

  • Merge branch wizard

Explanation

Question 85 of 89

1

Which two of the following items best describe technical debt?

Select one or more of the following:

  • Allowing only carefully reviewed and thoroughly tested changes to move through a release pipeline

  • Pattern of allowing low-quality features into your production environment

  • You spend more time fixing bugs than working on new features that add business value

  • The debt incurred due to postponing the implementation of a technical requirement

Explanation

Question 86 of 89

1

What are the three end-user activities in a DevOps Release pipeline?

Select one or more of the following:

  • Unit testing

  • Testing new features

  • Accepting the software and deploying to production

  • Ensuring changes do not conflict with other developer's changes

  • Sharing changes with other developers

  • Making sure existing features still work as expected

Explanation

Question 87 of 89

1

What two benefits do you receive by running appropriate tests at each stage of a release pipeline?

Select one or more of the following:

  • Fewer design issues within the application

  • Reinforcement of testing best practices

  • Better performance

  • Timely feedback

Explanation

Question 88 of 89

1

Which statement is true about Guardrail wanings?

Select one of the following:

  • A Guardrail warning prevents the role from saving

  • Only one Guardrail warning is shown on the rule form

  • Guardrail warnings are stored in the pc_rule_declare database table

  • A rule with a Guardrail warning can be executed

Explanation

Question 89 of 89

1

In which two situations do you typically use rule check-in approval?

Select one or more of the following:

  • To coordinate efforts of a large development team

  • When business logic requires a manager to review a case

  • To track interface changes for connectors

  • To control changes to a framework application

Explanation