Practice Free PEGACPLSA24V1 Exam Online Questions
A job scheduler with a NotifyBusinessUser activity has been created in an application to send emails every day. However, the scheduler processing is not working as expected. After thorough analysis, the production support team noticed that some other application-specific activity with the same name as NotifyBusinessUser is executed at runtime.
What is a possible reason for the scheduler to not execute the application-specific activity? (Choose two)
- A . A sync requestor type rule does not have an application-specific access group.
- B . An activity rule is marked as blocked in the highest version of the current application.
- C . An activity rule is marked as blocked in the highest version of the current application.
- D . The system runtime context does not include the application.
You are a lead developer in a software development team. Your team is working on a large project that requires the development of multiple features simultaneously.
Which two of the following strategies do you employ to manage this Branch development effectively? (Choose Two)
- A . Ignore conflicts between Branches until the end of the project
- B . Develop all features on the main Branch.
- C . Assign each feature to a separate Branch.
- D . Regularly merge Branches back to the main Branch.
A user logs in to a shopping website that contains a malicious hidden link to pass an HTTP request to send user information to another website. Because the user is already logged in to the shopping website, the browser sends the website cookies to the other website. If the shopping website is not protected, the attack succeeds, sending the user information to another website.
What is the best approach to protecting an application from such attacks?
- A . Enable cross-site request forgery (CSRF) with the help of cookies.
- B . Create logic in the application to protect users from unsolicited requests to the server.
- C . Enable cross-site request forgery (CSRF), which protects the user from unsolicited requests to a server.
- D . Plug a third-party tool into the shopping website to protect users from unsolicited requests.
ABC is an internet service provider that uses a Complaint application to track customer issues. Once a customer complaint is resolved, the application captures the customer’s satisfaction in a range of 0-100. Now, the Application Manager wants to assign each Complaint case to a category depending on the feedback range.
The manager uses the grouped data in a trend report to show how many Complaint cases are in each category at various points on a timeline.
The manager wants to use the following categories: 0-25 – Not Happy 26-50 C Okay 51-70 C Happy 71-90 – Very Happy 91-100 – Delighted.
What is the recommended approach to achieving this functionality?
- A . Use aggregate functions to categorize the results.
- B . Use class joins to categorize the results.
- C . Use custom SQLs in the report definition to categorize the results.
- D . Use subreports to categorize the results.
ABC Retail Inc. wants a report that illustrates the distribution of customer loyalty based on their shopping history. ABC wants to see the number of customers who have been shopping with the company for more than 10 years, between five and 10 years, between two and five years, and less than two years. Suggest the most optimistic way of separating and displaying the shopping history using a report.
- A . Use a function alias.
- B . Use a correlated subreport.
- C . Use a Rule-Obj-ListView with a custom getContent activity.
- D . Use a Connect-SQL rule.
Which three of the following options are reasons for companies to invest in UX design?
- A . UX design eliminates the iterative process in software development.
- B . Studies show that good design leads to more profits for companies.
- C . UX design is a key component of client and user satisfaction.
- D . The UX design process begets effective cross-functional collaboration.
You are a Lead System Architect working on a booking application for a travel agency. You want to send email notifications to different participants (such as customers or sales coordinators) with custom messages based on their roles. You also want to ensure that the email-sending process does not affect the performance or responsiveness of the application.
Which design option would you choose to implement this requirement?
- A . Standard agent
- B . Standard queue processor
- C . Advanced agent
- D . Job scheduler
A low-code developer can select which two of the following participants who are associated with a user account in the application? (Choose Two)
- A . Reporting manager
- B . Current user
- C . Org Unit manager
- D . Workgroup manager
Which one of the following specialization techniques is best suited for the localization of Pega Platform™ applications?
- A . Ruleset
- B . Class
- C . Circumstance
- D . Organization hierarchy
What are some best practices for extending an existing data model in Pega applications? (Select all that apply)
- A . Avoiding direct changes to the core data classes to maintain upgradability.
- B . Creating separate copies of data classes for each extension to prevent conflicts.
- C . Using the "Apply Data Model Changes" wizard to propagate changes to related applications.
- D . Collaborating with business stakeholders to define the scope and requirements of the extension.
