Practice Free PEGACPLSA24V1 Exam Online Questions
A reference property can be best thought of as _____________?
- A . a reference to an external entity that is stored in a system of record
- B . a pointer between two pages or properties
- C . a property that can be referenced from any context at any time
- D . a property whose references are tracked for auditing purposes
- E . Another term for a linked property
An application consisting of a single case requires sending correspondence at a designated time with minimal delay.
The existing solution uses an assignment to pause the case until an SLA invokes the escalation activity that sends the correspondence. Occasionally there is a delay in sending the correspondence.
Which two factors contribute to the delay? (Choose Two)
- A . Correspondence rule configuration
- B . The number of queued SI A objects
- C . Error handling for locked items
- D . Multiple open assignments on the same case
In Pega applications, the Center-out business architecture is a fine-tuned software architecture that you use to deliver customer and business outcomes. The Center-out approach gives meaningful results quickly and sustains the architecture in the future by avoiding the mistakes of the top-down and bottom-up approaches.
Which two of the following statements are true about the Center-out business architecture? (Choose Two)
- A . The Pega DX API maintains the principle of separation of concern and keeps front-end channels and back-end logic out of sync.
- B . The Pega DX API keeps your front-end channels and back-end logic in sync, not in silos.
- C . The Pega Live Data visualization layer automatically extracts the data that you need to customer data schema.
- D . You can get every step in your Microjourney right by using the case management feature to manage, automate, and improve work.
Which five of the following options should you consider when recommending a design solution? (Choose Five)
- A . Deployment.
- B . User experience/responsiveness.
- C . Complexity (which indirectly impact effort and maintenance).
- D . Maintenance.
- E . Effort (cost).
- F . Resource management (memory/database).
When implementing a security requirement, it is important to _____________________ and _____________________. (Choose Two)
- A . understand the vulnerabilities inherent in the application programming language and underlying platform
- B . consider the cost to the users
- C . only change default settings if absolutely necessary
- D . consider whether the requirements can be implemented using ABAC instead of RBAC
The ABC trip planner company offers a variety of services, for example, hotel bookings, flight bookings, and train bookings, all on a single platform. All the services offered havetheir invoice processing managed by a dedicated team of accounting specialists from the XYZ financial accounting organization. Every booking made by a customer creates a "Booking" case, which manages the booking of the required service. An "Invoice" case is also created for the verification and validation of all payments to the various stakeholders involved. For security reasons, the Invoice case contains limited information and cannot be a child case of Booking. Both are siblings that update each other.
Which one of the following is the best possible solution to implement this requirement?
- A . Have a data object that connects both the sibling cases. Use a Job Scheduler that runs every one minute to query records from the data object and update the sibling case as required. Use system context to gain access to the sibling case.
- B . Have a data object that connects both the sibling cases. Use a Job Scheduler that runs every one minute to query records from the data object and update the sibling case as required.
- C . Have a data object that connects both the sibling cases. Use a queue processor (Dedicated/Standard) to process the record for status updates. Update the security context while queuing with the appropriate access group to gain access to the sibling case.
- D . Have a data object that connects both the sibling cases. Use a queue processor (Dedicated/Standard) to process the record for status updates. Use the current operator access group context while queuing to update the case.
When merging Branch code, which two of the following methods can help address Rule conflicts? (Choose Two)
- A . Ignore the conflicts and proceed with the merge.
- B . Review alert log Files.
- C . Use the Rule Comparison tool.
- D . Use the Performance Analyzer tool.
- E . Resolve the conflicts manually.
The Pega Intelligent Virtual Assistant (IVA) feature of Pega Platform™ offers a simple, conversational user experience (UX).
- A . False
- B . True
Which two of the following options are best practices for using App Studio? (Choose Two)
- A . Create reusable IT assets using App Studio.
- B . Share business assets across applications.
- C . Manage reusable assets through a center of excellence (COE).
- D . Avoid using App Studio for Directly Capture Objectives (DCO) sessions.
What is the primary function of a file listener in background processing?
- A . To automatically process incoming files as soon as they are detected.
- B . To ensure that files are processed synchronously with other tasks.
- C . To convert binary data from files into readable text format.
- D . To validate the format and structure of the files before processing.
