How do you achieve this requirement?
Security policies need to be configured for a newly developed Pega application using basic credential authentication. The lockout policy configuration must lock out users after three failed login attempts. The configuration must exclude Administrator or Executive operators from the lockout. How do you achieve this requirement?A . Define operator override...
Identify three rule types that are used in defining Authentication Service data instances. (Choose Three)
Identify three rule types that are used in defining Authentication Service data instances. (Choose Three)A . Data pages B. Activities C. Connectors D. Reports E. Data transformsView AnswerAnswer: A,B,C
XYZ Inc.'s COE wants case life cycle developers to use a field group named "Claim" regardless of the application being developed
DRAG DROP XYZ Inc.'s COE wants case life cycle developers to use a field group named "Claim" regardless of the application being developed. Select and move the three tasks that the COE performs for this requirement to the Task List column and place them in the correct order. (Choose Three)...
Which two options do you recommend to isolate the issue?
XYZ Corp users are experiencing delays in the application that you suspect is related to the database. Which two options do you recommend to isolate the issue? (Choose Two)A . Write Pega logs to the database server. B. Investigate when the database is used most heavily. C. Lower query-time-related alert...
What is your recommendation to implement the new business requirement?
MyCo.com has instances of SCM-F5, SmartDispute, and CPM-F5 in their Production Environment distributed across multiple Pega instances. A new business requirement states that users working in any one application cart create a case in any other application. What is your recommendation to implement the new business requirement?A . Synchronize case...
Select two ways for queuing an item for a queue processor. (Choose Two.)
Select two ways for queuing an item for a queue processor. (Choose Two.)A . Use the Queue-for-processing method B. Use Utility smart shape C. Use Run in Background smart shape D. Use the Queue for -agent methodView AnswerAnswer: A,C
What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over tune? (Choose Two)
What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over tune? (Choose Two)A . Add indexes to all columns. B. Purge workparty UlU index tables periodically. C. Schedule scripts to maintain frequently fragmented tables. D. Purge and/or archive...
You are designing a case life cycle to process fraudulent charge claims. After a list of suspected fraudulent charge is submitted, the case advances to the processing stage. In the first step of theprocess fraud claim process, a seprate child case must be created for each suspected fraudulent charge.
You are designing a case life cycle to process fraudulent charge claims. After a list of suspected fraudulent charge is submitted, the case advances to the processing stage. In the first step of theprocess fraud claim process, a seprate child case must be created for each suspected fraudulent charge. After...
Where do you configure the PartOetails section?
Ar.mo Corporation is designing an Order Fulfillment application built on an Inventory application. Both applications reuse a section that displays Part details. Where do you configure the PartOetails section?A . In an Inventory ruleset within the Inventory application's work pool class B. In an Order Fulfillment luleset within the Order...
Select two ways for queuing an item for a queue p
Select two ways for queuing an item for a queue pA . Use the Queue-for-processing method B. Use Utility smart shape C. Use Run in Background smart shape D. Use the Queue for -agent methodView AnswerAnswer: A,C