Answer:
C. Client Based - Answers If your application stores data that could be used to identify a person and you
are subject to GDPR or similar regulations. Which security model should be used?
A. Role-Based
B. Attribute-Based
C. Client-Based
Answer:
A. Client Based - Answers Which security model allows you to track and process requests to view,
change, remove, and restrict the use of personal data, and to show auditors that you have done so.
A. Client-Based
B. Role-Based.
C. Attribute-Based
Answer:
B. pyRuleExecutionMessagesLogged - Answers Which activity below can be used to determine the
privileges required by logged rules using an Access Deny rule type?
A. pzRuleExecutionMessagesLogged
B. pyRuleExecutionMessagesLogged
C. pzAccessDenyRulePrivileges
D. pyAccessDenyRulePrivileges
Answer:
,C and D
Starting with Pega in the middle allows for a consistent solution to be developed and evolved over time,
connecting channels and back end systems to provide an end to end solution.
Build for change allows you to build solutions iteratively based on what you know today. - Answers
When developing a new Pega application start with ___________ and __________
A. Channel design and work your way into the Pega application
B. Integration to systems of record and work your way back into the Pega application
C. The Pega application in the middle and work your way out to channels and system of record
D. One application at a time base your design on what you know today
Answer: A and D
The BPO model requires a multitenant deployment.
You have requirements to use message driven beans (MDB) to deliver messages from a system of record
to the Pega application. - Answers Which two business requirements impact how you deploy your
application?
A. You have requirements to support a business process outsourcing (BPO) model for your organization.
B. You have requirements to start application development in Pega Cloud, and then move your
application to an on-premise production environment.
C. You have requirements for case types to participate in a distributed architecture through
microservices.
D. You have requirements to use message driven beans (MDB) to deliver messages from a system of
record to the Pega application.
,Answer: D
This is the primary reason for starting the security design early. Security requirements can be complex,
and identifying the organization's security standards early to make sure they are woven into your
application design is crucial. - Answers What is the primary reason for designing the security model as
early as possible?
A. To quickly address any warnings you see in the Rule Security Analyzer
B. To start your team on building access role, privileges, and attribute-based controls
C. To begin penetration testing as early as possible
D. To ensure you account for and design to the organization security standards and legal requirements
Answer: A
This is the primary goal of the release management strategy. Moving to DevOps facilitates the ability to
deliver changes to users quickly. - Answers When defining a release management strategy, what is your
primary objective?
A. Create a repeatable and sustainable process for ensuring business value is delivered safely and as
quickly as possible to end users.
B. Implement a process for developers to minimize rule conflicts when merging into a central repository.
C. Introduce automated testing into the organization.
D. Move the organization to a continuous integration/continuous deployment (CI/CD) model.
Answer: A and B
This is a benefit of using a data warehouse
You can focus on using Pega for reporting on throughput data. - Answers What benefits do you gain by
leveraging a data warehouse coupled with Pega reporting? (Choose Two)
, A. You can use reporting tools suited for trending and data analysis.
B. You can focus on using Pega for reporting on throughput data.
C. You can purge cases from your database along with the data warehousing process.
D. You can use BIX to export cases to a database, a comma separated file, or XML format.
Answer: D
PDC and AES show insights in the health of Pega applications, but traditional application server and
database monitoring tools do not. - Answers Why would you use PDC or AES when the organization
already has application performance monitoring tools in place?
A. PDC and AES collect alerts and health activity across Pega nodes.
B. PDC and AES are available both on premise and in the Pega Cloud.
C. PDC and AES provide the ability to stop and start agents, listeners, and manage requestors.
D. PDC and AES show insights into the health of the Pega application.
Answer: A and B - Answers Pega Platform supports which two in-memory cache management options
for multi-node cluster topologies?
A. Hazelcast
B. Apache Ignite
C. Windows
D. Oracle
Answer: B and C - Answers When would you use the client-server cluster topology (Choose 2)?
A. In a single node environment
B. Cluster instability
C. In Large production environments that consist of more than five cluster nodes