A dispute case type has various stages, including collect, review, Reinburse, Chargeback, and Resolve.
In the production system, inflight cases exist in the chargeback stage. The Chargeback stage is moved to a new case type.
If the analyst advances the inflight cases, what error flow is initiated?
Answer : B
Identifying the Error Flow:
When stages are altered in a case type, in-flight cases can encounter issues if they try to advance to a now-missing stage.
pzStageProblems Flow:
This flow is initiated when there are problems advancing stages due to missing or reconfigured stages.
It helps to manage and resolve issues related to stage progression.
Pega Platform Case Management Documentation
Pega Academy Course on Advanced Case Design
A banking customer service application is in production that processes various customer complaint requests. After three years in production, the operations manager needs a historical report on resolved cases. This report is to receive in near real time.
Data warehouse has exposed a REST API to receive dat
a. Reports are generated out of data warehouse.
What two of the following options to create an ideal design solution to post data to the data warehouse? (Choose Two)
Answer : A, B
Using Data Flows:
Leverage data flows to read and process data efficiently.
Utilize datasets to source the required data.
Option A:
Use a utility to post data to a queue processor.
The queue processor will then handle posting the data to the data warehouse over REST.
Option B:
Alternatively, the utility can synchronously post data directly to the data warehouse.
This ensures immediate transfer of data upon resolution of a case.
Pega Platform Data Flow Documentation
Pega Academy Course on Integration and Data Synchronization
A Pega developer working on customizing GetNextWork functionality has overridden the
GetNextWork_WorkBasketUrgencyThreshold application settings rule, because they want to define a minimum cutoff value for assignment urgency.
Overriding this value can speed things up by changing the order in which assignment candidates are examined.
As an LSA, which one of the following would you recommend as a best practice in this situation?
Answer : A
Creating a Separate Ruleset:
It is considered best practice to isolate customizations in a separate ruleset to simplify future migrations and upgrades.
Benefits of Separate Ruleset:
Easier to identify and manage customizations.
Simplifies the process of moving custom rules between environments.
Reduces the risk of conflicts during upgrades.
Implementation:
Define a new ruleset specifically for the custom GetNextWork functionality.
Override the necessary rules within this ruleset.
Pega Best Practices Guide
Pega Academy Course on Rule Management and Versioning
An organization wants to know about failed authentication attempts to gain access to a Pega Platform application. How do you log information about unauthorized access or failed login attempts?
Answer : C
Enable Security Auditing:
Navigate to the Pega Platform's security settings.
Enable security auditing by configuring the security policies.
This setting will track and log any unauthorized access attempts and failed login attempts.
Configure Audit Log Settings:
Go to the 'Security Policies' section under the 'System' category in the Dev Studio.
Ensure that logging for authentication events is enabled. This includes both successful and failed login attempts.
Generate Reports:
Utilize the built-in reporting capabilities of Pega to create custom reports.
These reports can be configured to display logs of failed login attempts, providing visibility into unauthorized access attempts.
Pega Platform User Guide on Security Policies
Pega Academy Course on Security and Access Control
An organization has two sets of users: Manager and Vice President, with no role dependencies. The organization wants to introduce a new set of users called Senior Manager that has Manager access and a subset of Vice President access.
What is the recommended approach to add the Senior Manager role to meet this requirement?
Answer : D, D
Senior Manager Role with Dependent Roles:
Creating a new Senior Manager role with Manager and Vice President as dependent roles ensures that the Senior Manager inherits access from both roles. Overriding the Access of Role to Object rules from the Vice President role as required provides the necessary fine-tuning.
Reference:
Pega documentation on role-based access control recommends defining new roles with dependencies to inherit access rights and customize as needed.
Therefore, the correct answer is:
An application for the U+ Vehicle Insurance company generates insurance quotes for vehicles specified by the customer. There can be various types of vehicles processed by the application, such as cars, motorcycles, trucks, and so on. The business specifications can also differ for each vehicle type in the quote process.
Which one of the following possibilities is the best data model design for the quote case type?
Answer : B
For modeling different types of vehicles in an insurance quote application:
Separate Data Types:
Create a distinct data type for each vehicle type (e.g., Car, Motorcycle, Truck). This allows for specific properties and business logic for each vehicle type.
Single Vehicle Page List:
Maintain a single page list property in the quote case type to hold vehicle details.
At runtime, dynamically identify the page class for each entry in the list based on the type of vehicle being processed. This approach allows for flexibility and maintainability.
Pega Data Modeling Best Practices
Pega Case Management Guide
While extracting transactional data from the Pega Platform database to external data store with the Business Intelligence Exchange (BIX) rueset, how do you avoid recalculating declarative properties from its source properties?
Answer : C
To avoid recalculating declarative properties when extracting data with BIX:
BIX Command Line Options:
The BIX extraction process can be configured to disable recalculating declarative properties by using specific command line options.
The options disableBackwardChaining and disableForwardChaining prevent the recalculation of declarative properties during the extraction.
Configuration:
Include these options in the BIX command line execution to ensure that declarative properties are not recalculated from their source properties during the extraction process.
Pega Business Intelligence Exchange (BIX) User Guide
Pega Documentation on Declarative Rules