Which three of the following options come under security administration events while auditing your Pega application? (Choose Three)
Hospital XYZ wants to analyze patient data and identify those at high risk of readmission. The hospital has patient data stored in an Electronic Health Record (EHR) system, and a separate system for hospital admission records. Which two of the following are key advantages of using a Data Flow over a Queue Processor for analyzing patient data in this scenario? (Choose Two)
An application design team led by a Lead System Architect is considering the divide-and-conquer approach for most business use cases. Which two of the following reasons are benefits behind the team’s decision to use the divide-and-conquer design pattern? (Choose Two)
Lead System Architects must enforce unit testing of code while developing Pega applications. Which of the following is considered the most important benefit of unit testing in Pega Platform?
In Pega applications, the Center-out business architecture is a fine-tuned software architecture that you use to deliver customer and business outcomes. The Center-out approach gives meaningful results quickly and sustains the architecture in the future by avoiding the mistakes of the top-down and bottom-up approaches. Which two of the following statements are true about the Center-out business architecture? (Choose Two)
The test coverage report in Pega Platform helps to determine the number of rules covered during a test cycle. It is viewable at the application and user level. Which of the following statements describes the difference between these two levels?
U+ Bank has a customer service application that processes customer complaints. Now, after three years in production, the operations manager needs historical reports on resolved cases. The reports should be sent in near real-time. The data warehouse has exposed a REST API to receive the data, and the reports are then generated from the data warehouse. Which two of the following options could you use to create an ideal design solution for posting the data to the data warehouse? (Choose Two)
As a Lead System Architect, you are developing a solution for enrolling students into culinary arts training sessions that includes two distinct specializations: Baking and Confectionery. Unique rules and business logic govern each specialization. Which of the following specialization techniques is considered most appropriate in this Pega implementation?
ABC is an insurance company that provides quotes to its customers. Customers submit insurance quote requests through the ABC company website. The insurance workflow exposes a web embed to the ABC company website; the web embed uses custom bearer authentication. What are the primary uses of a custom bearer token? (Choose Two)
In a flight schedule management application, the initiation of a scheduled flight case triggers both pre-flight check and flight catering service processes. These processes require access to flight information, such as flight number, cabin class, number of seats, departure date and time, while also maintaining process-specific data elements. Which one of the following options best describes the optimal data model for meeting this requirement?
Dynamic class references (DCR) are one approach to creating a data model in a Pega implementation. Which one of the following best describes the DCR approach?
In a hospital's patient management Pega application, patient details are gathered during the initial consultation process. This information must be accessible and current for all subsequent appointments and treatments. Keeping patient information updated is crucial to effective planning and implementation of treatment. Which one of the following options would you select as a solution?
The ABC trip planner company offers a variety of services, for example, hotel bookings, flight bookings, and train bookings, all on a single platform. All the services offered have their invoice processing managed by a dedicated team of accounting specialists from the XYZ financial accounting organization. Every booking made by a customer creates a "Booking" case, which manages the booking of the required service. An "Invoice" case is also created for the verification and validation of all payments to the various stakeholders involved. For security reasons, the Invoice case contains limited information and cannot be a child case of Booking. Both are siblings that update each other. Which one of the following is the best possible solution to implement this requirement?
ABC organization has a case management application where users handle customer complaints. Each complaint case contains various details, including the following attributes: Case title: A brief description of the complaint. Creation date: The date when the complaint was registered. Complaint name: The name of the person who filed the complaint. Complaint details: A more detailed description of the issue. ABC wants to allow certain users (for example, managers and supervisors) to gain insights into complaint cases even if they do not have full read access. What is the primary purpose of the ABAC Discover policy in the case management application?
The ABC organization has a financial application built on Pega Platform™. ABC wants to extend this application to other regions in a short period of time, by deploying a large development team. As it is a very sensitive application, ABC wants to have a proper review process to ensure delivery of quality code by the team. What are the two approaches that can help ensure that proper quality check-in gates are in place to achieve this requirement? (Choose Two)