Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Pegasystems PEGAPCSSA86V1 - Pega Certified Senior System Architect (PCSSA) 86V1

Page: 3 / 3
Total 92 questions

A courier company wants a mobile app to scan and track the parcels collected from remote areas with no internet access.

Which mobile app do you develop to fulfill the requirement?

A.

Signed app

B.

Unsigned app

C.

Native app

D.

SDK app

Which two statements are valid regarding Pega Web Mashup? (Choose Two)

A.

Pega Platform limits mashup users to working on existing cases.

B.

Mashup requests are checked for the corresponding mashup channel ID parameter.

C.

A mashup can allow access to Dev Studio for full system configuration.

D.

A user can view their worklist in an external portal and select items on which to take action.

The Static Assembler is used to address rules assembly issues due to which cause?

A.

The server is managing a large number of rules caches.

B.

Access groups contain multiple production rulesets.

C.

A new application is migrated to the production system.

D.

The application record lists several branch rulesets.

Which two configurations can you use to include access groups into your Product rule? (Choose Two)

A.

Associate the access groups with a ruleset included in the application.

B.

Export the access groups using the Access Manager.

C.

Add the access groups to the application definition.

D.

Add the access group to the Product record in the Individual instances to include section.

Which statement is true about connectors?

A.

Connectors use a listener that runs in the background.

B.

Connectors establish a link to a service on another system.

C.

Connectors require a REST service to function.

D.

Connectors can be referenced from data transforms.

Which three mobile device features can you leverage by using Pega Mobile Client? (Choose Three)

A.

Barcode scanning

B.

Text messages

C.

Biometric identification

D.

Push notifications

E.

Phone calls

Consider the following requirement: An auditing policy explicitly requires that employees cannot see the contents of complaints made against themselves.

Which security solution do you use to satisfy the requirement?

A.

Access of Role to Object

B.

Access Control Policy

C.

Access When

D.

Access Deny