Search
Configuring security policies
-
Challenge
Configuring security policies
2 Tasks
5 mins
-
GogoRoad is experiencing a large number of failed login attempts. Management suspects that the attempts are malicious attacks by an internet bot...
Configuring parallel processing
-
Challenge
Configuring parallel processing
4 Tasks
20 mins
-
At TGB, candidates for an open position are interviewed by multiple team members. The existing interview Process in the HRApps application only allows...
Configuring Case locking
-
Challenge
Configuring Case locking
1 Task
10 mins
-
At TGB, candidates applying for an open position are interviewed by three to six existing employees. Each interviewer can independently rate a...
Configuring Flow Action post-processing
-
Challenge
Configuring Flow Action post-processing
2 Tasks
20 mins
-
Currently, the Candidate Case Type creates a candidate stakeholder to represent a job applicant and adds the candidate stakeholder to the Case at the...
Creating a new service request
-
Challenge
Creating a new service request
4 Tasks
10 mins
-
U+ Bank wants to offer its employees lunch services by creating a service request in which employees can select and then submit what they want to eat...
Creating a robotic test solution for Citrix
-
Challenge
Creating a robotic test solution for Citrix
6 Tasks
30 mins
Pega Robotic Automation 19.1 -
The client company ABC Enterprises needs a Citrix Robotic solution that allows users to manage their legacy applications. Create a test solution to...
Dismissing a Citrix logon window
-
Challenge
Dismissing a Citrix logon window
4 Tasks
20 mins
Pega Robotic Automation 19.1 -
As a developer, you are tasked with creating a Citrix robotic solution for your company to allow users to manage a legacy application in a mixed mode...
Monitoring the guardrail compliance score
-
Challenge
Monitoring the guardrail compliance score
2 Tasks
10 mins
-
The GoGoRoad application development team has completed and checked in their work for the day. You evaluate the quality of their work by viewing the...
Securing an application using attribute-based access control
-
Challenge
Securing an application using attribute-based access control
4 Tasks
30 mins
-
Each candidate Case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...
Securing an application using role-based access control
-
Challenge
Securing an application using role-based access control
2 Tasks
20 mins
-
In the Employee Evaluation case, TGB provides an optional, case-wide action to update an employee’s goals. The Human Resources (HR) department...