Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ACD201 Exam Dumps - Appian Senior Developer

Go to page:
Question # 17

You're creating a synced record type which will store read-only data from an external web service. Data in the external system is updated nightly, and the latest information must be available to users in the morning. Currently there are approximately 150,000 entries in the external system, and this number is not expected to change significantly.

There is an existing integration object and associated expression rule, which when called returns the complete dataset from the external system.

What are two configurations that you must apply to ensure that the latest and complete record set is available? (Choose two.)

A.

Within the record type, schedule a full sync to occur nightly after the data is refreshed in the external system.

B.

Modify the integration object and associated expression rule to return batches of 1000 based on a batch number passed in from the record type.

C.

Within the Source Filters settings on the record type, disable the row limit option so that all entries can be retrieved from the external system.

D.

Set all record fields to evaluate in real-time so that the latest information is always retrieved from the web service.

Full Access
Question # 18

You're the administrator of your insurance company’s case management system. You need to limit insurance agents to only those clients to which they have been assigned.

Which two statements must be true for one way to configure Record-Level security for the Customer record? (Choose two.)

A.

Record-level security means agents must have permission to view the record type and permission to edit the records.

B.

A new record-level security rule should be created using the Users found in fields option to specify that if a user is found in the "assignedAgent" field (which is a type User), then they can see their cases.

C.

Data sync should be enabled.

D.

A condition should be added to the record-level security rule to specify which cases specifically named agents can access.

Full Access
Question # 19

You need to create a process workflow for employee background investigations. This workflow takes an average of six months from start to completion. There are multiple phases to the background investigation which must be completed by people in different departments. Each department is responsible for inputting a large amount of data as part of the workflow.

There is an emphasis on process memory management since thousands of these investigations will happen concurrently.

What are two best practices that you should employ when designing this process workflow? (Choose two.)

A.

Utilize a record-backed design throughout the workflow where data entered by users is saved to and queried from the database.

B.

Combine all stages of the workflow into a single process model, so that data can be efficiently shared between nodes using process variables.

C.

Divide the workflow into multiple process models so that each process can be short-lived and consume less memory.

D.

Ensure that the data management policy is set to archive the process instances after a minimum of six months, so that data is available throughout the workflow.

Full Access
Question # 20

You're developing a user input form for a financial services application.

One component of this form requires you to embed an external site (in the form of a URL) that can receive inputs from Appian and return updates as the user interacts with it.

What should you do?

A.

Use an integration to achieve interaction with the embedded site while displaying information in the Appian out-of-the-box Web Content Component. That way you can refresh for updates and interact with the site.

B.

Use the Appian out-of-the-box Web Content Component. It can display content from a URL and provide both additional inputs, or receive updates as the user interacts with the embedded site.

C.

Use a component plug-in to achieve interaction with the embedded site, because this use case requires input-output or event parameters.

Full Access
Question # 21

You're refining a story for a centralized distribution center that extends the current application by allowing inventory managers to review orders.

These orders are created through a record action that various workshops access from a shared Appian site.

Which consideration best suits this use case?

A.

How will you handle errors resulting from a failed integration as a result of the workshops using an external system to place orders?

B.

What are the personas that will be utilizing this application so that an Appian group structure can be developed and maintained?

C.

What components have already been built relating to this piece of functionality so that you can reuse them and speed up development?

Full Access
Question # 22

You're developing a user input form for a government services application that includes a file upload component.

If the uploaded file is a multimedia file (for example: .MP4, .MOV or .WAV), the customer wants these uploaded to Microsoft SharePoint instead.

What is the best way to achieve this requirement?

A.

Use the out-of-the-box Appian Connected System, but since it does not have any pre-built connected systems, you will need to use either a HTTP or OpenAI Connected System to connect with SharePoint.

B.

Develop a connected system plug-in given SharePoint has an extensive API that cannot easily be resolved using the Appian out-of-the-box Connected System.

C.

Use the out-of-the-box Appian Connected System as it has a pre-built connected system to SharePoint to provide a guided experience for designers to send and receive data.

Full Access
Question # 23

You’re making a POST request to the Appian web API. You need to include complex data structures, such as lists or objects, in the request body.

How should you design the API to accept those requests?

A.

Use query parameters to represent the complex data structures.

B.

Use XML format to represent the complex data structures in the request body.

C.

Convert the complex data structures to JSON and include them in the request body as a string.

Full Access
Question # 24

There are two record types, ABC and XYZ, with sync enabled. The XYZ record type is added as a relationship into the ABC record type.

A user has Viewer permission to the ABC record type but does not have access to the XYZ record type.

A site page is presented to the user where the data is sourced from the ABC record type and its related record type the XYZ reference.

What information does the user see on the site page?

A.

Page is presented to the user and the data references to the XYZ record type appear as "null".

B.

Page is presented to the user with the XYZ record type data and fields references redacted.

C.

Page does not load and an error message is presented: "The record type [identifier=XYZ] does not exist, has been deleted, or you do not have sufficient privileges to access its data."

Full Access
Go to page: