Pegasystems PEGACPLSA23V1 Certified Pega Lead System Architecture (LSA) Exam 23 Online Training
Pegasystems PEGACPLSA23V1 Online Training
The questions for PEGACPLSA23V1 were last updated at Mar 12,2025.
- Exam Code: PEGACPLSA23V1
- Exam Name: Certified Pega Lead System Architecture (LSA) Exam 23
- Certification Provider: Pegasystems
- Latest update: Mar 12,2025
In which two scenarios the access group context can be changed for queue processors?
- A . Run immediately
- B . Queue-For-Processing
- C . Queue Schedule
- D . Run in background
Which authorization model do you use to implement the data privacy requirements of the European Union’s General Data Protection Regulation (GDPR) and similar regulations?
- A . Client-based access control (CBAC)
- B . Privileged based access control (PBAC)
- C . Role-based access control (RBAC)
- D . Attribute-based access control (ABAC)
For which two purposes can you use a ruleset override application? (Choose Two)
- A . To define applications that are specific to a division within an enterprise.
- B . To aggregate multiple built-on applications into a single application
- C . As a repository for dependency inversion-based rules.
- D . To specialize the appearance of a page that is displayed by a web embed channel.
- E . To create the first production application built on a framework application.
The XYZ organization plans to adopt DevOps practices to automate its deployment process.
What are three questions to ask to help you evaluate their current situation? (Choose Three)
- A . How much of the code base has regression test coverage?
- B . How much of the code base has automated test coverage? How often are those tests run?
- C . What parts of the change migration process are the most frequent, time-consuming, or error-prone?
- D . What are all the ways through which change is introduced to production? (Rule changes, code changes, platform upgrades, schema, and runtime configuration.).
Select the recommended option for extending the data model provided by a pega industry framework.
- A . Hide the data model with a custom data model.
- B . Redefine the data model.
- C . Specialize the data model as little as possible.
- D . Hide the data model with an Enterprise service Bus (ESB) dictated data model.
How does a Queue Processor differ from a Job Scheduler in asynchronous processing?
- A . A Queue Processor executes tasks immediately, while a Job Scheduler allows scheduling tasks for future processing.
- B . A Queue Processor handles one task at a time, while a Job Scheduler can handle multiple tasks concurrently.
- C . A Queue Processor is used for background processing, while a Job Scheduler is used for real-time tasks.
- D . A Queue Processor requires a separate server for execution, while a Job Scheduler runs on the main application server.
You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?
- A . create an encrypted keyring password and replace the unencypted password in prconfig.xml
- B . create an encrypted password with PR cipherGenerator and reference the external system
- C . create an encrypted password with passGen and replace the unencrypted password in pconfig.xml
- D . enter a password in an application ID instance and reference the external system
Which of the following statements are most accurate about Business Events? (Choose Two)
- A . All users working with Business Event definitions must have an unlocked Production RuleSet available to them
- B . The default subscriber to a Business Event definition is the operator who creates it
- C . At runtime, PRPC materializes a Business Event with a pre-defined work item
- D . At runtime, a Business Event definition responds to a Business Event only when the current requestor holds a specific privilege
- E . A Business Event Definition may respond to a Business Event by calling a pre-defined flow
What are two reasons why you tune some of the Pega out-of-the-box default agents in a production environment?
- A . The agent should not run in production.
- B . The agent is preconfigured to run at an optimal time by default.
- C . The agent runs more frequently than needed.
- D . The agent runs based on node classification.
A job scheduler with a NotifyBusinessUser activity has been created in an application to send emails every day. However, the scheduler processing is not working as expected. After thorough analysis, the production support team noticed that some other application-specific activity with the same name as NotifyBusinessUser is executed at runtime.
What is a possible reason for the scheduler to not execute the application-specific activity? (Choose two)
- A . A sync requestor type rule does not have an application-specific access group.
- B . An activity rule is marked as blocked in the highest version of the current application.
- C . An activity rule is marked as blocked in the highest version of the current application.
- D . The system runtime context does not include the application.