Site icon Exam4Training

Pegasystems PEGACPLSA23V1 Certified Pega Lead System Architecture (LSA) Exam 23 Online Training

Question #1

In which two scenarios the access group context can be changed for queue processors?

  • A . Run immediately
  • B . Queue-For-Processing
  • C . Queue Schedule
  • D . Run in background

Reveal Solution Hide Solution

Correct Answer: BD
Question #2

Which authorization model do you use to implement the data privacy requirements of the European Union’s General Data Protection Regulation (GDPR) and similar regulations?

  • A . Client-based access control (CBAC)
  • B . Privileged based access control (PBAC)
  • C . Role-based access control (RBAC)
  • D . Attribute-based access control (ABAC)

Reveal Solution Hide Solution

Correct Answer: A
Question #3

For which two purposes can you use a ruleset override application? (Choose Two)

  • A . To define applications that are specific to a division within an enterprise.
  • B . To aggregate multiple built-on applications into a single application
  • C . As a repository for dependency inversion-based rules.
  • D . To specialize the appearance of a page that is displayed by a web embed channel.
  • E . To create the first production application built on a framework application.

Reveal Solution Hide Solution

Correct Answer: DE
Question #4

The XYZ organization plans to adopt DevOps practices to automate its deployment process.

What are three questions to ask to help you evaluate their current situation? (Choose Three)

  • A . How much of the code base has regression test coverage?
  • B . How much of the code base has automated test coverage? How often are those tests run?
  • C . What parts of the change migration process are the most frequent, time-consuming, or error-prone?
  • D . What are all the ways through which change is introduced to production? (Rule changes, code changes, platform upgrades, schema, and runtime configuration.).

Reveal Solution Hide Solution

Correct Answer: BCD
Question #5

Select the recommended option for extending the data model provided by a pega industry framework.

  • A . Hide the data model with a custom data model.
  • B . Redefine the data model.
  • C . Specialize the data model as little as possible.
  • D . Hide the data model with an Enterprise service Bus (ESB) dictated data model.

Reveal Solution Hide Solution

Correct Answer: C
Question #6

How does a Queue Processor differ from a Job Scheduler in asynchronous processing?

  • A . A Queue Processor executes tasks immediately, while a Job Scheduler allows scheduling tasks for future processing.
  • B . A Queue Processor handles one task at a time, while a Job Scheduler can handle multiple tasks concurrently.
  • C . A Queue Processor is used for background processing, while a Job Scheduler is used for real-time tasks.
  • D . A Queue Processor requires a separate server for execution, while a Job Scheduler runs on the main application server.

Reveal Solution Hide Solution

Correct Answer: B
Question #7

You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?

  • A . create an encrypted keyring password and replace the unencypted password in prconfig.xml
  • B . create an encrypted password with PR cipherGenerator and reference the external system
  • C . create an encrypted password with passGen and replace the unencrypted password in pconfig.xml
  • D . enter a password in an application ID instance and reference the external system

Reveal Solution Hide Solution

Correct Answer: A
Question #8

Which of the following statements are most accurate about Business Events? (Choose Two)

  • A . All users working with Business Event definitions must have an unlocked Production RuleSet available to them
  • B . The default subscriber to a Business Event definition is the operator who creates it
  • C . At runtime, PRPC materializes a Business Event with a pre-defined work item
  • D . At runtime, a Business Event definition responds to a Business Event only when the current requestor holds a specific privilege
  • E . A Business Event Definition may respond to a Business Event by calling a pre-defined flow

Reveal Solution Hide Solution

Correct Answer: AE
Question #9

What are two reasons why you tune some of the Pega out-of-the-box default agents in a production environment?

  • A . The agent should not run in production.
  • B . The agent is preconfigured to run at an optimal time by default.
  • C . The agent runs more frequently than needed.
  • D . The agent runs based on node classification.

Reveal Solution Hide Solution

Correct Answer: AC
Question #10

A job scheduler with a NotifyBusinessUser activity has been created in an application to send emails every day. However, the scheduler processing is not working as expected. After thorough analysis, the production support team noticed that some other application-specific activity with the same name as NotifyBusinessUser is executed at runtime.

What is a possible reason for the scheduler to not execute the application-specific activity? (Choose two)

  • A . A sync requestor type rule does not have an application-specific access group.
  • B . An activity rule is marked as blocked in the highest version of the current application.
  • C . An activity rule is marked as blocked in the highest version of the current application.
  • D . The system runtime context does not include the application.

Reveal Solution Hide Solution

Correct Answer: CD

Question #11

A reference property can be best thought of as _____________?

  • A . a reference to an external entity that is stored in a system of record
  • B . a pointer between two pages or properties
  • C . a property that can be referenced from any context at any time
  • D . a property whose references are tracked for auditing purposes
  • E . Another term for a linked property

Reveal Solution Hide Solution

Correct Answer: B
Question #12

Which two of the following design approaches are most closely related to the concept of application layering? (Choose Two)

  • A . Liskov Substitution
  • B . Template design pattern
  • C . Polymorphism
  • D . Open-closed principle

Reveal Solution Hide Solution

Correct Answer: BD
Question #13

XYZ is an Insurance application in which CSRs update thousands of claims daily. In the UI, claim cases are displayed to the CSRs in a grid, based on filter criteria. The source for the UI grid to retrieve the cases is a list data page that sources a report definition. The report definition is configured to use Elasticsearch to improve performance.

Though Elasticsearch is configured on the report definition, the report definition fires on the database SQL query.

Which two of the following reasons explain why the report definition falls back to database SQL query, instead of using Elasticsearch? (Choose two)

  • A . The report definition is configured to retrieve distinct values.
  • B . The report definition is configured to retrieve duplicate values.
  • C . The Report definition does not perform a join.
  • D . Properties that are configured on report definitions are not included in the search results of Elasticsearch.

Reveal Solution Hide Solution

Correct Answer: AD
Question #14

ABC Company is a distributor of discount wines and uses Pega Platform™ for order tracking. There are up to 100 orders per day, with up to 40 different line items in each order specifying the product and quantity. There are up to 5,000 varieties of wines that continuously change over time as new wines are added to and dropped from the list.

ABC Company want to extend the functionality of the order tracking application to determine recent hot-selling items by recording the top 10 items ordered by volume each day. This information is populated in a table and used to ease historical reporting. Select a design solution to support this.

  • A . The job scheduler should leverage a report to easily retrieve and sort the number of items ordered in a day and record values in the historical table.
  • B . Create an advanced agent to identify the list of orders to be processed.
  • C . Use a queue processor to identify the list of orders to be processed.
  • D . Create a standard agent to perform the orders to be processed.

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Front Stage Group (FSG) wants to add a Suggestion Box to its customer-facing web site. The company plans to add a mashup interface that allows customers to fill a simple FSG-Data-Suggestion form. FSG analyzes the suggestions periodically.

If the same type of suggestion is displayed multiple times, FSG wants to ask certain members of its team to investigate, rating their findings on a scale of 1-10. Findings that rate higher than 7 are sent to an approval committee.

Which one of the following case design patterns is best suited to this request?

  • A . Data Instance First:
  • B . Data Instance After:
  • C . Divide and Conquer:
  • D . Limited Availability and Concurrency:

Reveal Solution Hide Solution

Correct Answer: A
Question #16

How can polymorphism be applied in data modeling in Pega applications? (Select all that apply)

  • A . Defining data classes that inherit properties and behavior from multiple parent classes.
  • B . Using data types to enforce strict data typing and prevent type conversion errors.
  • C . Creating multiple instances of the same data class with different data values.
  • D . Polymorphism is not applicable in data modeling; it is only used in rule resolution.

Reveal Solution Hide Solution

Correct Answer: AC
Question #17

Which three of the following options make up the three-level data modeling approach?

  • A . Logical
  • B . Physical
  • C . Conceptual
  • D . Extensible
  • E . Flexible

Reveal Solution Hide Solution

Correct Answer: ABC
Question #18

Identify the two correct statements regarding Localization wizard capabilities. (Choose Two)

  • A . Creates field value rules for all labels used in the application.
  • B . Extracts the string values from all application field values, paragraphs, and correspondence records.
  • C . Generates a package for French even though Pega provides an associated language pack.
  • D . Automatically sets the locale, base currency, and time zones based on the user’s language.

Reveal Solution Hide Solution

Correct Answer: AB
Question #19

The production support team has identified that a queue processor is not executing. The team has yet to begin debugging and identifying the root cause.

Which two of the following statements are possible reasons for the failure of the queue processor? (Choose Two)

  • A . The node that is associated with queue processor is running, but the stream node is not running.
  • B . Background processing node types are not configured in the cluster.
  • C . The stream node is up and running, but the node that is associated with the queue processor is not running.
  • D . All the nodes in the cluster are running, and the user has a privilege to execute the activity.

Reveal Solution Hide Solution

Correct Answer: AC
Question #20

What does the non-final getFlowProblemOperator activity determine in the flow error resolution process? (Choose One)

  • A . The work item that the system cannot find.
  • B . The Decision result to select the appropriate connector.
  • C . The appropriate shape to advance in the flow.
  • D . The operator to inform and the Assignment type.

Reveal Solution Hide Solution

Correct Answer: D

Question #21

In a SQL query, which of the following is an example of a complex SQL function?

  • A . UPPER()
  • B . CONCAT()
  • C . DATEPART()
  • D . LEN()

Reveal Solution Hide Solution

Correct Answer: C
Question #22

When a customer submits a credit card dispute, the application connects to an external service to retrieve all transaction made by the customer. The external service returns transactions ordered by date of transaction, in a descending, chronological order when a case worker reviews the dispute the application displays the 10 most recent transactions.

If the case worker does not see the disputed transaction in the list, the case worker can search for additional transaction the caseworker can filter search results on transaction date the transaction amount or the merchant name the search results display the 10 most recent transactions that satisfy the filter criteria. The case worker cannot paginate through the results.

How do you configure the response data transform to satisfy all of the requirements in the scenario?

  • A . configure the data transform to copy only the first 10 matching records to a page list property
  • B . configure the data transform to copy all of the records to a page list property
  • C . configure the data transform to copy all of the records to the data page
  • D . configure the data transform to use the first x pagination setting to copy only the first 10 results to the data page

Reveal Solution Hide Solution

Correct Answer: C
Question #23

How do you implement polymorphism when defining a data relationship field type during data modelling?

  • A . Map a field type to a concrete class at design-time and allow its actual type to be determined at run-time.
  • B . Map a field type to a class at design-time and allow its actual type to be determined by Pattern inheritance at run-time
  • C . Map a field type to a class at design-time and allow its actual type to be determined by Direct inheritance at runtime.
  • D . Map a field type to a class at design-time and allow its actual type to be determined by Direct inheritance at runtime.

Reveal Solution Hide Solution

Correct Answer: D
Question #24

Which two of the following reporting requirements entail the use of a subreport? (Choose Two)

  • A . The main report outputs the total number of times that a combination of column values is found, as well as subtotals for that combination that add up to that total.
  • B . An aggregated value, obtained through a join, is used to filter each main report row by comparing a value that is contained in each main report row to the aggregated value.
  • C . Subreports can combine the data by using IN, HAVING, and WITH clauses.
  • D . An aggregated value should appear in a main report when a join condition is true. If the join condition is always false, the displayed value should be either null or zero.
  • E . Each main report row is filtered based on a whether a main report row value is either included or not included within a sequence of values

Reveal Solution Hide Solution

Correct Answer: BE
Question #25

Which one of the following pieces data is not captured by Pega Predictive Diagnostic Cloud (PDC)? (Choose two)

  • A . Personally Identifiable Information (PII) data
  • B . Pega alert data
  • C . Java Virtual Machine (JVM) Metrics
  • D . SQL bind variables

Reveal Solution Hide Solution

Correct Answer: AD
Question #26

Which of the following types of testing are typically included in a comprehensive testing strategy? (Select all that apply)

  • A . Unit Testing
  • B . Performance Testing
  • C . Acceptance Testing
  • D . User Interface (UI) Testing
  • E . Regression Testing

Reveal Solution Hide Solution

Correct Answer: ABCDE
Question #27

Which of the following is a crucial aspect of security event logging?

  • A . Logging events in a human-readable format for easier analysis.
  • B . Disabling logging for non-critical events to reduce storage needs.
  • C . Storing logs on the same server where the application is hosted.
  • D . Keeping logs for only a few days before overwriting them.

Reveal Solution Hide Solution

Correct Answer: A
Question #28

A credit card dispute application has multiple integrations to fetch the card, customer, transaction, and account details. For any exceptions in these integration calls, the cases are routed to different work queues based on the nature of the exception. Analysts open the case from the work queue and perform the Retry/Resume problem flow.

What is the optimal way to implement this requirement?

  • A . Customize the Work-.getFlowProblemOperator activity and set the parameter AssignTo to the work queues based on the exception type.
  • B . Perform a save-as of the FlowProblems flow rule into your application ruleset and update the ProblemFlowWorkBasket assignment to use a decision table to return the work queue.
  • C . Perform a save-as of the FlowProblems flow rule into your application ruleset and update the ProblemFlowWorkBasket assignment, Use business logic in Route To section and use a decision tree.
  • D . Customize the Work-.getFlowProblemOperator activity, and set the OperatorToInform parameter to the work queues based on the exception type.

Reveal Solution Hide Solution

Correct Answer: D
Question #29

What is the primary advantage of using asynchronous processing with a Job Scheduler or Queue Processor?

  • A . It reduces the need for background processing altogether.
  • B . It ensures real-time processing and immediate results.
  • C . It allows the system to process tasks concurrently and improves performance.
  • D . It simplifies the overall design of the application.

Reveal Solution Hide Solution

Correct Answer: C
Question #30

Which of the following statements is most accurate regarding the PRPC data model?

  • A . In a good design there would be no business rules or processes defined in the data classes
  • B . The PRPC data model can help promote reuse via inheritance and composition
  • C . The PRPC data model should be stored in a separate RuleSet from application/business rules
  • D . The PRPC data model should always be modeled after the external systems with which it interfaces

Reveal Solution Hide Solution

Correct Answer: B

Question #31

Which three best practices can protect against cross-site scripting (XSS) attacks? (Choose Three)

  • A . PrivateAPI methods for XSS filtering.
  • B . Filter HTML and XML outputs.
  • C . PublicAPI methods for XSS filtering.
  • D . Write custom JavaScript.
  • E . Filter all inputs.

Reveal Solution Hide Solution

Correct Answer: BCE
Question #32

Which two tools and/or methods support continuous integration practices? (Choose Two)

  • A . Performing Ul regression testing
  • B . Leveraging release toggles
  • C . Using an automation server to invoke unit test suites
  • D . Configuring pre and post import steps

Reveal Solution Hide Solution

Correct Answer: BC
Question #33

Users in a cloud-based production application report a chronic performance issue that occurs every day between 2:0 P.M. and 4:00 P.M. All attempts to reproduce the problem in the Development, QA, and Staging environments have failed.

Which two techniques help you troubleshoot the problem? (Choose Two)

  • A . Review Performance Alerts and Exceptions in PDC
  • B . Review a Production Tracer Log using SMA
  • C . Review Alerts and Exceptions using PLA.
  • D . Review Performance Alerts and Exceptions in AES.

Reveal Solution Hide Solution

Correct Answer: AC
Question #34

What is the role of a "Case Designer" in the context of designing Pega applications? (Select all that apply)

  • A . Responsible for creating user interfaces and user experience design.
  • B . In charge of developing and maintaining application backend logic.
  • C . Involved in defining case hierarchy and relationships between case types.
  • D . Coordinates with stakeholders to gather business requirements.

Reveal Solution Hide Solution

Correct Answer: CD
Question #35

An HR application has an employee absentee report that is generated and sent to the respective managers on the following day based on the reporting structure.

Which of the following approaches best suits the requirement?

  • A . Generate a report and use data pages to load the data and filter on the reporting manager for their direct reports.
  • B . Generate a report based on the filters that are available as drop-down lists.
  • C . Build separate reports with the proper filter conditions.
  • D . Create appropriate reports by using subreports.

Reveal Solution Hide Solution

Correct Answer: A
Question #36

A shipping case needs to wait a specific time period before progressing in its flow. The developer is considering using a wait shape or an assignment with an SLA to perform this function.

Identify the two requirements for which a wait shape is the simpler approach. (Choose Two)

  • A . Manually step past the waiting point prior to the designated time.
  • B . Adjust the case urgency when the assignment is created
  • C . Automatically bypass locking when the assignment is created.
  • D . Present a custom UI form to the user while waiting to expire.

Reveal Solution Hide Solution

Correct Answer: BD
Question #37

What feature of Pega Platform allows you to build and execute microservices-based applications?

  • A . Pega Process Fabric
  • B . Pega Mobile
  • C . Pega Intelligent Virtual Assistant
  • D . Pega Predictive Analytics

Reveal Solution Hide Solution

Correct Answer: A
Question #38

In the context of a DevOps Release pipeline, a user typically performs what three activities? (Choose Three)

  • A . Collaborating and sharing rule modifications with fellow developers.
  • B . Ensuring that existing features continue to operate as anticipated.
  • C . Conducting unit tests.
  • D . Approving the software and initiating its deployment to the production environment.
  • E . Verifying that changes do not interfere with the work of other developers.
  • F . Evaluating new functionalities.

Reveal Solution Hide Solution

Correct Answer: BDF
Question #39

When should you consider incorporating other Pega products besides Pega Platform in your application design?

  • A . When your organization is using legacy systems that cannot be integrated with Pega Platform.
  • B . When your application requires advanced AI capabilities beyond Pega’s built-in features.
  • C . Pega Platform is sufficient for all application requirements; no other products are needed.
  • D . Only when deploying applications to the cloud.

Reveal Solution Hide Solution

Correct Answer: B
Question #40

Which two of the following reasons are the main difference between push routing and pull routing? (Choose Two)

  • A . Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing.
  • B . The behavior of push routing is configured in Rule-System-Settings , but pull routing is not.
  • C . Push routing activity names begin with the word To , and pull routing activity names begin with either Get or Find.
  • D . The security type value for push routing activities is Route, while the security type value for pull routing activities is Activity.

Reveal Solution Hide Solution

Correct Answer: AB

Question #41

The initial behavior of the case type is always the same. But the case type must ultimately change based on the type of data instance that it is associated with. The data instance’s type is not known when the case is created.

How do you implement this scenario?

  • A . For each data instance type, create a subflow. Use a Decision shape to select the appropriate subflow shape.
  • B . For each data instance type create a subcase. Use a Decision shape to select the appropriate create case flow shape.
  • C . Circumstance every rule in the case life-cycle beyond the point that the data instance’s type is determined.
  • D . Use pattern inheritance with the case type class for each data instance type. Define type-specific behavior in each specialized class.

Reveal Solution Hide Solution

Correct Answer: D
Question #42

Which three of the following requestor types can process cases? (Choose Three)

  • A . App
  • B . Portal
  • C . Batch
  • D . Batch

Reveal Solution Hide Solution

Correct Answer: ACD
Question #43

When designing reports for performance, what technique can help reduce query execution time?

  • A . Including multiple complex SQL functions in the queries.
  • B . Storing pre-aggregated data in the reporting database.
  • C . Using a higher level of normalization in the database schema.
  • D . Running reports during peak business hours to improve response time.

Reveal Solution Hide Solution

Correct Answer: B
Question #44

A linked property can be best thought of as ___________?

  • A . A reference to an external entity that is stored in a system of record
  • B . A pointer between two pages or properties
  • C . A property that can be referenced from any context at any time
  • D . A property that represents a PRPC-managed object
  • E . Another term for a reference property

Reveal Solution Hide Solution

Correct Answer: D
Question #45

In which three of the following ways can an application be specialized? (Choose Three)

  • A . Through ruleset overriding
  • B . By using decision rules
  • C . Through class inheritance
  • D . By using branching
  • E . By circumstancing

Reveal Solution Hide Solution

Correct Answer: ACE
Question #46

Which one of the following statements is true about accessibility features?

  • A . Pega Platform™ requires developers to enable accessibility features for individual access groups by adding the PegaWAI ruleset.
  • B . Pega Infinity™ applications need to remove the PegaWAI ruleset, if present, from the list of production rulesets when upgarding from the previous versions.
  • C . Accessibility Inspector can identify whether a screen reader is improperly configured for interaction with a form.
  • D . Accessibility Inspector is available in App Studio only.

Reveal Solution Hide Solution

Correct Answer: B
Question #47

Which two of the following security risks can be identified by the Rule security analyzer? (Choose Two)

  • A . Properties with incorrect type
  • B . Vulnerabilities in stream rules
  • C . Custom-written Java code
  • D . Unsecured rulesets and unlocked ruleset versions

Reveal Solution Hide Solution

Correct Answer: BC
Question #48

What does the Rule Coverage report provide in a Pega application?

  • A . A list of all Rules that did not run during a test run.
  • B . A list of all users of the application.
  • C . A list of all temporary data stored in the application.
  • D . A list of all temporary data stored in the application.

Reveal Solution Hide Solution

Correct Answer: A
Question #49

Which tasks are part of continuous integration and continuous delivery? (Select all that apply)

  • A . Running automated tests whenever new code is committed.
  • B . Manually deploying code to the production environment.
  • C . Automating the build process for application packages.
  • D . Creating a release plan and schedule for each deployment.
  • E . Conducting user acceptance testing (UAT) before each deployment.

Reveal Solution Hide Solution

Correct Answer: AC
Question #50

A case is routed to a work queue after creation in a Fraud application. The fraud analyst picks up the work using GetNextWork functionality. If the fraud analyst cannot complete the assignment, the analyst clicks Cancel so another fraud analyst can work on the assignment.

Which item can be configured to implement the above requirement?

  • A . GetNextWorkCriteria
  • B . Assign-Workbasket.GetNextWork
  • C . MoveToWorklist
  • D . GetNextWork_MoveAssignmentToWorklist

Reveal Solution Hide Solution

Correct Answer: D

Question #51

Your team is working on a project with multiple developers, and you want to ensure that the application meets functional and non-functional requirements.

What should you do?

  • A . Use a development methodology.
  • B . Use a version control system.
  • C . Use a shared development environment.
  • D . Test thoroughly.

Reveal Solution Hide Solution

Correct Answer: D
Question #52

Which of the following best describes "Role-Based Access Control (RBAC)"?

  • A . Users are granted access based on specific attributes associated with their account.
  • B . Access rights are determined by the individual user for their resources.
  • C . Users are grouped into roles, and access rights are granted to those roles.
  • D . Access is granted based on the principle of "need-to-know."

Reveal Solution Hide Solution

Correct Answer: C
Question #53

Which two of the following action are required to configure your application to support SSO authentication? (choose TWO)

  • A . configuring the authentication activity to identify the operator in the system
  • B . configure the application record to use external authentication
  • C . configure required mapping between LDAP attributes and operator properties
  • D . configure model operator records for each access group in your application

Reveal Solution Hide Solution

Correct Answer: AC
Question #54

What are two options you can use to monitor the status of nodes in the cluster of Pega Platform™?

  • A . Admin Studio
  • B . App Studio
  • C . Dev Studio
  • D . Pega Predictive Diagnostic Cloud (PDC)

Reveal Solution Hide Solution

Correct Answer: AD
Question #55

When you start designing Pega Platform™ for an enterprise application as a lead system architect (LSA), a best practice is to begin with Pega Platform in the middle of the architectural design.

What is the significance of this approach?

  • A . When you begin with Pega Platform in the middle, you have the advantage of skipping the creation of UI in the implementation.
  • B . The Pega Platform APIs that are available in Admin Studio are independent of integration protocols; you should design with Pega Platform in the middle of the architectural design.
  • C . The UI in Pega Platform applications works best only when it is integrated with front-end framework tools to render the display screens. Pega’s Cosmos Design System is supported only when you start designing with Pega Platform.
  • D . Pega Platform can integrate and communicate with front-end framework tools, back-end systems, and sibling systems. An LSA should start by understanding the technical landscape of the client enterprise, and then begin with the Pega Platform-in-the-middle design approach.

Reveal Solution Hide Solution

Correct Answer: D
Question #56

Which configuration steps do you perfrom to enable an access group for offline user?

  • A . Enable caching for the access group
  • B . configure an offline-capable portal as the default portal for the access group
  • C . Create a model operator for the access group to authienticate users.
  • D . Force a full syn for members of the access group

Reveal Solution Hide Solution

Correct Answer: B
Question #57

An application processes stock market trades. which two requirement are best implemented by an advanced agent? (Choose two)

  • A . call a service every day at 5 : 00 am to get the marker open and close time, and recird the result
  • B . create a case to audit an account if the customer trade more tha usd9999in a day
  • C . Excute a trade cae only after the stock reaches a certain price
  • D . complete unexecuted trade when the market

Reveal Solution Hide Solution

Correct Answer: AD
Question #58

Asynchronous communication is helpful in scenarios where the business logic or process execution is dependent on the response or when the request fails.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #59

What is the primary goal of a "DDoS (Distributed Denial of Service)" attack?

  • A . Stealing sensitive data from the target system.
  • B . Infecting the target system with malware.
  • C . Overloading the target system to make it unavailable to users.
  • D . Modifying the target system’s configuration.

Reveal Solution Hide Solution

Correct Answer: C
Question #60

Event-driven architectures have three key components: event producers, brokers, and consumers.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B

Question #61

When designing an effective case structure, which elements should be considered? (Select all that apply)

  • A . The number of stages and steps required to complete the case.
  • B . The level of integration with external systems and data sources.
  • C . The availability of predefined templates for specific case types.
  • D . The color scheme and layout of the case user interface.

Reveal Solution Hide Solution

Correct Answer: AB
Question #62

Which of the following statements is true about the reports database in Pega Platform™?

  • A . Pega Platform automatically replicates data on to Reports database schema.
  • B . A table in a reports database need not have the same structure (such as columns) as its counterpart table in the PegaRULES database.
  • C . Reports database schema and Pega database schema must be on the same database server.
  • D . A table in a reports database must have the same structure (such as columns) as its counterpart table in the PegaRULES database.

Reveal Solution Hide Solution

Correct Answer: D
Question #63

Any suspicious activity that that a customer performs is reported to the Financial-Crimes and Enforcement (FinCEN) department for further inquiry using the customer details by the U+ Bank suspicious activity monitoring (SAM) application. The investigation status is updated in the SAM application with a REST APIs service package that is configured in the SAM application call once the investigation is completed.

Which one of the following approaches prevents other applications from accessing the SAM application using REST?

  • A . Configure a cross-origin resource sharing (CORS) policy with allowed FINCEN origin, and then apply this policy to the API.
  • B . Configure a custom authentication type, and then apply the authentication to the service package of the API.
  • C . Configure a content security policy (CSP) with allowed FinCEN origin (URL), and then apply the policy to the application.
  • D . Configure the OAuth2.0 authentication type and apply the authentication to the service package of the API.

Reveal Solution Hide Solution

Correct Answer: A
Question #64

Which one of the following object-oriented programming principles do Pega Platform component applications follow?

  • A . Open/Closed
  • B . Liskov Substitution
  • C . Open-ended design
  • D . Interface Segregation

Reveal Solution Hide Solution

Correct Answer: A
Question #65

How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?

  • A . Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg-HRWork-RFP
  • B . Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
  • C . Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
  • D . Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools

Reveal Solution Hide Solution

Correct Answer: B
Question #66

In which one of the following contexts does the sytem run data flow runs that you initiate on the Data Flows landing page?

  • A . Access group
  • B . System Runtime Context
  • C . Async Processor requestor
  • D . Batch requestor

Reveal Solution Hide Solution

Correct Answer: A
Question #67

The Center of Excellence (COE) team is performing a design review of multiple applications. The team identifies that some applications are not in line with the Center-out™ business architecture.

Which two of the following design statements are uncharacterisitc of the Center-out approach? (Choose Two)

  • A . The organization currently operates in one region only, so the design has one enterprise layer and one production application layer. Separate the organization-wide assets from the assets that are specific to the production application.
  • B . All the channels in an organization have their own back-end-specific business logic to retrieve and display the required data.
  • C . The organization uses two different legacy database systems: define data access, and persistence with the data virtualization layer.
  • D . The organization uses two different legacy database systems, so define data access and data presentation rules that are very specific to the existing database vendors. The execution of database queries is faster, and output can be displayed very quickly with this design approach.

Reveal Solution Hide Solution

Correct Answer: BD
Question #68

Which two content security policies come with Pega Platform™ by default? (Choose Two)

  • A . pxDefaultAllowAll
  • B . pxDefaultAllowAll
  • C . pxDefaultAllowAll
  • D . pxDefaultSecured

Reveal Solution Hide Solution

Correct Answer: AD
Question #69

Which two of the following statements is true about the reporting database feature in Pega Platform™? (Choose two)

  • A . The reporting database is a replica of the PegaDATA that the developer creates to support the faster execution of the reports.
  • B . The reporting database is not a replica of the PegaDATA that the system creates to support the faster execution of the reports.
  • C . The reporting database does not automatically sync with PegaDATA.
  • D . The reporting database automatcially syncs with PegaDATA.

Reveal Solution Hide Solution

Correct Answer: AC
Question #70

Which three statements are true about attribute-based access control (ABAC)? (Choose Three)

  • A . ABAC does not support encryption at the property level.
  • B . Using ABAC, you must reference at least one type of RBAC rule to enforce security.
  • C . The Applies-To class for every rule used by an access control policy must extend either Work- or Data-.
  • D . Access control policies cannot be turned off once defined.
  • E . Using ABAC, it is possible to prevent an access control policy from being overridden.
  • F . ABAC allows only certain properties within a class to be masked.
  • G . ABAC does not need to reference role-based access control (RBAC) rules to enforce security.

Reveal Solution Hide Solution

Correct Answer: EFG

Question #71

The application contains a property named claimid. You want to business users to reuse this property in any new case types they create.

How do you define the claimid property?

  • A . As a final rule
  • B . As a case level property
  • C . As an enterprise class level property
  • D . As a relevant record

Reveal Solution Hide Solution

Correct Answer: D
Question #72

In the context of a DevOps Release pipeline, a developer typically performs what four activities? (Choose Four)

  • A . Giving approval for the software and facilitating its deployment to the production environment.
  • B . Distributing rule modifications among other developers.
  • C . Setting up feature toggles.
  • D . Executing unit tests.
  • E . Verifying that existing functionalities continue to perform as intended.
  • F . Confirming that alterations do not clash with other developers’ work.

Reveal Solution Hide Solution

Correct Answer: BCDF
Question #73

Which one of the following statements is true about mapping data from a system of record to an industry foundation Data Model?

  • A . The mechanics of how data maps is the primary concern of a Lead System Architect (LSA).
  • B . Every property retrieved from an interface must map to the business Data Model before an application can go live.
  • C . Using a center of excellence (COE) can help ensure consistent implementation of the industry foundation Data Model.
  • D . Maintaining a data dictionary is a wasteful use of team resources.

Reveal Solution Hide Solution

Correct Answer: C
Question #74

A user report poor application performance at 5:00 pm yesterday. which two tools do you use to review the user’s session to identify the cause of the poor performance ? (Choose Two)

  • A . Alerts log
  • B . tracer
  • C . performance profiler
  • D . my performance Details report

Reveal Solution Hide Solution

Correct Answer: AD
Question #75

What are two ways to define a trend report with a chart that displays the number of Cases that users create and resolve each day? (Choose Two)

  • A . Use a series of subreports.
  • B . Define and report against a Timeline table.
  • C . Use a complex SQL.
  • D . Define and report against a custom history table.

Reveal Solution Hide Solution

Correct Answer: BD
Question #76

Which of the following statements most accurately describes dependency management?

  • A . The waiting case can move forward only when all cases it is waiting for are completed
  • B . In order for 2 cases to depend on each other, they should have a direct parent-child relationship
  • C . The dependency configuration could be done through the case type rule form of the top- level case
  • D . A dependency can be configured to instantiate a case when another case has started

Reveal Solution Hide Solution

Correct Answer: D
Question #77

What is the primary purpose of App Studio in Pega application development?

  • A . To manage the deployment process and track application versions.
  • B . To design and customize user interfaces for the application.
  • C . To facilitate collaboration between business and IT teams.
  • D . To create data models and define data relationships.

Reveal Solution Hide Solution

Correct Answer: B
Question #78

Whose primary responsibility is it to monitor and address security alerts and events in a Pega Platform™ application?

  • A . Senior System Architect
  • B . Citizen Developer
  • C . Security Administrator
  • D . Lead System Architect

Reveal Solution Hide Solution

Correct Answer: C
Question #79

What are some best practices for extending an existing data model in Pega applications? (Select all that apply)

  • A . Avoiding direct changes to the core data classes to maintain upgradability.
  • B . Creating separate copies of data classes for each extension to prevent conflicts.
  • C . Using the "Apply Data Model Changes" wizard to propagate changes to related applications.
  • D . Collaborating with business stakeholders to define the scope and requirements of the extension.

Reveal Solution Hide Solution

Correct Answer: ACD
Question #80

When designing a reporting strategy based on business needs, what is the primary consideration?

  • A . The aesthetic design and layout of the reports.
  • B . The complexity of SQL functions used in the queries.
  • C . The frequency and timeliness of the report updates.
  • D . The size of the database where the reports are stored.

Reveal Solution Hide Solution

Correct Answer: C

Question #81

What is the significance of Center-out business architecture in designing Pega enterprise applications?

  • A . It focuses on building applications around the user interface for a seamless user experience.
  • B . It emphasizes creating a centralized business logic layer for better scalability and performance.
  • C . It prioritizes the integration of various backend systems to streamline data flow.
  • D . It promotes a mobile-first approach to application design.

Reveal Solution Hide Solution

Correct Answer: B
Question #82

The clipboard contains a list of details for all companies on the NASDAQ stock Exchange. Select the requirement that indicates you use a page list instead of a page group.

  • A . A DATA transform must iterate over the list.
  • B . company details must be referenced using the company stock triker.
  • C . the list must be sorted by company stock ticker.
  • D . Each element in the list of companies must contain a list of accounts.

Reveal Solution Hide Solution

Correct Answer: C
Question #83

An e-commerce site deals with multiple orders daily. The site wants to provide discounts for the top customers based on the purchase amount in the previous month. On the last day of every month, top buyers are identified based on the purchase amount and the discounts are applied on the first item purchased in the next month.

Which optimal background mechanism do you use to retrieve the top 10 buyers from the following options?

  • A . Advanced agent
  • B . File listener
  • C . Job scheduler
  • D . Queue processor

Reveal Solution Hide Solution

Correct Answer: C
Question #84

As a software developer, you are tasked with implementing scenario testing for your application.

Which three of the following options are the benefits of scenario testing? (Choose Three)

  • A . Scenario testing provides a realistic context for testing, which can reveal unique issues.
  • B . Scenario testing is not important to the overall application quality.
  • C . Scenario testing helps with the early detection of issues.
  • D . Scenario testing helps in understanding how the application behaves in different scenarios.
  • E . Scenario testing is unnecessary as it does not impact the overall quality of the application.

Reveal Solution Hide Solution

Correct Answer: ACD
Question #85

To secure a Pega application in production, which of the following is the best practice for password management?

  • A . Storing passwords in plaintext format in a secure database.
  • B . Implementing multi-factor authentication (MFA) for all user accounts.
  • C . Sharing passwords with other team members through email.
  • D . Using default passwords for application logins.

Reveal Solution Hide Solution

Correct Answer: B
Question #86

In which of the following rule types can you configure privileges? (Choose Five)

  • A . Correspondence
  • B . Report definitions
  • C . Data pages
  • D . Attachment category rules
  • E . Connect REST
  • F . Parse structured rules
  • G . Rule utility functions

Reveal Solution Hide Solution

Correct Answer: ABCDF
Question #87

Which of the following terms refers to the total experience of a user, whether intended or not?

  • A . UX
  • B . AI
  • C . IT
  • D . UI

Reveal Solution Hide Solution

Correct Answer: A
Question #88

A many-to-many relationship is defined between a Pega Platform™ version 8.8 case type and a data type within an application that is not specialized by division.

Which two of the following statements is true?

  • A . A data reference property is created on the Data Model tab of the case type.
  • B . A class is created under [ORG]-[APP]-Data that extends Link- .
  • C . A class is created under [ORG]-[APP]-Link
  • D . A class is created with an [ORG]-[APP]-Data that extends Link-.

Reveal Solution Hide Solution

Correct Answer: AC
Question #89

You need to automate a claim adjudication process in which files containing claims are parsed, verified, and adjudicated. Claims which pass those initial steps are automatically created for further processing. A single file containing up to 1,000 claims is received daily before 5:00 PM.

Claim verification is simple and takes a few milliseconds, but claim adjudication might take up to five minutes.

Which two design options best fit this solution?

  • A . Create a queue processor to perform the calculation. Use a Run in background to call the queue processor. Pause the case processing and wait for the queue processor to complete processing.
  • B . Create an advanced agent to identify all the cases for adjudication with status as Pending-Adjudication.
  • C . Create a job scheduler to fetch all the claims with status as Pending-Adjudication and process for calculation.
  • D . Create a standard agent to perform the case processing and calculation.
  • E . In an activity, invoke the Queue-For-Processing method against each claim.

Reveal Solution Hide Solution

Correct Answer: AE
Question #90

Which two of the following routing activities leverage the @pickBalancedOperator() function? (Choose Two)

  • A . ToLeveledGroup
  • B . ToWorkGroup
  • C . ToSkilledGroup
  • D . ToSkilledWorkbasket

Reveal Solution Hide Solution

Correct Answer: AC

Question #91

A customer service representative (CSR) needs to launch multiple applications to manually update information to keep dam synchronized across systems. The applications are built in different technologies, decreasing the CSR’s efficiency in handling customer requests.

The client has a requirement to launch all applications from the PLCJA Customer service application. The client requires that data Mows to and from the Pega Customer Service application to the other applications used by the CSR.

Changes made in any one of the systems is reflected in other relevant systems. This results in the CSR handling customer requests more efficiently and spending less time manually updating dependent applications.

Which Pega capability do you recommend to support this requirement?

  • A . Use SQL connectors to update the data.
  • B . Use Robotic Process Automation.
  • C . Use SOAP/REST services to update the information.
  • D . Use Robotic Desktop Automation.

Reveal Solution Hide Solution

Correct Answer: B
Question #92

Consider a scenario in which an insurance company publishes policies and regulations based on many different types of vehicles and has its workflow defined accordingly. The company plans to add more vehicle types in the future.

Which approach best suits this scenario?

  • A . Class specialization
  • B . Application specialization
  • C . Ruleset specialization
  • D . Circumstancing

Reveal Solution Hide Solution

Correct Answer: A
Question #93

The SLA and the customer’s system administrator are reviewing scenarios that do not require an application server restart.

Select three scenarios from this list. (choose three)

  • A . When deploying rule only hotflxes
  • B . When changing the prweb web.xml file
  • C . When changing the system name
  • D . When the deploying new rules
  • E . When the prlogging.xml file is modified

Reveal Solution Hide Solution

Correct Answer: ADE
Question #94

What are the are two main goals of the Lead System Architect mission? (Choose Two)

  • A . Solidify techniques for advanced Rule configuration.
  • B . Learn how asynchronous integration works.
  • C . Evaluate identified design options to form a recommended solution.
  • D . Identify design options for particular situations.

Reveal Solution Hide Solution

Correct Answer: CD
Question #95

If the flow pauses at an Assignment named pzStageProblems, what is the best possible action to take? (Choose One)

  • A . Cancel the Assignment or change the Stage.
  • B . Restart the Stage or cancel the Assignment.
  • C . Cancel the Assignment or reassign the Assignment.
  • D . Change the Stage or restart Stage.

Reveal Solution Hide Solution

Correct Answer: A
Question #96

Your organization uses a large number of business intelligence (BI) reports.

Which two approaches are good solutions when you develop a reporting strategy?

  • A . Elasticsearch
  • B . Data archive
  • C . BIX
  • D . Data warehouse

Reveal Solution Hide Solution

Correct Answer: CD
Question #97

What are two ways to minimize or avoid data integrity issues?

  • A . Do not persist values that are derivable, such as counts and categorizations, and that are subject to change.
  • B . Follow the single source of truth principle (SSOT).
  • C . Avoid using properties that represent a version or as-of-date.
  • D . Store critical data within multiple tables to prevent data loss.

Reveal Solution Hide Solution

Correct Answer: AB
Question #98

You want a group of users to view certain properties in a case without being able to open the case.

Which one of the following solutions do you implement?

  • A . Role-based access control Read action
  • B . Role-based access control privilege
  • C . Attribute-based access control Discover action
  • D . Attribute-based access control Property Read action

Reveal Solution Hide Solution

Correct Answer: C
Question #99

XYZ Corporation wants to perform extensive analysis on work party information across various case types in near real time. At the same time, XYZ wants to minimize the impact this analysis has on case workers using Pega applications.

Choose two options that would contribute to viable solutions. (Choose Two)

  • A . Use Pega API RCST services to update Case and Work Party data in a reports database.
  • B . Configure a reports database for the Class Group and Index WorkPartyUri Data Admm DB-Table records.
  • C . Define additional database indexes for the Class Group and related Work Party tables.
  • D . Use BIX to export Case and related Work Party data to a data warehouse.

Reveal Solution Hide Solution

Correct Answer: BD
Question #100

Multiple case types within the Booking application’s case hierarchy can produce FSG-Data-Pricing records, BookEvent and VehicleParking, for example. To generate a customer’s invoice, the Booking team needs to collect every Pricing record related to a given BookEvent case.

Which of the following approaches should be used as part of solution?

  • A . Define an FSG-Booking-Work-BookEvent Report Definition that defines a JOIN to FSG-Booking-Work-BookEvent aliased as “CHILD”. The JOIN compares pyOrigOrg values. The Query tab’s filter condition compares CHILD.pzInsKey to the pxCoveredInsKeys ValueList which generates an ((A = B) or (A = C) or…) clause.
  • B . Define an SQL Function named isInCaseHierachy() that takes two parameters, one being the passed-in pyID of the parent case, the other being the Reference property within the FSG-Data-Pricing record Pricing record.
  • C . Define an FSG-Booking-Work subreport that uses Do Not JOIN rows. The main FSG-Booking-Work-BookEvent Report Definition declares a ParentKey parameter which is passed to the subreport. The subreport filters on pxCoveredInsKey = param.ParentKey. Main report filters on pzInsKey = SUBRPT.pxCoveredInsKey which generates an IN clause. The main report OR’s that filter with pzInsKey = param.ParentKey
  • D . Define an FSG-Booking-Data-CaseHierarchy class. Within each row of that class, both the pyID of the BookEvent case and the pyID of a BookEvent child case are persisted. That generated table is joined to FSG-Data-Pricing’s Reference property.

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version