Pegasystems PEGACPLSA23V1 Certified Pega Lead System Architecture (LSA) Exam 23 Online Training
Pegasystems PEGACPLSA23V1 Online Training
The questions for PEGACPLSA23V1 were last updated at Mar 13,2025.
- Exam Code: PEGACPLSA23V1
- Exam Name: Certified Pega Lead System Architecture (LSA) Exam 23
- Certification Provider: Pegasystems
- Latest update: Mar 13,2025
When designing an effective case structure, which elements should be considered? (Select all that apply)
- A . The number of stages and steps required to complete the case.
- B . The level of integration with external systems and data sources.
- C . The availability of predefined templates for specific case types.
- D . The color scheme and layout of the case user interface.
Which of the following statements is true about the reports database in Pega Platform™?
- A . Pega Platform automatically replicates data on to Reports database schema.
- B . A table in a reports database need not have the same structure (such as columns) as its counterpart table in the PegaRULES database.
- C . Reports database schema and Pega database schema must be on the same database server.
- D . A table in a reports database must have the same structure (such as columns) as its counterpart table in the PegaRULES database.
Any suspicious activity that that a customer performs is reported to the Financial-Crimes and Enforcement (FinCEN) department for further inquiry using the customer details by the U+ Bank suspicious activity monitoring (SAM) application. The investigation status is updated in the SAM application with a REST APIs service package that is configured in the SAM application call once the investigation is completed.
Which one of the following approaches prevents other applications from accessing the SAM application using REST?
- A . Configure a cross-origin resource sharing (CORS) policy with allowed FINCEN origin, and then apply this policy to the API.
- B . Configure a custom authentication type, and then apply the authentication to the service package of the API.
- C . Configure a content security policy (CSP) with allowed FinCEN origin (URL), and then apply the policy to the application.
- D . Configure the OAuth2.0 authentication type and apply the authentication to the service package of the API.
Which one of the following object-oriented programming principles do Pega Platform component applications follow?
- A . Open/Closed
- B . Liskov Substitution
- C . Open-ended design
- D . Interface Segregation
How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?
- A . Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg-HRWork-RFP
- B . Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
- C . Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
- D . Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools
In which one of the following contexts does the sytem run data flow runs that you initiate on the Data Flows landing page?
- A . Access group
- B . System Runtime Context
- C . Async Processor requestor
- D . Batch requestor
The Center of Excellence (COE) team is performing a design review of multiple applications. The team identifies that some applications are not in line with the Center-out™ business architecture.
Which two of the following design statements are uncharacterisitc of the Center-out approach? (Choose Two)
- A . The organization currently operates in one region only, so the design has one enterprise layer and one production application layer. Separate the organization-wide assets from the assets that are specific to the production application.
- B . All the channels in an organization have their own back-end-specific business logic to retrieve and display the required data.
- C . The organization uses two different legacy database systems: define data access, and persistence with the data virtualization layer.
- D . The organization uses two different legacy database systems, so define data access and data presentation rules that are very specific to the existing database vendors. The execution of database queries is faster, and output can be displayed very quickly with this design approach.
Which two content security policies come with Pega Platform™ by default? (Choose Two)
- A . pxDefaultAllowAll
- B . pxDefaultAllowAll
- C . pxDefaultAllowAll
- D . pxDefaultSecured
Which two of the following statements is true about the reporting database feature in Pega Platform™? (Choose two)
- A . The reporting database is a replica of the PegaDATA that the developer creates to support the faster execution of the reports.
- B . The reporting database is not a replica of the PegaDATA that the system creates to support the faster execution of the reports.
- C . The reporting database does not automatically sync with PegaDATA.
- D . The reporting database automatcially syncs with PegaDATA.
Which three statements are true about attribute-based access control (ABAC)? (Choose Three)
- A . ABAC does not support encryption at the property level.
- B . Using ABAC, you must reference at least one type of RBAC rule to enforce security.
- C . The Applies-To class for every rule used by an access control policy must extend either Work- or Data-.
- D . Access control policies cannot be turned off once defined.
- E . Using ABAC, it is possible to prevent an access control policy from being overridden.
- F . ABAC allows only certain properties within a class to be masked.
- G . ABAC does not need to reference role-based access control (RBAC) rules to enforce security.