Pegasystems PEGACPLSA88V1 Certified Pega Lead System Architect (CPLSA) Exam 8.8 Online Training
Pegasystems PEGACPLSA88V1 Online Training
The questions for PEGACPLSA88V1 were last updated at Apr 21,2025.
- Exam Code: PEGACPLSA88V1
- Exam Name: Certified Pega Lead System Architect (CPLSA) Exam 8.8
- Certification Provider: Pegasystems
- Latest update: Apr 21,2025
What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over time? (Choose Two)
- A . Add indexes to all columns.
- B . Purge workparty UUI index tables periodically.
- C . Schedule scripts to maintain frequently fragmented tables.
- D . Purge and/or archive records based on the company’s record retention policy.
Users in a cloud-based production application report a chronic performance issue that occurs every day between 2:00 P.M. and 4:00 P.M. AH attempts to reproduce the problem in the Development, QA, and Staging environments have failed.
Which two techniques help you troubleshoot the problem? (Choose Two)
- A . Review Performance Alerts and Exceptions in PDC.
- B . Review a Production Tracer Log using SMA.
- C . Review Alerts and Exceptions using PLA.
- D . Review Performance Alerts and Exceptions in AES.
XYZ Corp users are experiencing delays in the application that you suspect is related to the database
Which two options do you recommend to isolate the issue? (Choose Two)
- A . Write Pega logs to the database server.
- B . Investigate when the database is used most heavily.
- C . Lower query-time-related alert thresholds.
- D . Increase the threshold for blob-size alerts.
You isolated the problem to node ! of the cluster. Y see node 1 goes down shortly «ift<rr 3:00 P.M.
every day with an out-of-memory error.
What is the likely cause of the out of-memory error?
- A . At 3:00 P.M., managers view multiple reports displaying open assignments and cases so they can plan work for the following day.
- B . At 3:00 P.M., a robotic process automation runs every day. The mapping of results to each case type horn the automation is CPU intensive.
- C . At 3:00 P.M., a job scheduler is mistakenly configured to run on a single Web Tier node that pulls an increasingly large number of records onto a clipboard page each day.
- D . At 3:00 P.M., a shift change occurs and several users login and display the" work list and dashboard.
Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.
Which configuration do you recommend?
- A . Use a visible when rule for the properties displaying sensitive information.
- B . Create an access control policy restricting access to the sensitive information.
- C . Configure an access deny rule restricting access to the sensitive information.
- D . Move sensitive information to separate sections and apply a privilege to the sections.
XYZ Corporation wants to perform extensive analysis on work party information across various case types in near real time. At the same time, XYZ wants to minimize the impact this analysis has on case workers using Pega applications.
Choose two options that would contribute to viable solutions. (Choose Two)
- A . Use Pega API RCST services to update Case and Work Party data in a reports database.
- B . Configure a reports database for the Class Group and Index WorkPartyUri Data Admm DB-Table records.
- C . Define additional database indexes for the Class Group and related Work Party tables.
- D . Use BIX to export Case and related Work Party data to a data warehouse.
A call center uses Pega Customer Service. Where does Pega Customer Service fit into the enterprise architecture?
- A . Pega Customer Set vice is the customer and account enterprise service bus.
- B . Pega Customer Service is the customer interaction system of record.
- C . Pega Customer Service is the billing and reporting system of record.
- D . Pega Customer Service is the new customer onboarding system.
One of the important requirements of Pega Web Mashup is to ensure that the same-origin policy is following.
From the following options, select two valid configurations. (Choose TWO)
- A . Configuration A
- B . Configuration B
- C . Configuration C
- D . Configuration D
Select the option in which you would define Content Security Policies.
- A . To prevent the browser to load content from untrusted sources
- B . To restrict what data a user can view in a case the user can open
- C . To define security for case attachments
- D . To configure security for the content management integration
A developer has set the Rule security mode on the access group to Deny. Select the reason for this setting.
- A . Require Access of Role to Object rules be specified for each layer in the class hierarchy and not inherited from parent classes.
- B . Deny access to a rule if the privilege of the user is not defined in an Access of Role to Object.
- C . Disable standard privileges providing administrator access to the application (for example AllFlows and AllFllowActions).
- D . Ensure that all rules with the option of specifying a privilege have a privilege. Only users with the privilege can execute the rules.