The safer , easier way to help you pass any IT exams. 1 / 9 Pegasystems PEGACPLSA23V1 Exam Certified Pega Lead System Architecture (LSA) Exam 23 https://www.passquestion.com/pegacplsa23v1.html 35% OFF on All, Including PEGACPLSA23V1 Questions and Answers P ass Pegasystems PEGACPLSA23V1 Exam with PassQuestion PEGACPLSA23V1 questions and answers in the first attempt. https://www.passquestion.com/ The safer , easier way to help you pass any IT exams. 2 / 9 1.In which two scenarios the access group context can be changed for queue processors? A. Run immediately B. Queue-For-Processing C. Queue Schedule D. Run in background Answer: BD 2.Which authorization model do you use to implement the data privacy requirements of the European Union ’ s General Data Protection Regulation (GDPR) and similar regulations? A. Client-based access control (CBAC) B. Privileged based access control (PBAC) C. Role-based access control (RBAC) D. Attribute-based access control (ABAC) Answer: A 3.For which two purposes can you use a ruleset override application? (Choose Two) A. To define applications that are specific to a division within an enterprise. B. To aggregate multiple built-on applications into a single application C. As a repository for dependency inversion-based rules. D. To specialize the appearance of a page that is displayed by a web embed channel. E. To create the first production application built on a framework application. Answer: DE 4.The XYZ organization plans to adopt DevOps practices to automate its deployment process. What are three questions to ask to help you evaluate their current situation? (Choose Three) A. How much of the code base has regression test coverage? B. How much of the code base has automated test coverage? How often are those tests run? C. What parts of the change migration process are the most frequent, time-consuming, or error-prone? D. What are all the ways through which change is introduced to production? (Rule changes, code changes, platform upgrades, schema, and runtime configuration.). Answer: BCD 5.Select the recommended option for extending the data model provided by a pega industry framework. A. Hide the data model with a custom data model. B. Redefine the data model. C. Specialize the data model as little as possible. D. Hide the data model with an Enterprise service Bus (ESB) dictated data model. Answer: C 6.How does a Queue Processor differ from a Job Scheduler in asynchronous processing? A. A Queue Processor executes tasks immediately, while a Job Scheduler allows scheduling tasks for future processing. The safer , easier way to help you pass any IT exams. 3 / 9 B. A Queue Processor handles one task at a time, while a Job Scheduler can handle multiple tasks concurrently. C. A Queue Processor is used for background processing, while a Job Scheduler is used for real-time tasks. D. A Queue Processor requires a separate server for execution, while a Job Scheduler runs on the main application server. Answer: B 7.You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password? A. create an encrypted keyring password and replace the unencypted password in prconfig.xml B. create an encrypted password with PR cipherGenerator and reference the external system C. create an encrypted password with passGen and replace the unencrypted password in pconfig.xml D. enter a password in an application ID instance and reference the external system Answer: A 8.Which of the following statements are most accurate about Business Events? (Choose Two) A. All users working with Business Event definitions must have an unlocked Production RuleSet available to them B. The default subscriber to a Business Event definition is the operator who creates it C. At runtime, PRPC materializes a Business Event with a pre-defined work item D. At runtime, a Business Event definition responds to a Business Event only when the current requestor holds a specific privilege E. A Business Event Definition may respond to a Business Event by calling a pre-defined flow Answer: AE 9.What are two reasons why you tune some of the Pega out-of-the-box default agents in a production environment? A. The agent should not run in production. B. The agent is preconfigured to run at an optimal time by default. C. The agent runs more frequently than needed. D. The agent runs based on node classification. Answer: AC 10.A job scheduler with a NotifyBusinessUser activity has been created in an application to send emails every day. However, the scheduler processing is not working as expected. After thorough analysis, the production support team noticed that some other application-specific activity with the same name as NotifyBusinessUser is executed at runtime. What is a possible reason for the scheduler to not execute the application-specific activity? (Choose two) A. A sync requestor type rule does not have an application-specific access group. B. An activity rule is marked as blocked in the highest version of the current application. C. An activity rule is marked as blocked in the highest version of the current application. D. The system runtime context does not include the application. Answer: CD The safer , easier way to help you pass any IT exams. 4 / 9 11.A reference property can be best thought of as _____________? A. a reference to an external entity that is stored in a system of record B. a pointer between two pages or properties C. a property that can be referenced from any context at any time D. a property whose references are tracked for auditing purposes E. Another term for a linked property Answer: B 12.Which two of the following design approaches are most closely related to the concept of application layering? (Choose Two) A. Liskov Substitution B. Template design pattern C. Polymorphism D. Open-closed principle Answer: BD 13.XYZ is an Insurance application in which CSRs update thousands of claims daily. In the UI, claim cases are displayed to the CSRs in a grid, based on filter criteria. The source for the UI grid to retrieve the cases is a list data page that sources a report definition. The report definition is configured to use Elasticsearch to improve performance. Though Elasticsearch is configured on the report definition, the report definition fires on the database SQL query. Which two of the following reasons explain why the report definition falls back to database SQL query, instead of using Elasticsearch? (Choose two) A. The report definition is configured to retrieve distinct values. B. The report definition is configured to retrieve duplicate values. C. The Report definition does not perform a join. D. Properties that are configured on report definitions are not included in the search results of Elasticsearch. Answer: AD 14.ABC Company is a distributor of discount wines and uses Pega Platform ™ for order tracking. There are up to 100 orders per day, with up to 40 different line items in each order specifying the product and quantity. There are up to 5,000 varieties of wines that continuously change over time as new wines are added to and dropped from the list. ABC Company want to extend the functionality of the order tracking application to determine recent hot-selling items by recording the top 10 items ordered by volume each day. This information is populated in a table and used to ease historical reporting. Select a design solution to support this. A. The job scheduler should leverage a report to easily retrieve and sort the number of items ordered in a day and record values in the historical table. B. Create an advanced agent to identify the list of orders to be processed. C. Use a queue processor to identify the list of orders to be processed. D. Create a standard agent to perform the orders to be processed. The safer , easier way to help you pass any IT exams. 5 / 9 Answer: A 15.Front Stage Group (FSG) wants to add a Suggestion Box to its customer-facing web site. The company plans to add a mashup interface that allows customers to fill a simple FSG-Data-Suggestion form. FSG analyzes the suggestions periodically. If the same type of suggestion is displayed multiple times, FSG wants to ask certain members of its team to investigate, rating their findings on a scale of 1-10. Findings that rate higher than 7 are sent to an approval committee. Which one of the following case design patterns is best suited to this request? A. Data Instance First: B. Data Instance After: C. Divide and Conquer: D. Limited Availability and Concurrency: Answer: A 16.How can polymorphism be applied in data modeling in Pega applications? (Select all that apply) A. Defining data classes that inherit properties and behavior from multiple parent classes. B. Using data types to enforce strict data typing and prevent type conversion errors. C. Creating multiple instances of the same data class with different data values. D. Polymorphism is not applicable in data modeling; it is only used in rule resolution. Answer: AC 17.Which three of the following options make up the three-level data modeling approach? A. Logical B. Physical C. Conceptual D. Extensible E. Flexible Answer: ABC 18.Identify the two correct statements regarding Localization wizard capabilities. (Choose Two) A. Creates field value rules for all labels used in the application. B. Extracts the string values from all application field values, paragraphs, and correspondence records. C. Generates a package for French even though Pega provides an associated language pack. D. Automatically sets the locale, base currency, and time zones based on the user's language. Answer: AB 19.The production support team has identified that a queue processor is not executing. The team has yet to begin debugging and identifying the root cause. Which two of the following statements are possible reasons for the failure of the queue processor? (Choose Two) A. The node that is associated with queue processor is running, but the stream node is not running. B. Background processing node types are not configured in the cluster. C. The stream node is up and running, but the node that is associated with the queue processor is not The safer , easier way to help you pass any IT exams. 6 / 9 running. D. All the nodes in the cluster are running, and the user has a privilege to execute the activity. Answer: AC 20.What does the non-final getFlowProblemOperator activity determine in the flow error resolution process? (Choose One) A. The work item that the system cannot find. B. The Decision result to select the appropriate connector. C. The appropriate shape to advance in the flow. D. The operator to inform and the Assignment type. Answer: D 21.In a SQL query, which of the following is an example of a complex SQL function? A. UPPER() B. CONCAT() C. DATEPART() D. LEN() Answer: C 22.When a customer submits a credit card dispute, the application connects to an external service to retrieve all transaction made by the customer. The external service returns transactions ordered by date of transaction, in a descending, chronological order when a case worker reviews the dispute the application displays the 10 most recent transactions. If the case worker does not see the disputed transaction in the list, the case worker can search for additional transaction the caseworker can filter search results on transaction date the transaction amount or the merchant name the search results display the 10 most recent transactions that satisfy the filter criteria. The case worker cannot paginate through the results. How do you configure the response data transform to satisfy all of the requirements in the scenario? A. configure the data transform to copy only the first 10 matching records to a page list property B. configure the data transform to copy all of the records to a page list property C. configure the data transform to copy all of the records to the data page D. configure the data transform to use the first x pagination setting to copy only the first 10 results to the data page Answer: C 23.How do you implement polymorphism when defining a data relationship field type during data modelling? A. Map a field type to a concrete class at design-time and allow its actual type to be determined at run-time. B. Map a field type to a class at design-time and allow its actual type to be determined by Pattern inheritance at run-time C. Map a field type to a class at design-time and allow its actual type to be determined by Direct inheritance at runtime. D. Map a field type to a class at design-time and allow its actual type to be determined by Direct The safer , easier way to help you pass any IT exams. 7 / 9 inheritance at runtime. Answer: D 24.Which two of the following reporting requirements entail the use of a subreport? (Choose Two) A. The main report outputs the total number of times that a combination of column values is found, as well as subtotals for that combination that add up to that total. B. An aggregated value, obtained through a join, is used to filter each main report row by comparing a value that is contained in each main report row to the aggregated value. C. Subreports can combine the data by using IN, HAVING, and WITH clauses. D. An aggregated value should appear in a main report when a join condition is true. If the join condition is always false, the displayed value should be either null or zero. E. Each main report row is filtered based on a whether a main report row value is either included or not included within a sequence of values Answer: BE 25.Which one of the following pieces data is not captured by Pega Predictive Diagnostic Cloud (PDC)? (Choose two) A. Personally Identifiable Information (PII) data B. Pega alert data C. Java Virtual Machine (JVM) Metrics D. SQL bind variables Answer: AD 26.Which of the following types of testing are typically included in a comprehensive testing strategy? (Select all that apply) A. Unit Testing B. Performance Testing C. Acceptance Testing D. User Interface (UI) Testing E. Regression Testing Answer: ABCDE 27.Which of the following is a crucial aspect of security event logging? A. Logging events in a human-readable format for easier analysis. B. Disabling logging for non-critical events to reduce storage needs. C. Storing logs on the same server where the application is hosted. D. Keeping logs for only a few days before overwriting them. Answer: A 28.A credit card dispute application has multiple integrations to fetch the card, customer, transaction, and account details. For any exceptions in these integration calls, the cases are routed to different work queues based on the nature of the exception. Analysts open the case from the work queue and perform the Retry/Resume problem flow. What is the optimal way to implement this requirement? The safer , easier way to help you pass any IT exams. 8 / 9 A. Customize the Work-.getFlowProblemOperator activity and set the parameter AssignTo to the work queues based on the exception type. B. Perform a save-as of the FlowProblems flow rule into your application ruleset and update the ProblemFlowWorkBasket assignment to use a decision table to return the work queue. C. Perform a save-as of the FlowProblems flow rule into your application ruleset and update the ProblemFlowWorkBasket assignment, Use business logic in Route To section and use a decision tree. D. Customize the Work-.getFlowProblemOperator activity, and set the OperatorToInform parameter to the work queues based on the exception type. Answer: D 29.What is the primary advantage of using asynchronous processing with a Job Scheduler or Queue Processor? A. It reduces the need for background processing altogether. B. It ensures real-time processing and immediate results. C. It allows the system to process tasks concurrently and improves performance. D. It simplifies the overall design of the application. Answer: C 30.Which of the following statements is most accurate regarding the PRPC data model? A. In a good design there would be no business rules or processes defined in the data classes B. The PRPC data model can help promote reuse via inheritance and composition C. The PRPC data model should be stored in a separate RuleSet from application/business rules D. The PRPC data model should always be modeled after the external systems with which it interfaces Answer: B 31.Which three best practices can protect against cross-site scripting (XSS) attacks? (Choose Three) A. PrivateAPI methods for XSS filtering. B. Filter HTML and XML outputs. C. PublicAPI methods for XSS filtering. D. Write custom JavaScript. E. Filter all inputs. Answer: BCE 32.Which two tools and/or methods support continuous integration practices? (Choose Two) A. Performing Ul regression testing B. Leveraging release toggles C. Using an automation server to invoke unit test suites D. Configuring pre and post import steps Answer: BC 33.Users in a cloud-based production application report a chronic performance issue that occurs every day between 2:0 P.M. and 4:00 P.M. All attempts to reproduce the problem in the Development, QA, and Staging environments have failed. Which two techniques help you troubleshoot the problem? (Choose Two) The safer , easier way to help you pass any IT exams. 9 / 9 A. Review Performance Alerts and Exceptions in PDC B. Review a Production Tracer Log using SMA C. Review Alerts and Exceptions using PLA. D. Review Performance Alerts and Exceptions in AES. Answer: AC 34.What is the role of a "Case Designer" in the context of designing Pega applications? (Select all that apply) A. Responsible for creating user interfaces and user experience design. B. In charge of developing and maintaining application backend logic. C. Involved in defining case hierarchy and relationships between case types. D. Coordinates with stakeholders to gather business requirements. Answer: CD 35.An HR application has an employee absentee report that is generated and sent to the respective managers on the following day based on the reporting structure. Which of the following approaches best suits the requirement? A. Generate a report and use data pages to load the data and filter on the reporting manager for their direct reports. B. Generate a report based on the filters that are available as drop-down lists. C. Build separate reports with the proper filter conditions. D. Create appropriate reports by using subreports. Answer: A 36.A shipping case needs to wait a specific time period before progressing in its flow. The developer is considering using a wait shape or an assignment with an SLA to perform this function. Identify the two requirements for which a wait shape is the simpler approach. (Choose Two) A. Manually step past the waiting point prior to the designated time. B. Adjust the case urgency when the assignment is created C. Automatically bypass locking when the assignment is created. D. Present a custom UI form to the user while waiting to expire. Answer: BD 37.What feature of Pega Platform allows you to build and execute microservices-based applications? A. Pega Process Fabric B. Pega Mobile C. Pega Intelligent Virtual Assistant D. Pega Predictive Analytics Answer: A