Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Pegasystems > Certified Lead System Architect (CLSA) > PEGACPLSA88V1

PEGACPLSA88V1 Certified Pega Lead System Architecture Exam 8.8 Question and Answers

Question # 4

XYZ Inc.'s COE wants case life cycle developers to use a field group named "Claim" regardless of the application being developed.

Select and move the three tasks that the COE performs for this requirement to the Task List column and place them in the correct order. (Choose Three)

Full Access
Question # 5

An attribute-based access control configuration evaluate the attributes of the operator creating the

case. A data page contains the value used in the evaluation.

A.

Use the data page as a restriction method in the access control policy.

B.

Use the data page as a the policy condition value in the access control policy condition

C.

Use the data page as a the permit access if the value in the access control policy

D.

Use the data page as a the policy condition column source in the access control policy condition

Full Access
Question # 6

Select the recommended option for extending the data model provided by a pega industry framework.

A.

Specialize the data model as little as possible.

B.

Redefine the data model.

C.

Hide the data model with a custom data model.

D.

Hide the data model with an Enterprise service Bus (ESB) dictated data model.

Full Access
Question # 7

An application uses a property to process customer information that is stored in an external

database. some of the customer information changes infrequently.

how do you ensure the property contains the correct customer information at run time?

A.

configure the property to refer to a data page using the SOR patten.

B.

configure the user interface (UI) to refresh the information each time it is rebdered.

C.

configure the property to copy the customer information from a data page using the snap shot patten.

D, configure the property to use a report definition to retrieve the customer information directly.

Full Access
Question # 8

How do you improve performance during synchronization for users of an offline-enable mobile app.

A.

Use only node-scope data pages for reference data

B.

Configure optimistic locking on offline-enabled cases.

C.

Restrict the number of offline-enable access group

D.

Declare large data pages in the data page whitel

Full Access
Question # 9

how do you differentiate between satisfied and unsatisfied customers to provide an appropriate greeting for each customer in facebook massenger?

A.

configure a parallel process for each type of customer to return the appropriate greeting.

B.

Define both greetings and assign the appropriate intent to each one.

C.

define both greetings and apply a when rule to respond with the appropriate greeting.

D.

configure a channel for each type of customer to return the appropriate greeting

Full Access
Question # 10

A case displays recent customer transaction. Different operators often view the recent transactions

for the same customer repeatedly throughout the day. the operation to fetch the transactions is resource-intensive, and the source data is updated once an hour. select two options to configure a data page to cache the customer transactions and minimize the operator's wait time. (choose two)

A.

configure the data page scope to node.

B.

configure the refresh strategy to reload of older than 1 hour

C.

configure the data page scope to thread.

D.

configure the refresh strategy to reload once per interaction.

Full Access
Question # 11

Six weeks after you deliver your application to production, your users report that the application slows down in the afternoon. The application is almost completely unresponsive for some users shortly after

3:00 P.M. Other users do not experience this problem until later in the day.

You do not have access to the Production environment, but you do have access to AES. The production environment has three nodes and a load balancer.

You need to resolve this issue because a new division of the organization will start using the application next month.

How do you begin your research to diagnose the cause of the reported performance issue?

A.

Look at the performance profile and DB Trace output from each node.

B.

Observe the cluster and node status on the Enterprise Health Console.

C.

Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.

D.

Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Full Access
Question # 12

Select each task on the left and drag it to the corresponding Application Development Studio on the right, where the task can be completed.

Full Access
Question # 13

what configuration is required to control which nodes in a cluster an agent runs.?

A.

assign the agent to a specifie category.

B.

associate the agent to specific node type.

C.

use a custom queue for the agent

D.

create agent schedules on applicable nodes.

Full Access
Question # 14

An insurance company wants to extend a native mobile app to allow customers to create claims using a claims management application implemented on the pega platfrom. As a claim is processed, update are sent to the mobile app as push notifications.

How do you satisfy this requirement ?

A.

Package the claims management application as a SDK mobile app

B.

Configure a service to creat claim cases when called from the native mobile app

C.

configure the native mobile app to creat a claim case using the page API

D.

Embed the claims management application in the native mobile app using a pega web Mashup gadget

Full Access
Question # 15

You oversee a medium-size development team, and some of the team members are new to

pega. What are the most efficient ways to ensure that the rules the team creates adhere to

best practices? (choose two)

A.

Have new team members create and run Pega automated unit tests against their rules.

B.

Use Pega Log Analyzer to identify exceptions associated with the new team members.

C.

Run Tracer on each rule the new team members check in to identify an failures in rule execution.

D.

Leverage the rule check-in approval process to review the new team member’s changes first.

Full Access
Question # 16

In order to produce a complete view of a customer, a customer service(CS) application requires reference data from multiple external systems. The customer data resides on a customerinfo page in a parent case type. The data on the CustomerInfo Page is also used by some of its subcases. Sometimes, the connectors that populate the data page are slow.

Which two of the following approaches for handling the required reference data from the external systems uses the least system resources? (Choose Two.)

A.

Use Case Designer data propagation to copy the data to the subcases to populate the page contents.

B.

Use the Load-DataPage method to initiate the population of the page contents.

C.

Use the system of Record (SOR) data access pattern to populate the page contents.

D.

Use the Snapshot data access pattern to populate the page contents.

Full Access
Question # 17

Select the option in which you would define Content Security Policies.

A.

To prevent the browser to load content from untrusted sources

B.

To restrict what data a user can view in a case the user can open

C.

To define security for case attachments

D.

To configure security for the content management integration

Full Access
Question # 18

XYZ Corporation wants to perform extensive analysis on work party information across various case types in near real time. At the same time, XYZ wants to minimize the impact this analysis has on case workers using Pega applications.

Choose two options that would contribute to viable solutions. (Choose Two)

A.

Use Pega API RCST services to update Case and Work Party data in a reports database.

B.

Configure a reports database for the Class Group and Index WorkPartyUri Data Admm DB-Table records.

C.

Define additional database indexes for the Class Group and related Work Party tables.

D.

Use BIX to export Case and related Work Party data to a data warehouse.

Full Access
Question # 19

XYZ corp has requirement to send an email to every person who has used a certain service in the previous month thanking them for doing business with XYZ. Generating and sending these emails take a certain amount of time XYZ wants these email processed as quickly as possible to avoid interfering with emails sent during business hours.XYZ also wants to ensure that the thank-you email is not sent to the same person twice

Full Access
Question # 20

Which two action can you perform to improve the Guardrails Compliance score of an application? (Choose two.)

A.

Develop CheckForCustomerWarnin activities that filter out pxWarning rows based on specifies pxWarningName values.

B.

Add a justification to Access of Role to Object (ARO) instances whenever a listed privilege is not visible from the ARO’s rulset.

C.

Create an application that is built on the original application. Use the parent application’s compliance score.

D.

Changes the security type for activities used for simulations from Activity to Utility.

Full Access
Question # 21

Ar.mo Corporation is designing an Order Fulfillment application built on an Inventory application. Both applications reuse a section that displays Part details.

Where do you configure the PartOetails section?

A.

In an Inventory ruleset within the Inventory application's work pool class

B.

In an Order Fulfillment luleset within the Order Fulfillment application's Parts data class

C.

In an Enterprise ruleset within the Inventory application's Paits data class

D.

In an Order Fulfillment ruleset within the Order Fulfillment application's work pool class

Full Access
Question # 22

While configuring GetNextWork, overriding the System Settings rule

GetNextWork__WorkBasketUrgencyThreshold imposes a minimum cutoff value for assignment urgency.

Which statement accurately depicts the system behavior when the GetNextWork_WorkBaseketUrgencyThreshold setting is overridden?

A.

The override ignores other criteria in GetNextWork.

B.

The override causes the application to revisit workbaskets for assignments with lower urgency.

C.

The override causes a search of only those assignments with the urgency higher than the threshold value.

D.

The override causes a search of all assignments in a work queue that equal or exceed the set urgency threshold.

Full Access
Question # 23

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

A.

Use a visible when rule for the properties displaying sensitive information.

B.

Create an access control policy restricting access to the sensitive information.

C.

Configure an access deny rule restricting access to the sensitive information.

D.

Move sensitive information to separate sections and apply a privilege to the sections.

Full Access
Question # 24

Select two ways for queuing an item for a queue p

A.

Use the Queue-for-processing method

B.

Use Utility smart shape

C.

Use Run in Background smart shape

D.

Use the Queue for -agent method

Full Access
Question # 25

What two features do activities and functions share? (Choose Two)

A.

Ability to be circumstanced

B.

Ability to be parameterized

C.

Ability to be called directly from a decision table

D.

Ability to be versioned

Full Access
Question # 26

XYZ, Inc. is multinational software interested in deploying a worldwide application as soon as possible. The application currently does not have requirements that depend on its user’s geographical region. An outside consultant suggested that the application initially be generated with a framework and implementation layer.

Which three questions do you ask to validate the outside consultant’s recommendation? (Choose Three)

A.

Can the framework layer instead consist of multiple built-on applications?

B.

How many languages and locales must the application eventually support?

C.

Is there a reason why this decision cannot be made at a later time?

D.

Is there an intent to market the framework layer to other companies?

E.

What is the name of the first division or region that uses the application?

Full Access
Question # 27

Using the information shown in the Class structure, select the correct statement.

A.

Auto must be a subcase of Parking.

B.

Instances of EventBooking and Hosted can be stored in a separate.

C.

EventBooking cannot be a subcase of Auto.

D.

Parking and Auto instances must be stored in the same table.

Full Access
Question # 28
A.

Create a new autogenerated button control and alter its caption to support a shortcut key.

B.

Create a new custom burton control that uses an image and uses a fixed width.

C.

Create a new custom text label control set as required and uses relative widths.

D.

Create a new autogenerated link control with a shortcut key and limit its obsolute width.

Full Access
Question # 29

A slow-running connector must run whenever the status of a case changes.

select the three steps to configure a solution that minimizes the delay experienced by the user

A.

set the execution of the activity to immediately

B.

set the execution of the activity to execute in Background an copy

C.

configure an activity to call the connector

D.

configure a declare trigger to execute when the case is committed

E configure a declare trigger to execute when the status of the case change

Full Access
Question # 30

Select two ways for queuing an item for a queue processor. (Choose Two.)

A.

Use the Queue-for-processing method

B.

Use Utility smart shape

C.

Use Run in Background smart shape

D.

Use the Queue for -agent method

Full Access
Question # 31

An application uses LDAP authentication and create operators dynamically based on a model operate recorded select and move the three options needed to complete the configuration to configuration column

Full Access
Question # 32

An organization has two lines of business: selling books for children and reselling college textbooks.

The division selling books for children can use the same basic user interface (UI) as the division reselling textbooks with the exception of the payment methods.

How do you apply the Situational Layer CakeTM in this scenario?

A.

Place the UI rules in the base layer, and create a new layer for the payment rules for both lines of business.

B.

Place the UI rules and generic payment method rules in the base layer, and create a new layer for the division-specific payment rules.

C.

Place the UI rules in the base layer, and create a parallel base layer for the payments rules.

D.

Place the UI rules in the base layer, and create a new layer for the payment rule for each division.

Full Access
Question # 33

In the Answer Area, drag each use case on the left to the appropriate locking strategy on the right.

Full Access
Question # 34

You are audit a property named. Generic Code. The label on the form is named suggested generic substitute. when the field value changes, you want the history details to show as the name of the label.

you also want to record the name of the property

How do you ensure that the entry shows both the label and the property name?

A.

On the pyTracksecurtiyChanges data tranform, in the source field, enter "suggested generic substitue

(. GenricCode)"

B.

on the pyTracksecurtiyChanges declare trigger activity, enter GenericCode as a parameter name and

"suggested generic substitute" as a perameter description

C.

on the work management landing page> Filed level Auditing tab in the source filed enter

GenericCode. in the Description filed enter "suggested generic substitute"

D.

on the work management landing page > Filed level Auditing tab,, in the source filed enter "suggested

generic substituite(. GeneriCode)"

Full Access
Question # 35

An application processes stock market trades.

which two requirement are best implemented by an advanced agent?

A.

call a service every day at 5 : 00 am to get the marker open and close time, and recird the result

B.

Excute a trade cae only after the stock reaches a certain price

C.

create a case to audit an account if the customer trade more tha usd9999in a day

D.

complete unexecuted trade when the market

Full Access
Question # 36

which two statements are correct with regard to inbound email processing? (choose two)

A.

an incoming email reply is liked to its original case by the case ID in the subject of the email.

B.

when creating a case from an email using the standard service activity, email attachments are automatically added as case attachments.

C.

custom configuration is required to handle automatic reply and delivery status notifications.

D.

if an email service executes an action, such as an approval, and the case is locked the email is queued and retried

Full Access
Question # 37

An application is being constructed In multiple phases for a growing company that has over 1000 employees. During the initial development stages, it is determined a button on a section has to be made conditionally visible based on a group of actors.

What should the conditional visibility be based on to minimize the amount of future maintenance?

A.

Privilege

B.

AccessGroup

C.

Role

D.

Work group

Full Access
Question # 38

You need to create custom workspaces for the manager and for the Customer service representative (CSR), Also, you are asked to display some properties in custom formats that arc not supported by Pega.

Which approach satisfies these requirements?

A.

Each access group can use separate portals, harnesses, and sections. Use Specialty Components and use XML to pass data.

B.

Level age the Case Manager and Case Worker as reference points to create new portals, if required. Use Special Components and use JSON to pass data.

C.

Create different harnesses for each user's workspace. New portal rules are not needed. Define Specialty Components and use JSON to pass data.

D.

Identify the functionality required for each portal. Customize the portal either by modifying the section or harness. Use Specialty Components and use XML to pass data.

Full Access
Question # 39
A.

Increase subcase urgency based on ClaimUnit type prior to the workbasket assignment. Specialize the Service Level Rule by ClaimUnit case type.

B.

When the SLA's goal is reached, have an escalation Activity adjust the claim urgency in proportion to the average time to resolve ClaimUnit cases.

C.

Implement a GetNextWork solution based on case deadline and ClaimUnit type. Specialist the service Level Rule by ClaimUnity case type.

D.

Store the average time to complete sub case types in a table. Customize GetNextWork list view by joining to this table and use this value for ordering the results.

Full Access
Question # 40

Review the following classes and properties:

A field group list is defined at the MyCo-Lending-Work work pool level. The find group list name is Loans: the specified data type is MyCo-Data-Loan.

Which three statements are valid? (Choose Three)

A.

An auto loan application can extend MyCo-Data-LoarvAuto without affecting a sum performed against .Loans C). Amount

B.

At design time, the system issues a warning since it is poor practice to define a field group with an abstract data type ctas%

C.

All pages within the .Loans field group must be the same class, either MyCo-Data-Loan-Aiito or MyCo-Oata-Loan Mortqage

D.

The pxObjClass of any page in the .Loans field group list can be changed at nm time and does not need to be the same class.

E.

A rule In MyCo-DataLoan-Mortgage can only be referenced through -Loans if also defined In MyCo Data-Loan.

Full Access
Question # 41

Table a contains customer information. Table B contains complaints submitted by customers. Table C contains positive feedback submitted by customer.

You are tasked to write a report that list all rows in Table A where, per customer, the number of rows in Table B related to Table A are greater than the number of rows in Table C related to table A.

Which method creates the report that executes with the best performance?

A.

Define two subreports: one that counts rows in Table B relative to Table A, and on that counts the rows in table C relative to Table A. Only include rows in the main. Report against table A where the table B count is greater that the Table C count.

B.

Join table A to Table B and C using include all rows in this class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

C.

Join table A to Table B and C using include all rows in join class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

D.

Define two subreports, one where table B users ''Do not Join'', and one where Table C users ''Do not Join'', In the main report count the rows from each subpreport, then only include rows where the count from the Table B subreport than the count from the Table C subreport.

Full Access
Question # 42

A duplicate case search contains two weighted conditions in which a property value in the current case is compared to the same property value in the existing case. After processing multiple cases that have two matching data values, duplicate case search does not identify any duplicates.

What two approaches do you take to diagnose the cause? (Choose two.)

A.

Verify that there are no more than 4 maximum weighted conditions being tested.

B.

Verify that the total weights of the matching conditions match or exceed the threshold.

C.

Verify that each of the basic conditions are satisfied.

D.

Verify that the case type is instantiated as a temporary case so the case can be cancelled.

Full Access
Question # 43

You are configuring the container settings of a display a title. The title is based on the type of loan requested

Full Access
Question # 44

The application contains a property named claimid. You want to business users to reuse this property in any new case types they create. How do you define the claimid property?

A.

As a final rule

B.

As a case level property

C.

As an enterprise class level property

D.

As a relevant record

Full Access
Question # 45

You are implementing a paga customer service application and are integrating the system of record data for account information?

select the three tasks required to implement this integation

A.

Specialize the pega customer service data pages that use account data.

B.

Integrate with the system of record in the pega customer service account class

C.

Rename the pega customer service data pages to match the system of record.

D.

Integrate with the system of record to populate an Account data class.

E.

Create a data transform to map the Account data class to the pega customer service Account class

Full Access
Question # 46

Which three actions do you recommend to address their performance issue and ensure optimal application performance in the future? (Choose Three.)

A.

Dedicated a node to background processing.

B.

Review application environment sizing.

C.

Remove embedded dashboard reports from the manager portal.

D.

Minimize the usage of robotic automations.

E.

Review selection criteria of agent activities.

Full Access
Question # 47

An application contains cases which transition though different statuses throughout their life cycle which typically lasts 3 months.

Design a reporting strategy to display the number of cases by status at the end of each month for a 12-month period.

A.

Configure an agent to record monthly case status in a separate table and report on that table.

B.

Configure an activity to generate the data in the clipboard and report using a custom section.

C.

Configure a summary report that leverages sub reports for each month.

D.

Configure a Declare index to record case data to a separate table.

Full Access
Question # 48

In the Answer Area, determine where data is stored for each design option.

Full Access
Question # 49

The following figure depicts a hierarchy of applications that are built on other applications.

Specifically , the productionapp application is built on applications customerapp and

employeeapp. Each of these applications has additional built-on applications, including the duplicated MYEnterpriseApp application, which has two different versions in use. All applications are built on the same version of PegaRUUS.

Full Access
Question # 50

you are configuring authentication for a pega web mashup implementation.

how do you ensure the host system origin is trusted?

A.

in the authentication service JNDI binding parameters, specify the protocol, host, and port.

B.

in the authentication service spaecify the IACAuthverification activity

C.

in the application definition, specify the protocol, host, and port

D.

in the content security policy record specify the website as allowed

Full Access
Question # 51

Your team is developing a Quoting application for BigCo. The team is developing a Policy Administration application. The Quoting application is built on the Policy Administration application. The Policy Administration application requires enhancements to support other areas of the business. These enhancement take place during the same time frame as the Quoting application development.

Select the two practices for your team to follow to minimize potential development conflicts. (Choose Two.)

A.

Share rule sets between both application

B.

Switch application when modifying rules.

C.

Perform branch reviews when merging branches.

D.

Periodically rebase the policy Administrator application

Full Access