Pegasystems PEGACPLSA23V1 Übungsprüfungen
Zuletzt aktualisiert am 12.05.2025- Prüfungscode: PEGACPLSA23V1
- Prüfungsname: Certified Pega Lead System Architecture (LSA) Exam 23
- Zertifizierungsanbieter: Pegasystems
- Zuletzt aktualisiert am: 12.05.2025
When assessing and monitoring quality, what metrics or measures can be considered?
(Select all that apply)
- A . Code Coverage
- B . Bug Count
- C . Test Case Execution Time
- D . User Engagement
- E . Deployment Frequency
Which three kinds of security issues can be detected if you monitor the PegaRULES-ALERTSECURITY.log file?
(Choose Three)
- A . Cross-site request forgery (CSRF) attacks
- B . Authorized data access
- C . User successful login information
- D . Access to a restricted activity, stream, or report
- E . Content Security Policy violations
In a vaccine study application, there are two sets of users; Volunteers, for whom user information is stored in an external system; Organizational users, for whom user information is stored in the Active Directory Federation Services (ADFS) of the organization.
What is the best approach to authenticating volunteer login credentials and internal users‘ login credentials?
- A . Create two separate authentication services: one for internal users and another for volunteers.
- B . Create a single authentication service that can validate credentials for both external and internal users.
- C . Create a single authentication service for volunteers and use PRServlet URL authentication for internal users.
- D . Create basic authentication services for volunteers and internal users.
Which two of the following statements is true about the reporting database feature in Pega Platform™?
(Choose two)
- A . The reporting database is a replica of the PegaDATA that the developer creates to support the faster execution of the reports.
- B . The reporting database is not a replica of the PegaDATA that the system creates to support the faster execution of the reports.
- C . The reporting database does not automatically sync with PegaDATA.
- D . The reporting database automatcially syncs with PegaDATA.
Which three of the following options are tools to orchestrate containerized applications?
(Choose Three)
- A . Docker
- B . Docker Swarm
- C . Apache Mesos
- D . Kubernetes
Which two of the following statements about Enterprise Content Management (ECM) attachment type are most accurate?
(Choose Two)
- A . Using ECM attachments disables standard PRPC attachment functionality
- B . A Connect CMIS rule must be configured to support the ECM attachment
- C . To improve Performance, the data model structure of the content management system must be imported into PRPC
- D . PRPC leverages the table "pc_data_workattach" to store the link between work items and files in the CM repository
- E . Content management integration can be enabled through the Application rule configuration
Which one of the following specialization techniques is best suited for the localization of Pega Platform™ applications?
- A . Ruleset
- B . Class
- C . Circumstance
- D . Organization hierarchy
When using a Queue Processor for background processing, what happens if a task fails to process successfully?
- A . The Queue Processor retries the task automatically until it succeeds.
- B . The task is moved to a separate error queue for manual inspection and reprocessing.
- C . The Queue Processor stops processing other tasks until the failed task is resolved.
- D . The task is automatically marked as completed, and its status is logged for review.
As part of an underwriting process, the application must generate a risk factor for a loan and insert the risk factor into the Loan case. The risk factor generation is an intensive calculation that requires several minutes to run.
The calculation slows down the environment. You want to have all risk factor calculations run automatically between the hours of 10:00 PM and 6:00 AM to avoid the slowdown during daytime working hours.
Which two design options best fit this solution?
- A . Use a job scheduler to fetch all the Loan cases with the Pending-RiskCalculation status, and then calculate the risk factor and call Resume Flow.
- B . Use a delayed dedicated queue processor and set the DateTime for processing to 10 PM using the Run in background shape.
- C . Use an advanced agent to fetch and process the Loan Risk factors.
- D . Use a standard queue processor to perform the calculation. Pause the case until 10 PM and include a step in the flow to queue the case for the queue processor.
- E . Use standard agent to process the queued Loan cases.
When using a declarative page to store a list of currency rates used by an entire application, what is the most appropriate scope?
- A . Node
- B . Requestor
- C . Thread
- D . Application