Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Pegasystems PEGACPLSA88V1 Certified Pega Lead System Architecture Exam 8.8 Exam Practice Test

Demo: 51 questions
Total 170 questions

Certified Pega Lead System Architecture Exam 8.8 Questions and Answers

Question 1

You need to create custom workspaces for the manager and for the Customer service representative (CSR), Also, you are asked to display some properties in custom formats that arc not supported by Pega.

Which approach satisfies these requirements?

Options:

A.

Each access group can use separate portals, harnesses, and sections. Use Specialty Components and use XML to pass data.

B.

Level age the Case Manager and Case Worker as reference points to create new portals, if required. Use Special Components and use JSON to pass data.

C.

Create different harnesses for each user's workspace. New portal rules are not needed. Define Specialty Components and use JSON to pass data.

D.

Identify the functionality required for each portal. Customize the portal either by modifying the section or harness. Use Specialty Components and use XML to pass data.

Question 2

Select each task on the left and drag it to the corresponding Application Development Studio on the right, where the task can be completed.

Options:

Question 3

Select the primary reason for developing a set of unit lest cases and automated testing Suites in a continuous integration and continuous deployment (CI/CD) model.

Options:

A.

Automated testing reduces costs by reducing the need to hire and I rain testing resources.

B.

Automated testing accelerates the deployment of rules from the development environment to target environments.

C.

Automated testing programmatically ensures quality of rules to maintain the integrity of the pipeline.

D.

Automated testing allows for orchestration between automation server and the Execute Test REST service.

Question 4

The BigCo quoting application is currently on-premise. BigCo plans to move the application to Pega Cloud What factor do you need to consider for environment setup?

Options:

A.

Network security configuration

B.

Database access configuration

C.

System management application configuration

D.

Log file access configuration

Question 5

A form listing nearby restaurants has four columns:

  • Restaurant name
  • Restaurant location
  • Thumbnail image of the seating area
  • Make reservation (check box)

You want to ensure that users have the information they need to make a reservation regardless of screen size. When viewed on a small screen, you do not need to display images.

What three configuration steps do you take to support this requirement? (Choose three.)

Options:

A.

Set the importance of the Make reservation column to Primary.

B.

Set the importance of the Restaurant name column to Primary.

C.

Set the importance of the image column to Other.

D.

Set the importance of the image column to Secondary.

E.

Set the importance of the Restaurant location and Make reservation columns to Secondary.

F.

Set the importance of the Restaurant name and Make reservation columns to Primary.

Question 6

XYZ, Inc. is multinational software interested in deploying a worldwide application as soon as possible. The application currently does not have requirements that depend on its user’s geographical region. An outside consultant suggested that the application initially be generated with a framework and implementation layer.

Which three questions do you ask to validate the outside consultant’s recommendation? (Choose Three)

Options:

A.

Can the framework layer instead consist of multiple built-on applications?

B.

How many languages and locales must the application eventually support?

C.

Is there a reason why this decision cannot be made at a later time?

D.

Is there an intent to market the framework layer to other companies?

E.

What is the name of the first division or region that uses the application?

Question 7

You isolated the problem to node 1 of the cluster. You see node 1 goes down shortly after

3:00 p.m. every day with an out-of-memory error. Which two alerts typically precede this

condition?(choose two)

Options:

A.

PEGA0004 –Quantity of data received by database query exceeds limit

B.

PEGA0001 – HTTP interaction time exceeds limit

C.

PEGA00017 – Cache exceeds limit

D.

PEGA0002 – Connect operation time exceeds limit

Question 8

what configuration is required to control which nodes in a cluster an agent runs.?

Options:

A.

assign the agent to a specifie category.

B.

associate the agent to specific node type.

C.

use a custom queue for the agent

D.

create agent schedules on applicable nodes.

Question 9

XYZ corp sells products that can be researched and ordered within a single screen. After the user submits the order, only the ID for each ordered product is propagated to a product child case. An additional property within the product child case reference a data page that displays product detail. XYZ wants you to define a report that shows detail about each product associated within a given order case.

In which class do you optimize the detail properties for the product?

Options:

A.

both the order class and product class

B.

the product class

C.

the order class

D.

the data class for the product

.

Question 10

XYZ Corp users are experiencing delays in the application that you suspect is related to the database.

Which two options do you recommend to isolate the issue? (Choose Two)

Options:

A.

Write Pega logs to the database server.

B.

Investigate when the database is used most heavily.

C.

Lower query-time-related alert thresholds.

D.

Increase the threshold for blob-size alerts.

Question 11

An application uses LDP authentication users have role and application attributes, but not access group attributes. select the two tasks required to configure the application to uses LDAP attributes to determine the access group for a user

Options:

A.

Create a decision table that evaluate role and application properties that return access group

B.

Configure the authentication mapping to evaluate the decision table

C.

Create a decision table that evaluate role and application attribute value that return access group

D.

Add a method to the authentication activity to evaluate the decision table

Question 12

What are two valid reasons for defining a case type within a case type-specific ruleset? (Choose

Options:

A.

Case-specific rulesets make it easier to rebase ruleset versions.

B.

Each branch ruleset can be associated to case-specific user stories.

C.

The ruleset can be added to the ruleset stack for multiple applications.

D.

The case type might be converted to a component application in the future.

Question 13

you need to formet required fields with red labels. you configure a custom style in the skin rule.

how do you apply the custom style?

Options:

A.

reference the skin rule in the dynamic layout with the required field labels

B.

reference the skin in the required field labels.

C.

reference the custom style as a parameter in a dynamic layout.

D.

reference the custom style in the required field labels

Question 14

XYZ Corporation would like a report that shows the number of employees who have been with the company more than 20 years, between 15 and 20 years, between 10 and 15 years, between 5 and 10 years, and less than 5 years.

How do you implement this report using Pega?

Options:

A.

Use a SQL Function.

B.

Use a listView with a custom getContent Activity.

C.

Use a correlated subreport.

D.

Use a Connect-SQL rule.

Question 15

Select two ways for queuing an item for a queue p

Options:

A.

Use the Queue-for-processing method

B.

Use Utility smart shape

C.

Use Run in Background smart shape

D.

Use the Queue for -agent method

Question 16

How do you improve performance during synchronization for users of an offline-enable mobile app.

Options:

A.

Use only node-scope data pages for reference data

B.

Configure optimistic locking on offline-enabled cases.

C.

Restrict the number of offline-enable access group

D.

Declare large data pages in the data page whitel

Question 17

you want to expose a set of services for your application. Each service should be exposed as a separate WSDL. How do you accomplish this?

Options:

A.

create a separate service package for each WSDL.

B.

create a service listener for each WSDL.

C.

Run the service wizard for each WSDL.

D.

place the service rules in separate classes, one class per WSDL

Question 18

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

Options:

A.

Use a visible when rule for the properties displaying sensitive information.

B.

Create an access control policy restricting access to the sensitive information.

C.

Configure an access deny rule restricting access to the sensitive information.

D.

Move sensitive information to separate sections and apply a privilege to the sections.

Question 19

Options:

A.

Increase subcase urgency based on ClaimUnit type prior to the workbasket assignment. Specialize the Service Level Rule by ClaimUnit case type.

B.

When the SLA's goal is reached, have an escalation Activity adjust the claim urgency in proportion to the average time to resolve ClaimUnit cases.

C.

Implement a GetNextWork solution based on case deadline and ClaimUnit type. Specialist the service Level Rule by ClaimUnity case type.

D.

Store the average time to complete sub case types in a table. Customize GetNextWork list view by joining to this table and use this value for ordering the results.

Question 20

APP Studio created a data type in the Organization layer for Quote data called BCO-Data Quote. How do you help users find rules from this data class when working in APP Studio?

Options:

A.

Create a BCO-QI -Data-Quote class that inherits from BCO Data-Quote.

B.

Use a Data Reference to configure the rules that you need from the BCO-Data-Quote class.

C.

Copy the fields In the data class to the BCO QT Work- class so all subclasses can see the Quote rules.

D.

Select each rule you want to reuse in the application as a relevant record.

Question 21

Which of the following Skin rule customizations help satisfy the stated requirements?

Options:

A.

Configure the importance field for each column included in a repeating layout.

B.

Configure the Column I ayout and specify how the sidebar appears on tablets and smart phones.

C.

Configure the style for all application field values, paragraphs, and correspondence records.

D.

Configure the Column Layout and specify the width of the sidebar on desktops.

Question 22

An organization has two lines of business: selling books for children and reselling college textbooks.

The division selling books for children can use the same basic user interface (UI) as the division reselling textbooks with the exception of the payment methods.

How do you apply the Situational Layer CakeTM in this scenario?

Options:

A.

Place the UI rules in the base layer, and create a new layer for the payment rules for both lines of business.

B.

Place the UI rules and generic payment method rules in the base layer, and create a new layer for the division-specific payment rules.

C.

Place the UI rules in the base layer, and create a parallel base layer for the payments rules.

D.

Place the UI rules in the base layer, and create a new layer for the payment rule for each division.

Question 23

An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner

how do you implement this requirement?

Options:

A.

create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.

B.

create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.

C.

create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.

D.

create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access

Question 24

A call center uses Pega Customer Service. Where does Pega Customer Service fit into the enterprise architecture?

Options:

A.

Pega Customer Set vice is the customer and account enterprise service bus.

B.

Pega Customer Service is the customer interaction system of record.

C.

Pega Customer Service is the billing and reporting system of record.

D.

Pega Customer Service is the new customer onboarding system.

Question 25

Which two tools and/or methods support continuous integration practices? (Choose Two)

Options:

A.

Performing Ul regression testing

B.

Leveraging release toggles

C.

Using an automation server to invoke unit test suites

D.

Configuring pre and post import steps

Question 26

A Customer Service application requires customer data assembled from multiple external systems. The customer data is captured by a parent case. Subcases of that parent case need to reference the same customer data.The customer data must be as current as possible.

Which two options are used as part of the solution? (Choose Two)

Options:

A.

Have each subcase load a portion of the customer data prior to updating the parent case.

B.

Use the Snapshot data access pattern to capture the customer data prior to subcase spin off.

C.

Load the customer data in parallel using the Load -Data Page and Connect-Wair methods.

D.

Use the System of Record (SOR) data access pattern when capturing the customer data.

Question 27

Using the information shown in the case structure below, which option is always true?

Options:

A.

Resolution of the Event Booking case requires the Parking case to be resolved.

B.

Parking, Weather, and Hotel cases must be instantiated for the Event case to process correctly.

C.

The Weather case can be instantiated without a parent Event Booking case.

D.

The Parking class must inherit from the Event Booking class.

Question 28

A pega application has cases that represent customer accounts each with many members.

When a member of a customer account registers with the application through an offline

component, a related registration transaction is recorded. An advanced agent updates the

customer account cases with new members. The application is running in a multimode

system and advanced agents are enabled on all nodes. Which two elements are valid design

choices? (choose two)

Options:

A.

Use the optimistic locking option on the case types.

B.

Create a Registration subcase configured to run in offline mode.

C.

Leverage the default object lock contention requeuing capability.

D.

Override DetermineLockString to use .AccountID instead of .pyID as the lock string.

Question 29

You are configuring the container settings of a display a title. The title is based on the type of loan requested

Options:

Question 30

In the first step in a case type, the user compares data on a form to the data on a customer account. If the data matches, the case is resolved. If the data does not match, the user advances the case to update the account.

Management only wants a record of the cases that update an account. What two configuration options do you use to implement this requirement? (Choose two.)

Options:

A.

Add a Persist Case shape after the first step.

B.

Apply a when condition to the first step to persist only cases requiring updates.

C.

Configure the starting flow to instantiate the case type as a temporary case.

D.

Configure the first step to instantiate the case type as a temporary case.

Question 31

You are working on an insurance claims application that receives claims through email. The company receives 500 emails per hour. the insurance company promises a 24-hour response time to receives and verify the clain. After the claim is verified. The system automatically responds with email containing the claim ID.

The application is developed in the Pega cloud environment. The production environment is currently running on premises.

What is your recommendation to ensure that insurance company can meet the 24-hour response time requirement for claims submitted by email?

Options:

A.

Recommend the insurance company change its policy to allow for a broader processing window.

B.

Recommend the insurance company use an advanced agent to verify claims and respond.

C.

Recommend the insurance company use an email lister with concurrent threats.

D.

Recommend the insurance company use an MDB listener instead of an email listener.

Question 32

A shipping case needs to wait n specific time period before progressing in its flow. The developer is considering using ;i wait shape or an assignment with an SI A to perform this (unction.

Identify the two requirements for which a wait shape is the simpler approach. (Choose Two)

Options:

A.

Adjust the case urgency when the assignment is created.

B.

Manually step past the waiting point prior to the designated time.

C.

Present a custom UI form to the user while waiting to expire.

D.

Automatically bypass locking when the assignment is created.

Question 33

Review the following classes and properties:

A page list property is defined at the class group MyCo-Lending-Work. The property name is .Loans and it is defined as being a page List of class MyCo-data-Loan.

Which three statements are valid? (Choose Three.)

Options:

A.

At run time, Loans(1) cloud be of class MyCo-data-Loan-Auto while .Loan (2) is of class MyCo-data Loan Mortgage.

B.

At design time, the system provides a warning since it is not a best Loans practice a page list with an abstract class.

C.

At design time, an architect uses a data warning since it is not a best practice to define a page list of an embedded page at run time.

D.

At run time pages o . Loans can be of either MyCo-data-Login Auto or Myco-Data Loan Mortgage but all pages must be the class.

E.

At run time, a specialized rule in MyCo-Date-Loan Mortgage can be reference through-loans only if referenced in MyCo-Data-Loan

Question 34

You manage a 30-person development team with members located across the globe.

Which Pega Cloud environment best supports the needs of your team?

Options:

A.

Large sandbox

B.

Standard sandbox

C.

Large development instance

D.

Preproduction instance

Question 35

MyCo.com has instances of SCM-F5, SmartDispute, and CPM-F5 in their Production Environment distributed across multiple Pega instances. A new business requirement states that users working in any one application cart create a case in any other application.

What is your recommendation to implement the new business requirement?

Options:

A.

Synchronize case creation with RFST services.

B.

Leverage database replication to communicate case creation.

C.

Implement Federated Case Management.

D.

Implement a parent case across multiple products.

Question 36

Options:

A.

Create a new autogenerated button control and alter its caption to support a shortcut key.

B.

Create a new custom burton control that uses an image and uses a fixed width.

C.

Create a new custom text label control set as required and uses relative widths.

D.

Create a new autogenerated link control with a shortcut key and limit its obsolute width.

Question 37

You are configuring a new version of a data transform that is partially complete. During testing, you want to be able to use previous of the rule.

select the rule configuration that enable you to save ans check in the record with validation error and allows previous versions of the rule to execute.

Options:

A.

Set the availability of the record to Not AvailableB. set the status of the record to Template

B.

set the availability of the record to Blocked

C.

set the availability of the record to withdrawn

Question 38

Six weeks after you deliver your application to production, your users report that the application slows down in the afternoon. The application is almost completely unresponsive for some users shortly after

3:00 P.M. Other users do not experience this problem until later in the day.

You do not have access to the Production environment, but you do have access to AES. The production environment has three nodes and a load balancer.

You need to resolve this issue because a new division of the organization will start using the application next month.

How do you begin your research to diagnose the cause of the reported performance issue?

Options:

A.

Look at the performance profile and DB Trace output from each node.

B.

Observe the cluster and node status on the Enterprise Health Console.

C.

Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.

D.

Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Question 39

A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director.

How do you configure the process so that the request can continue to be processed if only two of the three physicians approve the order?

Options:

A.

Use an Any join condition.

B.

Use a Some join condition.

C.

Use a decision table.

D.

Use a validate rule.

Question 40

What advantage does a rule-utility-function have over a rule-obj-activity?

Options:

A.

Ability to be circumstanced

B.

Ability to be saved multiple rulesets

C.

Ability to be directly called from a decision table

D.

Ability to be used to enforce security

Question 41

How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?

Options:

A.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg-HRWork-RFP

B.

Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

C.

Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP

D.

Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools

Question 42

Which configuration steps do you perfrom to enable an access group for offline user?

Options:

A.

Force a full syn for members of the access group

B.

Enable caching for the access group

C.

Create a model operator for the access group to authienticate users.

D.

configure an offline-capable portal as the default portal for the access group

Question 43

An application consisting of a single case requires sending correspondence at a designated time with minimal delay. The existing solution uses an assignment to pause the case until an SLA invokes the escalation activity that sends the correspondence. Occasionally there is a delay in sending the correspondence.

Which two factors contribute to the delay? (Choose Two)

Options:

A.

The number of queued SI A objects

B.

Multiple open assignments on the same case

C.

Error handling for locked items

D.

Correspondence rule configuration

Question 44

An application uses a property to process customer information that is stored in an external

database. some of the customer information changes infrequently.

how do you ensure the property contains the correct customer information at run time?

Options:

A.

configure the property to refer to a data page using the SOR patten.

B.

configure the user interface (UI) to refresh the information each time it is rebdered.

C.

configure the property to copy the customer information from a data page using the snap shot patten.

D, configure the property to use a report definition to retrieve the customer information directly.

Question 45

Users in a cloud-based production application report a chronic performance issue that occurs every day between 2:0 P.M. and 4:00 P.M. All attempts to reproduce the problem in the Development, QA, and Staging environments have (ailed.

Which two techniques help you troubleshoot the problem? (Choose Two)

Options:

A.

Review Performance Alerts and Exceptions in PDC

B.

Review a Production Tracer Log using SMA-

C.

Review Alerts and Exceptions using PLA.

D.

Review Performance Alerts and Exceptions in AES.

Question 46

Select and move the five steps required to implement single sign-on (SSO) authentication in a pega application to the SSO authentication implementation steps column. (choose five)

Options:

Question 47

You are implementing a paga customer service application and are integrating the system of record data for account information?

select the three tasks required to implement this integation

Options:

A.

Specialize the pega customer service data pages that use account data.

B.

Integrate with the system of record in the pega customer service account class

C.

Rename the pega customer service data pages to match the system of record.

D.

Integrate with the system of record to populate an Account data class.

E.

Create a data transform to map the Account data class to the pega customer service Account class

Question 48

The SLA and the customer’s system administrator are reviewing scenarios that do not require an application server restart. Select three scenarios from this list. (choose three)

Options:

A.

When deploying rule only hotflxes

B.

When changing the prweb web.xml file

C.

When changing the system name

D.

When the deploying new rules

E.

When the prlogging.xml file is modified

Question 49

select and move the three option that are required for tracing an agent on one of the nodes in a cluster to the step column and place them in the correct order

Options:

Question 50

you are configuring authentication for a pega web mashup implementation.

how do you ensure the host system origin is trusted?

Options:

A.

in the authentication service JNDI binding parameters, specify the protocol, host, and port.

B.

in the authentication service spaecify the IACAuthverification activity

C.

in the application definition, specify the protocol, host, and port

D.

in the content security policy record specify the website as allowed

Question 51

An insurance company wants to extend a native mobile app to allow customers to create claims using a claims management application implemented on the pega platfrom. As a claim is processed, update are sent to the mobile app as push notifications.

How do you satisfy this requirement ?

Options:

A.

Package the claims management application as a SDK mobile app

B.

Configure a service to creat claim cases when called from the native mobile app

C.

configure the native mobile app to creat a claim case using the page API

D.

Embed the claims management application in the native mobile app using a pega web Mashup gadget

Demo: 51 questions
Total 170 questions