Pegasystems PEGACPLSA23V1 Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: PEGACPLSA23V1
- Prüfungsname: Certified Pega Lead System Architecture (LSA) Exam 23
- Zertifizierungsanbieter: Pegasystems
- Zuletzt aktualisiert am: 26.04.2025
What are the benefits of analyzing Microjourneys in designing Pega applications?
(Select all that apply)
- A . Identifying user pain points and improving user experience.
- B . Optimizing backend processes and data flow.
- C . Creating reusable components for faster application development.
- D . Determining the hardware and infrastructure requirements.
Which of the following statements is true about the reports database in Pega Platform™?
- A . Pega Platform automatically replicates data on to Reports database schema.
- B . A table in a reports database need not have the same structure (such as columns) as its counterpart table in the PegaRULES database.
- C . Reports database schema and Pega database schema must be on the same database server.
- D . A table in a reports database must have the same structure (such as columns) as its counterpart table in the PegaRULES database.
XYZ is an Insurance application in which CSRs update thousands of claims daily. In the UI, claim cases are displayed to the CSRs in a grid, based on filter criteria. The source for the UI grid to retrieve the cases is a list data page that sources a report definition. The report definition is configured to use Elasticsearch to improve performance.
Though Elasticsearch is configured on the report definition, the report definition fires on the database SQL query.
Which two of the following reasons explain why the report definition falls back to database SQL query, instead of using Elasticsearch?
(Choose two)
- A . The report definition is configured to retrieve distinct values.
- B . The report definition is configured to retrieve duplicate values.
- C . The Report definition does not perform a join.
- D . Properties that are configured on report definitions are not included in the search results of Elasticsearch.
A credit card application is deployed on Amazon Web Services (AWS) with an S3 repository. This application connects to other external applications to retrieve credit card and transaction details.
What is the recommended approach to authenticating the REST connections?
- A . Use a REST connector that is associated with a secure protocol for secure communication.
- B . Use a REST connector that is associated with an Amazon Web Services (AWS) authentication profile. For secure communication, use AWS authentication in an S3 repository.
- C . Configure an OAuth 2.0 provider data instance for secure communication over HTTPS.
- D . Use a REST connector that is associated with an external application authentication profile for secure communication.
In a Fraud Monitoring production application, the analysts should not be able to log in in with multiple sessions. These restrictions do not apply to the Center of Excellence (COE) team. By limiting multiple sessions, the possibilities of an untrustworthy person acquiring access to a system in the cluster are minimized.
What is the best approach to limiting concurrent operator sessions?
- A . Configure session management at the application server to restrict the multiple sessions.
- B . Configure the Data-Admin-System instance to restrict multiple sessions and allow access to the COE team members.
- C . Configure the authentication service rule with restriction of multiple sessions.
- D . Update the prconfig.xml file to restrict multiple concurrent sessions.
When is it appropriate to use a spin-off?
- A . When you wish to run calculations in a separate thread from the current process
- B . When you wish to make a long-running SOAP service call asynchronously
- C . When you wish to start another flow execution while continuing down the current process path
- D . When you wish to call multiple connector rules concurrently
Which statement is true when comparing subcases and subflows?
- A . Subcases perform better than subflows.
- B . Locking consequences can be ignored with subflows.
- C . Subcases offer more security options than subflows.
- D . Subcases are always preferred over subflows.
What is the primary function of a file listener in background processing?
- A . To automatically process incoming files as soon as they are detected.
- B . To ensure that files are processed synchronously with other tasks.
- C . To convert binary data from files into readable text format.
- D . To validate the format and structure of the files before processing.
Which tasks are part of continuous integration and continuous delivery?
(Select all that apply)
- A . Running automated tests whenever new code is committed.
- B . Manually deploying code to the production environment.
- C . Automating the build process for application packages.
- D . Creating a release plan and schedule for each deployment.
- E . Conducting user acceptance testing (UAT) before each deployment.
In which three of the following ways can an application be specialized?
(Choose Three)
- A . Through ruleset overriding
- B . By using decision rules
- C . Through class inheritance
- D . By using branching
- E . By circumstancing