Weekend Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

PEGACPLSA88V1 Sample Questions Answers

Questions 4

Items selected by a user need to be copied to a page list property when the user submits the form.

How do you copy the items?

Options:

A.

Create a validate rule to copy the selected items.

B.

Create a declare expression with the page list property as the target.

C.

Add a data transform to the flow action as a pre-processing action.

D.

Add a data transform to the flow action as a post-processing action.

Buy Now
Questions 5

You review and tune the agent configuration on a production system since some default

agents----------------and--------------.(choose two)

Options:

A.

Are not necessary for every application.

B.

require an agent schedule record

C.

Should never run in a production environment.

D.

need to be registered with the master agent

Buy Now
Questions 6

Which of the following Skin rule customizations help satisfy the stated requirements?

Options:

A.

Configure the importance field for each column included in a repeating layout.

B.

Configure the Column I ayout and specify how the sidebar appears on tablets and smart phones.

C.

Configure the style for all application field values, paragraphs, and correspondence records.

D.

Configure the Column Layout and specify the width of the sidebar on desktops.

Buy Now
Questions 7

XYZ corp expects managers to create a variety of reports. Those reports are always based on the same set of classes, but every report does not use every class in the set.

to simplify report creation for managers, you create________________________

Options:

A.

numerous sample reports showing how to join the classes

B.

association rules for the classes in this set

C.

a template report with every class join predefined

D.

a declare trigger that restricts report class joins to this set

Buy Now
Questions 8

An organization has two lines of business: selling books for children and reselling college textbooks.

The division selling books for children can use the same basic user interface (UI) as the division reselling textbooks with the exception of the payment methods.

How do you apply the Situational Layer CakeTM in this scenario?

Options:

A.

Place the UI rules in the base layer, and create a new layer for the payment rules for both lines of business.

B.

Place the UI rules and generic payment method rules in the base layer, and create a new layer for the division-specific payment rules.

C.

Place the UI rules in the base layer, and create a parallel base layer for the payments rules.

D.

Place the UI rules in the base layer, and create a new layer for the payment rule for each division.

Buy Now
Questions 9

A recent review of the audit polices log show that a specific IP address has made a large number of failed login attempts within a few minutes you suspect that it is an internet bot attack

Select two options you can configure to prevent the bot from accessing you application

Options:

A.

Enable the CAPTCHA security policy

B.

Enable an authentication lockout policy

C.

Enable a contect security policy

D.

Enable a failed login attempts security event

Buy Now
Questions 10

Identify the two correct statements regarding Localization wizard capabilities. (Choose Two)

Options:

A.

Extracts the string values from all application field values, paragraphs, and correspondence records.

B.

Creates field value rules for all labels used in the application.

C.

Automatically sets the locale, base currency, and time zones based on the user's language.

D.

Generates a package for French even though Pega provides an associated language pack.

Buy Now
Questions 11

Users are spending excess time researching duplicate cases to determine whether to process or resolve the cases.

Which two options allow you to reduce the number of potential duplicate cases? (Choose two.)

Options:

A.

Decrease the weights of the weighted conditions.

B.

Increase the weights of the weighted conditions.

C.

Increase the weighted condition sum threshold.

D.

Decrease the weighted condition sum threshold.

Buy Now
Questions 12

An agent is associated with the Background processing node type. Several nodes in the cluster are

configured to perform background processing. You need to create an agent that runs every day at

midnight and sends customers an email if their birthday is that day

which two options do you select to configure the agent?

Options:

A.

Auto queue management

B.

Advanced for mode

C.

Periodic for pattern

D.

Delay next run of agent across the cluster by specified time period

Buy Now
Questions 13

Inconsistent formatting of phone numbers is causing, usability issues. You hnvo been asked to enh interface to ensure all phone numbers are automatically reformatted consistently.

Which two options incorporate best practices for applying the required formatting? (Choose Two)

Options:

A.

Configure a Declare Constraint rule.

B.

Configure an Edit Validate rule.

C.

Configure a Custom Control.

D.

Configure an Edit Input rule.

Buy Now
Questions 14

Which two actions can yon perform to improve the guardrails compliance score of an application? (Choose

Options:

A.

Ensure keyed data classes are not mapped to pr-other where possible.

B.

Convert activities that only retrieve data to data transforms that invoke data pages.

C.

Achieve a higher application level test coverage percentage score.

D.

Increase the percentage of unit tests and scenario tests that pass.

Buy Now
Questions 15

You deplyed a pega web mashup implementation into production and are using IACAuthentication.

which two action ensure that the external authentication module, and not another source, has validated the user?

Options:

A.

In the IACAuthentication service, map a passoword attribute form the LDAP server used by the external

B.

In an IAC authentication activity, add a step to idenify the security token provied by the external authentication module.

C.

in the IACAuthentication service, specify the appropriate bind password used by the host system

D.

In an IAC authentication activity, add steps that return the security token to the external authentication module for verification.

Buy Now
Questions 16

What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over time? (Choose Two)

Options:

A.

Add indexes to all columns.

B.

Purge workparty UUI index tables periodically.

C.

Schedule scripts to maintain frequently fragmented tables.

D.

Purge and/or archive records based on the company's record retention policy.

Buy Now
Questions 17

your application queues items for a standard agent a case has not been updated as expected by the agent. on the system queue management landing page the queue status for each item us available.

what two issues can be identified in the system queue management landing page using the status?

(choose two)

Options:

A.

the agent failed when processing the item.

B.

the agent is scheduled to process the item in the future.

C.

the agent schedules were disabled.

D.

the agent is not configured for optimistic locking.

Buy Now
Questions 18

You are managing distributed, geographically dispersed, development teams A, B and C. Team A is ready to merge changes into their development environment to make available changes to Team B’s Team C’s.

To ensure all development teams are working with the latest version of shared rule base, select and move all of the following tasks to the tasks List Order column and place them in the correct order.

Options:

Buy Now
Questions 19

you need to formet required fields with red labels. you configure a custom style in the skin rule.

how do you apply the custom style?

Options:

A.

reference the skin rule in the dynamic layout with the required field labels

B.

reference the skin in the required field labels.

C.

reference the custom style as a parameter in a dynamic layout.

D.

reference the custom style in the required field labels

Buy Now
Questions 20

which of the following things do you need to add to the whitelist for a mobile application to function correctly while offline?

Options:

A.

Data transforms invoked by custom javascript

B.

Data paga used to source a drop-down list

C.

Validate rules on an email address field

D.

Filed values used to populate a drop-down

Buy Now
Questions 21

BigCo receives complaints from existing customers and new prospects that BigCo representatives contact them with irrelevant offers and products.

Which two Pega solutions do you suggest to help solve this problem? (Choose Two)

Options:

A.

Pega Marketing

B.

Pega Customer Service

C.

Robotic Process Automation

D.

Customer Decision Hub

Buy Now
Questions 22

set the three security tasks you perform when deploying an application to a production environment. (Choose Three)

Options:

A.

Delete the Unauthenticated access group.

B.

Restrict access to ruleset configuration.

C.

Change the Rule security mode setting on the access groups to Deny.

D.

Rename the PRServlet default servlets.

E.

Update standard dynamic system settings.

Buy Now
Questions 23

Select and move the three option that are required to enable to access to the client clipboard in a mobile app to the configuration column and place them in the correct order

Options:

Buy Now
Questions 24

XYZ corp has requirement to send an email to every person who has used a certain service in the previous month thanking them for doing business with XYZ. Generating and sending these emails take a certain amount of time XYZ wants these email processed as quickly as possible to avoid interfering with emails sent during business hours.XYZ also wants to ensure that the thank-you email is not sent to the same person twice

Options:

Buy Now
Questions 25

select and move the three option that are required for tracing an agent on one of the nodes in a cluster to the step column and place them in the correct order

Options:

Buy Now
Questions 26

In order to produce a complete view of a customer, a customer service(CS) application requires reference data from multiple external systems. The customer data resides on a customerinfo page in a parent case type. The data on the CustomerInfo Page is also used by some of its subcases. Sometimes, the connectors that populate the data page are slow.

Which two of the following approaches for handling the required reference data from the external systems uses the least system resources? (Choose Two.)

Options:

A.

Use Case Designer data propagation to copy the data to the subcases to populate the page contents.

B.

Use the Load-DataPage method to initiate the population of the page contents.

C.

Use the system of Record (SOR) data access pattern to populate the page contents.

D.

Use the Snapshot data access pattern to populate the page contents.

Buy Now
Questions 27

You isolated the problem to node ! of the cluster. Y see node 1 goes down shortly «ift

What is the likely cause of the out of-memory error?

Options:

A.

At 3:00 P.M., managers view multiple reports displaying open assignments and cases so they can plan work for the following day.

B.

At 3:00 P.M., a robotic process automation runs every day. The mapping of results to each case type horn the automation is CPU intensive.

C.

At 3:00 P.M., a job scheduler is mistakenly configured to run on a single Web Tier node that pulls an increasingly large number of records onto a clipboard page each day.

D.

At 3:00 P.M., a shift change occurs and several users login and display the" work list and dashboard.

Buy Now
Questions 28

An application processes stock market trades.

which two requirement are best implemented by an advanced agent?

Options:

A.

call a service every day at 5 : 00 am to get the marker open and close time, and recird the result

B.

Excute a trade cae only after the stock reaches a certain price

C.

create a case to audit an account if the customer trade more tha usd9999in a day

D.

complete unexecuted trade when the market

Buy Now
Questions 29

You oversee a medium-size development team, and some of the team members are new to

pega. What are the most efficient ways to ensure that the rules the team creates adhere to

best practices? (choose two)

Options:

A.

Have new team members create and run Pega automated unit tests against their rules.

B.

Use Pega Log Analyzer to identify exceptions associated with the new team members.

C.

Run Tracer on each rule the new team members check in to identify an failures in rule execution.

D.

Leverage the rule check-in approval process to review the new team member’s changes first.

Buy Now
Questions 30

When do you use the load-datapage activity method?

Options:

A.

To refresh a data page

B.

To queue the data page for a default agent

C.

To initiate the loading of a data page

D.

To run a connector asynchronously

Buy Now
Questions 31

XYZ Corporation wants to ensure that every attempt by a developer to check a rule into a certain ruleset version is reviewed before that rule is allowed to be checked in. The rule should be automatically sent back to the developer without being checked in if all warnings are not justified and the fields on the history tab are not complete.

How do you address this requirement?

Options:

A.

Prior to the first assignment in the ApproveRuleCheckin flow, add a decision shape where one output connector is equivalent to the submitting the SendBack flow action.

B.

Implement a CheckForCustomWarnings activity for each rule included in the requirement. The activity issues a warning whenever the requirement's history tab criteria are not met.

C.

Override the FindReviewers decision tree to invoke a when rule that evaluates the criteria, if the when rule returns true, the decision tree returns SendBack.

D.

Override the SendBack Flow Action adding a pre-ctivity that transfers the assignment to the create operator if the rule's criteria are not met.

Buy Now
Questions 32

MyCo.com has instances of SCM-F5, SmartDispute, and CPM-F5 in their Production Environment distributed across multiple Pega instances. A new business requirement states that users working in any one application cart create a case in any other application.

What is your recommendation to implement the new business requirement?

Options:

A.

Synchronize case creation with RFST services.

B.

Leverage database replication to communicate case creation.

C.

Implement Federated Case Management.

D.

Implement a parent case across multiple products.

Buy Now
Questions 33

Six weeks after you deliver your application to production, your users report that the application slows down in the afternoon. The application is almost completely unresponsive for some users shortly after

3:00 P.M. Other users do not experience this problem until later in the day.

You do not have access to the Production environment, but you do have access to AES. The production environment has three nodes and a load balancer.

You need to resolve this issue because a new division of the organization will start using the application next month.

How do you begin your research to diagnose the cause of the reported performance issue?

Options:

A.

Look at the performance profile and DB Trace output from each node.

B.

Observe the cluster and node status on the Enterprise Health Console.

C.

Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.

D.

Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Buy Now
Questions 34

Select the recommended option for extending the data model provided by a pega industry framework.

Options:

A.

Specialize the data model as little as possible.

B.

Redefine the data model.

C.

Hide the data model with a custom data model.

D.

Hide the data model with an Enterprise service Bus (ESB) dictated data model.

Buy Now
Questions 35

Options:

A.

Increase subcase urgency based on ClaimUnit type prior to the workbasket assignment. Specialize the Service Level Rule by ClaimUnit case type.

B.

When the SLA's goal is reached, have an escalation Activity adjust the claim urgency in proportion to the average time to resolve ClaimUnit cases.

C.

Implement a GetNextWork solution based on case deadline and ClaimUnit type. Specialist the service Level Rule by ClaimUnity case type.

D.

Store the average time to complete sub case types in a table. Customize GetNextWork list view by joining to this table and use this value for ordering the results.

Buy Now
Questions 36

A user report poor application performance at 5:00 pm yesterday. which two tools do you use to review the user's session to identify the cause of the poor performance ?

Options:

A.

performance profiler

B.

my performance Details report

C.

Alerts log

D.

tracer

Buy Now
Questions 37

You imported a rule-admin-product (RAP) file that contains new features into a user acceptance testing(UAT) environment. Select the option that ensures basic functionality behaves as expected before inviting users to start acceptance testing.

Options:

A.

Create a smoke test suite. Run the test suite using the pre-import process.

B.

Create an ad hoc test suite. Run the test suite using the post-import process.

C.

Create an integration test suite. Run the test suite using the Execute Test REST service

D.

Create a regression test suite. Run the test suite using the automation server.

Buy Now
Questions 38

You need to define a new LDAP authentication servlet because all of the standard LDAP servlets are

being used in authentication services

which two task do you perform to implement this requirement

Options:

A.

Copy an existing LDAP servlet and rename it

B.

Create a new mapping servlet and URL pattern

C.

add a new URL pattern to the existing mapping servlet

D.

rename an existing LDAP servlet

Buy Now
Questions 39

Your team is developing a Quoting application for BigCo. The team is developing a Policy Administration application. The Quoting application is built on the Policy Administration application. The Policy Administration application requires enhancements to support other areas of the business. These enhancement take place during the same time frame as the Quoting application development.

Select the two practices for your team to follow to minimize potential development conflicts. (Choose Two.)

Options:

A.

Share rule sets between both application

B.

Switch application when modifying rules.

C.

Perform branch reviews when merging branches.

D.

Periodically rebase the policy Administrator application

Buy Now
Questions 40

Given the following classes and properties:

myco-data-shape (abstract)

area

color

myco-data-shape-rectangle

length

width

myco-data-shape-circle

radius

a page list property .shapes is defined as being of the abstract class myco-data-shape.

select two correct statements. (choose two)

Options:

A.

a rule defined in myco-data-shape-rectangle can modify the. Color property.B. pages of shapes can contain. length and. Radius.

B.

A rule existing in myco-data-shape can be overridden in myco-data-shape-circle.

C.

pages of .Shapes can be of either myco-data-Shape-rectangle or myco-data-shape-circle, but all pages must be the same.

Buy Now
Questions 41

what configuration is required to control which nodes in a cluster an agent runs.?

Options:

A.

assign the agent to a specifie category.

B.

associate the agent to specific node type.

C.

use a custom queue for the agent

D.

create agent schedules on applicable nodes.

Buy Now
Questions 42

XYZ Corporate wants to perform extensive analysis on work party information across various case types in real time at any time of the day. At the same time, xyz wants to minimize the impact this analysis has case worker using Pega applications.

Which solution do you recommend?

Options:

A.

Invoke BIX to export Index-WorkPartyUri data to the report database.

B.

Impalement a REST Service that persists index-WorkPartyUri data within the report database.

C.

Define additional database indexes against index-WorlParyUri.

D.

Configure the Index-WorkpartyUri Data_admin_DB_table record to write to the reports database.

Buy Now
Questions 43

You are designing a case life cycle to process fraudulent charge claims. After a list of suspected fraudulent charge is submitted, the case advances to the processing stage. In the first step of theprocess fraud claim process, a seprate child case must be created for each suspected fraudulent charge.

After all necessary fraudulent charge cases are created, the parent cse advance to the next step where the customer is notified that their claims are being processed

choose three actions needed to configure the missing step so that a separate child case is created for

each fraudulent charge selected

Options:

A.

Add a customer split for each process step to the cse life cycle and configure it ti create child cases.

B.

configure data propagation to map property value between the parent and clid cases.

C.

add a create case smart shape to the case life cycle and configure it to be created a case

D.

add a create case smart setup to the cse life cycle and configure it to creare child cases

E.

use a page list property to store the fraudulent claim items and identify the number if child cases to create

Buy Now
Questions 44

which two of the following action are required to configure your application to support SSO authentication ?

Options:

A.

configuring the authentication activity to identify the operator in the system

B.

configure the application record to use external authentication

C.

configure required mapping between LDAP attributes and operator properties

D.

configure model operator records for each access group in your application

Buy Now
Questions 45

Users in a cloud-based production application report a chronic performance issue that occurs every day between 2:00 P.M. and 4:00 P.M. AH attempts to reproduce the problem in the Development, QA, and Staging environments have failed.

Which two techniques help you troubleshoot the problem? (Choose Two)

Options:

A.

Review Performance Alerts and Exceptions in PDC.

B.

Review a Production Tracer Log using SMA.

C.

Review Alerts and Exceptions using PLA.

D.

Review Performance Alerts and Exceptions in AES.

Buy Now
Questions 46

An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner

how do you implement this requirement?

Options:

A.

create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.

B.

create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.

C.

create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.

D.

create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access

Buy Now
Questions 47

A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director.

In order to allow the three physicians to review the orders in parallel, how would you configure the process?

Options:

A.

Add a Split Join shape, add a list of physicians, and call the surgical procedure request process.

B.

Add a Split For Each shape, add a list of physicians, and call the evaluation process.

C.

Add a Split Join shape, add a list of physicians, and call the evaluation process.

D.

Add a cascading approvals shape that is called by the evaluation subprocess.

Buy Now
Questions 48

Consider the following requirement:

case worker must be able to add a work party when creating a case

select the configuration option that fulfills this requirement

Options:

A.

add a data transform to the pyCaseManagementDefault work parties rule

B.

Ensure the addparty user action is available as a local action

C.

add the addworkObjectparty activity to the assigments

D.

select the VOE? option on the pyCaseManagementDefault work parties rule

Buy Now
Questions 49

Ar.mo Corporation is designing an Order Fulfillment application built on an Inventory application. Both applications reuse a section that displays Part details.

Where do you configure the PartOetails section?

Options:

A.

In an Inventory ruleset within the Inventory application's work pool class

B.

In an Order Fulfillment luleset within the Order Fulfillment application's Parts data class

C.

In an Enterprise ruleset within the Inventory application's Paits data class

D.

In an Order Fulfillment ruleset within the Order Fulfillment application's work pool class

Buy Now
Questions 50

You need to create custom workspaces for the manager and for the Customer service representative (CSR), Also, you are asked to display some properties in custom formats that arc not supported by Pega.

Which approach satisfies these requirements?

Options:

A.

Each access group can use separate portals, harnesses, and sections. Use Specialty Components and use XML to pass data.

B.

Level age the Case Manager and Case Worker as reference points to create new portals, if required. Use Special Components and use JSON to pass data.

C.

Create different harnesses for each user's workspace. New portal rules are not needed. Define Specialty Components and use JSON to pass data.

D.

Identify the functionality required for each portal. Customize the portal either by modifying the section or harness. Use Specialty Components and use XML to pass data.

Buy Now
Questions 51

XYZ Corp users are experiencing delays in the application that you suspect is related to the database

Which two options do you recommend to isolate the issue? (Choose Two)

Options:

A.

Write Pega logs to the database server.

B.

Investigate when the database is used most heavily.

C.

Lower query-time-related alert thresholds.

D.

Increase the threshold for blob-size alerts.

Buy Now
Exam Code: PEGACPLSA88V1
Exam Name: Certified Pega Lead System Architect (CPLSA) Exam 8.8
Last Update: May 6, 2024
Questions: 170
$64  $159.99
$48  $119.99
$40  $99.99
buy now PEGACPLSA88V1