Exam4Training

Pegasystems PEGAPCLSA80V1_2020 Pega Certified Lead System Architect (PCLSA) 80V1 2020 – Architecture exam Online Training

Question #1

An application is being constructed in multiple phases for a growing company that has over 1000 employees. During the initial development stages. It is determined a button on section has to be made conditionally visible based on a group of actors.

What should the conditional visibility be based on to minimize the amount of future maintenance?

  • A . AccessGroup
  • B . Privilege
  • C . Role
  • D . Work group

Reveal Solution Hide Solution

Correct Answer: A
Question #2

You oversee a medium size development team, and some of the team members are new to Pega.

What are the two most efficient ways to ensure that the rules the team creates adhere to best practices? (Choose Two.)

  • A . Leverage the rule check-in approve process to review the new team member changes first.
  • B . Have new team members create and run Pega automated unit tests against their rules.
  • C . Use Pega Log Analyze to identify exceptions associated with the new team members.
  • D . Run Tracer on each rule the new team members check in the identify an failure in rule execution.

Reveal Solution Hide Solution

Correct Answer: A,C
Question #3

A purchase order application allows users in their work group to read and write purchase request cases. When the total amount exceeds USD100,000 however, only the work group g manager can read and write the case.

Select two configurations that satisfy the requirement. (Choose two.)

  • A . Use a read access control policy with a condition that verifies the amount is less than
    USD10,000.
  • B . Add a privilege to the case type class that Is conditionally granted when the purchase request amount is less than USD10,000.
  • C . Configure conditional access in Access Manager to read and write a purchase request case when the amount is less than USD10,000.
  • D . Configure the work list to only display purchase requests greater than USD10,000 for the group manager.

Reveal Solution Hide Solution

Correct Answer: A,B
Question #4

A case can be withdraw using a local action. You want to restrict the ability to withdraw a case to the user who created the case or any work group manager of the user.

Select three rule types used in combination to achieve this functionality. (Choose three.)

  • A . Access Control Policy
  • B . Access when
  • C . Access Deny
  • D . Access of Role to Object
  • E . Privilege

Reveal Solution Hide Solution

Correct Answer: A,B,C
Question #5

A page application locally stores the same set of codes defied by an used within an external system of record. The Pega application does not locally store the associated to these codes. During case processing, the displayed labels for this set if codes are sourced from the external system of record. On any given data, the label associated to a code may change. You are asked to implement a report definition that display the current label associated to each code whenever the report is run.

How do you design a Pega application to meet this requirement?

  • A . Persist the most recently retrieved label for each code in a table. Join to that table when running the report.
  • B . Develop a SQL function rows that calls a stored procedure to retrieve the currently associated label for each code.
  • C . Display report definition rows using a custom section. Use a keyed-access Data page to source label values.
  • D . Query the distinct codes that the report would display. Develop an interface to retrieve the associated labels in bulk.

Reveal Solution Hide Solution

Correct Answer: C
Question #6

Select the option in which you would define Content Security Policies.

  • A . To restrict what data a user can view in a case the user can open
  • B . To prevent the browser to load content from untrusted sources
  • C . To configure security for the content management integration
  • D . To define security for case attachments

Reveal Solution Hide Solution

Correct Answer: C
Question #7

Which two tools and /or methods support continuous integration practices? (Choose Two.)

  • A . Performing UI regression testing
  • B . Configuring pre and import steps
  • C . Using an automation server to invoke unit test suites
  • D . Leveraging release toggles

Reveal Solution Hide Solution

Correct Answer: B,D
Question #8

A health plan application includes a process for surgical procedure requests. Currently, there is an evaluation subprocess in which a physician reviews the diagnosis and enters the recommended procedure and its urgency. The request then advances to a medical director who analyzes the feedback and approves the appropriate procedure. The health care organization has created a new requirement, which states that three physicians can perform the evaluation independently. Only two evaluations are necessary to advance the case to the medical director.

How do you configure the process so that the request can continue to be processed if only two of the three physicians approve the order?

  • A . Use an Any join condition.
  • B . Use a Some join condition.
  • C . Use a decision table.
  • D . Use a validate rule.

Reveal Solution Hide Solution

Correct Answer: B
Question #9

DRAG DROP

Select each task on the left and drag it to the corresponding Application Development Studio on the right, where the task can be completed.

Reveal Solution Hide Solution

Correct Answer:


Question #10

DRAG DROP

You are managing distributed, geographically dispersed, development teams A, B and

C. Team A is ready to merge changes into their development environment to make available changes to Team B’s Team C’s.

To ensure all development teams are working with the latest version of shared rule base, select and move all of the following tasks to the tasks List Order column and place them in the correct order.

Reveal Solution Hide Solution

Correct Answer:


Question #11

Using the information shown in the following case structure, when option is always true?

  • A . The Weather case can be instantiated without a parent Event Booking case.
  • B . The Parking class must inherit from the Event Booking class.
  • C . Resolution of the Event Booking case requires the Parking case to be resolved.
  • D . Parking, weather, and hotel cases must be Instantiated for the Event case to process correctly.

Reveal Solution Hide Solution

Correct Answer: C
Question #12

An end user of the application experienced a browser crash working on a highly available system. Crash recovery is enabled.

Does the user have to be authenticated?

  • A . Yes, if the user is directed to the same node.
  • B . Yes. If the authentication cookie was lost.
  • C . No, if the authentication cookie was lost.
  • D . No, if the user is directed to a different node.

Reveal Solution Hide Solution

Correct Answer: B
Question #13

You are designing an accessible Pega application for French and English-language users who require assistive technologies. The application must be able to run from desktop, table and mobile phone browsers.

Also, several screens require the ability to save changes and refresh the screen?

Which of the following Skin rule customization help satisfy the stated requirements?

  • A . In the Skin rule, Configure the import filed for each column included in repeating layout.
  • B . In the Skin rule, Configure the column Layout and specify how the sidebar appeared on tables and smart phones.
  • C . In the Skin configure the style for all application filed values, paragraphs, and correspondence records.
  • D . In the Skin rule, configure the Column Layout and specify the width of the sidebar on desktops.

Reveal Solution Hide Solution

Correct Answer: C
Question #14

An application contains cases which transition through different statuses through their life cycle which typically lasts 3 months.

  • A . Design a reporting strategy to display the number of cases by status at the end of each month for a 12-month period.
  • B . Configure a Declare index to record case data to separate table.
  • C . Configure an activity to generate the data in the clipboard and report using a custom section.
  • D . Configure a summary report that leverages sub reports for each month.

Reveal Solution Hide Solution

Correct Answer: C
Question #15

A developer has set the Rule security mode on the access group to deny.

Select the reason for this setting.

  • A . Require Access of Role to object rules to be specified for each layer in the class hierarchy and not inherited from parent classes.
  • B . Disable standard privileges providing administrator access to the application (for example AllFlows and AllFlowActions)
  • C . Deny access to a rule if the privilege of the user is not defined in an access of Role to Object.
  • D . Ensure that all rule with the option of specifying a privilege have a privilege. Only users with the privilege can execute the rules.

Reveal Solution Hide Solution

Correct Answer: A
Question #16

Using the information shown in the class structure, select the correct statement.

  • A . Parking and Auto instances must be stored in the same table.
  • B . Instance of EventBooking and Hotel can be stored In a separate table.
  • C . Auto must be a subcase of Parking.
  • D . EventBooking cannot be a subcase of Auto

Reveal Solution Hide Solution

Correct Answer: A
Question #17

Your team is developing a Quoting application for BigCo. The team is developing a Policy Administration application. The Quoting application is built on the Policy Administration application. The Policy Administration application requires enhancements to support other areas of the business. These enhancement take place during the same time frame as the Quoting application development.

Select the two practices for your team to follow to minimize potential development conflicts. (Choose Two.)

  • A . Share rule sets between both application
  • B . Switch application when modifying rules.
  • C . Perform branch reviews when merging branches.
  • D . Periodically rebase the policy Administrator application

Reveal Solution Hide Solution

Correct Answer: B,C
Question #18

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

  • A . Configure an access deny rule restricting access to the sensitive information.
  • B . Use a visible when rule for the properties displaying sensitive information.
  • C . Create an access control policy restricting access to the sensitive information.
  • D . Move sensitive information to separate sections and apply a privilege to the sections.

Reveal Solution Hide Solution

Correct Answer: A
Question #19

XYZ Corporate wants to perform extensive analysis on work party information across various case types in real time at any time of the day. At the same time, xyz wants to minimize the impact this analysis has case worker using Pega applications.

Which solution do you recommend?

  • A . Invoke BIX to export Index-WorkPartyUri data to the report database.
  • B . Impalement a REST Service that persists index-WorkPartyUri data within the report database.
  • C . Define additional database indexes against index-WorlParyUri.
  • D . Configure the Index-WorkpartyUri Data_admin_DB_table record to write to the reports database.

Reveal Solution Hide Solution

Correct Answer: D
Question #20

CORRECT TEXT

A company wants to run the same pega application in its eastern US office as well as its india office. The eastern united states server runs in the eastern united states time zone. The india server runs in the india time zon. The company wants a process to run in both offices at the same time world-wide once a day regardless of the server’s location.

How do you efficiently meet this requirement?

  • A . Define two advanced agents that call the same activity. one agent is scheduled to run at a time in the eastern united states time zone and the other agents is scheduled to run at a time in the india time zone. The activity checks both the local time zone and the local time. if the local time is close to the expected time the activity should run it continues otherwise it exits
  • B . Define two advanced agent that call the same parameterzied activity. One agent passes eastern united states time zone to the activity, and the other agent passes india time zone. The activity checks the local time zone. if the parameter matches the local time zone, the activity continues. otherwise it exits
  • C . Define a single adavanced agent that is scheduled to run in any desired time zone. in the Eastern us server modify the agaent schedule to run in the eastern united states time zone. For the india server, specify the india time zone within the agent schedule
  • D . Define a single advanced agent that is scheduled to run in either the eastern united states zone or the india time zone. Ensure that the clocks with the servers in both offices are synchronized using the simple Network time protocal

Reveal Solution Hide Solution

Correct Answer: C

Question #21

Acme Corporation is designing an Order Fulfillment application built on an Inventory application. Both applications reuse a section that displays Part details.

Where do you configure the PartDetails section?

  • A . In an Inventory ruleset within the Inventory application’s work pool class
  • B . In an Order Fulfillment ruleset within the Order Fulfillment application’s work pool class
  • C . In an Order Fulfillment ruleset within the Order Fulfillment application’s Pans data class
  • D . In an Enterprise ruleset within the Inventory application’s Parts data class

Reveal Solution Hide Solution

Correct Answer: D
Question #22

What are two valid reasons for defining a case type within a case type-specific ruleset? (Choose Two)

  • A . The ruleset can be added to the ruleset stack for multiple applications.
  • B . The case type might be converted to a component application in the future.
  • C . A User Story can be associated to a single, fine-grained ruleset within a Branch.
  • D . The case type ruleset might be converted to a true component in the future.

Reveal Solution Hide Solution

Correct Answer: C,D
Question #23

Six weeks after you deliver you application to production, you users reports that the application slows down in the afternoon. The application is almost completely unresponsive for some users shortly after 3:00 P.M Other users do not experience this problem until later in the day.

You do not have access to the production environment, but you do have access to AES.

The production environment has three nodes and a load balancer.

You need to resolve this issue because a new division of the organization will start using the application next month.

What is the likely cause of the out-of-memory error you see on node1 of the production environment?

  • A . At 3:00 P.M a shift change occurs and several users login and display their work list.
  • B . An agent on node 1 that runs at 3: 00 P.M pulls an increasingly large number of records onto a clipboard page each day.
  • C . At 3:00 P.M managers on node 1 view an embedded report displaying open assignments so they can plan work for the following day.
  • D . A robotic process automation runs at 3:00 P.M every day on node 1. The mapping of results to each case type from the automation is CPU.

Reveal Solution Hide Solution

Correct Answer: C
Question #24

You are working on an insurance claims application that receive claims email. The company receives 500 emails per hour. The insurance company promises a 24-hour response time to receive and verify the claim. After the claim is verified, the system automatically responds with an email containing the claim ID.

The application is developed in the cloud environment. The production environment is currently running on premise.

What is your recommendation to ensure the insurance company can meet the 24-hour

response time requirement for claims submitted by email?

  • A . Recommend the insurance company use email listener with concurrent threads.
  • B . Recommend the insurance company use an advanced agent to verify claims and respond.
  • C . Recommend the insurance company change its policy to allow for a broader processing and respond.
  • D . Recommend the insurance company use an MDB listener instead of an email listener.

Reveal Solution Hide Solution

Correct Answer: D
Question #25

An application consisting of a single case requires sending correspondence at a designated time minimal delay.

The existing solution sends the correspondence through an escalation activity in an SLA.

Which two factors do you consider for this solution ? (Choose Two)

  • A . The number of queue SLA objects
  • B . Correspondence rule configuration
  • C . Errors handling for locked items
  • D . Multiple open assignment on the same case.

Reveal Solution Hide Solution

Correct Answer: C,D
Exit mobile version