Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Pegasystems PEGAPCLSA86V2 - Lead System Architect (LSA) Pega Architecture Exam 86V2

Page: 3 / 5
Total 148 questions

What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over time? (Choose Two)

A.

Add indexes to all columns.

B.

Purge workparty UUI index tables periodically.

C.

Schedule scripts to maintain frequently fragmented tables.

D.

Purge and/or archive records based on the company's record retention policy.

BigCo receives complaints from existing customers and new prospects that BigCo representatives contact them with irrelevant offers and products.

Which two Pega solutions do you suggest to help solve this problem? (Choose Two)

A.

Pega Marketing

B.

Pega Customer Service

C.

Robotic Process Automation

D.

Customer Decision Hub

An application consisting of a single case requires sending correspondence at a designated time with minimal delay. The existing solution uses an assignment to pause the case until an SLA invokes the escalation activity that sends the correspondence. Occasionally there is a delay in sending the correspondence.

Which two factors contribute to the delay? (Choose Two)

A.

The number of queued SI A objects

B.

Multiple open assignments on the same case

C.

Error handling for locked items

D.

Correspondence rule configuration

While configuring GetNextWork, overriding the System Settings rule

GetNextWork__WorkBasketUrgencyThreshold imposes a minimum cutoff value for assignment urgency.

Which statement accurately depicts the system behavior when the GetNextWork_WorkBaseketUrgencyThreshold setting is overridden?

A.

The override ignores other criteria in GetNextWork.

B.

The override causes the application to revisit workbaskets for assignments with lower urgency.

C.

The override causes a search of only those assignments with the urgency higher than the threshold value.

D.

The override causes a search of all assignments in a work queue that equal or exceed the set urgency threshold.

your application connects to two REST services that list details about bank offices.

One REST service uses a postal code as a GET parameter and returns a detailed list of bank officers in that postal code.

the other REST service uses a city name as a GET parameter and returns a datailed list of back offices in cities with that name. The application uses data pages to cache details about bank offices.

select two options to configure a data page to accept either a postal code or a city name as a parameter and call the appropriate REST connector.(choose TWO)

A.

sourcing data from both rest connectors and using the response data transform to select the correct data

B.

sourcing data from a single REST connector that is circumstanced based on the input parameter

C.

sourcing data from each REST connector separately and using a when rule to select the appropriate data source at run time

D.

sourcing data from an activity that evaluates the parameter to select the appropriate REST connector to call at run time

set the three security tasks you perform when deploying an application to a production environment. (Choose Three)

A.

Delete the Unauthenticated access group.

B.

Restrict access to ruleset configuration.

C.

Change the Rule security mode setting on the access groups to Deny.

D.

Rename the PRServlet default servlets.

E.

Update standard dynamic system settings.

What two features do activities and functions share? (Choose Two)

A.

Ability to be circumstanced

B.

Ability to be parameterized

C.

Ability to be called directly from a decision table

D.

Ability to be versioned

You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?

A.

create an encrypted keyring password and replace the unencypted password in prconfig.xml

B.

enter a password in an application ID instance and reference the external system

C.

create an encrypted password with PR cipherGenerator and reference the external system

D.

create an encrypted password with passGen and replace the unencrypted password in pconfig.xml

BigCo is planning an update to JVM settings on all production nodes at the of the month. The production application supports high availability.

To ensure that users can continue working without distribution while the JVM changes are in process, select and move all of the following tasks to the Task List Order column arrange then correct order.

A case can be withdrawn using a local action. You want to restrict the ability to withdraw a

case to the user who created the case or any work group manager of the user. Select three

rule types used in combination to achieve this functionality. (choose three)

A.

Access Deny

B.

Access When

C.

Access Control Policy

D.

Access of Role to Object

E.

Privilege