Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Pegasystems PEGAPCLSA86V1 Lead System Architect (LSA) Pega Architecture Exam 86V2 Exam Practice Test

Lead System Architect (LSA) Pega Architecture Exam 86V2 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

You oversee a medium-size development team. Some of the team members and new to Pega and are working on features in a separate branch.

What are two ways you can ensure that the rules the team creates adhere to best practices? (Choose Two)

Options:

A.

Run 1 rarer on each new rule in the branch that new team members check in to identify any failures in rule execution.

B.

Leverage the branch review feature to have senior team members validate the branch contents.

C.

Use Pega Log Analyzer to locate any exceptions in the branch associated with the new team members.

D.

Review the branch quality to identify any rules with guardrail warnings.

Question 2

Users in a cloud-based production application report a chronic performance issue that occurs every day between 2:00 P.M. and 4:00 P.M. AH attempts to reproduce the problem in the Development, QA, and Staging environments have failed.

Which two techniques help you troubleshoot the problem? (Choose Two)

Options:

A.

Review Performance Alerts and Exceptions in PDC.

B.

Review a Production Tracer Log using SMA.

C.

Review Alerts and Exceptions using PLA.

D.

Review Performance Alerts and Exceptions in AES.

Question 3

In the Answer Area, drag each use case on the left to the appropriate locking strategy on the right.

Options:

Question 4

Security policies need to be configured for a newly developed Pega application using basic credential authentication. The lockout policy configuration must lock out users after three failed login attempts. The configuration must exclude Administrator or Executive operators from the lockout.

How do you achieve this requirement?

Options:

A.

Define operator override setting in enterprise authentication system

B.

Create a separate role for Admin Executives

C.

Use Exclude Operators options in Security Policies landing page

D.

Define Access Control Policy to exclude Admin Executives

Question 5

Which two actions can yon perform to improve the guardrails compliance score of an application? (Choose

Options:

A.

Ensure keyed data classes are not mapped to pr-other where possible.

B.

Convert activities that only retrieve data to data transforms that invoke data pages.

C.

Achieve a higher application level test coverage percentage score.

D.

Increase the percentage of unit tests and scenario tests that pass.

Question 6

In order to produce a complete view of a customer, a customer service(CS) application requires reference data from multiple external systems. The customer data resides on a customerinfo page in a parent case type. The data on the CustomerInfo Page is also used by some of its subcases. Sometimes, the connectors that populate the data page are slow.

Which two of the following approaches for handling the required reference data from the external systems uses the least system resources? (Choose Two.)

Options:

A.

Use Case Designer data propagation to copy the data to the subcases to populate the page contents.

B.

Use the Load-DataPage method to initiate the population of the page contents.

C.

Use the system of Record (SOR) data access pattern to populate the page contents.

D.

Use the Snapshot data access pattern to populate the page contents.

Question 7

A shipping case needs to wait n specific time period before progressing in its flow. The developer is considering using ;i wait shape or an assignment with an SI A to perform this (unction.

Identify the two requirements for which a wait shape is the simpler approach. (Choose Two)

Options:

A.

Adjust the case urgency when the assignment is created.

B.

Manually step past the waiting point prior to the designated time.

C.

Present a custom UI form to the user while waiting to expire.

D.

Automatically bypass locking when the assignment is created.

Question 8

A shipping case needs to wait a specific time period before progressing in its flow. The developer is considering using a wait shape or an assignment with an SLA to perform this function.

Identify the two requirements for which a wait shape is the simpler approach. (Choose Two)

Options:

A.

Adjust the case urgency when the assignment is created-

B.

Manually step past the waiting point prior to the designated time.

C.

Present a custom UI form to the user while waiting to expire.

D.

Automatically bypass locking when the assignment is created.

Question 9

Client XYZ Corp implemented Pega Customer Service.

A customer service representative (CSR) needs to launch multiple applications to manually update information to keep dam synchronized across systems. The applications are built in different technologies, decreasing the CSR's efficiency in handling customer requests. The client has a requirement to launch all applications from the PLCJA Customer service application. The client requires that data Mows to and from the Pega Customer Service application to the other applications used by the CSR. Changes made in any one of the systems is reflected in other relevant systems. This results in the CSR handling customer requests more efficiently and spending less time manually updating dependent applications.

Which Pega capability do you recommend to support this requirement?

Options:

A.

Use Robotic Desktop Automation.

B.

Use SOAP/REST services to update the information.

C.

Use SQL connectors to update the data.

D.

Use Robotic Process Automation.

Question 10

A case can be withdrawn using a local action. You want to restrict the ability to withdraw a

case to the user who created the case or any work group manager of the user. Select three

rule types used in combination to achieve this functionality. (choose three)

Options:

A.

Access Deny

B.

Access When

C.

Access Control Policy

D.

Access of Role to Object

E.

Privilege

Question 11

MyMealth Corporation wants to use the age of the claim to increase the urgency on the assignment so that claims processors work on the most urgent claims first. The claim assignment urgency increases by 1 each day the claim remains in an unresolved status. At any time. My Health has up to 10,000 claims in process. Claims in the PendingProcessing workbasket are subject to this calculation. The application updates the claim urgency daily before the work day begins. AM claims are processed within 30 days.

MyHealth also processes complaint cases from health plan members. Complaint cases use a service level agreement (SLA) to ensure the customer service representatives respond to complaints within 48 hours. All claims processors work in Los Angeles 9:00 AM-5:OQ PM PST.

Which approach satisfies the claim urgency requirement and provides the best experience for the claims processor?

Options:

A.

Use an advanced agent on a dedicated node to increment the pyUrgencyAssignAdjust value by 1 for every assignment that matches the selection criteria.

B.

Use the assignment SLA to increment the pyUnjerncyAssiqnAdjust value by 1 every day the claim is in an open status.

C.

Use a declare expression to increment the pytJrgcncyAsp/gnAdjur.t value to 1. When a claim processor opens the assignment, the urgency is increased by 1.

D.

Use the overall SLA to increment the pyUrgencyAssignAdjust value by 1. Reset the goal date to the following day

Question 12

A developer has set the Rule security mode on the access group to Deny. Select the reason for this setting.

Options:

A.

Require Access of Role to Object rules be specified for each layer in the class hierarchy and not inherited from parent classes.

B.

Deny access to a rule if the privilege of the user is not defined in an Access of Role to Object.

C.

Disable standard privileges providing administrator access to the application (for example AllFlows and AllFllowActions).

D.

Ensure that all rules with the option of specifying a privilege have a privilege. Only users with the privilege can execute the rules.

Question 13

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

Options:

A.

Use a visible when rule for the properties displaying sensitive information.

B.

Create an access control policy restricting access to the sensitive information.

C.

Configure an access deny rule restricting access to the sensitive information.

D.

Move sensitive information to separate sections and apply a privilege to the sections.