Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Note! The PEGAPCLSA85V1 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the PEGAPCLSA86V2 Exam.

PEGAPCLSA85V1 Lead System Architect (LSA) Pega Architecture Exam 85V1 Questions and Answers

Questions 4

The application contains a property named claimid. You want to business users to reuse this property in any new case types they create. How do you define the claimid property?

Options:

A.

As a final rule

B.

As a case level property

C.

As an enterprise class level property

D.

As a relevant record

Buy Now
Questions 5

In the answer area, select the configuration for back-to=back processing on the follow action form so that getnextwork processing does not occur.

PEGAPCLSA85V1 Question 5

Options:

A.

Look for the assignment to perform.

B.

If not found, look for other assignment in flows on this case

C.

If not found, look for assignment in flows on the parent case

D.

For each also consider assignments in workbaskets

Buy Now
Questions 6

Table a contains customer information. Table B contains complaints submitted by customers. Table C contains positive feedback submitted by customer.

You are tasked to write a report that list all rows in Table A where, per customer, the number of rows in Table B related to Table A are greater than the number of rows in Table C related to table A.

Which method creates the report that executes with the best performance?

Options:

A.

Define two subreports: one that counts rows in Table B relative to Table A, and on that counts the rows in table C relative to Table A. Only include rows in the main. Report against table A where the table B count is greater that the Table C count.

B.

Join table A to Table B and C using include all rows in this class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

C.

Join table A to Table B and C using include all rows in join class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

D.

Define two subreports, one where table B users ''Do not Join'', and one where Table C users ''Do not Join'', In the main report count the rows from each subpreport, then only include rows where the count from the Table B subreport than the count from the Table C subreport.

Buy Now
Questions 7

XYZ Corporation wants to ensure that every attempt by a developer to check a rule into a certain ruleset version is reviewed before that rule is allowed to be checked in. The rule should be automatically sent back to the developer without being checked in if all warnings are not justified and the fields on the history tab are not complete.

How do you address this requirement?

Options:

A.

Prior to the first assignment in the ApproveRuleCheckin flow, add a decision shape where one output connector is equivalent to the submitting the SendBack flow action.

B.

Implement a CheckForCustomWarnings activity for each rule included in the requirement. The activity issues a warning whenever the requirement's history tab criteria are not met.

C.

Override the FindReviewers decision tree to invoke a when rule that evaluates the criteria, if the when rule returns true, the decision tree returns SendBack.

D.

Override the SendBack Flow Action adding a pre-ctivity that transfers the assignment to the create operator if the rule's criteria are not met.

Buy Now
Questions 8

What two features do activities and functions share? (Choose Two)

Options:

A.

Ability to be circumstanced

B.

Ability to be parameterized

C.

Ability to be called directly from a decision table

D.

Ability to be versioned

Buy Now
Questions 9

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.

Which configuration do you recommend?

Options:

A.

Use a visible when rule for the properties displaying sensitive information.

B.

Create an access control policy restricting access to the sensitive information.

C.

Configure an access deny rule restricting access to the sensitive information.

D.

Move sensitive information to separate sections and apply a privilege to the sections.

Buy Now
Questions 10

Select the recommended option for extending the data model provided by a pega industry framework.

Options:

A.

Specialize the data model as little as possible.

B.

Redefine the data model.

C.

Hide the data model with a custom data model.

D.

Hide the data model with an Enterprise service Bus (ESB) dictated data model.

Buy Now
Questions 11

A pega application has cases that represent customer accounts each with many members.

When a member of a customer account registers with the application through an offline

component, a related registration transaction is recorded. An advanced agent updates the

customer account cases with new members. The application is running in a multimode

system and advanced agents are enabled on all nodes. Which two elements are valid design

choices? (choose two)

Options:

A.

Use the optimistic locking option on the case types.

B.

Create a Registration subcase configured to run in offline mode.

C.

Leverage the default object lock contention requeuing capability.

D.

Override DetermineLockString to use .AccountID instead of .pyID as the lock string.

Buy Now
Questions 12

An application contains cases which transition though different statuses throughout their life cycle which typ.ca, months.

Design a reporting strategy to display the number of cases by status at the end of each month for a 12 month period.

Options:

A.

Configure an agent to record monthly case status in a separate table and report on that table.

B.

Configure an activity to generate the data in the clipboard and report using a custom section.

C.

Configure a summary report that leverages sub reports for each month.

D.

Configure a Declare index to record case data to a separate table.

Buy Now
Questions 13

Select the option in which you would define Content Security Policies.

Options:

A.

To prevent the browser to load content from untrusted sources

B.

To restrict what data a user can view in a case the user can open

C.

To define security for case attachments

D.

To configure security for the content management integration

Buy Now
Exam Code: PEGAPCLSA85V1
Exam Name: Lead System Architect (LSA) Pega Architecture Exam 85V1
Last Update: Apr 14, 2023
Questions: 93