Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

PEGAPCLSA86V2 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PEGAPCLSA86V2 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Lead System Architect (LSA) Pega Architecture Exam 86V2
  • Last Update: Sep 12, 2025
  • Questions and Answers: 148
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PEGAPCLSA86V2 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PEGAPCLSA86V2 Practice Exam Questions with Answers Lead System Architect (LSA) Pega Architecture Exam 86V2 Certification

Question # 6

In the Answer Area, determine where data is stored for each design option.

PEGAPCLSA86V2 question answer

Full Access
Question # 7

Select the primary reason for developing a set of unit lest cases and automated testing Suites in a continuous integration and continuous deployment (CI/CD) model.

A.

Automated testing reduces costs by reducing the need to hire and I rain testing resources.

B.

Automated testing accelerates the deployment of rules from the development environment to target environments.

C.

Automated testing programmatically ensures quality of rules to maintain the integrity of the pipeline.

D.

Automated testing allows for orchestration between automation server and the Execute Test REST service.

Full Access
Question # 8

You are configuring the container settings of a display a title. The title is based on the type of loan requested

PEGAPCLSA86V2 question answer

Full Access
Question # 9

How do you begin your research to diagnose the cause of the reported performance issue?

A.

Look at the performance profile and DB Trace out put from each node.

B.

Observe the cluster and node status on the Enterprise Health Console.

C.

Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.

D.

Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Full Access
Question # 10

An application contains cases which transition though different statuses throughout their life cycle which typically lasts 3 months.

Design a reporting strategy to display the number of cases by status at the end of each month for a 12-month period.

A.

Configure an agent to record monthly case status in a separate table and report on that table.

B.

Configure an activity to generate the data in the clipboard and report using a custom section.

C.

Configure a summary report that leverages sub reports for each month.

D.

Configure a Declare index to record case data to a separate table.

Full Access
Question # 11

XYZ Corporation would like a report that shows the number of employees who have been with the company more than 20 years, between 15 and 20 years, between 10 and 15 years, between 5 and 10 years, and less than 5 years.

How do you implement this report using Pega?

A.

Use a SQL Function.

B.

Use a listView with a custom getContent Activity.

C.

Use a correlated subreport.

D.

Use a Connect-SQL rule.

Full Access
Question # 12

While configuring GetNextWork, overriding the System Settings rule

GetNextWork__WorkBasketUrgencyThreshold imposes a minimum cutoff value for assignment urgency.

Which statement accurately depicts the system behavior when the GetNextWork_WorkBaseketUrgencyThreshold setting is overridden?

A.

The override ignores other criteria in GetNextWork.

B.

The override causes the application to revisit workbaskets for assignments with lower urgency.

C.

The override causes a search of only those assignments with the urgency higher than the threshold value.

D.

The override causes a search of all assignments in a work queue that equal or exceed the set urgency threshold.

Full Access
Question # 13

You manage a 30-person development team with members located across the globe.

Which Pega Cloud environment best supports the needs of your team?

A.

Large sandbox

B.

Standard sandbox

C.

Large development instance

D.

Preproduction instance

Full Access
Question # 14

which of the following things do you need to add to the whitelist for a mobile application to function correctly while offline?

A.

Data transforms invoked by custom javascript

B.

Data paga used to source a drop-down list

C.

Validate rules on an email address field

D.

Filed values used to populate a drop-down

Full Access
Question # 15

Finco corporation uses pega to perform the majority of the mortgage underwriting tasks.

After gathering the initial data, the mortgage case pauses and waits for the credit report

The credit report is a separate case, located in the same class group as the mortgage case, and typically resolves within 24 hours. After the credit report is complete, the application routes the mortgage case to the specialist.

Which of the following options is the optimal solution to route the mortgage case to the specialist when the credit report is complete?

A.

Add a wait shape to the mortgage flow with a case dependency to advance the mortgage flow to the next assignment when the credit report case is resolved.

B.

Insert a credit report assignment in the mortgage flow with a SLA to check the status of the credit report case and call the ResumeFlow activity when the credit report case completes.

C.

Include a split join shape in the mortgage flow to include the credit report flow. Use the All option on the split join shape to ensure the credit report is complete before routing to the specialist.

D.

Modify the credit report flow to move the mortgage case to the specialist. The application routes the assignment to the specialist with the least amount of work.

Full Access
Question # 16

One of the important requirements of Pega Web Mashup is to ensure that the same-origin policy is following.

From the following options, select two valid configurations. (Choose TWO)

PEGAPCLSA86V2 question answer

A.

Configuration A

B.

Configuration B

C.

Configuration C

D.

Configuration D

Full Access
Question # 17

You are implementing a paga customer service application and are integrating the system of record data for account information?

select the three tasks required to implement this integation

A.

Specialize the pega customer service data pages that use account data.

B.

Integrate with the system of record in the pega customer service account class

C.

Rename the pega customer service data pages to match the system of record.

D.

Integrate with the system of record to populate an Account data class.

E.

Create a data transform to map the Account data class to the pega customer service Account class

Full Access
Question # 18

Table a contains customer information. Table B contains complaints submitted by customers. Table C contains positive feedback submitted by customer.

You are tasked to write a report that list all rows in Table A where, per customer, the number of rows in Table B related to Table A are greater than the number of rows in Table C related to table A.

Which method creates the report that executes with the best performance?

A.

Define two subreports: one that counts rows in Table B relative to Table A, and on that counts the rows in table C relative to Table A. Only include rows in the main. Report against table A where the table B count is greater that the Table C count.

B.

Join table A to Table B and C using include all rows in this class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

C.

Join table A to Table B and C using include all rows in join class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

D.

Define two subreports, one where table B users ''Do not Join'', and one where Table C users ''Do not Join'', In the main report count the rows from each subpreport, then only include rows where the count from the Table B subreport than the count from the Table C subreport.

Full Access
Question # 19

An end user of the application experienced a browser crash while working on a highly available system. Crash recovery is enabled. Does the user to be reauthenticated?

A.

Yes, if the user is directed to the same node.

B.

No, if the user is directed to a different node.

C.

Yes, If the authentication cookie was lost.

D.

No, if the authentication cookie was lost

Full Access
Question # 20

An attribute-based access control configuration evaluate the attributes of the operator creating the

case. A data page contains the value used in the evaluation.

A.

Use the data page as a restriction method in the access control policy.

B.

Use the data page as a the policy condition value in the access control policy condition

C.

Use the data page as a the permit access if the value in the access control policy

D.

Use the data page as a the policy condition column source in the access control policy condition

Full Access
Question # 21

MyMealth Corporation wants to use the age of the claim to increase the urgency on the assignment so that claims processors work on the most urgent claims first. The claim assignment urgency increases by 1 each day the claim remains in an unresolved status. At any time. My Health has up to 10,000 claims in process. Claims in the PendingProcessing workbasket are subject to this calculation. The application updates the claim urgency daily before the work day begins. AM claims are processed within 30 days.

MyHealth also processes complaint cases from health plan members. Complaint cases use a service level agreement (SLA) to ensure the customer service representatives respond to complaints within 48 hours. All claims processors work in Los Angeles 9:00 AM-5:OQ PM PST.

Which approach satisfies the claim urgency requirement and provides the best experience for the claims processor?

A.

Use an advanced agent on a dedicated node to increment the pyUrgencyAssignAdjust value by 1 for every assignment that matches the selection criteria.

B.

Use the assignment SLA to increment the pyUnjerncyAssiqnAdjust value by 1 every day the claim is in an open status.

C.

Use a declare expression to increment the pytJrgcncyAsp/gnAdjur.t value to 1. When a claim processor opens the assignment, the urgency is increased by 1.

D.

Use the overall SLA to increment the pyUrgencyAssignAdjust value by 1. Reset the goal date to the following day

Full Access
Question # 22

Consider the following requirement:

case worker must be able to add a work party when creating a case

select the configuration option that fulfills this requirement

A.

add a data transform to the pyCaseManagementDefault work parties rule

B.

Ensure the addparty user action is available as a local action

C.

add the addworkObjectparty activity to the assigments

D.

select the VOE? option on the pyCaseManagementDefault work parties rule

Full Access
Question # 23

A recent review of the audit polices log show that a specific IP address has made a large number of failed login attempts within a few minutes you suspect that it is an internet bot attack

Select two options you can configure to prevent the bot from accessing you application

A.

Enable the CAPTCHA security policy

B.

Enable an authentication lockout policy

C.

Enable a contect security policy

D.

Enable a failed login attempts security event

Full Access
Question # 24

A case can be withdrawn using a local action. You want to restrict the ability to withdraw a

case to the user who created the case or any work group manager of the user. Select three

rule types used in combination to achieve this functionality. (choose three)

A.

Access Deny

B.

Access When

C.

Access Control Policy

D.

Access of Role to Object

E.

Privilege

Full Access
Question # 25

An application processes stock market trades.

which two requirement are best implemented by an advanced agent?

A.

call a service every day at 5 : 00 am to get the marker open and close time, and recird the result

B.

Excute a trade cae only after the stock reaches a certain price

C.

create a case to audit an account if the customer trade more tha usd9999in a day

D.

complete unexecuted trade when the market

Full Access
Question # 26

A purchase order application allows users in their work group to read and write purchase

request cases. When the total amount exceeds usd10,000 however, only the work group

manger can read and write the case. Select two configuration that satisfy the

requirement.(choose two)

A.

Add a privilege to the case type class that is conditionally granted when the purchase request amount is less than USD 10.000.

B.

Use a reads access control policy with a condition that verifies the amount is less than USD10.000.

C.

Configure the worklist to only display purchase requests greater than USD10.000 for the work group manager.

D.

Configure conditional access in Access Manager to read and write a purchase request case when the amount is less than USD 10.000.

Full Access
Question # 27

Select the option in which you would define Content Security Policies.

A.

To prevent the browser to load content from untrusted sources

B.

To restrict what data a user can view in a case the user can open

C.

To define security for case attachments

D.

To configure security for the content management integration

Full Access
Question # 28

which two of the following action are required to configure your application to support SSO authentication ?

A.

configuring the authentication activity to identify the operator in the system

B.

configure the application record to use external authentication

C.

configure required mapping between LDAP attributes and operator properties

D.

configure model operator records for each access group in your application

Full Access
Question # 29

APP Studio created a data type in the Organization layer for Quote data called BCO-Data Quote. How do you help users find rules from this data class when working in APP Studio?

A.

Create a BCO-QI -Data-Quote class that inherits from BCO Data-Quote.

B.

Use a Data Reference to configure the rules that you need from the BCO-Data-Quote class.

C.

Copy the fields In the data class to the BCO QT Work- class so all subclasses can see the Quote rules.

D.

Select each rule you want to reuse in the application as a relevant record.

Full Access
Question # 30

What are two valid reasons for defining a case type within a case type-specific ruleset? (Choose

A.

Case-specific rulesets make it easier to rebase ruleset versions.

B.

Each branch ruleset can be associated to case-specific user stories.

C.

The ruleset can be added to the ruleset stack for multiple applications.

D.

The case type might be converted to a component application in the future.

Full Access
Question # 31

XYZ Corp requires employees to designate alternate operators to perform their work while they are on vacation. Work vacationing operators should be visible to alternate operators.

How do you configure the application to handle this requirement?

A.

Add a ValueList Property to Data Admin-Operator-ID. Alternate operators add vacationing persons to their ValueList. Modify the Assign Worklist report definition to include this ValueList. Modify security accordingly to allow access.

B.

Modify the user portal to only display team members for which the operator has been designated an alternate. Clicking on an operator displays that operator's worklist. Assignments are opened accordingly.

C.

Define a custom Access When rule named pxAssignedToMeOr Alternate. Modify the pyUserWorkList Report Definition using this rule to display every Assign-Worklist assignment within the WorkGroup.

D.

Develop an agent that transfers worklist assignments from the operator going on vacation, when that vacation starts, to the alternate operator. When vacation ends, transfer uncompleted assignments back.

Full Access
Question # 32

You isolated the problem to node 1 of the cluster. You see node 1 goes down shortly after

3:00 p.m. every day with an out-of-memory error. Which two alerts typically precede this

condition?(choose two)

A.

PEGA0004 –Quantity of data received by database query exceeds limit

B.

PEGA0001 – HTTP interaction time exceeds limit

C.

PEGA00017 – Cache exceeds limit

D.

PEGA0002 – Connect operation time exceeds limit

Full Access
Question # 33

an application provides the user with written instructions for completing a form. How do you ensure that the instuction can be localized without updating the application?

A.

cricumstance the section that describes the form for each language.

B.

add the section to the translation package using the localization wizard.

C.

create a filed value rule for the instruction text.

D.

create a paragraph rule for the instruction text.

Full Access
Question # 34

When implementing a Next-Best-Action, the customer Lifetime value Threshold is used to __________ for an offer

A.

determine customer eligibility

B.

apply the customer's lifetime value

C.

prioritze high value propositions

D.

prioritize customer

Full Access
Question # 35
A.

Create a new autogenerated button control and alter its caption to support a shortcut key.

B.

Create a new custom burton control that uses an image and uses a fixed width.

C.

Create a new custom text label control set as required and uses relative widths.

D.

Create a new autogenerated link control with a shortcut key and limit its obsolute width.

Full Access
Question # 36

An application uses LDAP authentication and create operators dynamically based on a model operate recorded select and move the three options needed to complete the configuration to configuration column

PEGAPCLSA86V2 question answer

Full Access
Question # 37

select and move the three option that are required for tracing an agent on one of the nodes in a cluster to the step column and place them in the correct order

PEGAPCLSA86V2 question answer

Full Access
Question # 38

Select and move the five steps required to implement single sign-on (SSO) authentication in a pega application to the SSO authentication implementation steps column. (choose five)

PEGAPCLSA86V2 question answer

Full Access
Question # 39

A slow-running connector must run whenever the status of a case changes.

select the three steps to configure a solution that minimizes the delay experienced by the user

A.

set the execution of the activity to immediately

B.

set the execution of the activity to execute in Background an copy

C.

configure an activity to call the connector

D.

configure a declare trigger to execute when the case is committed

E configure a declare trigger to execute when the status of the case change

Full Access
Question # 40

BiyCo has two development projects currently in progress developed by independent teams. One team builds the Quoting application. Another team builds the Policy Administration application. Development takes place on different servers with separate rulebases.

The Quoting application is built on the Policy Administration application.

The Policy Administration application requires enhancements to support other areas of the business.

The Quoting team is notified when the Policy Administration application is versioned. The Quoting team responds by importing a HAP containing the new version.

Select the two best practices to minimize potential development conflicts and work with the most current version of the Policy Administration application. (Choose Two)

A.

Periodically rebase the Policy Administration application.

B.

Switch between applications when modifying rules.

C.

Perform branch reviews when merging brandies.

D.

Share rulesets between both applications.

Full Access
Question # 41

set the three security tasks you perform when deploying an application to a production environment. (Choose Three)

A.

Delete the Unauthenticated access group.

B.

Restrict access to ruleset configuration.

C.

Change the Rule security mode setting on the access groups to Deny.

D.

Rename the PRServlet default servlets.

E.

Update standard dynamic system settings.

Full Access
Question # 42

You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?

A.

create an encrypted keyring password and replace the unencypted password in prconfig.xml

B.

enter a password in an application ID instance and reference the external system

C.

create an encrypted password with PR cipherGenerator and reference the external system

D.

create an encrypted password with passGen and replace the unencrypted password in pconfig.xml

Full Access
Question # 43

users complain of difficulty creating a customer service request through facebook massenger. how do you address this issue?

A.

add approximate matches to the response commands for the channel.

B.

add approximate matches to the create case command (s) for the channel.

C.

change the text analyzer configured for the channel.

D.

add response commands to the channel

Full Access
Question # 44

What two recommendations do you provide to the development team to ensure the performance of the Pega application does not degrade over tune? (Choose Two)

A.

Add indexes to all columns.

B.

Purge workparty UlU index tables periodically.

C.

Schedule scripts to maintain frequently fragmented tables.

D.

Purge and/or archive records based on the company's record retention policy.

Full Access