Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

PEGAPCLSA86V2 PDF

$44

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PEGAPCLSA86V2 PDF + Testing Engine

$70.4

$175.99

3 Months Free Update

  • Exam Name: Lead System Architect (LSA) Pega Architecture Exam 86V2
  • Last Update: Apr 19, 2024
  • Questions and Answers: 148
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PEGAPCLSA86V2 Engine

$52.8

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PEGAPCLSA86V2 Practice Exam Questions with Answers Lead System Architect (LSA) Pega Architecture Exam 86V2 Certification

Question # 6

Using the information shown in the case structure below, which option is always true?

PEGAPCLSA86V2 question answer

A.

Resolution of the Event Booking case requires the Parking case to be resolved.

B.

Parking, Weather, and Hotel cases must be instantiated for the Event case to process correctly.

C.

The Weather case can be instantiated without a parent Event Booking case.

D.

The Parking class must inherit from the Event Booking class.

Full Access
Question # 7

Which three approaches arc considered a PegaUnit: testing best practice? (Choose Three)

A.

A test ruleset is placed at the top of an application's ruleset stack.

B.

A test case uses limited assertions.

C.

A test case groups relevant asseitions together.

D.

A test case is not necessary when an error message is the expected result.

E.

A test case focuses on a single area of functionality.

Full Access
Question # 8

You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?

A.

create an encrypted keyring password and replace the unencypted password in prconfig.xml

B.

enter a password in an application ID instance and reference the external system

C.

create an encrypted password with PR cipherGenerator and reference the external system

D.

create an encrypted password with passGen and replace the unencrypted password in pconfig.xml

Full Access
Question # 9

Which of the following Skin rule customizations help satisfy the stated requirements?

A.

Configure the importance field for each column included in a repeating layout.

B.

Configure the Column I ayout and specify how the sidebar appears on tablets and smart phones.

C.

Configure the style for all application field values, paragraphs, and correspondence records.

D.

Configure the Column Layout and specify the width of the sidebar on desktops.

Full Access
Question # 10

An insurance company wants to extend a native mobile app to allow customers to create claims using a claims management application implemented on the pega platfrom. As a claim is processed, update are sent to the mobile app as push notifications.

How do you satisfy this requirement ?

A.

Package the claims management application as a SDK mobile app

B.

Configure a service to creat claim cases when called from the native mobile app

C.

configure the native mobile app to creat a claim case using the page API

D.

Embed the claims management application in the native mobile app using a pega web Mashup gadget

Full Access
Question # 11

BigCo is planning an update to JVM settings on all production nodes at the of the month. The production application supports high availability.

To ensure that users can continue working without distribution while the JVM changes are in process, select and move all of the following tasks to the Task List Order column arrange then correct order.

PEGAPCLSA86V2 question answer

Full Access
Question # 12

A developer has set the Rule security mode on the access group to Deny. Select the reason for this setting.

A.

Require Access of Role to Object rules be specified for each layer in the class hierarchy and not inherited from parent classes.

B.

Deny access to a rule if the privilege of the user is not defined in an Access of Role to Object.

C.

Disable standard privileges providing administrator access to the application (for example AllFlows and AllFllowActions).

D.

Ensure that all rules with the option of specifying a privilege have a privilege. Only users with the privilege can execute the rules.

Full Access
Question # 13

Table a contains customer information. Table B contains complaints submitted by customers. Table C contains positive feedback submitted by customer.

You are tasked to write a report that list all rows in Table A where, per customer, the number of rows in Table B related to Table A are greater than the number of rows in Table C related to table A.

Which method creates the report that executes with the best performance?

A.

Define two subreports: one that counts rows in Table B relative to Table A, and on that counts the rows in table C relative to Table A. Only include rows in the main. Report against table A where the table B count is greater that the Table C count.

B.

Join table A to Table B and C using include all rows in this class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

C.

Join table A to Table B and C using include all rows in join class. Count the Join column from both Table B and Table C. Only include rows where the first count is greater than the second.

D.

Define two subreports, one where table B users ''Do not Join'', and one where Table C users ''Do not Join'', In the main report count the rows from each subpreport, then only include rows where the count from the Table B subreport than the count from the Table C subreport.

Full Access
Question # 14

APP Studio created a data type in the Organization layer for Quote data called BCO-Data-Quote. How do you help users find rules from this data class when working in APP Studio?

A.

Create a BCO-QI-Data-Quote class that inherits from BCO Data-Quote.

B.

Use a Data Reference to configure the rules that you need from the BCO Data Quote class.

C.

Copy the fields in the data class to the BCO-QT Work- class so all subclasses can see the Quote rules.

D.

Select each rule you want to reuse in the application as a relevant record.

Full Access
Question # 15

Which three actions do you recommend to address their performance issue and ensure optimal application performance in the future? (Choose Three.)

A.

Dedicated a node to background processing.

B.

Review application environment sizing.

C.

Remove embedded dashboard reports from the manager portal.

D.

Minimize the usage of robotic automations.

E.

Review selection criteria of agent activities.

Full Access
Question # 16

you are configuring authentication for a pega web mashup implementation.

how do you ensure the host system origin is trusted?

A.

in the authentication service JNDI binding parameters, specify the protocol, host, and port.

B.

in the authentication service spaecify the IACAuthverification activity

C.

in the application definition, specify the protocol, host, and port

D.

in the content security policy record specify the website as allowed

Full Access
Question # 17

Select the option in which you would define Content Security Policies.

A.

To prevent the browser to load content from untrusted sources

B.

To restrict what data a user can view in a case the user can open

C.

To define security for case attachments

D.

To configure security for the content management integration

Full Access
Question # 18

In the Answer Area, drag each use case on the left to the appropriate locking strategy on the right.

PEGAPCLSA86V2 question answer

Full Access
Question # 19
A.

Create a new autogenerated button control and alter its caption to support a shortcut key.

B.

Create a new custom burton control that uses an image and uses a fixed width.

C.

Create a new custom text label control set as required and uses relative widths.

D.

Create a new autogenerated link control with a shortcut key and limit its obsolute width.

Full Access
Question # 20

an application provides the user with written instructions for completing a form. How do you ensure that the instuction can be localized without updating the application?

A.

cricumstance the section that describes the form for each language.

B.

add the section to the translation package using the localization wizard.

C.

create a filed value rule for the instruction text.

D.

create a paragraph rule for the instruction text.

Full Access
Question # 21

Ar.mo Corporation is designing an Order Fulfillment application built on an Inventory application. Both applications reuse a section that displays Part details.

Where do you configure the PartOetails section?

A.

In an Inventory ruleset within the Inventory application's work pool class

B.

In an Order Fulfillment luleset within the Order Fulfillment application's Parts data class

C.

In an Enterprise ruleset within the Inventory application's Paits data class

D.

In an Order Fulfillment ruleset within the Order Fulfillment application's work pool class

Full Access
Question # 22

which two statements are correct with regard to inbound email processing? (choose two)

A.

an incoming email reply is liked to its original case by the case ID in the subject of the email.

B.

when creating a case from an email using the standard service activity, email attachments are automatically added as case attachments.

C.

custom configuration is required to handle automatic reply and delivery status notifications.

D.

if an email service executes an action, such as an approval, and the case is locked the email is queued and retried

Full Access