Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PEGACPLSA88V1 Exam Dumps - Certified Pega Lead System Architect (CPLSA) Exam 8.8

Go to page:
Question # 25

U+ Bank uses Pega Customer Decision Hubâ„¢ to approve credit card limit changes requested by customers automatically. A scorecard model determines the customer credit score. The automatic approval of credit card limits are processed based on the following criteria set by the bank.

The bank wants to change the threshold value for the USD2000 credit limit from <175 to <200. How do you implement this change?

A.

Change in the strategy the condition from .pxSegment <=175 to .pxSegment <=200.

B.

Map the score value in the decision strategy to <=200.

C.

Change the cutoff value in the Results tab of the scorecard model.

D.

Change the cutoff value in the Results tab of the scorecard decision component.

Full Access
Question # 26

users complain of difficulty creating a customer service request through facebook massenger. how do you address this issue?

A.

add approximate matches to the response commands for the channel.

B.

add approximate matches to the create case command (s) for the channel.

C.

change the text analyzer configured for the channel.

D.

add response commands to the channel

Full Access
Question # 27

In an e-commerce application that is built on Pega Platform, a data type named Order stores the order-related information. as shown in the following table:

An operations manager wants to view a report at the end of each day. If the number of items ordered in a category is greater than 5, the report displays the number of items in that category that are ordered during the day.

Which option do you use to implement the requirement?

A.

A report with a custom SQL function on Quantity and filter condition Sum (Quantity) > 5 that the system applies before aggregation.

B.

A report with a summarize function on Quantity and filter condition Sum (Quantity) > 5 that the system applies before aggregation.

C.

A report with a summarize function on Quantity and filter condition Sum (Quantity) > 5 that the system applies after aggregation.

D.

A report with a custom SQL function on Quantity and filter condition Sum (Quantity) > 5 that the system applies after aggregation.

Full Access
Question # 28

U+ Bank implemented a customer journey for its customers. The journey consists of three stages. The first stage raises awareness about available products, the second stage presents available offers, and in the last stage, customers can talk to an advisor to get a personalized quote. The bank wants to actively increase offers promotion over time.

What action does the bank need to take to achieve this business requirement?

A.

Upweight the propensity by adding more predictors that fit the target customers and repeat this process over time.

B.

Enable increasing stage upweighting for the second stage of the journey.

C.

Enable increasing stage upweighting for the first stage of the journey.

D.

Enable constant stage upweighting for the second stage of the journey.

Full Access
Question # 29

You want to avoid creating unnecessary case-related properties and views. Which three actions do you take to accomplish this goal? (Choose Three)

A.

Define most of the properties and sections at the work pool level.

B.

Create a data type (if required) that corresponds to the case type.

C.

Use the data reference field type in a case type's data model tab.

D.

Drag and-drop a field group when defining a case view.

E.

Define case type views using ".page.property" syntax.

Full Access
Question # 30

You are designing a case life cycle to process fraudulent charge claims. After a list of suspected fraudulent charge is submitted, the case advances to the processing stage. In the first step of theprocess fraud claim process, a seprate child case must be created for each suspected fraudulent charge.

After all necessary fraudulent charge cases are created, the parent cse advance to the next step where the customer is notified that their claims are being processed

choose three actions needed to configure the missing step so that a separate child case is created for

each fraudulent charge selected

A.

Add a customer split for each process step to the cse life cycle and configure it ti create child cases.

B.

configure data propagation to map property value between the parent and clid cases.

C.

add a create case smart shape to the case life cycle and configure it to be created a case

D.

add a create case smart setup to the cse life cycle and configure it to creare child cases

E.

use a page list property to store the fraudulent claim items and identify the number if child cases to create

Full Access
Question # 31

XYZ Corp requires employees to designate alternate operators to perform their work while they are on vacation. Work vacationing operators should be visible to alternate operators.

How do you configure the application to handle this requirement?

A.

Add a ValueList Property to Data Admin-Operator-ID. Alternate operators add vacationing persons to their ValueList. Modify the Assign Worklist report definition to include this ValueList. Modify security accordingly to allow access.

B.

Modify the user portal to only display team members for which the operator has been designated an alternate. Clicking on an operator displays that operator's worklist. Assignments are opened accordingly.

C.

Define a custom Access When rule named pxAssignedToMeOr Alternate. Modify the pyUserWorkList Report Definition using this rule to display every Assign-Worklist assignment within the WorkGroup.

D.

Develop an agent that transfers worklist assignments from the operator going on vacation, when that vacation starts, to the alternate operator. When vacation ends, transfer uncompleted assignments back.

Full Access
Question # 32

What advantage does a rule-utility-function have over a rule-obj-activity?

A.

Ability to be circumstanced

B.

Ability to be saved multiple rulesets

C.

Ability to be directly called from a decision table

D.

Ability to be used to enforce security

Full Access
Go to page: