Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PEGACPLSA88V1 Exam Dumps - Certified Pega Lead System Architect (CPLSA) Exam 8.8

Go to page:
Question # 41

You need to define a new LDAP authentication servlet because all of the standard LDAP servlets are

being used in authentication services

which two task do you perform to implement this requirement

A.

Copy an existing LDAP servlet and rename it

B.

Create a new mapping servlet and URL pattern

C.

add a new URL pattern to the existing mapping servlet

D.

rename an existing LDAP servlet

Full Access
Question # 42

XYZ organization is planning to adopt DevOps practices to automate the deployment process to ensure chat the features and changes delivered are of high-quality.

What three methods comprise the recommended test automation strategy for your Pega Platform applications as a part of the DevOps release pipeline? (Choose Three)

A.

Identify and configure the right set of test suites during only specific stages of release pipeline.

B.

Identify and configure the right set of test suites to test early and often to identify the defects in the early stages of project life cycle.

C.

Identify and configure the right set of test suites that need to run at different stages of release pipeline.

D.

Identify and configure the automation test suite by using Pega Platform features and industry best practices.

E.

Identify and configure the right set of test suites to run only when entire functionality is built, because running the test suites often is expensive.

Full Access
Question # 43

you need to formet required fields with red labels. you configure a custom style in the skin rule.

how do you apply the custom style?

A.

reference the skin rule in the dynamic layout with the required field labels

B.

reference the skin in the required field labels.

C.

reference the custom style as a parameter in a dynamic layout.

D.

reference the custom style in the required field labels

Full Access
Question # 44

An application contains cases that transition through different statuses throughout their life cycle, which typically lasts three months.

Design a reporting strategy to display the number of cases by status at the end of each month for a 12-month period.

A.

Configure a job scheduler to record monthly case status in a separate table and report on that table.

B.

Configure an activity to generate the data in the clipboard and report by using a custom section.

C.

Configure a report scheduler to record monthly case status in a separate table and report on that table.

D.

Configure a summary report that uses subreports for each month.

Full Access
Question # 45

What are two valid reasons for defining a case type within a case type-specific ruleset? (Choose Two)

A.

The ruleset can be added to the ruleset stack for multiple applications.

B.

The case type might be converted to a component application in the future.

C.

A User Story can be associated to a single, fine-grained ruleset within a Branch.

D.

The case type ruleset might be converted to a true component in the future.

Full Access
Question # 46

You want to create a dynamic system setting to adjust an alert threshold for you application in

Production which three tasks do you perform to configure the DSS record?

A.

specifying the node ID of the system used for performance monitoring

B.

Appending / default to the setting purpose

C.

Setting the owing ruleset tp pega-Engine

D.

Prepending prconfig/ to the setting purpose

E.

setting the owning ruleset to one of the application rulesets

Full Access
Question # 47

Security policies need to be configured for a newly developed Pega application using basic credential authentication. The lockout policy configuration must lock out users after three failed login attempts. The configuration must exclude Administrator or Executive operators from the lockout.

How do you achieve this requirement?

A.

Define operator override setting in enterprise authentication system

B.

Create a separate role for Admin Executives

C.

Use Exclude Operators options in Security Policies landing page

D.

Define Access Control Policy to exclude Admin Executives

Full Access
Question # 48

A banking customer service application is in production that processes various customer complaint requests. After three years in production, the operations manager needs a historical report on resolved cases. This report is to receive in near real time.

Data warehouse has exposed a REST API to receive data. Reports are generated out of data warehouse.

What two of the following options to create an ideal design solution to post data to the data warehouse? (Choose Two)

A.

Read data with data flows, which source data by using a dataset and output data to a utility that posts the data to the queue processor, which then posts data to data warehouse over REST. For in-flight cases, on resolution of a case, reuse a queue processor that you created.

B.

Read data with data flows, which source data by using a dataset and output data to a utility that synchronously posts the data to data warehouse. For in-flight cases, on resolution of the case, configure the system to post the data to the data warehouse over REST.

C.

Run a one-time utility browse all the resolved-cases data, and then post the data to data warehouse asynchronously. For in-flight cases, on resolution of a case, configure the system to synchronously post the data to the data warehouse over REST.

D.

Prepare an extract rule and extract the data of already-resolved cases, and then load it into the data warehouse for reporting. For in-flight cases, on resolution of a case, configure the system to post the data to the data warehouse over REST.

Full Access
Go to page: