Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PEGACPLSA88V1 Exam Dumps - Certified Pega Lead System Architect (CPLSA) Exam 8.8

Go to page:
Question # 57

A user report poor application performance at 5:00 pm yesterday. which two tools do you use to review the user's session to identify the cause of the poor performance ?

A.

performance profiler

B.

my performance Details report

C.

Alerts log

D.

tracer

Full Access
Question # 58

your application queues items for a standard agent a case has not been updated as expected by the agent. on the system queue management landing page the queue status for each item us available.

what two issues can be identified in the system queue management landing page using the status?

(choose two)

A.

the agent failed when processing the item.

B.

the agent is scheduled to process the item in the future.

C.

the agent schedules were disabled.

D.

the agent is not configured for optimistic locking.

Full Access
Question # 59

An application include two case types: expense report and purchase requests which two steps are required to enable support for both case type for offline user on a mobile device ?

A.

Configure the application record to enable offline access

B.

Configure the user's access group to enable offline access.

C.

configure both case type to enable offline access

D.

Configure the application to build a custom mobile app

Full Access
Question # 60

XYZ Corporate wants to perform extensive analysis on work party information across various case types in real time at any time of the day. At the same time, xyz wants to minimize the impact this analysis has case worker using Pega applications.

Which solution do you recommend?

A.

Invoke BIX to export Index-WorkPartyUri data to the report database.

B.

Impalement a REST Service that persists index-WorkPartyUri data within the report database.

C.

Define additional database indexes against index-WorlParyUri.

D.

Configure the Index-WorkpartyUri Data_admin_DB_table record to write to the reports database.

Full Access
Question # 61

you are configuring authentication for a pega web mashup implementation.

how do you ensure the host system origin is trusted?

A.

in the authentication service JNDI binding parameters, specify the protocol, host, and port.

B.

in the authentication service spaecify the IACAuthverification activity

C.

in the application definition, specify the protocol, host, and port

D.

in the content security policy record specify the website as allowed

Full Access
Question # 62

Identify two benefits provided by using single sign-on (SSO) in a high availability (HA) application. (choose two)

A.

To automatically authenticate users on a new server following a server crash

B.

To redirect the user to a new server during a server quiesce (pause)

C.

To allow the movement of stateful data between application servers

D.

To allow for cookie persistence on the browser

Full Access
Question # 63

Given the following classes and properties:

myco-data-shape (abstract)

area

color

myco-data-shape-rectangle

length

width

myco-data-shape-circle

radius

a page list property .shapes is defined as being of the abstract class myco-data-shape.

select two correct statements. (choose two)

A.

a rule defined in myco-data-shape-rectangle can modify the. Color property.

B.

pages of shapes can contain. length and. Radius.

C.

A rule existing in myco-data-shape can be overridden in myco-data-shape-circle.

D.

pages of .Shapes can be of either myco-data-Shape-rectangle or myco-data-shape-circle, but all pages must be the same.

Full Access
Question # 64

In a Human Resources application, the Social Security Number (SSN) and date of birth details for employees are confidential, and business requirements state that only the HR Manager can see these details.

What is the best approach to mask the information for other users everywhere in the application?

A.

Use the PropertyRead access control policy for the SSN and date of birth.

B.

Add the privilege rule for the UI controls that display the SSN and date of birth.

C.

Add an Access When rule for access role objects of the HR Manager role.

D.

Use the Property Encrypt access control policy for the SSN and date of birth.

Full Access
Go to page: