New Year Special Sale Limited Time 70% Discount Offer - Ends in 1d 4h 54m 24s - Coupon code: scxmas70

PEGACPSSA23V1 Exam Dumps - Certified Pega Senior System Architect 23 Exam

Go to page:
Question # 17

A global application with infrastructure nodes located throughout the world requires certain operations to start executing at midnight GMT.

Select two possible designs for this use case. (Choose Two)

A.

Use the Run in background step in the case life cycle and design a standard queue processor.

B.

Use the Queue-For-Processing method in an activity and design a dedicated queue processor.

C.

Use the Queue-For-Processing method in an activity and design a standard queue processor.

D.

Use the Run in background step in the case life cycle and design a dedicated queue processor.

Full Access
Question # 18

How do you enable field-level auditing for properties?

A.

Add a field validation to the case workflow.

B.

Add an auditing optional action to the case workflow.

C.

Enable the auditing feature on the property rule forms.

D.

Enable field-level auditing for the case type.

Full Access
Question # 19

You have a requirement to associate users in different units to the same work queue.

How do you implement this requirement?

A.

Associate the users to a common work group. Then associate a work queue to the work group.

B.

Associate the users to a common work group. Then associate the work group to the appropriate units.

C.

Associate the users to a common unit. Then associate a work queue to the common unit.

D.

Associate the users to a common work queue. Then associate the work queue to the appropriate units.

Full Access
Question # 20

A report needs to list the user ID of the manager of the operator who creates a time-off case. The report provides information from the MyCo-HR-SelfService-Work-TimeOff and Data-Admin-Operator-ID classes.

Which two options independently satisfy the business outcome? (Choose Two)

A.

Configure a class join on the report definition to join operator information to each case.

B.

Add the operator ID to the report definition as a parameter.

C.

Use an association rule to join operator information to each case.

D.

Specify both classes in the Pages & Classes tab on the report definition.

Full Access
Question # 21

Which two data elements can be used as an attribute for an access control policy? (Choose Two)

A.

Appointment date

B.

Number of dependents

C.

Password string

D.

Encrypted bank account number

Full Access
Question # 22

During an Account review case, an accountant wants to evaluate the client's retirement plan. A Retirement planning case is created that runs in parallel with the Account review case. Neither case waits for nor reports to the other.

To configure this workflow, which type of parallel processing shape do you use?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 23

University admission application cases automatically advance in the case life cycle if the applicant's standardized test scores are above a certain threshold. The threshold is determined each year based on the provided national average score.

Which two configurations, when applied together, support this requirement? (Choose Two)

A.

Configure a process with a decision shape that continues if the TestThreshold Configuration setting is less than the applicant's test score.

B.

Configure a TestThreshold Configuration setting with the national average for the test score threshold.

C.

Configure a TestThreshold Configuration setting that calculates the national average for the test score threshold.

D.

Configure a process with a decision shape that continues if the TestThreshold Configuration setting is greater than the applicant's test score.

Full Access
Question # 24

Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)

A.

Leverage the standard authentication service IACAuthentication and update the authentication activities.

B.

Add an access group for the application rules that need to be accessed from the external system.

C.

Configure a node-level data page to hold security access information about the external system.

D.

Configure the application permissions by specifying a list of trusted domains in the application rule.

Full Access
Go to page: