Pass the Pegasystems Certified Senior System Architect PEGAPCSSA87V1 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are preparing to create a new major version of an application ruleset in which there are multiple minor and patch versions.

How do you create the new ruleset version?

Options:

A.

Use the Ruleset Maintenance wizard to skim the relevant ruleset versions to copy the highest version of existing rules to the new ruleset version.


B.

Use the Ruleset Maintenance wizard to merge the existing rules in the relevant ruleset versions to the new version.


C.

Use the Application Structure landing page to lock and roll the existing ruleset versions to the new version.


D.

Create a new application ruleset using the appropriate version number, then copy the highest version of existing rules into the new ruleset version.


Questions # 2:

Which statement is true about connectors?

Options:

A.

Connectors use a listener that runs in the background.


B.

Connectors establish a link to a service on another system.


C.

Connectors require a REST service to function.


D.

Connectors can be referenced from data transforms.


Questions # 3:

A class group is used to____________________.

Options:

A.

identify a layer of the Enterprise Class Structure


B.

combine related properties by usage


C.

assign work to a specific group of users


D.

associate child classes with a single database table


Questions # 4:

Which two statements about guardrails are true? (Choose Two)

Options:

A.

Each rule may have multiple guardrail warnings.


B.

Pega Platform performs guardrail examination when a rule is checked out.


C.

Pega Platform performs guardrail examination when a rule is saved.


D.

A developer receives a guardrail warning for rules checked out by other developers.


Questions # 5:

The current version of an application lists ABC:02-02 as an application ruleset. The ruleset versions listed in the Answer Area are also present on the system.

In the Answer Area, identify the ruleset versions that the skim operation considers when you perform a major version ruleset skim on ruleset ABC.

Question # 5


Questions # 6:

Drag each security solution on the left to its appropriate use case.

Question # 6


Questions # 7:

Your application is deployed to the cloud. A data source outside your application populates a data page by using your data access pattern configuration. You receive complaints that the system takes a long time to fetch data each time the case worker accesses information for a different customer.

Which approach solves this performance issue?

Options:

A.

Access data page with a predefined key so that, once loaded, data access is faster.


B.

Fetch only the targeted data from the database each time data is needed so access is faster.


C.

Change snapshot data access method to reference pattern data access method.


D.

Move to local installation because network traffic in cloud deployment is often slow.


Questions # 8:

Which three items are generated and displayed in the compliance score of an application? (Choose Three)

Options:

A.

Rules with unjustified warnings in the application


B.

Unweighted compliance score out of 100


C.

Total core rules used in the application


D.

Rules with warnings in the application


E.

Percentage of compliant rules in the application


Questions # 9:

Which two actions do you perform when using the Performance Analyzer (PAL) to ensure that you obtain accurate performance data? (Choose Two)

Options:

A.

Run the process to completion first to perform needed rule assembly and avoid skewed results.


B.

Capture PAL readings after significant changes to a process to identify any performance impact.


C.

Capture a PAL reading for a process with good performance to establish a benchmark for comparison.


D.

Run PAL as an end user to account for any performance differences due to the portal itself.


Questions # 10:

Which two data elements can be used as an attribute for an access control policy? (Choose Two)

Options:

A.

Appointment date


B.

Number of dependents


C.

Password string


D.

Encrypted bank account number


Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions