Pass the Pegasystems Certified Senior System Architect PEGAPCSSA87V1 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

The Static Assembler is used to address rules assembly issues due to which cause?

Options:

A.

The server is managing a large number of rules caches.


B.

Access groups contain multiple production rulesets.


C.

A new application is migrated to the production system.


D.

The application record lists several branch rulesets.


Expert Solution
Questions # 22:

Which two configurations can you use to include access groups into your Product rule? (Choose Two)

Options:

A.

Associate the access groups with a ruleset included in the application.


B.

Export the access groups using the Access Manager.


C.

Add the access groups to the application definition.


D.

Add the access group to the Product record in the Individual instances to include section.


Expert Solution
Questions # 23:

Which two statements describe the role of the cache manifest in a mobile app? (Choose two.)

Options:

A.

Allows downloading of rules for offline use with a mobile app.


B.

Provides access to static resources such as HTML files, image files, or JS files.


C.

Enables users to continue interacting with mobile apps while offline.


D.

Supports debugging efforts by providing a run-time view of the rules accessed by the app.


Expert Solution
Questions # 24:

Consider the following requirement: An auditing policy explicitly requires that employees cannot see the contents of complaints made against themselves.

Which security solution do you use to satisfy the requirement?

Options:

A.

Access of Role to Object


B.

Access Control Policy


C.

Access When


D.

Access Deny


Expert Solution
Questions # 25:

Organize the classes and associated rules in the appropriate Enterprise Class Structure (ECS) layer.

Question # 25


Expert Solution
Questions # 26:

A developer has identified resource-intensive queue processors as the source of performance issues that application users are experiencing.

Which two actions do you perform to resolve the performance issues? (Choose Two)

Options:

A.

Associate the queue processors with the appropriate node types.


B.

Select the Include in background processing option on the application rule.


C.

Configure the queue processors to run multiple times a day.


D.

Configure the application nodes with node types.


Expert Solution
Questions # 27:

In a hiring case type, only HR Managers should have read access to a candidate's reference letter attachment. Which two tasks are used to fulfill this requirement? (Choose Two)

Options:

A.

Configure read access for a user according to a privilege


B.

Restrict read access according to a When condition


C.

Configure attribute-based access control on the Attachment Category


D.

Define a separate Attachment Category for HR Managers


Expert Solution
Questions # 28:

A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.

♦ Patients access cases on a read-only basis.

♦ Patients can only access their own cases.

♦ Doctors and nurses can modify cases throughout the case life cycle.

♦ Only doctors are allowed to write prescriptions.

Which configuration allows doctors and nurses to modify cases while complying with all identified security requirements?

Options:

A.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 5.


B.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 1.


C.

Create a single access role for both doctors and nurses, and set the modify action to 5.


D.

Create a single access role for both doctors and nurses, and set the modify action to 1.


Expert Solution
Questions # 29:

Which two configurations do you implement when using a Pega Web Mashup? (Choose Two)

Options:

A.

Leverage the standard authentication service IACAuthentication and update the authentication activities.


B.

Add an access group for the application rules that need to be accessed from the external system.


C.

Configure a node-level data page to hold security access information about the external system.


D.

Configure the application permissions by specifying a list of trusted domains in the application rule.


Expert Solution
Questions # 30:

While running an application, a user notes that a system exception occurred. Which log do you review to identify the issue?

Options:

A.

Pega


B.

Alert


C.

AlertSecunty


D.

BIX


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions