100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

PEGA LSA Architecture Exam Questions and Correct Answers (Already Passed)

Rating
-
Sold
-
Pages
55
Grade
A+
Uploaded on
27-10-2024
Written in
2024/2025

PEGA LSA Architecture Exam Questions and Correct Answers (Already Passed) Answer: C. Client Based - Answers If your application stores data that could be used to identify a person and you are subject to GDPR or similar regulations. Which security model should be used? A. Role-Based B. Attribute-Based C. Client-Based Answer: A. Client Based - Answers Which security model allows you to track and process requests to view, change, remove, and restrict the use of personal data, and to show auditors that you have done so. A. Client-Based B. Role-Based. C. Attribute-Based Answer: B. pyRuleExecutionMessagesLogged - Answers Which activity below can be used to determine the privileges required by logged rules using an Access Deny rule type? A. pzRuleExecutionMessagesLogged B. pyRuleExecutionMessagesLogged C. pzAccessDenyRulePrivileges D. pyAccessDenyRulePrivileges Answer: C and D Starting with Pega in the middle allows for a consistent solution to be developed and evolved over time, connecting channels and back end systems to provide an end to end solution. Build for change allows you to build solutions iteratively based on what you know today. - Answers When developing a new Pega application start with ___________ and __________ A. Channel design and work your way into the Pega application B. Integration to systems of record and work your way back into the Pega application C. The Pega application in the middle and work your way out to channels and system of record D. One application at a time base your design on what you know today Answer: A and D The BPO model requires a multitenant deployment. You have requirements to use message driven beans (MDB) to deliver messages from a system of record to the Pega application. - Answers Which two business requirements impact how you deploy your application? A. You have requirements to support a business process outsourcing (BPO) model for your organization. B. You have requirements to start application development in Pega Cloud, and then move your application to an on-premise production environment. C. You have requirements for case types to participate in a distributed architecture through microservices.

Show more Read less
Institution
PEGA LSA Architecture
Course
PEGA LSA Architecture











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
PEGA LSA Architecture
Course
PEGA LSA Architecture

Document information

Uploaded on
October 27, 2024
Number of pages
55
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

PEGA LSA Architecture Exam Questions and Correct Answers (Already Passed)

Answer:



C. Client Based - Answers If your application stores data that could be used to identify a person and you
are subject to GDPR or similar regulations. Which security model should be used?



A. Role-Based

B. Attribute-Based

C. Client-Based

Answer:



A. Client Based - Answers Which security model allows you to track and process requests to view,
change, remove, and restrict the use of personal data, and to show auditors that you have done so.



A. Client-Based

B. Role-Based.

C. Attribute-Based

Answer:



B. pyRuleExecutionMessagesLogged - Answers Which activity below can be used to determine the
privileges required by logged rules using an Access Deny rule type?



A. pzRuleExecutionMessagesLogged

B. pyRuleExecutionMessagesLogged

C. pzAccessDenyRulePrivileges

D. pyAccessDenyRulePrivileges

Answer:

,C and D



Starting with Pega in the middle allows for a consistent solution to be developed and evolved over time,
connecting channels and back end systems to provide an end to end solution.



Build for change allows you to build solutions iteratively based on what you know today. - Answers
When developing a new Pega application start with ___________ and __________



A. Channel design and work your way into the Pega application

B. Integration to systems of record and work your way back into the Pega application

C. The Pega application in the middle and work your way out to channels and system of record

D. One application at a time base your design on what you know today

Answer: A and D



The BPO model requires a multitenant deployment.



You have requirements to use message driven beans (MDB) to deliver messages from a system of record
to the Pega application. - Answers Which two business requirements impact how you deploy your
application?



A. You have requirements to support a business process outsourcing (BPO) model for your organization.

B. You have requirements to start application development in Pega Cloud, and then move your
application to an on-premise production environment.

C. You have requirements for case types to participate in a distributed architecture through
microservices.

D. You have requirements to use message driven beans (MDB) to deliver messages from a system of
record to the Pega application.

,Answer: D



This is the primary reason for starting the security design early. Security requirements can be complex,
and identifying the organization's security standards early to make sure they are woven into your
application design is crucial. - Answers What is the primary reason for designing the security model as
early as possible?



A. To quickly address any warnings you see in the Rule Security Analyzer

B. To start your team on building access role, privileges, and attribute-based controls

C. To begin penetration testing as early as possible

D. To ensure you account for and design to the organization security standards and legal requirements

Answer: A



This is the primary goal of the release management strategy. Moving to DevOps facilitates the ability to
deliver changes to users quickly. - Answers When defining a release management strategy, what is your
primary objective?



A. Create a repeatable and sustainable process for ensuring business value is delivered safely and as
quickly as possible to end users.

B. Implement a process for developers to minimize rule conflicts when merging into a central repository.

C. Introduce automated testing into the organization.

D. Move the organization to a continuous integration/continuous deployment (CI/CD) model.

Answer: A and B



This is a benefit of using a data warehouse



You can focus on using Pega for reporting on throughput data. - Answers What benefits do you gain by
leveraging a data warehouse coupled with Pega reporting? (Choose Two)

, A. You can use reporting tools suited for trending and data analysis.

B. You can focus on using Pega for reporting on throughput data.

C. You can purge cases from your database along with the data warehousing process.

D. You can use BIX to export cases to a database, a comma separated file, or XML format.

Answer: D



PDC and AES show insights in the health of Pega applications, but traditional application server and
database monitoring tools do not. - Answers Why would you use PDC or AES when the organization
already has application performance monitoring tools in place?



A. PDC and AES collect alerts and health activity across Pega nodes.

B. PDC and AES are available both on premise and in the Pega Cloud.

C. PDC and AES provide the ability to stop and start agents, listeners, and manage requestors.

D. PDC and AES show insights into the health of the Pega application.

Answer: A and B - Answers Pega Platform supports which two in-memory cache management options
for multi-node cluster topologies?



A. Hazelcast

B. Apache Ignite

C. Windows

D. Oracle

Answer: B and C - Answers When would you use the client-server cluster topology (Choose 2)?



A. In a single node environment

B. Cluster instability

C. In Large production environments that consist of more than five cluster nodes

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
336
Member since
1 year
Number of followers
16
Documents
28398
Last sold
10 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions