Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pegasystems PEGAPCSSA86V1 Dumps

Pega Certified Senior System Architect (PCSSA) 86V1 Questions and Answers

Question 1

The primary purpose of a production ruleset is to allow rules to be

Options:

A.

tested in a production environment

B.

updated in a production environment

C.

reused in multiple production environments

D.

migrated to a production environment

Question 2

The current version of an application lists ABC:02-02 as an application ruleset. The ruleset versions listed in the Answer Area are also present on the system.

In the Answer Area, identify the ruleset versions that the skim operation considers when you perform a major version ruleset skim on ruleset ABC.

Options:

Question 3

A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.

♦Patients access cases on a read-only basis.

♦Patients can only access their own cases.

♦Doctors and nurses can modify cases throughout the case life cycle.

♦Only doctors are allowed to write prescriptions.

Which configuration allows doctors and nurses to modify cases while complying with all identified security requirements?

Options:

A.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 5.

B.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 1.

C.

Create a single access role for both doctors and nurses, and set the modify action to 5.

D.

Create a single access role for both doctors and nurses, and set the modify action to 1.

Question 4

In a hiring case type, only HR Managers should have read access to a candidate's reference letter attachment. Which two tasks are used to fulfill this requirement? (Choose Two)

Options:

A.

Configure read access for a user according to a privilege

B.

Restrict read access according to a When condition

C.

Configure attribute-based access control on the Attachment Category

D.

Define a separate Attachment Category for HR Managers

Question 5

Your application is deployed to the cloud. A data source outside your application populates a data page by using your data access pattern configuration. You receive complaints that the system takes a long time to fetch data each time the case worker accesses information for a different customer.

Which approach solves this performance issue?

Options:

A.

Access data page with a predefined key so that, once loaded, data access is faster.

B.

Fetch only the targeted data from the database each time data is needed so access is faster.

C.

Change snapshot data access method to reference pattern data access method.

D.

Move to local installation because network traffic in cloud deployment is often slow.

Question 6

Drag each security solution on the left to its appropriate use case.

Options:

Question 7

In the Answer Area, drag each mobile application solution on the left to the correct scenario.

Options:

Question 8

Which two tasks are required to build a mobile app from a Pega Platform application? (Choose Two)

Options:

A.

Create a certificate set.

B.

Configure access to the Pega Mobile Build Server.

C.

Configure access to Dev Studio.

D.

Set up push notifications to developers.

Question 9

A view has a part number field that requires the first two characters are letters, and the last four are digits (for example, AB1234).

How do you ensure that the correct pattern is entered when the user exits the field?

Options:

A.

Configure a validate rule on the flow action to validate the field with boolean logic.

B.

Configure an edit validate rule and call it from a validate rule in the relevant flow action.

C.

Configure an edit validate rule and reference it from the property rule for the field.

D.

Configure a validate rule to use input-qualified validation configuration.

Question 10

A travel reservation servicing case includes a service level for responding to requests. The service level intervals vary according to passenger status, class of service, and fare type.

Which implementation satisfies this requirement?

Options:

A.

Create a multivariate circumstanced rule and a when rule.

B.

Create a multivariate circumstanced rule, a circumstance definition, and a circumstance template.

C.

Create a single property circumstanced rule and a when rule.

D.

Create a single property circumstanced rule.

Question 11

A global application with infrastructure nodes located throughout the world requires certain operations to start executing at midnight GMT.

Select two possible designs for this use case. (Choose Two)

Options:

A.

Use the Run in background step in the case life cycle and design a standard queue processor.

B.

Use the Queue-For-Processing method in an activity and design a dedicated queue processor.

C.

Use the Queue-For-Processing method in an activity and design a standard queue processor.

D.

Use the Run in background step in the case life cycle and design a dedicated queue processor.

Question 12

Which two use cases correctly describe controlling access to an attachment category? (Choose Two)

Options:

A.

Configure the When condition "IsCurrentStageTesting" to allow users to view an attachment if the rule returns true.

B.

Configure a Visible when condition called "IsDocumentPrivate" to allow users to view an attachment if the rule returns false.

C.

Configure the privilege "DeleteOwn" and assign it to a user so that a user can delete their own attachments.

D.

Configure Client-based access control on the class where the attachment category exists to restrict access to the attachment.

Question 13

Which statement regarding managing encrypted data in Pega Platform is true?

Options:

A.

Encrypted properties cannot be referenced using filter conditions in reports.

B.

Property-level encryption is a time-efficient method to encrypt data.

C.

Encrypted properties can be referenced in report definitions.

D.

Each organization uses a custom key to encrypt its data.