Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Pegasystems Certified Lead System Architect (CLSA) PEGACPLSA23V1 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam PEGACPLSA23V1 Premium Access

View all detail and faqs for the PEGACPLSA23V1 exam


785 Students Passed

85% Average Score

91% Same Questions
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

How can you configure a flow to resume from the point of failure after an error is resolved?

Options:

A.

By using the Resume flow option in the Actions menu.

B.

By using the Ticket shape and setting the ticket name to pyRestartFlow.

C.

By using the Subprocess shape and calling the pyRestartFlow flow.

D.

By using the Assignment shape and setting the assignment type to Resume.

Questions # 12:

As a Lead System Architect, one of your principal duties involves advocating for the reuse of assets. You have the authority to harness the features of the Library in App Studio. Which two of the following statements best encapsulate the advantages of the Library? (Choose Two)

Options:

A.

Update the existing components to make it more specific to the current application.

B.

Perform create, read, update, and delete operations on the library components.

C.

Manage or add components to your application to enable new features.

D.

Use the library to optimize your application creation by reusing assets from all the existing applications developed in your Pega ecosystem.

Questions # 13:

A software development company is planning to deploy its application for a new client. The client has unique security concerns and requires full control over their resources. Which architecture would be most suitable for this scenario, considering customization, security, and performance?

Options:

A.

Design with the multitenancy architecture.

B.

Define an architecture that uses single tenancy.

C.

Blueprint the application architecture with shared tenancy.

D.

Design with the architecture that defines isolated tenancy.

Questions # 14:

In the design of Pega enterprise applications, the Lead System Architect must prioritize Microjourneys according to Pega Express best practices. Which two of the following statements accurately describe the concept of Microjourneys in Pega implementations? (Choose Two)

Options:

A.

Microjourneys constitute a segment of the overall customer journey that accomplishes all or a subset of the necessary business outcomes.

B.

Microjourneys represent the life cycles, or units of work, that yield a significant outcome for customers and users.

C.

Microjourneys are the life cycles, or units of work, that yield a significant reusable asset for citizen developers to improvise the functionality.

D.

Microjourneys are data objects in the overall customer journey that achieve all or a subset of the required data manipulations.

Questions # 15:

Which two of the following business use cases require the case-instance-first design pattern for implementation in Pega applications? (Choose Two)

Options:

A.

In a sports competition management system, users must be assigned to an existing sports competition case to provide a final score.

B.

In an event management system, event schedule preparation involves an approval process after a monthly schedule calendar is prepared.

C.

In a healthcare management system, a patient’s medical history is captured before processing diagnostic needs and scheduling an appointment with a specialist.

D.

In an e-commerce platform, customers can browse products and add them to their cart prior to proceeding to the checkout and billing process.

Questions # 16:

In the HRApp application, there are sensitive reports related to hiring and compensation. These reports must only be accessible to senior executives. What is the best possible way to achieve this requirement?

Options:

A.

Implement a role-based access control system that restricts access to the reports based on the role of the user.

B.

Use the Access Control Check feature in Pega Platform to identify any potential security risks in the custom code.

C.

Assign the HRApp:SeniorExec role to the relevant users and ensure that this role has the necessary permissions for the reports.

D.

Implement a data masking strategy to protect sensitive data in the reports.

Questions # 17:

Hospital XYZ wants to analyze patient data and identify those at high risk of readmission. The hospital has patient data stored in an Electronic Health Record (EHR) system, and a separate system for hospital admission records. Which two of the following are key advantages of using a Data Flow over a Queue Processor for analyzing patient data in this scenario? (Choose Two)

Options:

A.

Data Flow can directly access data from multiple systems.

B.

Data Flow can handle larger volumes of data.

C.

Data Flow can prioritize tasks based on urgency.

D.

Data Flow can process data in real-time.

Questions # 18:

A healthcare company wants to migrate its patient management system to a more secure and scalable environment. After evaluating different options, the company decides to host their application on a Pega-managed cloud environment, expecting it to meet its growing data security and compliance needs while ensuring uninterrupted access to patient records. In this context, which three of the following responsibilities does Pega assume in managing the healthcare company’s application in the Pega Cloud environment? (Choose Three)

Options:

A.

Monitor network and ensure system-level access control to safeguard patient information and system integrity.

B.

Install Pega Platform and any additional Pega applications to which the healthcare company subscribes.

C.

Securely store the healthcare company’s data in a cloud repository, which helps ensure data privacy and compliance with healthcare regulations.

D.

Oversee compliance, conduct security monitoring, and respond to security events to protect against potential breaches or threats.

E.

Set up the necessary authentication and authorization mechanisms to control access to sensitive patient data.

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.