Practice Free PEGACPLSA24V1 Exam Online Questions
An online streaming service faces performance issues because of a high volume of user data stored in the database.
As a Lead System Architect, what are the two best corrective actions that you suggest for enhancing application performance? (Choose Two)
- A . Implement horizontal and vertical database partitioning strategies and replication to distribute the load effectively.
- B . Implement archival of cases, case history, and associated media files, and then purge the data based on usage patterns and business criteria.
- C . Schedule regular database defragmentation sessions in collaboration with the Database Administrator.
- D . Conduct database indexing on critical tables and optimize columns to improve query performance.
BigCo receives complaints from existing customers and new prospects that BigCo representatives contact them with irrelevant offers and products.
Which two Pega solutions do you suggest to help solve this problem? (Choose Two)
- A . Customer Decision Hub
- B . Pega Customer Service
- C . Pega Marketing
- D . Robotic Process Automation
When designing and configuring asynchronous processing for a data flow, what is a typical consideration?
- A . Using the main application server to process all data flow tasks.
- B . Scheduling data flows to run during peak business hours for better performance.
- C . Ensuring that data flows handle exceptions and errors gracefully.
- D . Configuring data flows to process only a small batch of data at a time.
What are the benefits of analyzing Microjourneys in designing Pega applications? (Select all that apply)
- A . Identifying user pain points and improving user experience.
- B . Optimizing backend processes and data flow.
- C . Creating reusable components for faster application development.
- D . Determining the hardware and infrastructure requirements.
How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?
- A . Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg-HRWork-RFP
- B . Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
- C . Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
- D . Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools
An organization has come to know about hackers trying to access a secured Pega Platform™ application.
What can you do do learn more about the information related to failed login attempts?
- A . Integrate with third party security tools to find the failed login.
- B . Review the security event log file and get the information related to failed login.
- C . Add a utility to the session management operations.
- D . Enable the content security policy and generate the required reports of failed login.
You are a Pega developer working on an insurance application. The application needs to manage different types of insurance policies such as car insurance, home insurance, and life insurance. Each type of insurance policy has some common attributes (policy number, policyholder name, and premium amount), but also has some unique attributes (such as vehicle details for car insurance, property details for home insurance, and beneficiary details for life insurance).
Which one of the following approaches to handling this scenario would be most appropriate in a Pega application?
- A . Create a single class for all types of insurance policies and dynamically add or remove attributes as needed.
- B . Create a single class for all types of insurance policies and define all possible attributes.
- C . Create a base class for the insurance policy for the common attributes, and then create derived classes for each type of insurance policy with their unique attributes.
- D . Create a separate class for each type of insurance policy and then define the common attributes in the new class.
A recent review of the audit polices log show that a specific IP address has made a large number of failed login attempts within a few minutes you suspect that it is an internet bot attack
Select two options you can configure to prevent the bot from accessing you application. (Choose TWO)
- A . Enable the CAPTCHA security policy
- B . Enable an authentication lockout policy
- C . Enable a contect security policy
- D . Enable a failed login attempts security event
What is the purpose of the DX API (Data Exchange API) in Pega application development?
- A . To facilitate real-time communication between different Pega applications.
- B . To integrate Pega applications with external data sources and third-party systems.
- C . To optimize application performance and reduce latency.
- D . DX API is no longer used in the latest versions of Pega Platform.
Which of the following are considered production deployment best practices? (Select all that apply)
- A . Performing deployments during peak business hours to reduce downtime.
- B . Using version control to track changes and manage releases.
- C . Conducting thorough testing in a production-like environment before deployment.
- D . Implementing rollback mechanisms to revert to the previous version if issues arise.
- E . Manually applying changes directly to the production environment.
