Practice Free PEGACPLSA24V1 Exam Online Questions
Which of the following is a recommended approach to incorporate application monitoring and performance in Pega applications?
- A . Relying on manual testing and user feedback for performance evaluation.
- B . Utilizing built-in Pega logging capabilities to track application usage.
- C . Implementing third-party performance monitoring tools outside the Pega ecosystem.
- D . Disabling logging in production environments to avoid performance overhead.
Which three best practices can protect against cross-site scripting (XSS) attacks? (Choose Three)
- A . PrivateAPI methods for XSS filtering.
- B . Filter HTML and XML outputs.
- C . PublicAPI methods for XSS filtering.
- D . Write custom JavaScript.
- E . Filter all inputs.
An application uses LDP authentication users have role and application attributes, but not access group attributes. select the two tasks required to configure the application to uses LDAP attributes to determine the access group for a user (Choose two)
- A . Create a decision table that evaluate role and application properties that return access group
- B . Configure the authentication mapping to evaluate the decision table
- C . Create a decision table that evaluate role and application attribute value that return access group
- D . Add a method to the authentication activity to evaluate the decision table
Which three approaches arc considered a PegaUnit: testing best practice? (Choose Three)
- A . A test ruleset is placed at the top of an application’s ruleset stack.
- B . A test case uses limited assertions.
- C . A test case groups relevant asseitions together.
- D . A test case is not necessary when an error message is the expected result.
- E . A test case focuses on a single area of functionality.
Which one of the following statements is true regarding service-level agreements (SLAs) and Wait shapes?
- A . An SLA is a special type of advanced agent.
- B . Wait shapes completely replace SLA functionality.
- C . An SLA can be used to replace a custom agent in some situations.
- D . Wait shape escalation activity can advance the case in a flow.
Choose two ways to customize Get Next Work for a particular type of actor or primary role. (Choose Two)
- A . Override certain Get Next Work activities to react differently according to the operator’s work group.
- B . Define skill names specific to each work group. Set skills on each workbasket assignment according to the work group to which the workbasket is associated.
- C . Circumstance Get Next Work rules based on a text fragment derived from the operator’s primary access group.
- D . Define a workgroup-specific variation for each distinct workbasket purpose. Operator records specify workbaskets that correspond to their work group.
Which of the following options are the responsibilities of Lead System Architect to support Citizen developers to configure applications using App Studio? (Choose Two)
- A . Authoring decision tables.
- B . Creating design templates for selection in App Studio while configuring a view for a process step.
- C . Adding case types.
- D . Enabling branch development so that citizen developers can use it.
Which three of the following options make up the three-level data modeling approach?
- A . Logical
- B . Physical
- C . Conceptual
- D . Extensible
- E . Flexible
The production support team has identified that a queue processor is not executing. The team has yet to begin debugging and identifying the root cause.
Which two of the following statements are possible reasons for the failure of the queue processor? (Choose Two)
- A . The node that is associated with queue processor is running, but the stream node is not running.
- B . Background processing node types are not configured in the cluster.
- C . The stream node is up and running, but the node that is associated with the queue processor is not running.
- D . All the nodes in the cluster are running, and the user has a privilege to execute the activity.
Which two of the following statements are true about component applications? (Choose Two)
- A . Component applications do not contain case types.
- B . Component applications are designed to be used as built-on applications.
- C . Component applications cannot be self-testable.
- D . Component applications can be composed of other components.
