Pegasystems PEGACPLSA23V1 Practice Exams
Last updated on Mar 31,2025- Exam Code: PEGACPLSA23V1
- Exam Name: Certified Pega Lead System Architecture (LSA) Exam 23
- Certification Provider: Pegasystems
- Latest update: Mar 31,2025
In which three of the following ways can an application be specialized?
(Choose Three)
- A . Through ruleset overriding
- B . By using decision rules
- C . Through class inheritance
- D . By using branching
- E . By circumstancing
In which two of the following ways can App Studio accelerate projects?
- A . By standardization through UI templates.
- B . By improved application structuring.
- C . By leveraging a company’s reusable IT assets.
- D . By direct inheritance automation.
Which two of the following reporting requirements entail the use of a subreport?
(Choose Two)
- A . The main report outputs the total number of times that a combination of column values is found, as well as subtotals for that combination that add up to that total.
- B . An aggregated value, obtained through a join, is used to filter each main report row by comparing a value that is contained in each main report row to the aggregated value.
- C . Subreports can combine the data by using IN, HAVING, and WITH clauses.
- D . An aggregated value should appear in a main report when a join condition is true. If the join condition is always false, the displayed value should be either null or zero.
- E . Each main report row is filtered based on a whether a main report row value is either included or not included within a sequence of values
To validate login credentials entered by a volunteer in a Vaccine Study application with an externally authenticated access control system, a custom authentication service, such as single sign-on (SSO), is implemented. As a Lead System Architect (LSA), what is the best approach to handle the authentication time-outs?
- A . To handle the timeouts, select the Use PegaRULES Timeout checkbox on the Custom tab of the authentication service rule form.
- B . Update the web.xml file to handle authentication timeouts.
- C . Configure authentication time-outs in the VaccineStudy user access group.
- D . On the Advanced tab of the Access Group form, leave the authentication timeout entry blank, and the authentication timeout activity will be configured at the Authentication Service rule.
What is the role of a "Case Designer" in the context of designing Pega applications?
(Select all that apply)
- A . Responsible for creating user interfaces and user experience design.
- B . In charge of developing and maintaining application backend logic.
- C . Involved in defining case hierarchy and relationships between case types.
- D . Coordinates with stakeholders to gather business requirements.
Which of the following is an example of a social engineering attack?
- A . Installing a keylogger on a target computer to steal login credentials.
- B . Exploiting a vulnerability in the target system to gain unauthorized access.
- C . Tricking a user into revealing their password through a phishing email.
- D . Using brute force to guess a user’s password.
An organization has come to know about hackers trying to access a secured Pega Platform™ application.
What can you do do learn more about the information related to failed login attempts?
- A . Integrate with third party security tools to find the failed login.
- B . Review the security event log file and get the information related to failed login.
- C . Add a utility to the session management operations.
- D . Enable the content security policy and generate the required reports of failed login.
How can a case data model be designed to support reuse and integrity?
(Select all that apply)
- A . Creating separate data tables for each case type to prevent data conflicts.
- B . Defining common data elements as reusable data types for multiple case types.
- C . Establishing a hierarchical structure of data tables to promote data consistency.
- D . Implementing data page optimizations to improve data retrieval speed.
By default, queue processors run in the security context of which requestor type?
- A . Background
- B . AsyncProcessor
- C . Syncprocessor
- D . Batch
Which three kinds of security issues can be detected if you monitor the PegaRULES-ALERTSECURITY.log file?
(Choose Three)
- A . Cross-site request forgery (CSRF) attacks
- B . Authorized data access
- C . User successful login information
- D . Access to a restricted activity, stream, or report
- E . Content Security Policy violations