Pegasystems PEGACPLSA23V1 Practice Exams
Last updated on Apr 09,2025- Exam Code: PEGACPLSA23V1
- Exam Name: Certified Pega Lead System Architecture (LSA) Exam 23
- Certification Provider: Pegasystems
- Latest update: Apr 09,2025
What are two ways to minimize or avoid data integrity issues?
- A . Do not persist values that are derivable, such as counts and categorizations, and that are subject to change.
- B . Follow the single source of truth principle (SSOT).
- C . Avoid using properties that represent a version or as-of-date.
- D . Store critical data within multiple tables to prevent data loss.
Enabling audit tracking on each property used in the application does not impact the performance of the application.
- A . True
- B . False
Which of the following statements are most accurate about ad-hoc work?
(Choose Two)
- A . Both operations involving the creation of ad-hoc work and the conversion of ad-hoc work into a case type require a specific privilege
- B . By default, an ad-hoc work item class is the class group of the current work
- C . Process commander allows an ad-hoc work to be the child of another ad-hoc work
- D . An ad-hoc work item can only be converted into a case type as a subcase of an existing case type
- E . In order to convert an ad-hoc work item into a case type, it must NOT be an instance of a class group
During GetNextWork, if Get from work queues first is not selected in an operator record, the system invokes the Work-.findAssignmentInWorkbasket activity, followed by the Work-.findAssignmentInWorklist activity.
- A . False
- B . True
What database tuning technique do you use to determine whether the database is taking the most efficient route to return results?
- A . Create table indexes.
- B . Perform a load test.
- C . Run Explain Plans on your queries.
- D . Partition the database tables.
In a vaccine study application, there are two sets of users; Volunteers, for whom user information is stored in an external system; Organizational users, for whom user information is stored in the Active Directory Federation Services (ADFS) of the organization.
What is the best approach to authenticating volunteer login credentials and internal users’ login credentials?
- A . Create two separate authentication services: one for internal users and another for volunteers.
- B . Create a single authentication service that can validate credentials for both external and internal users.
- C . Create a single authentication service for volunteers and use PRServlet URL authentication for internal users.
- D . Create basic authentication services for volunteers and internal users.
Which report definition data access method should be used to include work parties?
- A . Declare index
- B . Join
- C . Sub report
- D . Association
A reference property can be best thought of as _____________?
- A . a reference to an external entity that is stored in a system of record
- B . a pointer between two pages or properties
- C . a property that can be referenced from any context at any time
- D . a property whose references are tracked for auditing purposes
- E . Another term for a linked property
Which authentication model is suitable for a scenario where users need to access a system using their existing social media accounts?
- A . Role-Based Authentication
- B . Biometric Authentication
- C . Single Sign-On (SSO)
- D . Attribute-Based Access Control (ABAC)
When designing reports for performance, what technique can help reduce query execution time?
- A . Including multiple complex SQL functions in the queries.
- B . Storing pre-aggregated data in the reporting database.
- C . Using a higher level of normalization in the database schema.
- D . Running reports during peak business hours to improve response time.