Curious about Actual Pegasystems Pega Lead System Architect (PEGACPLSA23V1) Exam Questions?
Here are sample Pegasystems Certified Pega Lead System Architecture (LSA) 23 (PEGACPLSA23V1) Exam questions from real exam. You can get more Pegasystems Pega Lead System Architect (PEGACPLSA23V1) Exam premium practice questions at TestInsights.
[Data Modeling]
In a flight schedule management application, the initiation of a scheduled flight case triggers both pre-flight check and flight catering service processes. These processes require access to flight information, such as flight number, cabin class, number of seats, departure date and time, while also maintaining process-specific data elements. Which one of the following options best describes the optimal data model for meeting this requirement?
Correct : A
Start a Discussions
[Application Design]
In the context of software system design and architecture, which two of the following statements accurately describe the Center-out business architecture approach used in Pega applications? (Choose Two)
Correct : A, C
Start a Discussions
[Application Design]
As a Lead System Architect, you are tasked with designing an application to analyze social media posts by using Pega Platform. This application generates insights based on the social media usage by the employees within an organization. The goal is to identify the top social media influencers in the organization. Which of the following approaches is the most effective for structuring and designing the application?
Correct : B
Start a Discussions
[Application Design]
As a Lead System Architect, the primary objective is to adhere to the low-code application development methodology and support citizen developers. Relevant records are a feature in App Studio that can help facilitate this process. Which two of the following options outline the benefits of relevant records? (Choose Two)
Correct : B, C
Start a Discussions
[Security Design]
An application has a web page where users can upload and view images. The application uses a Content Security Policy (CSP) to prevent cross-site scripting attacks by restricting the sources of scripts and images that the browser can load. The CSP has the following directives: default-src 'self'; script-src 'self'https://cdn.example.com; img-src 'self' data: blob:. What happens if a user tries to upload and view an image fromhttps://malicious.comon the web page?
Correct : A
Start a Discussions
Total 60 questions