Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

PEGACPSSA23V1 Pegasystems Certified Pega Senior System Architect 23 Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Pegasystems PEGACPSSA23V1 Certified Pega Senior System Architect 23 Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 144 questions

Organize the classes and associated rules in the appropriate Enterprise Class Structure (ECS) layer.

A Pega Platform™ application has just been integrated with an external data source.

Which of the following tests do you perform to ensure that the integration passes data as expected?

A.

Scenario test

B.

Automation test

C.

Performance test

D.

Unit test

Drag the error type on the left to its description on the right.

You want to create a new minor version of an application ruleset to add a new feature to your application. The new feature will be made available to users in a phased rollout.

How do you update the application to add the new ruleset version?

A.

Create a branch ruleset and a new application, and add the branch ruleset to the application.

B.

Lock and roll the existing ruleset, and create a new application version.

C.

Lock and roll the existing ruleset, and update the existing application version.

D.

Create a new application version and add the new ruleset version as a production ruleset.

In the Answer Area, drag each mobile application solution on the left to the correct scenario.

An assignment service-level agreement (SLA) is configured with the following details:

♦ Initial urgency: 20

♦ Assignment ready: Timed delay of 1 hour

♦ Goal: 5 hours and increase urgency by 10

♦ Deadline: 8 hours and increase urgency by 20

♦ Passed deadline: 2 hours, increase urgency by 20, and limit events to 5

Assuming no other urgency adjustments, what is the assignment urgency 16 hours after the case reaches the assignment.

A.

100

B.

130

C.

70

D.

90

Which two situations are likely to negatively impact application performance? (Choose Two)

A.

A report definition generates report data based on several properties stored in the BLOB.

B.

Business architects have delegated a large number of rules to process owners.

C.

A developer uses an SQL query tool or activities to archive case data before purging tables.

D.

Several applications on the system write cases to the pr_other table in the database.

What is the difference between using the Call and Branch methods in an activity step to invoke other activities?

A.

Call provides more robust debugging capability than Branch, while Branch provides better run-time performance.

B.

Branch overrides the security restrictions of the called activity allowing you to easily test code; it will not run in production.

C.

Branch creates a new thread to allow asynchronous processing, while Call runs in the thread from it was invoked.

D.

Call returns to the originating activity, while Branch skips the remainder of the originating activity.

Drag the name of the Pega Platform log file appender from the left to the matching use case on the right.

You perform a major skim on the ruleset ABC:02-02-01 to ABC:03-01-01.

In the Answer area, select the ruleset versions that the skim operation uses to copy rules into ABC:03-01-01.

A budgeting application uses a job scheduler to automatically email customers once a week with a breakdown of their weekly expenses. Due to the international usage of the application, stakeholders require peak performance at all hours.

Which solution addresses this performance concern?

A.

Configure the job scheduler to run at off-hours.

B.

Ensure that customers use a common access group.

C.

Dedicate and classify a node for the job scheduler.

D.

Limit the number of operators who can access the application.

Which two configurations can you use to include access groups into your Product rule? (Choose two.)

A.

Export the access groups using the Access Manager.

B.

Add the access groups to the application record.

C.

Add the access group to the Product record in the Individual instances to include section.

D.

Associate the access groups with a ruleset included in the application.

A medium-size toymaker wants to fulfill orders received during the peak season in December and process the orders in batches multiple times a day.

How do you implement this use case?

A.

Create one scheduled job and set its run schedule to multiple times a day.

B.

Create scheduled jobs, one for each run, that can process accumulated orders.

C.

Create batches of orders and send each batch for processing when it gets full.

D.

Create a queue processor that can process orders received by the company.

Drag each security solution on the left to its appropriate use case.

In an online shopping application, you enable class-level encryption for the entire case type and optimize First Name, Last Name, Social Security number (SSN), Total Cart, and Account Number properties for reporting.

To secure sensitive data, how do you enable property-level encryption for SSN and Account Number?

A.

Create a PropertyEncrypt data transform, and then add the properties.

B.

Create a PropertyEncrypt access control policy, and then add the properties.

C.

Create a TextEncrypted property type, and then add the properties.

D.

Update the class-level encryption to enable property-level encryption.

A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.

♦ Patients access cases on a read-only basis.

♦ Patients can only access their own cases.

♦ Doctors and nurses can modify cases throughout the case life cycle.

♦ Only doctors are allowed to write prescriptions.

Which configuration allows doctors and nurses to modify cases while complying with all identified security requirements?

A.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 5.

B.

Create two access roles, one for doctors and one for nurses, and set the modify action for each to 1.

C.

Create a single access role for both doctors and nurses, and set the modify action to 5.

D.

Create a single access role for both doctors and nurses, and set the modify action to 1.

Select the three Pega best practices for developing activities. (Choose Three)

A.

Keep activities short. Limit your activities to fewer than 15 steps.

B.

Limit activity calls to at most three to prevent performance problems.

C.

Limit custom Java steps whenever possible.

D.

Use only activities to support queue processing and interfaces.

E.

Limit the use of activities. Use alternative rule types such as data transforms whenever possible.

In the following example, the Homelns, Homelnslnt, and Customer rulesets are configured for application validation. MyCo and MyCoInt are configured for ruleset validation. MyCo lists MyCoInt and Customer as its prerequisites, and the prerequisite for MyCoInt is Pega-ProcessCommander.

Which of the following statements is correct?

A.

Rules in MyCo can reference rules in Homelnslnt.

B.

Rules in MyCo can reference rules in Homelns.

C.

Rules in Customer can reference rules in Homelns.

D.

Rules in MyCoInt can reference rules in Customer.

What is the function of class mapping for reports?

A.

Ensure all data from one report belongs to a single Case type instance.

B.

Create a new Database table record for a Pega Platform class.

C.

Assign an ID to a class so reports can reference specific properties.

D.

Retrieve data from an associated database table.

A fitness organization wants to ensure that data is entered correctly into an online form when users apply for, or update, their membership information.

Which scenario requires an edit validate rule?

A.

New members must be at least 18 years of age at the time they sign up for membership.

B.

The credit card number must be entered in the correct format for the payment type.

C.

The customer email address must match the expected format.

D.

The customer first and last name must be combined to create the full name.

Page: 2 / 3
Total 144 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved