Free PEGAPCLSA86V2 Exam Braindumps (page: 7)

Page 7 of 38

An application is being constructed In multiple phases for a growing company that has over 1000 employees. During the initial development stages, it is determined a button on a section has to be made conditionally visible based on a group of actors.
What should the conditional visibility be based on to minimize the amount of future maintenance?

  1. Privilege
  2. AccessGroup
  3. Role
  4. Work group

Answer(s): C



The BigCo quoting application is currently on-premise. BigCo plans to move the application to Pega Cloud What factor do you need to consider for environment setup?

  1. Network security configuration
  2. Database access configuration
  3. System management application configuration
  4. Log file access configuration

Answer(s): D



Six weeks after you deliver your application to production, your users report that the application slows down in the afternoon. The application is almost completely unresponsive for some users shortly after 3:00 P.M. Other users do not experience this problem until later in the day.
You do not have access to the Production environment, but you do have access to AES. The production environment has three nodes and a load balancer.
You need to resolve this issue because a new division of the organization will start using the application next month.
How do you begin your research to diagnose the cause of the reported performance issue?

  1. Look at the performance profile and DB Trace output from each node.
  2. Observe the cluster and node status on the Enterprise Health Console.
  3. Review guardrail warnings in the development environment to determine if any rules with warnings moved to production.
  4. Download the alert log file from each node and analyze the contents in the Pega Log Analyzer.

Answer(s): B



Security policies need to be configured for a newly developed Pega application using basic credential authentication. The lockout policy configuration must lock out users after three failed login attempts. The configuration must exclude Administrator or Executive operators from the lockout.
How do you achieve this requirement?

  1. Define operator override setting in enterprise authentication system
  2. Create a separate role for Admin Executives
  3. Use Exclude Operators options in Security Policies landing page
  4. Define Access Control Policy to exclude Admin Executives

Answer(s): B



Page 7 of 38



Post your Comments and Discuss Pegasystems PEGAPCLSA86V2 exam with other Community members:

Vasanth commented on August 15, 2024
well documented
UNITED STATES
upvote

Shanth commented on August 15, 2024
This PDF document for this is well documented. I bought that because I wanted to print and study from hard copy.
UNITED STATES
upvote