Questions for the PEGACPLSA23V1 were updated on : Dec 01 ,2025
[Security Design]
In the HRApp application, authorized users handle salary reviews by using the SalaryReview case
type. You want to restrict access to only human resources staff and managers. What is the best
possible solution to achieve this outcome?
A
[Security Design]
Which three of the following options come under security administration events while auditing your
Pega application? (Choose Three)
A,C,D
[Security Design]
ABC is an insurance company that provides quotes to its customers. Customers submit insurance
quote requests through the ABC company website. The insurance workflow exposes a web embed to
the ABC company website; the web embed uses custom bearer authentication. What are the primary
uses of a custom bearer token? (Choose Two)
A,C
[Security Design]
In the HRApp application, there are sensitive reports related to hiring and compensation. These
reports must only be accessible to senior executives. What is the best possible way to achieve this
requirement?
A
[Security Design]
A financial institution uses a Pega application to manage customer data, including sensitive personal
information. Under regulations such as the General Data Protection Regulation, customers have the
right to access, modify, or delete their personal dat
a. The institution implements client-based access control (CBAC) in Pega Platform to comply with
these regulations. Which statement best describes CBAC?
C
[Performance Optimization]
A company is implementing field-level auditing in their application. What two scenarios can affect
the field-level auditing feature in an application? (Choose Two)
A,D
[Security Design]
An application has a web page where users can upload and view images. The application uses a
Content Security Policy (CSP) to prevent cross-site scripting attacks by restricting the sources of
scripts and images that the browser can load. The CSP has the following directives: default-src 'self';
script-src 'self'https://cdn.example.com; img-src 'self' data: blob:. What happens if a user tries to
upload and view an image fromhttps://malicious.comon the web page?
A
[Security Design]
ABC organization has a case management application where users handle customer complaints. Each
complaint case contains various details, including the following attributes: Case title: A brief
description of the complaint. Creation date: The date when the complaint was registered. Complaint
name: The name of the person who filed the complaint. Complaint details: A more detailed
description of the issue. ABC wants to allow certain users (for example, managers and supervisors) to
gain insights into complaint cases even if they do not have full read access. What is the primary
purpose of the ABAC Discover policy in the case management application?
D
[Application Design]
As a Lead System Architect, the primary objective is to adhere to the low-code application
development methodology and support citizen developers. Relevant records are a feature in App
Studio that can help facilitate this process. Which two of the following options outline the benefits of
relevant records? (Choose Two)
B,C
[Pega Platform Architecture]
You are a Pega developer working on a large-scale application. You need to manage different settings
that control the behavior of your application. These settings need to be easily configurable by
production users, should be able to vary between different environments, and should be packaged
with the application when it is migrated. Which Pega feature is the most appropriate to use in this
scenario?
D
[Application Design]
As a Lead System Architect, one of your principal duties involves advocating for the reuse of assets.
You have the authority to harness the features of the Library in App Studio. Which two of the
following statements best encapsulate the advantages of the Library? (Choose Two)
C,D
[User Experience (UX) Design]
As a Lead System Architect, you must ensure that a Pega application implementation is inclusive and
accessible to diverse users, including those with disabilities. You are focusing on implementing
design practices that cater to users with various needs, including those who use assistive
technologies such as screen readers. With this goal in mind, which two of the following practices do
you prioritize when you design an accessible application? (Choose Two)
B,D
[Work Delegation and Asynchronous Processing]
You are leading a team to develop a Pega application with Pega Financial Industry Foundation. You
are tasked with adding a mandatory waiting period in the loan process, where the status of a child
process dictates the next stage. Your team is debatingwhether to use a Wait shape or a service-level
agreement for this requirement. Identify two scenarios where a Wait shape is the simpler choice.
(Choose Two)
A,C
[Performance Optimization]
A claims adjuster is working through a backlog of cases using a newly updated Pega insurance
application. The adjuster is tasked with entering detailed information into a digital claims form for
each case. However, as they proceed from one input field to another, they encounter noticeable
delays in data rendering, and occasionally, the application becomes unresponsive, significantly
slowing down their workflow. Given this situation, which two of the following are likely causes for
the poor user experience observed by the claims adjuster? (Choose Two)
B,D
[Reporting Design]
As the lead for Pega projects, you are assigned the task of creating a quarterly performance review
report for an organization’s marketing department. The report should encompass various aspects of
their work, such as campaign effectiveness, budget utilization, and team productivity. However,
there is a request for detailed data on individual campaigns while maintaining a comprehensive
summary of departmental performance. Which of the following is the best reporting design
approach for this requirement?
C