Pegasystems PEGAPCRSA80V1_2019 Exam (page: 2)
Pegasystems Pega Certified Robotics System Architect (PCRSA) 80V1 2019
Updated on: 12-Feb-2026

HOTSPOT
Pega Robot Studio provides five rules on how to differentiate between cloneable application objects when using key assignments in automations. The first rule states that an event creates the instance to set the context of a cloneable object. The remaining four rules state the requirements for a key assignment.

In the Answer Area, determine if each rule description requires a key assignment.
Hot Area:
Exhibit A:



Exhibit B:

  1. Please refer to Exhibit B for answer.

Answer(s): A



You need to configure an application to store encrypted login credentials in the user’s local profile. You also need to automate the login using these encrypted credentials.
How do you fulfill this requirement without creating an automation?

  1. Create a robot activity that performs the application login.
  2. Set the necessary adapter credential properties prior to interrogating the target controls.
  3. Interrogate the target controls and set the necessary adapter credential properties.
  4. Interrogate the target controls and create a script to perform the login functionality.

Answer(s): A


Reference:

https://community.pega.com/knowledgebase/articles/pega-robotic-automation/encryption-and-assisted-sign-component



You are automating the login process for a web application. There are three possible scenarios that may occur:

(1) You may successfully login, (2) you may not be successful logging in, or (3) you may log in but go to the change password screen.

Which control from the Toolbox do you use to determine which page you were on after performing the login function?

  1. WaitAll
  2. Switch
  3. WaitAny
  4. Signal

Answer(s): C



During application discovery of a Clarify application, you determine that the user accesses more than one customer case concurrently within the application, which creates multiple windows of the same type. This requires you to enable the UseKeys property on an application’s object.

Based on the image that shows the application and the matched controls in the Object Explorer, which control’s UseKeys property must be set to True?

  1. ClarifyCRM
  2. MdiClient
  3. _Case_1
  4. Control

Answer(s): A


Reference:

https://community.pega.com/knowledgebase/articles/how-do-i-use-keys-navigate-between-multiple-instances-object



There are two basic types of automations: events and procedures.
Which three statements describe a procedure automation? (Choose three.)

  1. It performs business logic and may interact with applications.
  2. It is triggered by a user or application action.
  3. It may contain more than one starting block.
  4. It contains an entry point and should contain at least one exit point.
  5. It should return a string value for messaging.

Answer(s): C,D,E



Viewing Page 2 of 13



Share your comments for Pegasystems PEGAPCRSA80V1_2019 exam with other users:

Edward 9/13/2023 5:27:00 PM

question #50 and question #81 are exactly the same questions, azure site recovery provides________for virtual machines. the first says that it is fault tolerance is the answer and second says disater recovery. from my research, it says it should be disaster recovery. can anybody explain to me why? thank you
CANADA


Monti 5/24/2023 11:14:00 PM

iam thankful for these exam dumps questions, i would not have passed without this exam dumps.
UNITED STATES


Anon 10/25/2023 10:48:00 PM

some of the answers seem to be inaccurate. q10 for example shouldnt it be an m custom column?
MALAYSIA


PeterPan 10/18/2023 10:22:00 AM

are the question real or fake?
Anonymous


CW 7/11/2023 3:19:00 PM

thank you for providing such assistance.
UNITED STATES


Mn8300 11/9/2023 8:53:00 AM

nice questions
Anonymous


Nico 4/23/2023 11:41:00 PM

my 3rd purcahse from this site. these exam dumps are helpful. very helpful.
ITALY


Chere 9/15/2023 4:21:00 AM

found it good
Anonymous


Thembelani 5/30/2023 2:47:00 AM

excellent material
Anonymous


vinesh phale 9/11/2023 2:51:00 AM

very helpfull
UNITED STATES


Bhagiii 11/4/2023 7:04:00 AM

well explained.
Anonymous


Rahul 8/8/2023 9:40:00 PM

i need the pdf, please.
CANADA


CW 7/11/2023 2:51:00 PM

a good source for exam preparation
UNITED STATES


Anchal 10/23/2023 4:01:00 PM

nice questions
INDIA


J Nunes 9/29/2023 8:19:00 AM

i need ielts general training audio guide questions
BRAZIL


Ananya 9/14/2023 5:16:00 AM

please make this content available
UNITED STATES


Swathi 6/4/2023 2:18:00 PM

content is good
Anonymous


Leo 7/29/2023 8:45:00 AM

latest dumps please
INDIA


Laolu 2/15/2023 11:04:00 PM

aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.
UNITED STATES


Zaynik 9/17/2023 5:36:00 AM

questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer
Anonymous


Massam 6/11/2022 5:55:00 PM

90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump
Anonymous


Anonymous 12/27/2023 12:47:00 AM

answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.
INDIA


Japles 5/23/2023 9:46:00 PM

password lockout being the correct answer for question 37 does not make sense. it should be geofencing.
Anonymous


Faritha 8/10/2023 6:00:00 PM

for question 4, the righr answer is :recover automatically from failures
UNITED STATES


Anonymous 9/14/2023 4:27:00 AM

question number 4s answer is 3, option c. i
UNITED STATES


p das 12/7/2023 11:41:00 PM

very good questions
UNITED STATES


Anna 1/5/2024 1:12:00 AM

i am confused about the answers to the questions. are the answers correct?
KOREA REPUBLIC OF


Bhavya 9/13/2023 10:15:00 AM

very usefull
Anonymous


Rahul Kumar 8/31/2023 12:30:00 PM

need certification.
CANADA


Diran Ole 9/17/2023 5:15:00 PM

great exam prep
CANADA


Venkata Subbarao Bandaru 6/24/2023 8:45:00 AM

i require dump
Anonymous


D 7/15/2023 1:38:00 AM

good morning, could you please upload this exam again,
Anonymous


Ann 9/15/2023 5:39:00 PM

hi can you please upload the dumps for sap contingent module. thanks
AUSTRALIA


Sridhar 1/16/2024 9:19:00 PM

good questions
Anonymous