Free PEGACLSA74V1-R Exam Braindumps (page: 13)

Page 12 of 39

You deplyed a pega web mashup implementation into production and are using IACAuthentication. which two action ensure that the external authentication module, and not another source, has validated the user?

  1. In the IACAuthentication service, map a passoword attribute form the LDAP server used by the external
  2. In an IAC authentication activity, add a step to idenify the security token provied by the external authentication module.
  3. in the IACAuthentication service, specify the appropriate bind password used by the host system
  4. In an IAC authentication activity, add steps that return the security token to the external authentication module for verification.

Answer(s): B,D



An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner how do you implement this requirement?

  1. create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.
  2. create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.
  3. create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.
  4. create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access

Answer(s): C



DRAG DROP (Drag and Drop is not supported)
An application uses LDAP authentication and create operators dynamically based on a model operate recorded select and move the three options needed to complete the configuration to configuration column

  1. See Explanation section for answer.

Answer(s): A

Explanation:



How do you encrypt the storage stream of the class MyOrg-HR-Work-RFP?

  1. Build a site-specific encrypting cypher and select Encrypt BLOB? on the class group for MyOrg- HRWork-RFP
  2. Build a site-specific encrypting cypher and select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
  3. Select Encrypt BLOB? on the class MyOrg-HR-Work-RFP
  4. Encrypt the pzPvStream colum of the DB table mapped to MyOrg-HR-Work-RFP class using DB tools

Answer(s): B






Post your Comments and Discuss Pegasystems PEGACLSA74V1-R exam with other Community members:

PEGACLSA74V1-R Discussions & Posts