Free PEGACPLSA88V1 Exam Braindumps (page: 12)

Page 12 of 61

Customer information is captured in an application. Corporate policy states that private information be secured and only visible to a limited users.
Which configuration do you recommend?

  1. Use a visible when rule for the properties displaying sensitive information.
  2. Create an access control policy restricting access to the sensitive information.
  3. Configure an access deny rule restricting access to the sensitive information.
  4. Move sensitive information to separate sections and apply a privilege to the sections.

Answer(s): B

Explanation:

To ensure that private information is secured and only visible to limited users, creating an access control policy is the recommended approach. Access control policies allow you to define specific conditions and constraints under which sensitive data can be accessed, ensuring that only authorized users can view or modify this information.


Reference:

Pega Security: Access Control Policies
Pega Data Security: Securing Sensitive Information



XYZ Corporation wants to perform extensive analysis on work party information across various case types in near real time. At the same time, XYZ wants to minimize the impact this analysis has on case workers using Pega applications.
Choose two options that would contribute to viable solutions. (Choose Two)

  1. Use Pega API RCST services to update Case and Work Party data in a reports database.
  2. Configure a reports database for the Class Group and Index WorkPartyUri Data Admm DB-Table records.
  3. Define additional database indexes for the Class Group and related Work Party tables.
  4. Use BIX to export Case and related Work Party data to a data warehouse.

Answer(s): B,D

Explanation:

Step by Step Comprehensive Detailed Explanation with


Reference:

To perform extensive analysis on work party information while minimizing impact on case workers:
Configure a reports database for the Class Group and Index WorkPartyUri Data Admm DB-Table records (B): Setting up a separate reports database helps offload reporting activities from the transactional database, reducing the load on the operational system. Use BIX to export Case and related Work Party data to a data warehouse (D): BIX (Business Intelligence Exchange) can be used to export data in bulk to a data warehouse where extensive analysis can be performed without affecting the performance of the operational Pega applications.


Pega Reporting: Using a Reports Database
Pega BIX: Business Intelligence Exchange



A call center uses Pega Customer Service.
Where does Pega Customer Service fit into the enterprise architecture?

  1. Pega Customer Set vice is the customer and account enterprise service bus.
  2. Pega Customer Service is the customer interaction system of record.
  3. Pega Customer Service is the billing and reporting system of record.
  4. Pega Customer Service is the new customer onboarding system.

Answer(s): B

Explanation:

Pega Customer Service functions as the customer interaction system of record within the enterprise architecture. It manages customer interactions and provides a comprehensive view of customer information and history, facilitating efficient and effective customer service.


Reference:

Pega Customer Service: Customer Interaction Management Pega System of Record: Defining System of Record



One of the important requirements of Pega Web Mashup is to ensure that the same-origin policy is following.
From the following options, select two valid configurations. (Choose TWO)

  1. Configuration A
  2. Configuration B
  3. Configuration C
  4. Configuration D

Answer(s): A,B

Explanation:

For Pega Web Mashup to follow the same-origin policy, both the web application page URL and the Pega gadget URL must have the same origin, which includes the same scheme (HTTP/HTTPS), host, and port.
Configuration A and Configuration B:
Web application page URL: https://www.pega.com/MyWebApp/home.html PEGA Gadget URL: https://www.pega.com/MyWebApp/gadgetA.html In both configurations A and B, the scheme (https), host (www.pega.com), and port (default HTTPS port 443) are the same, which adheres to the same-origin policy.


Reference:

Pega Web Mashup and Same-Origin Policy



Page 12 of 61



Post your Comments and Discuss Pegasystems PEGACPLSA88V1 exam with other Community members:

Babu commented on July 29, 2024
Perfect study guide. Unlike those other sites with annoying captcha validation after each page. This site is more professional and clean.
India
upvote

swati commented on July 07, 2024
what will be correct ans of ques 13?
Anonymous
upvote