Free PEGACPLSA88V1 Exam Braindumps (page: 33)

Page 33 of 61

How do you configure an application to monitor changes made to delegated Decision Table in a production environment?

  1. check Enable Auditing on the Rule-Declare-Decision Table RuleForm harness
  2. use Designer studio> system> Refactor-rules>compare rule
  3. check Audit the use of this flow action on the Rule check in flow action
  4. Define an Advanced agent that scans History-Rule instances on a daily basis

Answer(s): A

Explanation:

Enable Auditing:
On the Rule-Declare-Decision Table RuleForm, check the option to enable auditing.
Monitor Changes:
This configuration will track changes made to the decision table in the production environment.


Reference:

Pega decision table documentation and auditing features.



A security requirement states that personal data should only be visible to managers in the HR organization. All personal data is contained in a single section.
How do you restrict access to personal data ?

  1. configure a visible when rule on the section
  2. Create an Access control policy restricting access to the properties
  3. Add an Access when to relevent properties.
  4. Define a privilege for the section and add the privilege to appropriate roles

Answer(s): D

Explanation:

Define Privilege:
Create a privilege specific to the section containing personal data.
Assign Privilege:

Assign this privilege to roles associated with managers in the HR organization.


Reference:

Pega access control and security documentation.



You deplyed a pega web mashup implementation into production and are using IACAuthentication. which two action ensure that the external authentication module, and not another source, has validated the user?

  1. In the IACAuthentication service, map a passoword attribute form the LDAP server used by the external
  2. In an IAC authentication activity, add a step to idenify the security token provied by the external authentication module.
  3. in the IACAuthentication service, specify the appropriate bind password used by the host system
  4. In an IAC authentication activity, add steps that return the security token to the external authentication module for verification.

Answer(s): B,D

Explanation:

Security Token Identification:
Add steps in the IAC authentication activity to identify and validate the security token provided by the external module.
Token Verification:
Implement additional steps to return the security token to the external authentication module for verification, ensuring it is the authenticating source.


Reference:

Pega web mashup and IAC authentication documentation.



An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner how do you implement this requirement?

  1. create a when rule that validate id the current user is either a primay or secondary owner of the account configure then when rule in the required conditions section on all flow actions that allow account updates.
  2. create a privilage and configure it to validate if the current user is either a primary or secondary owner of the account. Assign the privilege for read and write instances of the account class in the user's access role.
  3. create an access when rule that validate if the current user is either a primary or secondary owner of the account. Assign the access when rule for read and write instances of the account class in the user's vaccess role.
  4. create an access when rule that validate if the current user is either a primay or secondary owner of the ccount. Configure the access when rule on the Accouny case type to ensure authorized access

Answer(s): D

Explanation:

Create Access When Rule:
Go to Records Explorer > Security > Access When.
Create a new Access When rule that checks if the current user is either the primary or secondary owner of the account. Use conditions like current user = primary owner or current user = secondary owner.
Configure the Access When Rule:
Open the Account case type.
Go to the Security tab and in the Case Type rules, apply the created Access When rule to ensure that only users who meet the conditions (primary or secondary owners) can view or update the case.
Apply Access Control:
In the Access Role configuration, apply the Access When rule for read and write instances of the Account class.
Ensure that the roles assigned to the users have the necessary permissions configured.
Testing and Validation:
Test the implementation by logging in with users who are primary or secondary owners and verifying access.
Try logging in with users who are not owners to ensure access is denied.


Reference:

Pega Academy: Security and Access Control.
Pega Documentation: Access Control Policies and Access When Rules.



Page 33 of 61



Post your Comments and Discuss Pegasystems PEGACPLSA88V1 exam with other Community members:

Babu commented on July 29, 2024
Perfect study guide. Unlike those other sites with annoying captcha validation after each page. This site is more professional and clean.
India
upvote

swati commented on July 07, 2024
what will be correct ans of ques 13?
Anonymous
upvote