How do you configure an application to monitor changes made to delegated Decision Table in a production environment?
Answer(s): A
Enable Auditing:On the Rule-Declare-Decision Table RuleForm, check the option to enable auditing.Monitor Changes:This configuration will track changes made to the decision table in the production environment.
Pega decision table documentation and auditing features.
A security requirement states that personal data should only be visible to managers in the HR organization. All personal data is contained in a single section.How do you restrict access to personal data ?
Answer(s): D
Define Privilege:Create a privilege specific to the section containing personal data.Assign Privilege:Assign this privilege to roles associated with managers in the HR organization.
Pega access control and security documentation.
You deplyed a pega web mashup implementation into production and are using IACAuthentication. which two action ensure that the external authentication module, and not another source, has validated the user?
Answer(s): B,D
Security Token Identification:Add steps in the IAC authentication activity to identify and validate the security token provided by the external module.Token Verification:Implement additional steps to return the security token to the external authentication module for verification, ensuring it is the authenticating source.
Pega web mashup and IAC authentication documentation.
An application allows users to manage Account cases. You need to configure security so that users are allowed to view and update account only if they are the primary or secondary owner how do you implement this requirement?
Create Access When Rule:Go to Records Explorer > Security > Access When.Create a new Access When rule that checks if the current user is either the primary or secondary owner of the account. Use conditions like current user = primary owner or current user = secondary owner.Configure the Access When Rule:Open the Account case type.Go to the Security tab and in the Case Type rules, apply the created Access When rule to ensure that only users who meet the conditions (primary or secondary owners) can view or update the case.Apply Access Control:In the Access Role configuration, apply the Access When rule for read and write instances of the Account class.Ensure that the roles assigned to the users have the necessary permissions configured.Testing and Validation:Test the implementation by logging in with users who are primary or secondary owners and verifying access.Try logging in with users who are not owners to ensure access is denied.
Pega Academy: Security and Access Control.Pega Documentation: Access Control Policies and Access When Rules.
Post your Comments and Discuss Pegasystems PEGACPLSA88V1 exam with other Community members:
Babu commented on July 29, 2024 Perfect study guide. Unlike those other sites with annoying captcha validation after each page. This site is more professional and clean. India upvote
swati commented on July 07, 2024 what will be correct ans of ques 13? Anonymous upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the PEGACPLSA88V1 content, but please register or login to continue.