Free PEGACPSSA23V1 Exam Braindumps (page: 15)

Page 14 of 36

Which statement regarding managing encrypted data in Pega Platform is true?

  1. Encrypted properties cannot be referenced using filter conditions in reports.
  2. Property-level encryption is a time-efficient method to encrypt data.
  3. Encrypted properties can be referenced in report definitions.
  4. Each organization uses a custom key to encrypt its data.

Answer(s): A

Explanation:

Managing encrypted data in Pega Platform comes with certain limitations, one of which is that encrypted properties cannot be referenced using filter conditions in reports (A). This is because the encryption obscures the actual value of the property, making it impossible for the reporting engine to perform comparisons or filtering based on the encrypted data. This limitation is essential for maintaining data security, as it prevents unauthorized access to sensitive information through report queries.


Reference:

Pega Community documentation on encryption and reporting.



Which two use cases correctly describe controlling access to an attachment category? (Choose Two)

  1. Configure the When condition "IsCurrentStageTesting" to allow users to view an attachment if the rule returns true.
  2. Configure a Visible when condition called "IsDocumentPrivate" to allow users to view an attachment if the rule returns false.
  3. Configure the privilege "DeleteOwn" and assign it to a user so that a user can delete their own attachments.
  4. Configure Client-based access control on the class where the attachment category exists to restrict access to the attachment.

Answer(s): A,C

Explanation:

Controlling access to an attachment category can be achieved through various configurations. Using a When condition like "IsCurrentStageTesting" (A) allows for dynamic access control based on the case's current stage, enabling attachments to be accessible only under certain conditions. Assigning privileges, such as "DeleteOwn" (C), to users enables fine-grained control over actions users can perform on attachments, such as deleting their own attachments, thus enhancing security and compliance with business rules.


Reference:

Pega Community documentation on attachment categories and access control.



A music production company's application contains the following classes:



A requirement states that users assigned the role "Manager" can edit objects related to any studio work.
At which position in the class hierarchy do you configure an Access of Role to Object (ARO) record to satisfy this requirement?

  1. UPlusMusic-Production-Work-Brand-Marketing
  2. UPlusMusic-Production-Work-Studio-Editing
  3. UPlusMusic-Production- Work-Studio-
  4. UPlusMusic-Production- Work-

Answer(s): C

Explanation:

To satisfy the requirement that users assigned the role "Manager" can edit objects related to any studio work, the Access of Role to Object (ARO) record should be configured at the "UPlusMusic- Production-Work-Studio-" level (C). This level is the common parent class for all studio-related work, such as Recording and Editing. By setting the ARO at this level, it ensures that managers have the necessary permissions to edit any object that falls under the studio work hierarchy, without having to set permissions at each individual subclass level.


Reference:

Pega Community documentation on class hierarchy and Access of Role to Object configuration.



Which two requirements are supported by Attribute-based access control (ABAC)? (Choose Two)

  1. Managers can reschedule but not delete appointments.
  2. Personal identifying information in the Work-Baking- class is restricted.
  3. Agents assigned the "Top Secret" clearance level can delete reports.
  4. Bakers with a rating of 4 or better can add recipes to the database.

Answer(s): A,D

Explanation:

Attribute-based access control (ABAC) supports various granular and dynamic access control requirements, such as allowing managers to reschedule but not delete appointments (A) and enabling bakers with a rating of 4 or better to add recipes to the database (D). ABAC uses attributes (such as user roles, data characteristics, and environmental conditions) to define access control policies, providing a flexible and context-aware mechanism to enforce security policies tailored to specific business requirements.


Reference:

Pega Community documentation on ABAC and its use cases.






Post your Comments and Discuss Pegasystems PEGACPSSA23V1 exam with other Community members:

PEGACPSSA23V1 Discussions & Posts