Which three approaches are valid for improving activity security? (Choose Three)
Which three approaches are valid for improving activity security? (Choose Three)
A . Select the activity type to limit which rule types can call the activity.
B . Limit the activity to calling activities of the same Apply to class.
C . Configure the activity to require authentication to prevent unauthorized use.
D . Configure the activity to restrict individual parameters to authorized users.
E . Apply a privilege to the activity to restrict the activity to authorized users.
Answer: ACE
Latest PEGAPCSSA87V1 Dumps Valid Version with 81 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments