An application contains a flow action with the Apply to: class of TRB-HRApps-Work-Feedback in a locked ruleset, HRApps: 01-01-01. There is a higher unlocked ruleset.
An application contains a flow action with the Apply to: class of TRB-HRApps-Work-Feedback in a locked ruleset, HRApps: 01-01-01. There is a higher unlocked ruleset. In the Answer area, select the appropriate settings on a saved copy of the flow action that prevents the application from using the rule in...
To secure sensitive data, how do you enable property-level encryption for SSN and Account Number?
In an online shopping application, you enable class-level encryption for the entire case type and optimize First Name, Last Name, Social Security number (SSN), Total Cart, and Account Number properties for reporting. To secure sensitive data, how do you enable property-level encryption for SSN and Account Number?A . Create a...
In which scenario is a Declare OnChange rule appropriate?
In which scenario is a Declare OnChange rule appropriate?A . When a user updates their address, the active case is suspended until the address can be confirmed.B . During a nightly backup process, only updated fields are backed up.C . When a developer changes a view, the change is checked...
Which requirement is supported by attribute-based access control (ABAC)?
Which requirement is supported by attribute-based access control (ABAC)?A . Managers can reschedule but not delete appointments.B . Personal identifying information in the Work-Baking- class is restricted.C . Agents who are assigned the Top Secret clearance level can delete reports.D . Customers have view access to all attachments on a...
Which is chosen during rule resolution?
The ruleset list for an application consists of the following rulesets, ordered from highest to lowest: • SelfService: 01-01 • TGB-HR:01-01 • TGB:01-01 A rule with an Apply to: class of TGB-HR-SelfService-Work-TimeOff references a rule named ConfirmationRequest. The four instances of Confirmation Request in the rules cache are shown in...
which statement regarding managing encrypted data in Pega Platform is true?
which statement regarding managing encrypted data in Pega Platform is true?A . Each organization uses a custom key to encrypt its data.B . Property level encryption is a time efficient method to encrypt data.C . Class-level encryption will encrypt individual properties.D . To decrypt dats, apply the same key used...
How do you configure the case stage to satisfy this requirement?
A requirement states that the Manager role cannot open a purchase request during the Audit stage. How do you configure the case stage to satisfy this requirement?A . Apply a Privilege record.B . Apply an Access When record.C . Apply an Access Deny record.D . Apply a When record.View AnswerAnswer:...
Which two best practices for creating a mobile app on Pega Platform guarantee a consistent user experience? (Choose Two)
Which two best practices for creating a mobile app on Pega Platform guarantee a consistent user experience? (Choose Two)A . Apply both responsive and adaptive user interface designs to optimize the display of the app.B . Incorporate Android emulators during the development and production phases.C . Use multiple unlocked rulesets...
Which security solution do you use to satisfy the requirement?
Consider the following requirement: An auditing policy explicitly requires that employees cannot see the contents of complaints made against themselves. Which security solution do you use to satisfy the requirement?A . Access Control PolicyB . Access DenyC . Access of Role to ObjectD . Access WhenView AnswerAnswer: D
How do you create the new ruleset version?
You are preparing to create a new major version of an application ruleset with multiple minor and patch versions. How do you create the new ruleset version?A . Lock and roll the existing ruleset versions to the new version.B . Skim the relevant ruleset versions to copy the highest versions...