CPSSA Quiz Exam dumps #3

Which statement regarding managing encrypted data in Pega Platform is true?
A. Encrypted properties cannot be referenced using filter conditions in reports.
B. Property-level encryption is a time-efficient method to encrypt data.
C. Encrypted properties can be referenced in report definitions.
D. Each organization uses a custom key to encrypt its data.
Which two use cases correctly describe controlling access to an attachment category?
(Choose Two)
A. Configure the When condition "IsCurrentStageTesting" to allow users to view an attachment if the rule returns true.
B. Configure a Visible when condition called "IsDocumentPrivate" to allow users to view an attachment if the rule returns false.
C. Configure the privilege "DeleteOwn" and assign it to a user so that a user can delete their own attachments.
D. Configure Client-based access control on the class where the attachment category exists to restrict access to the attachment.
A music production company's application contains the following classes:
 
Capture
 
A requirement states that users assigned the role "Manager" can edit objects related to any studio work.

At which position in the class hierarchy do you configure an Access of Role to Object (ARO) record to satisfy this requirement?
A. UPlusMusic-Production-Work-Brand-Marketing
B. UPlusMusic-Production-Work-Studio-Editing
C. UPlusMusic-Production- Work-Studio-
D. UPlusMusic-Production- Work-
Which two requirements are supported by Attribute-based access control (ABAC)? (Choose Two)
A. Managers can reschedule but not delete appointments.
B. Personal identifying information in the Work-Baking- class is restricted.
C. Agents assigned the "Top Secret" clearance level can delete reports.
D. Bakers with a rating of 4 or better can add recipes to the database.
Consider the following requirement: An auditing policy explicitly requires that employees cannot see the contents of complaints made against themselves. Which security solution do you use to satisfy the requirement?
A. Access of Role to Object
B. Access Control Policy
C. Access When
D. Access Deny
How do you ensure that only a manager can run a specific flow action?
A. Add a pre-processing activity to the flow action form to determine whether the user is a manager.
B. Add a privilege to the flow action form, then add the privilege to a role assigned to the access group for managers.
C. Add an Access When condition to the flow action to determine whether the user is a manager.
D. Add a validate rule to the flow action form to determine whether the user is a manager.
A hospital uses a case type to manage the treatment of patients visiting the Emergency Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following securityrequirements for the case type.

♦ Patients access cases on a read-only basis.
♦ Patients can only access their own cases.
♦ Doctors and nurses can modify cases throughout the case life cycle.
♦ Only doctors are allowed to write prescriptions.

What two steps, when performed together, allow you to ensure that patients can read, but not edit, cases?
(Choose Two)
A. Configure an Access of Role to Object rule with the open case action set to 5.
B. Configure an Access Role to Object rule with the open case action set to 1.
C. Configure an access control policy condition to test whether the user is a patient.
D. Create an access group unique to patients.
A hospital uses a case type to manage the treatment of patients visiting the Emergency
Room (ER). Cases are created when the patient checks in at the registration desk, and are resolved when the patient is released from the hospital. Stakeholders identify the following security requirements for the case type.

♦ Patients access cases on a read-only basis.
♦ Patients can only access their own cases.
♦ Doctors and nurses can modify cases throughout the case life cycle.
♦ Only doctors are allowed to write prescriptions.

Which configuration allows doctors and nurses to modify cases while complying with all
identified security requirements?
A. Create two access roles, one for doctors and one for nurses, and set the modify action for each to 5.
B. Create two access roles, one for doctors and one for nurses, and set the modify action for each to 1.
C. Create a single access role for both doctors and nurses, and set the modify action to 5.
D. Create a single access role for both doctors and nurses, and set the modify action to 1.
What are three valid ways to exchange data through a Pega Web Mashup? (Choose Three)
A. Use an action object configured as a script to perform additional actions on a web mashup gadget.
B. Use the Javascript function doAction() to set or read data values through the hosting web page.
C. Use an SQL call to exchange data between the mashup and hosting web page.
D. Use a queue processor to pass updated attributes to the gadget on the hosting web page.
E. Use the data-pega-event-onpagedata attribute to configure the default value for the gadget.
Which two statements are valid about configuring Pega Web Mashup? (Choose Two)
A. Only create one DIV element in the hosting web page for each Pega gadget.
B. Add a list of trusted domains in your applications in which you want to use the mashup.
C. Use the Integration wizard to generate mashup code for use in other systems.
D. Keep the original names of default actions in the mashup code to prevent security risks.
Which three items are generated and displayed in the compliance score of an application? (Choose Three)
A. Rules with unjustified warnings in the application
B. Unweighted compliance score out of 100
C. Total core rules used in the application
D. Rules with warnings in the application
E. Percentage of compliant rules in the application
What is the purpose of the Policy Verification landing page when configuring a security solution in Pega Platform?
A. To test if a user has the required access to a case
B. To manually authenticate a specific user on an integrated external database
C. To test if a user's channel-specific password meets defined property requirements
D. To configure mapping of access control attributes
In a hiring case type, only HR Managers should have read access to a candidate's reference letter attachment. Which two tasks are used to fulfill this requirement? (Choose Two)
A. Configure read access for a user according to a privilege
B. Restrict read access according to a When condition
C. Configure attribute-based access control on the Attachment Category
D. Define a separate Attachment Category for HR Managers
A requirement states that the Manager role cannot open a purchase request during the Audit stage. How do you configure the case stage to satisfy this requirement?
A. Apply an Access Deny record.
B. Apply an Access When record.
C. Apply a When record.
D. Apply a Privilege record.
Pick each security solution on the left to its appropriate use case.
Security solution
Dealers cannot modify orders in the Fulfillment stage.
Dealers cannot run reports.
Customers can only view their own credit report.
Dealers can modify evaluations.
What two actions must you perform to create a class join in a report definition? (Choose Two)
A. Select the type of match for key values.
B. Add an association rule to match key values.
C. Create a prefix for the joined class.
D. Add a parameter for each property in the class you want to join.
You are creating a report that lists all open Personal Injury cases with related Auto Claim case information. Personal Injury and Auto Claim cases belong to the same class group.

The report includes three columns:

♦ Case ID for the Personal Injury case
♦ Case ID for the parent Auto Claim case
♦ Claim adjuster for the Auto Claim case

Personal Injury case data includes the Auto Claim case ID. What join type do you use to configure the report?


Only include matching rows = INNER JOIN.
Include all rows in this class = LEFT OUTER JOIN.
Include all rows in joined class = RIGHT OUTER JOIN.
You are analyzing application performance and identify a data transform exceeding preferred performance parameters. Which performance tool do you use to help troubleshoot the issue?
A. Performance Profiler
B. Database Trace
C. Performance Analyzer (PAL)
D. Tracer
Which statement describes the appropriate use of the Purge/Archive wizard to address application performance?
A. Delete any properties exposed in table columns from the BLOB.
B. Remove / Archive old cases to reduce the size of a database table.
C. Delete stored SQL procedures that have been updated.
D. Remove unused rules caches maintained on the system.
Graduate school students create and submit project proposals to their advisors. During the proposal phase, the advisor and the student can each edit the draft proposal. How do you ensure the advisor and the student can simultaneously edit the proposal, and the application can check the proposal for changes before committing them?
A. Configure the locking on the case type to allow one user.
B. Configure the locking on the case type to allow multiple users.
C. Configure an assignment for the advisor and an assignment for the student.
D. Configure the student and advisor roles with view and edit permission.
A flow action calls a pre-processing data transform to initiate values. There are several flow actions available for the assignment. You want to make sure that the values are only initiated once for each flow action. How do you implement a solution?
A. Add logic to the pre-processing data transform to test if values were already initiated.
B. Do nothing. The pre-processing data transform is only called once for each assignment.
C. Make sure that the flow action does not have the highest likelihood since it will always be invoked.
D. Configure the data transform as post-processing instead of pre-processing.
Items selected by a user need to be copied to a page list property when the user submits the form. How do you copy the items?
A. Add a data transform to the flow action as a post-processing action.
B. Add a data transform to the flow action as a pre-processing action.
C. Create a declare expression with the page list property as the target.
D. Create a validate rule to copy the selected items.
If a customer reports an issue with their order, an Investigation case is created.
All investigation cases are higher priority than other case types.
What configuration supports this requirement?
A. Create a service-level agreement (SLA) rule and ensure that the assignment is ready immediately.
B. Create a service-level agreement (SLA) rule and increase the initial urgency.
C. Increase the initial urgency on the case type settings.
D. Configure an optional action to enable manual changes to case urgency.
An assignment service-level agreement (SLA) is configured with the following details:
 
♦ Initial urgency: 20
♦ Assignment ready: Timed delay of 2 hours
♦ Goal: 2 hours and increase urgency by 10
♦ Deadline: 4 hours and increase urgency by 25
♦ Passed deadline: 1 hour, increase urgency by 15, and limit events to 6

The case reaches the assignment at 9 AM on Wednesday.
Assuming no other urgency adjustments, what is the assignment urgency 7.5 hours after the case reaches the assignment?
A. 55
B. 90
C. 70
D. 80
Which two statements about building mobile applications with Pega Platform are true? (Choose Two)
A. Pega Platform allows the same certificate set to build and distribute iOS and Android applications.
B. Pega Mobile Build Server is configured in Dev Studio by using your Android or iOS developer certificates.
C. The containing application determines the layout and appearance of SDK applications.
D. Pega Mobile Build Server requires HTTPS access.
In the Answer Area, Pick each mobile application solution on the left to the correct scenario.
Mobile Application Solution
Globobank wants to build a mobile app of its pega platform application to embed in its mobile app
Metrobank wants to build a mobile app for distribution on Android and iOS app stores.
Localbank wants to build a mobile app for a Pega Platform application but developer certificates cannot be distributed to app developers
{"name":"CPSSA Quiz Exam dumps #3", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which statement regarding managing encrypted data in Pega Platform is true?, Which two use cases correctly describe controlling access to an attachment category? (Choose Two), A music production company's application contains the following classes:     A requirement states that users assigned the role \"Manager\" can edit objects related to any studio work. At which position in the class hierarchy do you configure an Access of Role to Object (ARO) record to satisfy this requirement?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker