Practice Free PEGACPLSA24V1 Exam Online Questions
Asynchronous communication is helpful in scenarios where the business logic or process execution is dependent on the response or when the request fails.
- A . True
- B . False
How do you identify security vulnerabilities in the custom code that is written by the project team for a Pega Platform™ application?
- A . Run the Rule Security Analyzer tool.
- B . Run the Access Manager tool.
- C . Review the PegaRULES log file.
- D . Run the App Studio Compliance tool.
Which of the following best describes a "Zero-Day Vulnerability"?
- A . A vulnerability that has been present for zero days and cannot be exploited.
- B . A vulnerability that has not been discovered or publicly disclosed yet.
- C . A vulnerability that can be mitigated with zero-day patches.
- D . A vulnerability that affects zero-day old software only.
When is access granted if both role-based access control (RBAC) and attribute-based access control (ABAC) are configured in an application?
- A . Access is only granted if both RBAC and ABAC evaluate to true.
- B . Access is granted if ABAC evaluates to true unless an Access Deny restricts access.
- C . Access is granted when ABAC evaluates to true because it overrides RBAC.
- D . Access is granted when RBAC evaluates to true because it overrides ABAC.
When evaluating and determining the appropriate background processing design option, which factor should be considered most crucial?
- A . The number of background tasks required to be processed.
- B . The overall complexity of the application’s data model.
- C . The frequency and timing requirements of the background tasks.
- D . The availability of the system’s hardware resources.
Which two of the following reasons are the main difference between push routing and pull routing? (Choose Two)
- A . Push routing is initiated during the context of case processing, and pull routing is initiated outside the context of case processing.
- B . The behavior of push routing is configured in Rule-System-Settings , but pull routing is not.
- C . Push routing activity names begin with the word To , and pull routing activity names begin with either Get or Find.
- D . The security type value for push routing activities is Route, while the security type value for pull routing activities is Activity.
What are the considerations for case participants and routing in Pega applications? (Select all that apply)
- A . Assigning tasks based on user availability and workload.
- B . Implementing dynamic routing based on business rules and case data.
- C . Restricting access to specific stages based on user roles and permissions.
- D . Using static routing to avoid any changes during case execution.
In which one of the following contexts does the sytem run data flow runs that you initiate on the Data Flows landing page?
- A . Access group
- B . System Runtime Context
- C . Async Processor requestor
- D . Batch requestor
What is the main difference between a Data Flow and a Queue Processor?
- A . Queue Processors can process a single item immediately, while Data Flows cannot.
- B . Data Flows can process data asynchronously, while Queue Processors cannot.
- C . Data Flows can be scheduled to run at specific times, while Queue Processors cannot.
- D . Queue Processors can process large volumes of data, while Data Flows cannot.
Which two of the following terms are associated with the term "component"? (Choose Two)
- A . Ruleset
- B . Recursive
- C . Framework
- D . Interface
