Practice Free PEGACPLSA24V1 Exam Online Questions
Which three of the following options externalized third-party services? (Choose Three)
- A . Hazelcast
- B . Elastic Search
- C . Search reporting service
- D . Cassandra Decision Data Store service
- E . Constellation
Which of the following is an example of a social engineering attack?
- A . Installing a keylogger on a target computer to steal login credentials.
- B . Exploiting a vulnerability in the target system to gain unauthorized access.
- C . Tricking a user into revealing their password through a phishing email.
- D . Using brute force to guess a user’s password.
What are the three supported Rule Security Mode settings on an access group that help enforce a deny first policy? (Choose Three)
- A . Deny
- B . Allow
- C . Reject
- D . Accept
- E . Approve
- F . Warn
A purchase order application allows users in their work group to read and write purchase request cases. When the total amount exceeds usd10,000 however, only the work group manger can read and write the case.
Select two configuration that satisfy the requirement (choose two)
- A . Configure conditional access in Access Manager to read and write a purchase request case when the amount is less than USD 10.000.
- B . Add a privilege to the case type class that is conditionally granted when the purchase request amount is less than USD 10.000.
- C . Configure the worklist to only display purchase requests greater than USD10.000 for the work group manager.
- D . Use a reads access control policy with a condition that verifies the amount is less than USD10.000.
Your organization uses a large number of business intelligence (BI) reports.
Which two approaches are good solutions when you develop a reporting strategy?
- A . Elasticsearch
- B . Data archive
- C . BIX
- D . Data warehouse
Which of the following can be a potential performance problem in reports?
- A . Using complex SQL functions in the queries.
- B . Including sub-reports to display related data.
- C . Employing associations and class joins in the report design.
- D . Running reports on a regularly maintained and optimized database.
Content security policies ______________ and ________________. (Choose Two)
- A . find common vulnerabilities by searching for matches with regular expressions
- B . protect your browser from loading and running content from untrusted sources
- C . create an event when security-relevant rules are updated.
- D . help detect and mitigate Cross Site Scripting (XSS) and data injection attacks
What is the purpose of using sub-reports in a report design?
- A . To include additional charts or graphs for visual representation.
- B . To display summary information at the beginning of the report.
- C . To embed external data sources into the report.
- D . To show detailed information related to the main report’s data.
Why do you use Pega Diagnostic Cloud (PDC) when the organization already has application performance monitoring tools?
- A . PDC shows insights into the health of the Pega application.
- B . PDC collects alerts and health activity across Pega nodes.
- C . PDC is available on-premises and in Pega Cloud® Services.
- D . PDC provides the ability to stop and start agents, listeners, and manage requestors.
Which two of the following options are key benefits of using a release managementa pproach in Pega Platform™? (Choose Two)
- A . It provides a visual representation of the application development process.
- B . It enables faster application development.
- C . It reduces the need for manual intervention in the development process.
- D . It ensures that all changes undergo proper testing and approval before deployment.
