PEGA LSA Architecture questions with correct answers
Answer: C. Client Based CORRECT ANSWER If your application stores data that could be used to identify a person and you are subject to GDPR or similar regulations. Which security model should be used? A. Role-Based B. Attribute-Based C. Client-Based Answer: A. Client Based CORRECT ANSWER Which security model allows you to track and process requests to view, change, remove, and restrict the use of personal data, and to show auditors that you have done so. A. Client-Based B. Role-Based. C. Attribute-Based Answer: B. pyRuleExecutionMessagesLogged CORRECT ANSWER Which activity below can be used to determine the privileges required by logged rules using an Access Deny rule type? A. pzRuleExecutionMessagesLogged B. pyRuleExecutionMessagesLogged C. pzAccessDenyRulePrivileges D. pyAccessDenyRulePrivileges
Written for
- Institution
- PEGA
- Course
- PEGA
Document information
- Uploaded on
- March 31, 2023
- Number of pages
- 58
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
pega lsa architecture questions with correct answers