<< Prev Question Next Question >>

Question 129/177

Which authentication model is suitable for a scenario where users need to access a system using their existing social media accounts?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (177q)
Question 1: An HR application has an employee absentee report that is ge...
Question 2: What user type would exclusively use App Studio?...
Question 3: What are three ways that you change the Get Next Work priori...
Question 4: How can a case data model be designed to support reuse and i...
Question 5: When should you use the "Rule Security Mode" as "Final" in a...
Question 6: When using the standard "start a new process" button to star...
Question 7: Which two actions can yon perform to improve the guardrails ...
Question 8: What is the primary drawback of using circumstancing to hand...
Question 9: You need to automate a claim adjudication process in which f...
Question 10: Which of the following types of testing are typically includ...
Question 11: Which two of the following situations require that use of th...
Question 12: In which two scenarios the access group context can be chang...
Question 13: Which of the following is a crucial aspect of security event...
Question 14: Which three of the following requestor types can process cas...
Question 15: Select the three best practices that can help minimize secur...
Question 16: A low-code developer can select which two of the following p...
Question 17: A report definition is configured to run as a scheduled job ...
Question 18: Which of the following things do you need to add to the whit...
Question 19: What is the primary goal of designing and automating testing...
Question 20: A company needs to generate reports with columns for the use...
Question 21: A linked property can be best thought of as ___________?...
Question 22: In which scenarios should you use circumstance, class, rules...
Question 23: Which of the following steps are required to implement Polic...
Question 24: What two benefits do you gain by using a data warehouse coup...
Question 25: What is the purpose of data virtualization in a Pega applica...
Question 26: The goal of security is to maintain which three of the follo...
Question 27: Which two reasons justify using subcases when designing a ca...
Question 28: Which of the following setups most likely requires the use o...
Question 29: Front Stage Group (FSG) wants to add a Suggestion Box to its...
Question 30: At a certain point in its life cycle, a case is required to ...
Question 31: Which of the following is an example of a "Man-in-the-Middle...
Question 32: When implementing a security requirement, it is important to...
Question 33: What is the purpose of the DX API (Data Exchange API) in Peg...
Question 34: What two actions are the responsibility of clients who deplo...
Question 35: Which two of the following security risks can be identified ...
Question 36: The development team has recently unveiled a major release o...
Question 37: Select two ways for queuing an item for a queue processor. (...
Question 38: Which of the following best describes the function of BIX in...
Question 39: Which three of the following options are flow-related assign...
Question 40: XYZ is an Insurance application in which CSRs update thousan...
Question 41: A customer account is a business requirement. The customer a...
Question 42: What features can be customized in the "Get Next Work" funct...
Question 43: Which one of the following is the default Authentication typ...
Question 44: What are two limitations of performing a rollback of a deplo...
Question 45: In which three of the following ways can an application be s...
Question 46: If the flow pauses at an Assignment named pzStageProblems, w...
Question 47: Which two statements are true about the industry foundation ...
Question 48: A case displays recent customer transaction. Different opera...
Question 49: What are the three best practices to follow when using PegaU...
Question 50: As a project manager, you are overseeing a software developm...
Question 51: In a vaccine study application, there are two sets of users;...
Question 52: A Pega Platformapplication uses the following security confi...
Question 53: XYZ Corporation wants to perform extensive analysis on work ...
Question 54: Which one of the following pieces data is not captured by Pe...
Question 55: As a software developer, you are tasked with implementing sc...
Question 56: Which of the following statements about Case Specialization ...
Question 57: Which two of the following reasons are the main difference b...
Question 58: Which of the following are deployment strategies commonly us...
Question 59: To accommodate changes to integration Rules, a Lead System A...
Question 60: Case Tagging and Case Following are referenced as Social BPM...
Question 61: In a shopping cart application, if the product is defective ...
Question 62: What is the primary function of a file listener in backgroun...
Question 63: A Lead System Architect (LSA) team has a task to automate a ...
Question 64: Which three approaches arc considered a PegaUnit: testing be...
Question 65: When App Studio is used, in which schema is a data type tabl...
Question 66: When evaluating and determining the appropriate background p...
Question 67: How does automated testing contribute to the efficiency of a...
Question 68: You add database connection information to prconfig.xml and ...
Question 69: Good UX design creates a better user experience and provides...
Question 70: A customer service representative (CSR) needs to launch mult...
Question 71: Which one of the following items does the system store and d...
Question 72: When designing reports for performance, what technique can h...
Question 73: Which two of the following routing activities leverage the @...
Question 74: You want to expose a set of services for your application. E...
Question 75: What is the purpose of a restore point in Pega Platform™?...
Question 76: An organization has an open position for Lead System Archite...
Question 77: In the context of access control, what is the principle of "...
Question 78: To validate login credentials entered by a volunteer in a Va...
Question 79: Which of the following options is considered critical Assign...
Question 80: Which of the following statements is true about the reports ...
Question 81: In a customer onboarding application, cases are routed to mu...
Question 82: While designing an application for a large set of users work...
Question 83: A Customer Service application requires customer data assemb...
Question 84: Which of the following is considered a data modeling best pr...
Question 85: Which two of the following statements are advantages of usin...
Question 86: How do you implement polymorphism when defining a data relat...
Question 87: What are two ways to minimize or avoid data integrity issues...
Question 88: The clipboard contains a list of details for all companies o...
Question 89: A pega application has cases that represent customer account...
Question 90: When using a declarative page to store a list of currency ra...
Question 91: In what two ways do Declare OnChange and Declare Trigger ins...
Question 92: Which two of the following options dedicated backing service...
Question 93: Which one of the following statements is true regarding serv...
Question 94: Any suspicious activity that that a customer performs is rep...
Question 95: What are three benefits of using dependent role hierarchies?...
Question 96: Which report definition data access method should be used to...
Question 97: Which of the following is a benefit of table partitioning?...
Question 98: What database tuning technique do you use to determine wheth...
Question 99: When generating queries for reporting, which SQL function wo...
Question 100: Event-driven architectures have three key components: event ...
Question 101: What are the considerations for case participants and routin...
Question 102: Which of the following best describes a "Zero-Day Vulnerabil...
Question 103: When using a Queue Processor for background processing, what...
Question 104: Which of the following statements are most accurate regardin...
Question 105: How can polymorphism be applied in data modeling in Pega app...
Question 106: A recent review of the audit polices log show that a specifi...
Question 107: How can data pages be used effectively in a Pega application...
Question 108: A process with three assignments exists in production. After...
Question 109: Which two of the following statements are true about the opt...
Question 110: Which three of the following application rule properties can...
Question 111: What does a release pipeline typically consist of? (Select a...
Question 112: How can you handle flow changes for cases in-flight in Pega ...
Question 113: You are a lead developer in a software development team. You...
Question 114: In a Human Resources application, the employee annual salary...
Question 115: Which of the following is a recommended approach to incorpor...
Question 116: Select the two true statements regarding background processi...
Question 117: Which three of the following options externalized third-part...
Question 118: Which three of the following options are reasons for compani...
Question 119: What is the primary goal of a "DDoS (Distributed Denial of S...
Question 120: What are two reasons why you tune some of the Pega out-of-th...
Question 121: A call center uses Pega Customer Service. Where does Pega Cu...
Question 122: When is it appropriate to reuse assets and relevant records,...
Question 123: When integrating with multiple independent services with lon...
Question 124: Which two of the following design approaches are most closel...
Question 125: With __________________, users can quickly and easily define...
Question 126: Which of the following Skin rule customizations help satisfy...
Question 127: XYZ Corp orders office supplies through multiple suppliers. ...
Question 128: What are two potential impacts if large data sets are genera...
Question 129: Which authentication model is suitable for a scenario where ...
Question 130: Which two of the following terms are associated with the ter...
Question 131: Which one of the following specialization techniques is best...
Question 132: You are a Pega developer working on a complex application. D...
Question 133: Which two of the following options are the benefits of using...
Question 134: Which authorization model do you use to implement the data p...
Question 135: The power company EnergyCo uses a PRPC-based Incident Manage...
Question 136: Center-out™ business architecture brings business and IT to...
Question 137: What security measure can help protect a web application fro...
Question 138: How do you encrypt the storage stream of the class MyOrg-HR-...
Question 139: The Work Parties rule directly facilitates routing decisions...
Question 140: A user logs in to a shopping website that contains a malicio...
Question 141: Which two of the following statements are true about compone...
Question 142: Which of the following is an example of a social engineering...
Question 143: An organization has come to know about hackers trying to acc...
Question 144: Your application connects to two REST services that list det...
Question 145: You are working on an insurance claims application that rece...
Question 146: When is it appropriate to use a spin-off?...
Question 147: If a stream node is not defined in a cluster, the system pro...
Question 148: Table a contains customer information. Table B contains comp...
Question 149: A shipping case needs to wait a specific time period before ...
Question 150: What are two scenarios that you take into consideration when...
Question 151: What are the three security levels in application security? ...
Question 152: What is the primary difference between push routing and pull...
Question 153: What are the benefits of analyzing Microjourneys in designin...
Question 154: An airline service allows flight bookings from 10 days befor...
Question 155: You are using pega express. You want to avoid creating unnec...
Question 156: What is the significance of Center-out business architecture...
Question 157: Whose primary responsibility is it to monitor and address se...
Question 158: Content security policies ______________ and _______________...
Question 159: A Dispute application uses the same process flow for credit ...
Question 160: A many-to-many relationship is defined between a Pega Platfo...
Question 161: In the pharmaceutical industry, cases are routed to differen...
Question 162: Which column can be removed from Declare Index tables to imp...
Question 163: Which Join condition is the most efficient in a report defin...
Question 164: Which three of the following options make up the three-level...
Question 165: What are two benefits of using Prediction Studio? (Choose Tw...
Question 166: What are the alternative ways to find work in Pega applicati...
Question 167: By default, queue processors run in the security context of ...
Question 168: An organization has multiple applications built on Pega Plat...
Question 169: Which two of the following options are the responsibilities ...
Question 170: Which three types of records can you mark as relevant record...
Question 171: What are two key initiatives to ensure the successful adopti...
Question 172: The ABC organization has a financial application built on Pe...
Question 173: Which of the following statements are most accurate about Bu...
Question 174: It is a best practice to include case types in a component....
Question 175: XYZ Corporation would like a report that shows the number of...
Question 176: What are two scenarios that you take into consideration when...
Question 177: What are the two major differences between the Pega Web Mash...