Which three best practices can protect against cross-site scripting (XSS) attacks? (Choose Three)
Which three best practices can protect against cross-site scripting (XSS) attacks? (Choose Three)A . PrivateAPI methods for XSS filtering.B . Filter HTML and XML outputs.C . PublicAPI methods for XSS filtering.D . Write custom JavaScript.E . Filter all inputs.View AnswerAnswer: BCE
You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?
You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?A . create an encrypted keyring password and replace the unencypted password in prconfig.xmlB . create an encrypted password with PR cipherGenerator and reference the external systemC ....
Which two of the following reporting requirements entail the use of a subreport? (Choose Two)
Which two of the following reporting requirements entail the use of a subreport? (Choose Two)A . The main report outputs the total number of times that a combination of column values is found, as well as subtotals for that combination that add up to that total.B . An aggregated value,...
In which two scenarios the access group context can be changed for queue processors?
In which two scenarios the access group context can be changed for queue processors?A . Run immediatelyB . Queue-For-ProcessingC . Queue ScheduleD . Run in backgroundView AnswerAnswer: BD
Which three of the following requestor types can process cases? (Choose Three)
Which three of the following requestor types can process cases? (Choose Three)A . AppB . PortalC . BatchD . BatchView AnswerAnswer: ACD
In which of the following rule types can you configure privileges? (Choose Five)
In which of the following rule types can you configure privileges? (Choose Five)A . CorrespondenceB . Report definitionsC . Data pagesD . Attachment category rulesE . Connect RESTF . Parse structured rulesG . Rule utility functionsView AnswerAnswer: ABCDF
What feature of Pega Platform allows you to build and execute microservices-based applications?
What feature of Pega Platform allows you to build and execute microservices-based applications?A . Pega Process FabricB . Pega MobileC . Pega Intelligent Virtual AssistantD . Pega Predictive AnalyticsView AnswerAnswer: A
Which of the following terms refers to the total experience of a user, whether intended or not?
Which of the following terms refers to the total experience of a user, whether intended or not?A . UXB . AIC . ITD . UIView AnswerAnswer: A
The clipboard contains a list of details for all companies on the NASDAQ stock Exchange. Select the requirement that indicates you use a page list instead of a page group.
The clipboard contains a list of details for all companies on the NASDAQ stock Exchange. Select the requirement that indicates you use a page list instead of a page group.A . A DATA transform must iterate over the list.B . company details must be referenced using the company stock triker.C...
Which two of the following security risks can be identified by the Rule security analyzer? (Choose Two)
Which two of the following security risks can be identified by the Rule security analyzer? (Choose Two)A . Properties with incorrect typeB . Vulnerabilities in stream rulesC . Custom-written Java codeD . Unsecured rulesets and unlocked ruleset versionsView AnswerAnswer: BC