Which three best practices can protect against cross-site scripting (XSS) attacks? (Choose Three)

Which three best practices can protect against cross-site scripting (XSS) attacks? (Choose Three)A . PrivateAPI methods for XSS filtering.B . Filter HTML and XML outputs.C . PublicAPI methods for XSS filtering.D . Write custom JavaScript.E . Filter all inputs.View AnswerAnswer: BCE

February 6, 2025 No Comments READ MORE +

You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?

You add database connection information to prconfig.xml and want to encrypt the password in the connection information how do you encrypt the password?A . create an encrypted keyring password and replace the unencypted password in prconfig.xmlB . create an encrypted password with PR cipherGenerator and reference the external systemC ....

February 5, 2025 No Comments READ MORE +

Which two of the following reporting requirements entail the use of a subreport? (Choose Two)

Which two of the following reporting requirements entail the use of a subreport? (Choose Two)A . The main report outputs the total number of times that a combination of column values is found, as well as subtotals for that combination that add up to that total.B . An aggregated value,...

February 4, 2025 No Comments READ MORE +

In which two scenarios the access group context can be changed for queue processors?

In which two scenarios the access group context can be changed for queue processors?A . Run immediatelyB . Queue-For-ProcessingC . Queue ScheduleD . Run in backgroundView AnswerAnswer: BD

February 3, 2025 No Comments READ MORE +

Which three of the following requestor types can process cases? (Choose Three)

Which three of the following requestor types can process cases? (Choose Three)A . AppB . PortalC . BatchD . BatchView AnswerAnswer: ACD

February 3, 2025 No Comments READ MORE +

In which of the following rule types can you configure privileges? (Choose Five)

In which of the following rule types can you configure privileges? (Choose Five)A . CorrespondenceB . Report definitionsC . Data pagesD . Attachment category rulesE . Connect RESTF . Parse structured rulesG . Rule utility functionsView AnswerAnswer: ABCDF

February 2, 2025 No Comments READ MORE +

What feature of Pega Platform allows you to build and execute microservices-based applications?

What feature of Pega Platform allows you to build and execute microservices-based applications?A . Pega Process FabricB . Pega MobileC . Pega Intelligent Virtual AssistantD . Pega Predictive AnalyticsView AnswerAnswer: A

January 29, 2025 No Comments READ MORE +

Which of the following terms refers to the total experience of a user, whether intended or not?

Which of the following terms refers to the total experience of a user, whether intended or not?A . UXB . AIC . ITD . UIView AnswerAnswer: A

January 28, 2025 No Comments READ MORE +

The clipboard contains a list of details for all companies on the NASDAQ stock Exchange. Select the requirement that indicates you use a page list instead of a page group.

The clipboard contains a list of details for all companies on the NASDAQ stock Exchange. Select the requirement that indicates you use a page list instead of a page group.A . A DATA transform must iterate over the list.B . company details must be referenced using the company stock triker.C...

January 28, 2025 No Comments READ MORE +

Which two of the following security risks can be identified by the Rule security analyzer? (Choose Two)

Which two of the following security risks can be identified by the Rule security analyzer? (Choose Two)A . Properties with incorrect typeB . Vulnerabilities in stream rulesC . Custom-written Java codeD . Unsecured rulesets and unlocked ruleset versionsView AnswerAnswer: BC

January 27, 2025 No Comments READ MORE +