Comprehensive and Detailed Explanation From Exact Extract:
This question tests the core security principles of Pega Platform applications, as outlined in the Certified Pega Business Architect (CPBA) curriculum, specifically focusing on the security triad (CIA: Confidentiality, Integrity, Availability).
A. Availability: Correct. Availability ensures that the Pega application remains accessible to authorized users, a key security goal. Pega’s security features, such as load balancing and failover mechanisms, support this. Extract: Pega Academy, Security Overview: “Availability ensures applications are accessible to authorized users, supported by robust system design.”
B. Integrity: Correct. Integrity protects data from unauthorized modification, ensuring accuracy and reliability. Pega uses access controls and audit logging to maintain integrity. Extract: Pega Academy, Security Overview: “Integrity prevents unauthorized changes to data, using access roles and logging.”
C. Extensibility: Incorrect. Extensibility relates to application customization, not a primary security goal. Extract: Pega Academy, Application Design: “Extensibility enables customization but is not a security principle.”
D. Maintainability: Incorrect. Maintainability relates to system upkeep, not security. Extract: Pega Academy, System Administration: “Maintainability ensures ease of system updates, not security.”
E. Confidentiality: Correct. Confidentiality protects sensitive data from unauthorized access, using encryption and access controls in Pega. Extract: Pega Academy, Security Overview: “Confidentiality safeguards data through encryption and role-based access.”
[:, Pega Academy, Business Architect ‘23 Mission, Module on Security., Pega Certified Business Architect Study Guide, Version 8.8, Section on Security Principles., Pega Help Documentation, Security Overview., ]