How do customers access Field Audit Trail data?
A. Set-up Audit Trail
B. Salesforce API
C. Pre-built Tableau CRM app
D. Event Log Files
How many records per metric per org are displayed in Security Center?
A. 10000
B. 1000
C. 500
D. 5000
Using Data Mask, how can a user mask the "Country" field with another country value?
A. Replace with Library and select "Address"
B. Replace with Random Characters
C. Replace with Library and select "Country"
D. Replace with Pattern and then input "Country"
What does the default Field Audit Trail policy in a production org state?
A. Archive data after 12 months, store it for 5 years
B. Archive data after 6 months, store it for 18 months
C. Archive data after 18 months, store it for 10 years
D. Archive data after 24 months, store it for 7 years
Which three capabilities are part of the Health Check tool?
A. Align your org's security setting with Salesforce-recommended security standards
B. Identify and fix vulnerabilities in your security settings Organize user access logs
C. Access event log files to track user activity and feature adoption and troubleshoot issues
D. Verify that multiple Salesforce applications have the same level of security
Can a customer run a penetration test against Salesforce?
A. Some types of penetration testing are permitted, but not in production
B. No, this is not permitted under any circumstances
C. Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment
D. Penetration testing can be carried out at anytime by anyone
Which three are key value points for Security Center?
A. Simplify Security Management
B. Decrease Storage Requirements
C. Increase Performance
D. Respond to Threats and Anomalies Faster
E. Gain Visibility to Drive Insights
Within Data Mask a user wants to stop a configuration that is currently running. What dropdown option needs to be selected to terminate the execution
A. END
B. STOP
C. CANcEL
D. ABORT
Which filter operator is supported by Deterministic Encryption?
A. contains
B. like
C. equals
D. starts with
Which activity is not recommended for internal support teams after MFA is enabled?
A. Adjusting policies that enable or disable MFA for Salesforce users
B. Helping users recover access if they've lost or forgotten their verification methods
C. Maintaining a supply of replacement security keys
D. Enabling MFA for new employees as part of the new hire onboarding process
Page 1 out of 11 Pages |