Security-and-Privacy-Accredited-Professional Exam Questions

Total 104 Questions


Last Updated On : 16-Jan-2025

How do customers access Field Audit Trail data?


A. Set-up Audit Trail


B. Salesforce API


C. Pre-built Tableau CRM app


D. Event Log Files





A.
  Set-up Audit Trail

How many records per metric per org are displayed in Security Center?


A. 10000


B. 1000


C. 500


D. 5000





C.
  500

Using Data Mask, how can a user mask the "Country" field with another country value?


A. Replace with Library and select "Address"


B. Replace with Random Characters


C. Replace with Library and select "Country"


D. Replace with Pattern and then input "Country"





C.
  Replace with Library and select "Country"

What does the default Field Audit Trail policy in a production org state?


A. Archive data after 12 months, store it for 5 years


B. Archive data after 6 months, store it for 18 months


C. Archive data after 18 months, store it for 10 years


D. Archive data after 24 months, store it for 7 years





C.
  Archive data after 18 months, store it for 10 years

Which three capabilities are part of the Health Check tool?


A. Align your org's security setting with Salesforce-recommended security standards


B. Identify and fix vulnerabilities in your security settings Organize user access logs


C. Access event log files to track user activity and feature adoption and troubleshoot issues


D. Verify that multiple Salesforce applications have the same level of security





A.
  Align your org's security setting with Salesforce-recommended security standards

B.
  Identify and fix vulnerabilities in your security settings Organize user access logs

D.
  Verify that multiple Salesforce applications have the same level of security

Can a customer run a penetration test against Salesforce?


A. Some types of penetration testing are permitted, but not in production


B. No, this is not permitted under any circumstances


C. Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment


D. Penetration testing can be carried out at anytime by anyone





C.
  Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment

Which three are key value points for Security Center?


A. Simplify Security Management


B. Decrease Storage Requirements


C. Increase Performance


D. Respond to Threats and Anomalies Faster


E. Gain Visibility to Drive Insights





A.
  Simplify Security Management

D.
  Respond to Threats and Anomalies Faster

E.
  Gain Visibility to Drive Insights

Within Data Mask a user wants to stop a configuration that is currently running. What dropdown option needs to be selected to terminate the execution


A. END


B. STOP


C. CANcEL


D. ABORT





B.
  STOP

Which filter operator is supported by Deterministic Encryption?


A. contains


B. like


C. equals


D. starts with





C.
  equals

Which activity is not recommended for internal support teams after MFA is enabled?


A. Adjusting policies that enable or disable MFA for Salesforce users


B. Helping users recover access if they've lost or forgotten their verification methods


C. Maintaining a supply of replacement security keys


D. Enabling MFA for new employees as part of the new hire onboarding process





A.
  Adjusting policies that enable or disable MFA for Salesforce users


Page 1 out of 11 Pages