Security-and-Privacy-Accredited-Professional Exam Questions

Total 104 Questions


Last Updated On : 16-Jan-2025

Which three objects is monitored by the Consent Event Stream (CES)?


A. Lead


B. Authorization Form Consent


C. Case


D. Contact


E. Opportunity





A.
  Lead

B.
  Authorization Form Consent

D.
  Contact

Which three MFA verification methods are supported by MuleSoft Anypoint Platform?


A. SMS text messages


B. Encryption Algorithm


C. Built-in Authenticators


D. Security Keys


E. Salesforce Authenticator





C.
  Built-in Authenticators

D.
  Security Keys

E.
  Salesforce Authenticator

How often are Security Center metrics updated?


A. Daily


B. Weekly


C. Hourly


D. Every 30 days





A.
  Daily

User in one of the monitored orgs has been granted the 'Modify All Data' permission.
Where can the consultant see how the permission was granted?


A. View the Configuration Metrics detail page.


B. View the detail page of the 'View All Data' metric, and check the Context column on the change for the user.


C. See the Permissions dashboard.


D. View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.





D.
  View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.

Which method should an admin use to view the Security Center Metrics?


A. Utilize the built-in dashboard and detail pages


B. Use an analytics tool of your choosing


C. Export to SEIM tool


D. Make a call to the REST API





A.
  Utilize the built-in dashboard and detail pages

What format can Event Log Files be downloaded via API?


A. XML


B. serialized


C. JSON


D. CSV





D.
  CSV

What three are driving factors for Data Mask completion time?


A. Number of fields being masked


B. The amount of data in the fields


C. A valid distractor


D. The time of day a config is run


E. Type of masking rules selected





A.
  Number of fields being masked

B.
  The amount of data in the fields

E.
  Type of masking rules selected

Which two regulations are important to follow for many companies collecting and processing their customers' data?


A. California Consumer Privacy Act (CCA), United States


B. Personal Electronic Documents Act (PEDA), Canada


C. General Data Protection Regulation (GDPR), European Union


D. California Corporate Privacy Regulation (CCPR), European Union





A.
  California Consumer Privacy Act (CCA), United States

C.
  General Data Protection Regulation (GDPR), European Union

What is an implication of connecting or disconnecting a tenant during the update period?


A. All previous metrics are erased


B. This can cause partial data to load


C. Data will not be loaded until the following day


D. An error message will display to the user





B.
  This can cause partial data to load

What two things occur if Platform Encryption is later enabled on fields that are enabled for Field Audit Trail?


A. Customers must run encryption sync again to encrypt the previously stored data for these fields


B. All data for these fields will be automatically encrypted


C. Data that was stored prior to encryption enablement can be encrypted via a support case


D. Only new data in these fields will be encrypted





A.
  Customers must run encryption sync again to encrypt the previously stored data for these fields


Page 3 out of 11 Pages
Previous