Which three objects is monitored by the Consent Event Stream (CES)?
A. Lead
B. Authorization Form Consent
C. Case
D. Contact
E. Opportunity
Which three MFA verification methods are supported by MuleSoft Anypoint Platform?
A. SMS text messages
B. Encryption Algorithm
C. Built-in Authenticators
D. Security Keys
E. Salesforce Authenticator
How often are Security Center metrics updated?
A. Daily
B. Weekly
C. Hourly
D. Every 30 days
User in one of the monitored orgs has been granted the 'Modify All Data' permission.
Where can the consultant see how the permission was granted?
A. View the Configuration Metrics detail page.
B. View the detail page of the 'View All Data' metric, and check the Context column on the change for the user.
C. See the Permissions dashboard.
D. View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.
Which method should an admin use to view the Security Center Metrics?
A. Utilize the built-in dashboard and detail pages
B. Use an analytics tool of your choosing
C. Export to SEIM tool
D. Make a call to the REST API
What format can Event Log Files be downloaded via API?
A. XML
B. serialized
C. JSON
D. CSV
What three are driving factors for Data Mask completion time?
A. Number of fields being masked
B. The amount of data in the fields
C. A valid distractor
D. The time of day a config is run
E. Type of masking rules selected
Which two regulations are important to follow for many companies collecting and processing their customers' data?
A. California Consumer Privacy Act (CCA), United States
B. Personal Electronic Documents Act (PEDA), Canada
C. General Data Protection Regulation (GDPR), European Union
D. California Corporate Privacy Regulation (CCPR), European Union
What is an implication of connecting or disconnecting a tenant during the update period?
A. All previous metrics are erased
B. This can cause partial data to load
C. Data will not be loaded until the following day
D. An error message will display to the user
What two things occur if Platform Encryption is later enabled on fields that are enabled for Field Audit Trail?
A. Customers must run encryption sync again to encrypt the previously stored data for these fields
B. All data for these fields will be automatically encrypted
C. Data that was stored prior to encryption enablement can be encrypted via a support case
D. Only new data in these fields will be encrypted
Page 3 out of 11 Pages |
Previous |