What does Salesforce Data Mask do?
A. Encrypt Salesforce Sandbox data
B. Change the color scheme of metrics within a production org based on predetermined rules
C. Anonymize data at rest within a production org
D. Anonymize, delete, or pseudonymize sensitive Salesforce sandbox data
A customer needs to track field history for more than 20 fields per object? How should the consultant advise them to proceed?
A. Purchase additional storage capacity to unlock additional field history tracking.
B. Purchase the Field Audit Trail add-on feature.
C. Purchase additional field history tracking capacity in blocks of 20 fields.
D. Enable and save field history tracking settings on the 21st field to automatically add additional field history tracking capacity to the org.
How does a user schedule automated runs for a policy?
A. Execute an APEX script in the Developer Console
B. Set email notifications in Salesforce for when to run a Policy
C. Scheduling of automated executions is not an included feature
D. Under Run Frequency, indicate how often you want the policy to run.
What settings can be controlled from the user's profile?
A. Session time out, Welcome email template, Password complexity requirement
B. Session time out, Password complexity requirement, Login IP Ranges, Login Hours
C. Session time out, Enabled Custom Permissions, Email opt-in
D. Session time out, Welcome email template, Password complexity requirement, Enabled Custom
How often do Event Log Files capture activity?
A. In near real-time
B. Hourly and once every 24 hours
C. Every 5 minutes
D. Every 30 minutes
Which two federation or SSO protocols does Salesforce support?
A. SCIMOpen
B. ID Connect
C. WS-Federation
D. SAML
Identify users who don't need MFA18. If the client wants to record the set up changes users are making to fields for a three years, how would the client achieve this with the standard product?
A. Buy Shield as this provides features that can do this
B. The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the changes out of Salesforce to another system
C. The Setup Audit Trail is good for 5 years so can be used to record this as standard.
D. Leverage Platform Encryption and enable the archive feature
What are the two typical human emotions/reactions cyber criminals exploit to steal credentials and infiltrate your network?
A. Curiosity
B. Surprise
C. Fear
D. Rewards
How frequently can a user gather encryption statistics?
A. Once every month per objectOnce every 24 hours per object
B. Once every hour per object
C. Once every week per object
D. Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via Platform Encryption.
What are two ways customers can satisfy the MFA requirement that goes into effect on February 1, 2022?
A. Enable MFA for all users who log in through a Salesforce product's user interface
B. Enable MFA for all admins who log in through a Salesforce product's user interface
C. Enable MFA for your single sign-on identity provider and ensure all Salesforce users log in via SSO
D. Enable delegated authentication for all products built on the Salesforce Platform
Page 4 out of 11 Pages |
Previous |