Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Security-and-Privacy-Accredited-Professional Exam Dumps - Salesforce Security & Privacy Accredited Professional Exam

Question # 4

What does Salesforce Data Mask do?

A.

Encrypt Salesforce Sandbox data

B.

Change the color scheme of metrics within a production org based on predetermined rules

C.

Anonymize data at rest within a production org

D.

Anonymize, delete, or pseudonymize sensitive Salesforce sandbox data

Full Access
Question # 5

Which activity is not recommended for internal support teams after MFA is enabled?

A.

Adjusting policies that enable or disable MFA for Salesforce users

B.

Helping users recover access if they've lost or forgotten their verification methods

C.

Maintaining a supply of replacement security keys

D.

Enabling MFA for new employees as part of the new hire onboarding process

Full Access
Question # 6

Which three options can be controlled through password policies in Salesforce?

A.

Password expiration

B.

Password complexity

C.

Password length

D.

Password with special characters

E.

Disallowed passwords

Full Access
Question # 7

After a user completes setup of a portability policy, what API needs to be run to compile the identified PII?

A.

SOAP API

B.

Metadata API

C.

REST API

D.

Portability API

Full Access
Question # 8

Which three objects is monitored by the Consent Event Stream (CES)?

A.

Lead

B.

Authorization Form Consent

C.

Case

D.

Contact

E.

Opportunity

Full Access
Question # 9

What are the actions that an admin can take with Transaction Security?

A.

Freeze User, End Session, require 2FA

B.

Obfuscate, Encrypt, de-identify

C.

Launch Workflow, Require Approval, Send SMS Text

D.

Block, Multi-Factor Authentication, and Notifications

Full Access
Question # 10

Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?

A.

Platform Events

B.

Event Monitoring Analytics App

C.

Event Manager

D.

Transaction Security

Full Access
Question # 11

When will a user select the "Unique' check box next to a field as part of their Data Mask configuration?

A.

If a user wants to mask with data generated using a defined pattern.

B.

When a user wants to prevent unintended reuse of library words or random characters

C.

Whenever a user needs to delete sensitive data entirely, leaving an empty data set

D.

When a user needs to specify a minimum and maximum value for the field.

Full Access
Question # 12

Within Data Mask, which operators are available for the DATETIME field type when using the data filter?

A.

is prior to, is within, is after

B.

is before, is within, is after

C.

is before, is after, is between

D.

yesterday, today, a month ago

Full Access
Question # 13

What is the type and length of the key used to encrypt data?

A.

AES-256

B.

AES-192

C.

3DES

D.

RSA-4096

Full Access
Question # 14

Which type of field allows tracking with Field Audit Trail?

A.

Last Modified By

B.

Formula

C.

Currency field

D.

Roll-Up Summary

Full Access
Question # 15

For products built on the Salesforce Platform, how is MFA enabled?

A.

On the Identity Verification page in Setup, select the Enable Multi-Factor Authentication checkbox

B.

Create a permission set that includes the "Multi-Factor Authentication for User Interface Logins'

permission, then apply the permission set to desired users

C.

GMFA is enabled by default, each user simply registers a verification method from their personal settings

D.

Click the Enable button in the Launch stage of the Multi-Factor Authentication Assistant

Full Access