Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Salesforce Security-and-Privacy-Accredited-Professional Dumps

Salesforce Security & Privacy Accredited Professional Exam Questions and Answers

Question 1

Which two options are available for masking data outside of objects and fields?

Options:

A.

Update Contacts

B.

Anonymize Case Comments

C.

Query All Entries

D.

Delete All Emails

Question 2

Which activity is not recommended for internal support teams after MFA is enabled?

Options:

A.

Adjusting policies that enable or disable MFA for Salesforce users

B.

Helping users recover access if they've lost or forgotten their verification methods

C.

Maintaining a supply of replacement security keys

D.

Enabling MFA for new employees as part of the new hire onboarding process

Question 3

You need to limit when and where from users can access Salesforce- to help reduce the risks of unauthorized access. How should you go about this.

Options:

A.

Restrict Access based on Login IP Addresses but login hairs can't be set up in conjunction with this feature

B.

Use MFA to help ensure users are using a more secure login process

C.

Restrict Access based on Login IP Addresses and use the Login Hours feature together

D.

Do not allow users to access Salesforce from outside the office.

Question 4

How does a user reverse the masking of data once the process has completed?

Options:

A.

Data Mask retains any historical data that can be retrieved by an admin

B.

The masking of data is an irreversible process

C.

Data Mask takes snapshots of prior versions of sandbox data that can be viewed

D.

Utilize the "Unmask' feature

Question 5

Within Data Mask a user wants to stop a configuration that is currently running. What dropdown option needs to be selected to terminate the execution

Options:

A.

END

B.

STOP

C.

CANcEL

D.

ABORT

Question 6

How do customers access Field Audit Trail data?

Options:

A.

Set-up Audit Trail

B.

Salesforce API

C.

Pre-built Tableau CRM app

D.

Event Log Files

Question 7

What do Right to be Forgotten policies automate?

Options:

A.

How to compile and send PII to customers.

B.

How PII is anonymized

C.

How and when PII is deleted.

D.

How PII is stored and archived

Question 8

How does a user schedule automated runs for a policy?

Options:

A.

Execute an APEX script in the Developer Console

B.

Set email notifications in Salesforce for when to run a Policy

C.

Scheduling of automated executions is not an included feature

D.

Under Run Frequency, indicate how often you want the policy to run.

Question 9

Which two options are available for masking data outside of objects and fields?

Options:

A.

Anonymize Case Comments

B.

Update Contacts

C.

Query All Entries

D.

Delete All Emails

Question 10

What consideration should be made when connecting Salesforce orgs hosted in different data centers?

Options:

A.

Data Residency

B.

Fallover

C.

IP restrictions

D.

Scalability

Question 11

When enabled for streaming, Real-Time Events are published where?

Options:

A.

To the EventMonitoring subscription channel

B.

To independent custom object streams

C.

To independent event subscription channels

D.

To independent Big Objects

Question 12

What will the user see in the Salesforce user interface when they view a page that includes the field on it?

Options:

A.

The field label followed by a message indicating that the field value is encrypted

B.

The field label followed by the unencrypted field value

C.

The field label followed by eight asterisks

D.

The field label followed by 256 characters of cipher text

Question 13

What user permission is required to view Security Center pages and manage app configurations?

Options:

A.

Customize Application

B.

Manage Security Center

C.

View All Data

D.

Modify All Data

Question 14

What happens to metrics in the parent tenant when a child tenant is disconnected?

Options:

A.

The data is retained in the parent tenant, but not viewable in the app.

B.

Metrics for the tenant are deleted immediately.

C.

Metrics for the tenant are deleted during the next update.

D.

The user may see incomplete data in the app

Question 15

How often do Event Log Files capture activity?

Options:

A.

In near real-time

B.

Hourly and once every 24 hours

C.

Every 5 minutes

D.

Every 30 minutes

Page: 1 / 11
Total 106 questions