Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Salesforce Security-and-Privacy-Accredited-Professional - Salesforce Security & Privacy Accredited Professional Exam

You need to limit when and where from users can access Salesforce- to help reduce the risks of unauthorized access. How should you go about this.

A.

Restrict Access based on Login IP Addresses but login hairs can't be set up in conjunction with this feature

B.

Use MFA to help ensure users are using a more secure login process

C.

Restrict Access based on Login IP Addresses and use the Login Hours feature together

D.

Do not allow users to access Salesforce from outside the office.

After installing, what tab in Privacy Center 360 does a user need to input their Heroku credentials during the setup process?

A.

Remote Site Settings

B.

Settings

C.

Setup

D.

Home

Which three options can be controlled through password policies in Salesforce?

A.

Password expiration

B.

Password complexity

C.

Password length

D.

Password with special characters

E.

Disallowed passwords

How often do Event Log Files capture activity?

A.

In near real-time

B.

Hourly and once every 24 hours

C.

Every 5 minutes

D.

Every 30 minutes

Which three MFA verification methods are supported by MuleSoft Anypoint Platform?

A.

SMS text messages

B.

Encryption Algorithm

C.

Built-in Authenticators

D.

Security Keys

E.

Salesforce Authenticator

What kind of threats can be detected by Event Monitoring Threat Detection?

A.

Session Hijacking, Credential Stuffing, Report Anomaly

B.

Cross Site Scripting, Phishing

C.

Login outside of IP Range, Failed Password Attempt

D.

Multiple login attempts, SQL injection

What are the two typical human emotions/reactions cyber criminals exploit to steal credentials and infiltrate your network?

A.

Curiosity

B.

Surprise

C.

Fear

D.

Rewards

What does Salesforce Data Mask do?

A.

Encrypt Salesforce Sandbox data

B.

Change the color scheme of metrics within a production org based on predetermined rules

C.

Anonymize data at rest within a production org

D.

Anonymize, delete, or pseudonymize sensitive Salesforce sandbox data

How do customers access Field Audit Trail data?

A.

Event Log Files

B.

Set-up Audit Trail

C.

Salesforce API

D.

Pre-built Tableau CRM app

If a user loses their verification method, what are three of the recommended steps an admin should take?

A.

Disconnect the lost verification method

B.

Generate a temporary verification code so the user can log in

C.

Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity

D.

Monitor the user's account activity for suspicious activity