Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Salesforce Security-and-Privacy-Accredited-Professional - Salesforce Security & Privacy Accredited Professional Exam

What are two benefits of conducting a user inventory prior to implementing MFA?

A.

Identify users who should be deactivated

B.

Identify logical groups of users for a phased rollout

C.

Identify users who don't have the correct permissions

D.

Identify admins and other privileged users

Which category is NOT covered by Security Center?

A.

Permissions

B.

Event Monitoring

C.

Authentication

D.

Configuration

What does the default Field Audit Trail policy in a production org state?

A.

Archive data after 12 months, store it for 5 years

B.

Archive data after 6 months, store it for 18 months

C.

Archive data after 18 months, store it for 10 years

D.

Archive data after 24 months, store it for 7 years

How frequently can a user gather encryption statistics?

A.

Once every month per objectOnce every 24 hours per object

B.

Once every hour per object

C.

Once every week per object

D.

Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via

Platform Encryption.

Which two federation or SSO protocols does Salesforce support?

A.

SCIMOpen

B.

ID Connect

C.

WS-Federation

D.

SAML

For products built on the Salesforce Platform, how is MFA enabled?

A.

On the Identity Verification page in Setup, select the Enable Multi-Factor Authentication checkbox

B.

Create a permission set that includes the "Multi-Factor Authentication for User Interface Logins'

permission, then apply the permission set to desired users

C.

GMFA is enabled by default, each user simply registers a verification method from their personal settings

D.

Click the Enable button in the Launch stage of the Multi-Factor Authentication Assistant

How does Salesforce protect your org from all other customer orgs on a multitenancy platform?

A.

Uses a unique identifier which is associated with user's session

B.

Restricts IP addresses users can log in from

C.

Uses only server authentication

D.

Leverages only classic encryption

What will the user see in the Salesforce user interface when they view a page that includes the field on it?

A.

The field label followed by a message indicating that the field value is encrypted

B.

The field label followed by the unencrypted field value

C.

The field label followed by eight asterisks

D.

The field label followed by 256 characters of cipher text

What is the primary difference between Data Mask and Data Encryption?

A.

Data encryption is used for masking data in a production environment

B.

Data encryption is an add on feature to the Data Mask product

C.

Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.

D.

Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text

Which two options are good ways to check Filter Criteria before running a Data Mask configuration?

A.

Click Query Preview in the Data Filter to preview your query in SOQL

B.

Test the query on workbench or dev console.

C.

Run an initial configuration from end to end without filtering

D.

Execute script in filtered view