Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Salesforce Security-and-Privacy-Accredited-Professional - Salesforce Security & Privacy Accredited Professional Exam

If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?

A.

Use field level security or field permissions

B.

Use object level security or object permissions

C.

Use Apex managed sharing

D.

Use record level security settings

For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?

A.

Identity Verification Methods report

B.

Login History page in Setup

C.

Multi-Factor Authentication Dashboard App

D.

Multi-Factor Authentication Assistant

E.

Custom list view of Users in Setup

Within Data Mask, which operators are available for the DATETIME field type when using the data filter?

A.

is prior to, is within, is after

B.

is before, is within, is after

C.

is before, is after, is between

D.

yesterday, today, a month ago

What settings can be controlled from the user's profile?

A.

Session time out, Welcome email template, Password complexity requirement

B.

Session time out, Password complexity requirement, Login IP Ranges, Login Hours

C.

Session time out, Enabled Custom Permissions, Email opt-in

D.

Session time out, Welcome email template, Password complexity requirement, Enabled Custom

How much Heroku data storage is included with Privacy Center?

A.

1.5 TB

B.

5TB

C.

1TB

D.

3TB

Which of the following is a blocker to rolling out MFA?

A.

Licensing for Transaction Security Policies

B.

Users refusing to install applications on their personal phones

C.

Shared accounts or credentials

D.

Licensing for Login Flows

Which technology enables an admin to query for data or write custom code when enforcing a security policy?

A.

An apex based Transaction Security Policy

B.

Process Builder

C.

Threat Detection

D.

Real-Time Events

Which three standard authentication protocols does Salesforce support to integrate external applications using APIs?

A.

OpenID Connect

B.

Single Sign On (SSO)

C.

OMFA

D.

Security Assertion Markup Language (SAML)

E.

OAuth

What is the type and length of the key used to encrypt data?

A.

AES-256

B.

AES-192

C.

3DES

D.

RSA-4096

Which method should an admin use to view the Security Center Metrics?

A.

Utilize the built-in dashboard and detail pages

B.

Use an analytics tool of your choosing

C.

Export to SEIM tool

D.

Make a call to the REST API