Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Security-and-Privacy-Accredited-Professional Sample Questions Answers

Questions 4

If a user loses their verification method, what are three of the recommended steps an admin should take?

Options:

A.

Disconnect the lost verification method

B.

Generate a temporary verification code so the user can log in

C.

Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity

D.

Monitor the user's account activity for suspicious activity

Buy Now
Questions 5

When is data from a newly connected tenant updated in the Security Center App?

Options:

A.

Upon triggering the refresh

B.

During the next daily update

C.

Immediately

D.

When the API is called

Buy Now
Questions 6

Which type of field allows tracking with Field Audit Trail?

Options:

A.

Last Modified By

B.

Formula

C.

Currency field

D.

Roll-Up Summary

Buy Now
Questions 7

Within Data Mask, what is an example of a correct custom filter criteria that can be used in the data filter?

Options:

A.

1&& (2||3)

B.

1+(2+3)

C.

1&& (2 OR 3)

D.

1 & (2 OR 3)

E.

1 AND (2 OR 3)

Buy Now
Questions 8

Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?

Options:

A.

Platform Events

B.

Event Monitoring Analytics App

C.

Event Manager

D.

Transaction Security

Buy Now
Questions 9

What settings can be controlled from the user's profile?

Options:

A.

Session time out, Welcome email template, Password complexity requirement

B.

Session time out, Password complexity requirement, Login IP Ranges, Login Hours

C.

Session time out, Enabled Custom Permissions, Email opt-in

D.

Session time out, Welcome email template, Password complexity requirement, Enabled Custom

Buy Now
Questions 10

Which two options are good ways to check Filter Criteria before running a Data Mask configuration?

Options:

A.

Click Query Preview in the Data Filter to preview your query in SOQL

B.

Test the query on workbench or dev console.

C.

Run an initial configuration from end to end without filtering

D.

Execute script in filtered view

Buy Now
Questions 11

Where would the user go to connect a new tenant to the Security Center app?

Options:

A.

Setup/Manage Tenants

B.

Setup/Security Center

C.

Manage Security Tab

D.

Connected Tenants Tab

Buy Now
Questions 12

What is the difference between Classic Encryption and Platform Encryption?

Options:

A.

Classic Encryption encrypts standard fields

B.

Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields

C.

Platform Encryption is built on Classic Encryption

D.

Classic Encryption masks characters whereas Platform Encryption does not

Buy Now
Questions 13

By which method can Data Classification fields such as Compliance Categorization and Data

Options:

A.

Sensitivity Level be accessed?

B.

Field History Archive

C.

Bulk API

D.

Custom Metadata Types

E.

Apex

Buy Now
Questions 14

For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?

Options:

A.

Identity Verification Methods report

B.

Login History page in Setup

C.

Multi-Factor Authentication Dashboard App

D.

Multi-Factor Authentication Assistant

E.

Custom list view of Users in Setup

Buy Now
Questions 15

Which two federation or SSO protocols does Salesforce support?

Options:

A.

SCIMOpen

B.

ID Connect

C.

WS-Federation

D.

SAML

Buy Now
Questions 16

Which method should an admin use to view the Security Center Metrics?

Options:

A.

Utilize the built-in dashboard and detail pages

B.

Use an analytics tool of your choosing

C.

Export to SEIM tool

D.

Make a call to the REST API

Buy Now
Questions 17

What are three recommended change management activities to prepare users for MFA?

Options:

A.

Provide launch day support such as office hours or an onsite help desk

B.

Enable MFA for a test period to see what issues arise.

C.

Create onboarding materials on how to obtain, set up, and use verification methods to log in

D.

Communicate frequently about when MFA is coming and why it's important Send users a single announcement email, the day before MFA is enabled

Buy Now
Questions 18

If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?

Options:

A.

Use field level security or field permissions

B.

Use object level security or object permissions

C.

Use Apex managed sharing

D.

Use record level security settings

Buy Now
Questions 19

What are the two typical human emotions/reactions cyber criminals exploit to steal credentials and infiltrate your network?

Options:

A.

Curiosity

B.

Surprise

C.

Fear

D.

Rewards

Buy Now
Questions 20

Identify users who don't need MFA18. If the client wants to record the set up changes users are making to fields for a three years, how would the client achieve this with the standard product?

Options:

A.

Buy Shield as this provides features that can do this

B.

The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the changes out of Salesforce to another system

C.

The Setup Audit Trail is good for 5 years so can be used to record this as standard.

D.

Leverage Platform Encryption and enable the archive feature

Buy Now
Questions 21

What is an example of the principle of least privilege?

Options:

A.

Using single sign on

B.

Requiring unique passwords

C.

Prohibiting reuse of passwords on multiple accounts

D.

Limiting the number of users with admin rights

Buy Now
Questions 22

Within Data Mask, which operators are available for the DATETIME field type when using the data filter?

Options:

A.

is prior to, is within, is after

B.

is before, is within, is after

C.

is before, is after, is between

D.

yesterday, today, a month ago

Buy Now
Questions 23

Which Real-Time Events can be used with Transaction Security?

Options:

A.

ApiEvent, LoginEvent, MobileEmailEvent

B.

ApiEvent, ReportEvent, LoginEvent

C.

ApiEvent, LogoutEvent, UriEvent

D.

ApiEvent, LoginEvent, LightningURI Event

Buy Now
Questions 24

What are three tactics for ensuring the success of an MFA implementation?

Options:

A.

Train users on how to bypass MFA if they forget or lose their verification methods

B.

Defer MFA logins for new hires until they're comfortable working in Salesforce

C.

Watch for recurring login problems and changes to how many users are logging in

Collect and evaluate user feedback

D.

Have a clear and easy access recovery process for users who forget or lose their verification method

Buy Now
Questions 25

After a user completes setup of a portability policy, what API needs to be run to compile the identified PII?

Options:

A.

SOAP API

B.

Metadata API

C.

REST API

D.

Portability API

Buy Now
Questions 26

MFA is enabled at which level for Marketing Cloud-Email Studio, Mobile Studio, and Journey Builder?

Options:

A.

User level

B.

Top-level account

C.

Role level

D.

Business unit level

Buy Now
Questions 27

How frequently can a user gather encryption statistics?

Options:

A.

Once every month per objectOnce every 24 hours per object

B.

Once every hour per object

C.

Once every week per object

D.

Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via

Platform Encryption.

Buy Now
Questions 28

What does encryption statistics display to users?

Options:

A.

Percentage of records encrypted

B.

Percentage of records failing encryption check

C.

Number of records created since last sync job was run

D.

Number of times encrypted data was accessed by user

Buy Now
Questions 29

How long are EventLogFile objects stored for?

Options:

A.

6 months

B.

30 days

C.

1 year

D.

1 week

Buy Now
Questions 30

What is the correct order of precedence of strong verification methods for MFA logins?

Options:

A.

Salesforce Authenticator, Third-party TOTP authenticator apps, Security keys

B.

Security keys, Salesforce Authenticator, Third-party TOTP authenticator apps

C.

Third-party TOTP authenticator apps, Security keys, Salesforce Authenticator

D.

Salesforce Authenticator, Security keys, Third-party TOTP authenticator apps

Buy Now
Questions 31

How do customers access Field Audit Trail data?

Options:

A.

Event Log Files

B.

Set-up Audit Trail

C.

Salesforce API

D.

Pre-built Tableau CRM app

Buy Now
Exam Code: Security-and-Privacy-Accredited-Professional
Exam Name: Salesforce Security & Privacy Accredited Professional Exam
Last Update: Dec 3, 2024
Questions: 106
$66  $164.99
$50  $124.99
$42  $104.99
buy now Security-and-Privacy-Accredited-Professional