If a user loses their verification method, what are three of the recommended steps an admin should take?
Within Data Mask, what is an example of a correct custom filter criteria that can be used in the data filter?
Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?
Which two options are good ways to check Filter Criteria before running a Data Mask configuration?
By which method can Data Classification fields such as Compliance Categorization and Data
For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?
What are three recommended change management activities to prepare users for MFA?
If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?
What are the two typical human emotions/reactions cyber criminals exploit to steal credentials and infiltrate your network?
Identify users who don't need MFA18. If the client wants to record the set up changes users are making to fields for a three years, how would the client achieve this with the standard product?
Within Data Mask, which operators are available for the DATETIME field type when using the data filter?
After a user completes setup of a portability policy, what API needs to be run to compile the identified PII?
MFA is enabled at which level for Marketing Cloud-Email Studio, Mobile Studio, and Journey Builder?
What is the correct order of precedence of strong verification methods for MFA logins?