New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Security-and-Privacy-Accredited-Professional Exam Dumps - Salesforce Security & Privacy Accredited Professional Exam

Go to page:
Question # 9

What are the actions that an admin can take with Transaction Security?

A.

Freeze User, End Session, require 2FA

B.

Obfuscate, Encrypt, de-identify

C.

Launch Workflow, Require Approval, Send SMS Text

D.

Block, Multi-Factor Authentication, and Notifications

Full Access
Question # 10

Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?

A.

Platform Events

B.

Event Monitoring Analytics App

C.

Event Manager

D.

Transaction Security

Full Access
Question # 11

When will a user select the "Unique' check box next to a field as part of their Data Mask configuration?

A.

If a user wants to mask with data generated using a defined pattern.

B.

When a user wants to prevent unintended reuse of library words or random characters

C.

Whenever a user needs to delete sensitive data entirely, leaving an empty data set

D.

When a user needs to specify a minimum and maximum value for the field.

Full Access
Question # 12

Within Data Mask, which operators are available for the DATETIME field type when using the data filter?

A.

is prior to, is within, is after

B.

is before, is within, is after

C.

is before, is after, is between

D.

yesterday, today, a month ago

Full Access
Question # 13

What is the type and length of the key used to encrypt data?

A.

AES-256

B.

AES-192

C.

3DES

D.

RSA-4096

Full Access
Question # 14

Which type of field allows tracking with Field Audit Trail?

A.

Last Modified By

B.

Formula

C.

Currency field

D.

Roll-Up Summary

Full Access
Question # 15

For products built on the Salesforce Platform, how is MFA enabled?

A.

On the Identity Verification page in Setup, select the Enable Multi-Factor Authentication checkbox

B.

Create a permission set that includes the "Multi-Factor Authentication for User Interface Logins'

permission, then apply the permission set to desired users

C.

GMFA is enabled by default, each user simply registers a verification method from their personal settings

D.

Click the Enable button in the Launch stage of the Multi-Factor Authentication Assistant

Full Access
Go to page: