The security department at AW Computing wants to prevent users from exporting more data than they need. Included in this request is limiting records containing sensitive information, such as bank accounts and Personal Identifiable Information (PII).
Which feature should an administrator recommend to help limit what data is exported?
Cloud Kicks (CK) has deployed several new custom apps that use Lightning Web components. The administrator is now concerned that they may need to make some adjustments to CK’s org to make it more secure.
Which tools should the administrator use to expose possible security risks within a Lightning web component?
The Cloud Kicks security team has seen an increase in unattended device attacks, where hackers can view sensitive information when users leave devices unlocked in public settings. The security team wants to ensure Salesforce data cannot be viewed after 10 minutes of inactivity.
What is the recommended security setting to configure?
The AW Computing administrator team does significant amounts of work around process automation and ensuring data integrity. When an administrator created a new validation rule in production, the development team complained that their deployment to production failed.
What should be implemented to prevent this conflict from happening?