Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Salesforce Security-and-Privacy-Accredited-Professional Dumps

Salesforce Security & Privacy Accredited Professional Exam Questions and Answers

Question 1

10. Can a customer run a penetration test against Salesforce?

Options:

A.

Some types of penetration testing are permitted, but not in production

B.

No, this is not permitted under any circumstances

C.

Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment

D.

Penetration testing can be carried out at anytime by anyone

Question 2

What is the type and length of the key used to encrypt data?

Options:

A.

AES-256

B.

AES-192

C.

3DES

D.

RSA-4096

Question 3

Which three capabilities are part of the Health Check tool?

Options:

A.

Align your org's security setting with Salesforce-recommended security standards

B.

Identify and fix vulnerabilities in your security settings

Organize user access logs

C.

Access event log files to track user activity and feature adoption and troubleshoot issues

D.

Verify that multiple Salesforce applications have the same level of security

Question 4

How does Salesforce protect your org from all other customer orgs on a multitenancy platform?

Options:

A.

Uses a unique identifier which is associated with user's session

B.

Restricts IP addresses users can log in from

C.

Uses only server authentication

D.

Leverages only classic encryption

Question 5

When is data from a newly connected tenant updated in the Security Center App?

Options:

A.

Upon triggering the refresh

B.

During the next daily update

C.

Immediately

D.

When the API is called

Question 6

For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?

Options:

A.

Identity Verification Methods report

B.

Login History page in Setup

C.

Multi-Factor Authentication Dashboard App

D.

Multi-Factor Authentication Assistant

E.

Custom list view of Users in Setup

Question 7

How long are EventLogFile objects stored for?

Options:

A.

6 months

B.

30 days

C.

1 year

D.

1 week

Question 8

Which three standard authentication protocols does Salesforce support to integrate external applications using APIs?

Options:

A.

OpenID Connect

B.

Single Sign On (SSO)

C.

OMFA

D.

Security Assertion Markup Language (SAML)

E.

OAuth

Question 9

Which two technologies are used to stream and store real-time event monitoring data?

Options:

A.

Platform Events and Big Objects

B.

Platform Events and Standard Objects

C.

Web Sockets and PostgreSQL

D.

CDC Events and Custom Objects

Question 10

Which metric view holds information on the 'Password Never Expires' setting?

Options:

A.

Permission Metrics

B.

Configuration Metrics

C.

Authentication Metrics

D.

User and Profile Metrics

Question 11

Other than IdentityVerificationEvent and LoginEvent, Real-Time Events are stored for how long when enabled for storage

Options:

A.

One year

B.

Thirty days

C.

six months

D.

Three months

Question 12

If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?

Options:

A.

Use field level security or field permissions

B.

Use object level security or object permissions

C.

Use Apex managed sharing

D.

Use record level security settings

Question 13

If the client wants to record the set up changes users are making to fields for a three years, how

would the client achieve this with the standard product?

Options:

A.

The Setup Audit Trail is good for 5 years so can be used to record this as standard.

B.

Leverage Platform Encryption and enable the archive feature

C.

Buy Shield as this provides features that can do this

D.

The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the

changes out of Salesforce to another system.

Question 14

MFA is enabled at which level for Marketing Cloud-Email Studio, Mobile Studio, and Journey Builder?

Options:

A.

User level

B.

Top-level account

C.

Role level

D.

Business unit level

Question 15

Which method should an admin use to view the Security Center Metrics?

Options:

A.

Utilize the built-in dashboard and detail pages

B.

Use an analytics tool of your choosing

C.

Export to SEIM tool

D.

Make a call to the REST API