Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Security-and-Privacy-Accredited-Professional Questions and Answers

Question # 6

Which three objects is monitored by the Consent Event Stream (CES)?

A.

Lead

B.

Authorization Form Consent

C.

Case

D.

Contact

E.

Opportunity

Full Access
Question # 7

What two selections are available at the field level when building policies to manage data subject rights

A.

Refresh

B.

Delete

C.

Retain

D.

Insert

Full Access
Question # 8

What three are driving factors for Data Mask completion time?

A.

Number of fields being masked

B.

The amount of data in the fields

C.

A valid distractor

D.

The time of day a config is run

E.

Type of masking rules selected

Full Access
Question # 9

What format can Event Log Files be downloaded via API?

A.

XML

B.

serialized

C.

JSON

D.

CSV

Full Access
Question # 10

Which method should an admin use to view the Security Center Metrics?

A.

Utilize the built-in dashboard and detail pages

B.

Use an analytics tool of your choosing

C.

Export to SEIM tool

D.

Make a call to the REST API

Full Access
Question # 11

What two things occur if Platform Encryption is later enabled on fields that are enabled for Field Audit Trail?

A.

Customers must run encryption sync again to encrypt the previously stored data for these fields

B.

All data for these fields will be automatically encrypted

C.

Data that was stored prior to encryption enablement can be encrypted via a support case

D.

Only new data in these fields will be encrypted

Full Access
Question # 12

Which Real-Time Events can be used with Transaction Security?

A.

ApiEvent, LoginEvent, MobileEmailEvent

B.

ApiEvent, ReportEvent, LoginEvent

C.

ApiEvent, LogoutEvent, UriEvent

D.

ApiEvent, LoginEvent, LightningURI Event

Full Access
Question # 13

When is it necessary to set an object configuration to "Run in Serial Mode"?Each time a configuration needs to be run more than one time

A.

For each custom object that is part of the configuration

B.

To mask objects that have multiple records with master detail or lookup relationships to the same re

C.

When a user needs to replace sensitive data with a random number

Full Access
Question # 14

Why do admins need Shield Platform Encryption?

A.

To protect data from external hackers

B.

To meet regulatory compliance mandates

C.

To mask sensitive data on UI and API

D.

To encrypt ALL data Salesforce does not allow email or SMS text messages as verification methods for MFA.

Full Access
Question # 15

Salesforce does not allow email or SMS text messages as verification methods for MFA. Which two reasons explain this? (2 options)

A.

Entering codes from text messages is error-prone

B.

Mobile devices can be lost or broken

C.

Email account credentials can be compromised

D.

SIM cards can be hacked

Full Access