ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 124 - Certified Data Architect discussion

Report
Export

A customer is operating in a highly reputated industry and is planning to implement SF. The customer information maintained in SF, includes the following:

Personally, identifiable information (PII)

IP restrictions on profiles organized by Geographic location

Financial records that need to be private and accessible only by the assigned Sales associate.

User should not be allowed to export information from Salesforce.

Enterprise security has mandate access to be restricted to users within a specific geography and detail monitoring of user activity. Which 3 Salesforce shield capabilities should a data architect recommend? Choose 3 answers:

A.
Event monitoring to monitor all user activities
Answers
A.
Event monitoring to monitor all user activities
B.
Restrict access to SF from users outside specific geography
Answers
B.
Restrict access to SF from users outside specific geography
C.
Prevent Sales users access to customer PII information
Answers
C.
Prevent Sales users access to customer PII information
D.
Transaction security policies to prevent export of SF Data.
Answers
D.
Transaction security policies to prevent export of SF Data.
E.
Encrypt Sensitive Customer information maintained in SF.
Answers
E.
Encrypt Sensitive Customer information maintained in SF.
Suggested answer: B, D, E

Explanation:

The best Salesforce Shield capabilities for the customer are to restrict access to SF from users outside specific geography, implement transaction security policies to prevent export of SF data, and encrypt sensitive customer information maintained in SF. Salesforce Shield is a set of security features that help protect enterprise data on the Salesforce platform. It includes three components: Event Monitoring, Platform Encryption, and Field Audit Trail. Restricting access to SF from users outside specific geography can be done using network-based security features, such as IP whitelisting or VPN. Transaction security policies can be used to define actions or notifications based on user behavior patterns, such as exporting data or logging in from an unknown device. Platform Encryption can be used to encrypt data at rest using a tenant secret key that is controlled by the customer.

asked 23/09/2024
justen layne
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first