ExamGecko
Question list
Search
Search

Related questions











Question 191 - Certified Health Cloud Accredited Professional discussion

Report
Export

A customer compliance department requires encryption at rest, notification of activities, and extensive field tracking. What are some key considerations and recommended practices for supporting compliance in Salesforce?

A.
Use Role Hierarchy to control data access, implement password policies for user accounts, and use IP Restrictions to limit access to trusted ^ networks
Answers
A.
Use Role Hierarchy to control data access, implement password policies for user accounts, and use IP Restrictions to limit access to trusted ^ networks
B.
Enable Salesforce Shield to monitor data access and usage, configure Data Classification for sensitive data, and use Event Monitoring to track user activity.
Answers
B.
Enable Salesforce Shield to monitor data access and usage, configure Data Classification for sensitive data, and use Event Monitoring to track user activity.
C.
Enable Field Audit Trail, implement encryption for sensitive data, and configure two-factor authentication for all users.
Answers
C.
Enable Field Audit Trail, implement encryption for sensitive data, and configure two-factor authentication for all users.
D.
Use the Salesforce Security Health Check to identify vulnerabilities, implement custom profiles and permission sets to control data access, and configure Data Loss Prevention policies to prevent data leakage.
Answers
D.
Use the Salesforce Security Health Check to identify vulnerabilities, implement custom profiles and permission sets to control data access, and configure Data Loss Prevention policies to prevent data leakage.
Suggested answer: C

Explanation:

C is correct because enabling Field Audit Trail, implementing encryption for sensitive data, and configuring two-factor authentication for all users are some key considerations and recommended practices for supporting compliance in Salesforce. Field Audit Trail helps to track data changes and retain data history for up to 10 years. Encryption helps to protect data at rest from unauthorized access or theft. Two-factor authentication helps to strengthen user login security and prevent account compromise.

asked 23/09/2024
HWANG SEON TAE
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first