ExamGecko
Home Home / Salesforce / Certified Security and Privacy Accredited Professional

Salesforce Certified Security and Privacy Accredited Professional Practice Test - Questions Answers, Page 10

Question list
Search
Search

What happens to metrics in the parent tenant when a child tenant is disconnected?

A.
The data is retained in the parent tenant, but not viewable in the app.
A.
The data is retained in the parent tenant, but not viewable in the app.
Answers
B.
Metrics for the tenant are deleted immediately.
B.
Metrics for the tenant are deleted immediately.
Answers
C.
Metrics for the tenant are deleted during the next update.
C.
Metrics for the tenant are deleted during the next update.
Answers
D.
The user may see incomplete data in the app
D.
The user may see incomplete data in the app
Answers
Suggested answer: A

Which category is NOT covered by Security Center?

A.
Permissions
A.
Permissions
Answers
B.
Event Monitoring
B.
Event Monitoring
Answers
C.
Authentication
C.
Authentication
Answers
D.
Configuration
D.
Configuration
Answers
Suggested answer: B

What are two benefits of conducting a user inventory prior to implementing MFA?

A.
Identify users who should be deactivated
A.
Identify users who should be deactivated
Answers
B.
Identify logical groups of users for a phased rollout
B.
Identify logical groups of users for a phased rollout
Answers
C.
Identify users who don't have the correct permissions
C.
Identify users who don't have the correct permissions
Answers
D.
Identify admins and other privileged users
D.
Identify admins and other privileged users
Answers
Suggested answer: B, D

Identify users who don't need MFA18. If the client wants to record the set up changes users are making to fields for a three years, how would the client achieve this with the standard product?

A.
Buy Shield as this provides features that can do this
A.
Buy Shield as this provides features that can do this
Answers
B.
The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the changes out of Salesforce to another system
B.
The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the changes out of Salesforce to another system
Answers
C.
The Setup Audit Trail is good for 5 years so can be used to record this as standard.
C.
The Setup Audit Trail is good for 5 years so can be used to record this as standard.
Answers
D.
Leverage Platform Encryption and enable the archive feature
D.
Leverage Platform Encryption and enable the archive feature
Answers
Suggested answer: B

Which three options can be controlled through password policies in Salesforce?

A.
Password expiration
A.
Password expiration
Answers
B.
Password complexity
B.
Password complexity
Answers
C.
Password length
C.
Password length
Answers
D.
Password with special characters
D.
Password with special characters
Answers
E.
Disallowed passwords
E.
Disallowed passwords
Answers
Suggested answer: A, B, C

What are three implementation activities that should happen prior to enabling MFA for users?

A.
Document processes and troubleshooting information
A.
Document processes and troubleshooting information
Answers
B.
Enable the Salesforce Authenticator app for the org/tenant
B.
Enable the Salesforce Authenticator app for the org/tenant
Answers
C.
Create the Identity Verification Methods reportTest registration and login flows for each supported verification method
C.
Create the Identity Verification Methods reportTest registration and login flows for each supported verification method
Answers
D.
Distribute verification methods and registration instructions to users
D.
Distribute verification methods and registration instructions to users
Answers
Suggested answer: A, B, D

What do Right to be Forgotten policies automate?

A.
How to compile and send PII to customers.
A.
How to compile and send PII to customers.
Answers
B.
How PII is anonymized
B.
How PII is anonymized
Answers
C.
How and when PII is deleted.
C.
How and when PII is deleted.
Answers
D.
How PII is stored and archived
D.
How PII is stored and archived
Answers
Suggested answer: C

How does a user schedule automated runs for a policy?

A.
Execute an APEX script in the Developer Console
A.
Execute an APEX script in the Developer Console
Answers
B.
Set email notifications in Salesforce for when to run a Policy
B.
Set email notifications in Salesforce for when to run a Policy
Answers
C.
Scheduling of automated executions is not an included feature
C.
Scheduling of automated executions is not an included feature
Answers
D.
Under Run Frequency, indicate how often you want the policy to run.
D.
Under Run Frequency, indicate how often you want the policy to run.
Answers
Suggested answer: D

A customer prefers to generate an encryption key for Salesforce to use. They prefer to generate it manually, once a year.

What key management capability should the admin advise them to use?

A.
Export the tenant secret
A.
Export the tenant secret
Answers
B.
Implement a custom Apex key generation class
B.
Implement a custom Apex key generation class
Answers
C.
Bring your own key, plus opt-out of key derivation
C.
Bring your own key, plus opt-out of key derivation
Answers
D.
Upload your own tenant secret
D.
Upload your own tenant secret
Answers
Suggested answer: A

How often do Event Log Files capture activity?

A.
In near real-time
A.
In near real-time
Answers
B.
Hourly and once every 24 hours
B.
Hourly and once every 24 hours
Answers
C.
Every 5 minutes
C.
Every 5 minutes
Answers
D.
Every 30 minutes
D.
Every 30 minutes
Answers
Suggested answer: B
Total 108 questions
Go to page: of 11