ExamGecko
Home Home / Salesforce / Certified Security and Privacy Accredited Professional

Salesforce Certified Security and Privacy Accredited Professional Practice Test - Questions Answers, Page 5

Question list
Search
Search

Why do admins need Shield Platform Encryption?

A.
To protect data from external hackers
A.
To protect data from external hackers
Answers
B.
To meet regulatory compliance mandates
B.
To meet regulatory compliance mandates
Answers
C.
To mask sensitive data on UI and API
C.
To mask sensitive data on UI and API
Answers
D.
To encrypt ALL data Salesforce does not allow email or SMS text messages as verification methods for MFA.
D.
To encrypt ALL data Salesforce does not allow email or SMS text messages as verification methods for MFA.
Answers
Suggested answer: C

Which two reasons explain this?

A.
Entering codes from text messages is error-prone
A.
Entering codes from text messages is error-prone
Answers
B.
Mobile devices can be lost or broken
B.
Mobile devices can be lost or broken
Answers
C.
Email account credentials can be compromised
C.
Email account credentials can be compromised
Answers
D.
SIM cards can be hacked
D.
SIM cards can be hacked
Answers
Suggested answer: A, C

What is the difference between Classic Encryption and Platform Encryption?

A.
Classic Encryption encrypts standard fields
A.
Classic Encryption encrypts standard fields
Answers
B.
Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields
B.
Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields
Answers
C.
Platform Encryption is built on Classic Encryption
C.
Platform Encryption is built on Classic Encryption
Answers
D.
Classic Encryption masks characters whereas Platform Encryption does not
D.
Classic Encryption masks characters whereas Platform Encryption does not
Answers
Suggested answer: D

What is the primary difference between Data Mask and Data Encryption?

A.
Data encryption is used for masking data in a production environment
A.
Data encryption is used for masking data in a production environment
Answers
B.
Data encryption is an add on feature to the Data Mask product
B.
Data encryption is an add on feature to the Data Mask product
Answers
C.
Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.
C.
Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.
Answers
D.
Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text
D.
Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text
Answers
Suggested answer: C

Which of the following is a blocker to rolling out MFA?

A.
Licensing for Transaction Security Policies
A.
Licensing for Transaction Security Policies
Answers
B.
Users refusing to install applications on their personal phones
B.
Users refusing to install applications on their personal phones
Answers
C.
Shared accounts or credentials
C.
Shared accounts or credentials
Answers
D.
Licensing for Login Flows
D.
Licensing for Login Flows
Answers
Suggested answer: C

How do triggers and process automations deactivate before running a Data Mask configuration?

A.
Triggers and process automation do not need to be deactivated to run a configuration
A.
Triggers and process automation do not need to be deactivated to run a configuration
Answers
B.
User will manually deactivate all automated actions before running a configuration
B.
User will manually deactivate all automated actions before running a configuration
Answers
C.
User will need to run a script in the developer console to deactivate any automated processes
C.
User will need to run a script in the developer console to deactivate any automated processes
Answers
D.
While running a configuration, Data Mask will automatically disable triggers and process automation before the masking begins
D.
While running a configuration, Data Mask will automatically disable triggers and process automation before the masking begins
Answers
Suggested answer: D

When is it necessary to set an object configuration to "Run in Serial Mode"?

A.
To mask objects that have multiple records with master detail or lookup relationships to the same record
A.
To mask objects that have multiple records with master detail or lookup relationships to the same record
Answers
B.
For each custom object that is part of the configuration
B.
For each custom object that is part of the configuration
Answers
C.
Each time a configuration needs to be run more than one time
C.
Each time a configuration needs to be run more than one time
Answers
D.
When a user needs to replace sensitive data with a random number
D.
When a user needs to replace sensitive data with a random number
Answers
Suggested answer: A

Which technology enables an admin to query for data or write custom code when enforcing a security policy?

A.
An apex based Transaction Security Policy
A.
An apex based Transaction Security Policy
Answers
B.
Process Builder
B.
Process Builder
Answers
C.
Threat Detection
C.
Threat Detection
Answers
D.
Real-Time Events
D.
Real-Time Events
Answers
Suggested answer: A

What three are driving factors for Data Mask completion time?

A.
Number of fields being masked
A.
Number of fields being masked
Answers
B.
The amount of data in the fields
B.
The amount of data in the fields
Answers
C.
A valid distractor
C.
A valid distractor
Answers
D.
The time of day a config is run
D.
The time of day a config is run
Answers
E.
Type of masking rules selected
E.
Type of masking rules selected
Answers
Suggested answer: A, B, E

When will a user select the "Unique' check box next to a field as part of their Data Mask configuration?

A.
If a user wants to mask with data generated using a defined pattern.
A.
If a user wants to mask with data generated using a defined pattern.
Answers
B.
When a user wants to prevent unintended reuse of library words or random characters
B.
When a user wants to prevent unintended reuse of library words or random characters
Answers
C.
Whenever a user needs to delete sensitive data entirely, leaving an empty data set
C.
Whenever a user needs to delete sensitive data entirely, leaving an empty data set
Answers
D.
When a user needs to specify a minimum and maximum value for the field.
D.
When a user needs to specify a minimum and maximum value for the field.
Answers
Suggested answer: B
Total 108 questions
Go to page: of 11