Salesforce Certified Security and Privacy Accredited Professional Practice Test - Questions Answers, Page 5
List of questions
Question 41

Why do admins need Shield Platform Encryption?
To protect data from external hackers
To meet regulatory compliance mandates
To mask sensitive data on UI and API
To encrypt ALL data Salesforce does not allow email or SMS text messages as verification methods for MFA.
Suggested answer: C
Question 42

Which two reasons explain this?
Entering codes from text messages is error-prone
Mobile devices can be lost or broken
Email account credentials can be compromised
SIM cards can be hacked
Suggested answer: A, C
Question 43

What is the difference between Classic Encryption and Platform Encryption?
Classic Encryption encrypts standard fields
Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields
Platform Encryption is built on Classic Encryption
Classic Encryption masks characters whereas Platform Encryption does not
Suggested answer: D
Question 44

What is the primary difference between Data Mask and Data Encryption?
Data encryption is used for masking data in a production environment
Data encryption is an add on feature to the Data Mask product
Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.
Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text
Suggested answer: C
Question 45

Which of the following is a blocker to rolling out MFA?
Licensing for Transaction Security Policies
Users refusing to install applications on their personal phones
Shared accounts or credentials
Licensing for Login Flows
Suggested answer: C
Question 46

How do triggers and process automations deactivate before running a Data Mask configuration?
Triggers and process automation do not need to be deactivated to run a configuration
User will manually deactivate all automated actions before running a configuration
User will need to run a script in the developer console to deactivate any automated processes
While running a configuration, Data Mask will automatically disable triggers and process automation before the masking begins
Suggested answer: D
Question 47

When is it necessary to set an object configuration to "Run in Serial Mode"?
To mask objects that have multiple records with master detail or lookup relationships to the same record
For each custom object that is part of the configuration
Each time a configuration needs to be run more than one time
When a user needs to replace sensitive data with a random number
Suggested answer: A
Question 48

Which technology enables an admin to query for data or write custom code when enforcing a security policy?
An apex based Transaction Security Policy
Process Builder
Threat Detection
Real-Time Events
Suggested answer: A
Question 49

What three are driving factors for Data Mask completion time?
Number of fields being masked
The amount of data in the fields
A valid distractor
The time of day a config is run
Type of masking rules selected
Suggested answer: A, B, E
Question 50

When will a user select the "Unique' check box next to a field as part of their Data Mask configuration?
If a user wants to mask with data generated using a defined pattern.
When a user wants to prevent unintended reuse of library words or random characters
Whenever a user needs to delete sensitive data entirely, leaving an empty data set
When a user needs to specify a minimum and maximum value for the field.
Suggested answer: B
Question