ExamGecko

Salesforce Certified Security and Privacy Accredited Professional Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report
Export
Collapse

Why do admins need Shield Platform Encryption?

To protect data from external hackers
To protect data from external hackers
To meet regulatory compliance mandates
To meet regulatory compliance mandates
To mask sensitive data on UI and API
To mask sensitive data on UI and API
To encrypt ALL data Salesforce does not allow email or SMS text messages as verification methods for MFA.
To encrypt ALL data Salesforce does not allow email or SMS text messages as verification methods for MFA.
Suggested answer: C
asked 23/09/2024
Preety Koul
39 questions

Question 42

Report
Export
Collapse

Which two reasons explain this?

Entering codes from text messages is error-prone
Entering codes from text messages is error-prone
Mobile devices can be lost or broken
Mobile devices can be lost or broken
Email account credentials can be compromised
Email account credentials can be compromised
SIM cards can be hacked
SIM cards can be hacked
Suggested answer: A, C
asked 23/09/2024
John Bocachica
46 questions

Question 43

Report
Export
Collapse

What is the difference between Classic Encryption and Platform Encryption?

Classic Encryption encrypts standard fields
Classic Encryption encrypts standard fields
Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields
Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields
Platform Encryption is built on Classic Encryption
Platform Encryption is built on Classic Encryption
Classic Encryption masks characters whereas Platform Encryption does not
Classic Encryption masks characters whereas Platform Encryption does not
Suggested answer: D
asked 23/09/2024
Manoj Balan
44 questions

Question 44

Report
Export
Collapse

What is the primary difference between Data Mask and Data Encryption?

Data encryption is used for masking data in a production environment
Data encryption is used for masking data in a production environment
Data encryption is an add on feature to the Data Mask product
Data encryption is an add on feature to the Data Mask product
Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.
Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.
Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text
Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text
Suggested answer: C
asked 23/09/2024
Mustafa Kubha
44 questions

Question 45

Report
Export
Collapse

Which of the following is a blocker to rolling out MFA?

Licensing for Transaction Security Policies
Licensing for Transaction Security Policies
Users refusing to install applications on their personal phones
Users refusing to install applications on their personal phones
Shared accounts or credentials
Shared accounts or credentials
Licensing for Login Flows
Licensing for Login Flows
Suggested answer: C
asked 23/09/2024
Spencer Karenbauer
37 questions

Question 46

Report
Export
Collapse

How do triggers and process automations deactivate before running a Data Mask configuration?

Triggers and process automation do not need to be deactivated to run a configuration
Triggers and process automation do not need to be deactivated to run a configuration
User will manually deactivate all automated actions before running a configuration
User will manually deactivate all automated actions before running a configuration
User will need to run a script in the developer console to deactivate any automated processes
User will need to run a script in the developer console to deactivate any automated processes
While running a configuration, Data Mask will automatically disable triggers and process automation before the masking begins
While running a configuration, Data Mask will automatically disable triggers and process automation before the masking begins
Suggested answer: D
asked 23/09/2024
corey shields
27 questions

Question 47

Report
Export
Collapse

When is it necessary to set an object configuration to "Run in Serial Mode"?

To mask objects that have multiple records with master detail or lookup relationships to the same record
To mask objects that have multiple records with master detail or lookup relationships to the same record
For each custom object that is part of the configuration
For each custom object that is part of the configuration
Each time a configuration needs to be run more than one time
Each time a configuration needs to be run more than one time
When a user needs to replace sensitive data with a random number
When a user needs to replace sensitive data with a random number
Suggested answer: A
asked 23/09/2024
Aung Nyi Nyi Win
30 questions

Question 48

Report
Export
Collapse

Which technology enables an admin to query for data or write custom code when enforcing a security policy?

An apex based Transaction Security Policy
An apex based Transaction Security Policy
Process Builder
Process Builder
Threat Detection
Threat Detection
Real-Time Events
Real-Time Events
Suggested answer: A
asked 23/09/2024
Sriharsha Janga
43 questions

Question 49

Report
Export
Collapse

What three are driving factors for Data Mask completion time?

Number of fields being masked
Number of fields being masked
The amount of data in the fields
The amount of data in the fields
A valid distractor
A valid distractor
The time of day a config is run
The time of day a config is run
Type of masking rules selected
Type of masking rules selected
Suggested answer: A, B, E
asked 23/09/2024
Danilo Nogueira
37 questions

Question 50

Report
Export
Collapse

When will a user select the "Unique' check box next to a field as part of their Data Mask configuration?

If a user wants to mask with data generated using a defined pattern.
If a user wants to mask with data generated using a defined pattern.
When a user wants to prevent unintended reuse of library words or random characters
When a user wants to prevent unintended reuse of library words or random characters
Whenever a user needs to delete sensitive data entirely, leaving an empty data set
Whenever a user needs to delete sensitive data entirely, leaving an empty data set
When a user needs to specify a minimum and maximum value for the field.
When a user needs to specify a minimum and maximum value for the field.
Suggested answer: B
asked 23/09/2024
Donn Policarpio
43 questions
Total 108 questions
Go to page: of 11