ExamGecko
Home Home / Salesforce / Certified Security and Privacy Accredited Professional

Salesforce Certified Security and Privacy Accredited Professional Practice Test - Questions Answers, Page 6

Question list
Search
Search

How does Salesforce protect your org from all other customer orgs on a multitenancy platform?

A.
Uses a unique identifier which is associated with user's session
A.
Uses a unique identifier which is associated with user's session
Answers
B.
Restricts IP addresses users can log in from
B.
Restricts IP addresses users can log in from
Answers
C.
Uses only server authentication
C.
Uses only server authentication
Answers
D.
Leverages only classic encryption
D.
Leverages only classic encryption
Answers
Suggested answer: A

If the client wants to record the set up changes users are making to fields for a three years, how would the client achieve this with the standard product?

A.
The Setup Audit Trail is good for 5 years so can be used to record this as standard.
A.
The Setup Audit Trail is good for 5 years so can be used to record this as standard.
Answers
B.
Leverage Platform Encryption and enable the archive feature
B.
Leverage Platform Encryption and enable the archive feature
Answers
C.
Buy Shield as this provides features that can do this
C.
Buy Shield as this provides features that can do this
Answers
D.
The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the changes out of Salesforce to another system.
D.
The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the changes out of Salesforce to another system.
Answers
Suggested answer: D

If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?

A.
Use field level security or field permissions
A.
Use field level security or field permissions
Answers
B.
Use object level security or object permissions
B.
Use object level security or object permissions
Answers
C.
Use Apex managed sharing
C.
Use Apex managed sharing
Answers
D.
Use record level security settings
D.
Use record level security settings
Answers
Suggested answer: A

How does SF control access to its APIs?

A.
OAuth Flows
A.
OAuth Flows
Answers
B.
OAuth Everywhere
B.
OAuth Everywhere
Answers
C.
Connected Apps
C.
Connected Apps
Answers
D.
Customer 360 API Connect
D.
Customer 360 API Connect
Answers
Suggested answer: C

The Admin wants to make Salesforce applications more secure. Which set of security settings should be enabled to achieve this?

A.
Enable ClickJack protection, Lightning Lockdown, Enable User Certificates
A.
Enable ClickJack protection, Lightning Lockdown, Enable User Certificates
Answers
B.
Enable ClickJack protection, Health Check, Enable User Certificates
B.
Enable ClickJack protection, Health Check, Enable User Certificates
Answers
C.
Enable Click Jack protection, Require HTTPS, Enable Cross-Site Scripting (XSS) Protection
C.
Enable Click Jack protection, Require HTTPS, Enable Cross-Site Scripting (XSS) Protection
Answers
D.
Run Health Check, Require HTTPS, Salesforce Shield
D.
Run Health Check, Require HTTPS, Salesforce Shield
Answers
Suggested answer: C

For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?

A.
Identity Verification Methods report
A.
Identity Verification Methods report
Answers
B.
Login History page in Setup
B.
Login History page in Setup
Answers
C.
Multi-Factor Authentication Dashboard App
C.
Multi-Factor Authentication Dashboard App
Answers
D.
Multi-Factor Authentication Assistant
D.
Multi-Factor Authentication Assistant
Answers
E.
Custom list view of Users in Setup
E.
Custom list view of Users in Setup
Answers
Suggested answer: A, C, E

Which two options are available for masking data outside of objects and fields?

A.
Update Contacts
A.
Update Contacts
Answers
B.
Anonymize Case Comments
B.
Anonymize Case Comments
Answers
C.
Query All Entries
C.
Query All Entries
Answers
D.
Delete All Emails
D.
Delete All Emails
Answers
Suggested answer: B, D

Within Data Mask, what is an example of a correct custom filter criteria that can be used in the data filter?

A.
1&& (2||3)
A.
1&& (2||3)
Answers
B.
1+(2+3)
B.
1+(2+3)
Answers
C.
1&& (2 OR 3)
C.
1&& (2 OR 3)
Answers
D.
1 & (2 OR 3)
D.
1 & (2 OR 3)
Answers
E.
1 AND (2 OR 3)
E.
1 AND (2 OR 3)
Answers
Suggested answer: E

Which masking option should the client use if they want to replace data with familiar values?

A.
Replace Using Pattern
A.
Replace Using Pattern
Answers
B.
Replace with Random Characters
B.
Replace with Random Characters
Answers
C.
Replace From Library
C.
Replace From Library
Answers
D.
Transform
D.
Transform
Answers
Suggested answer: C

Within Data Mask a user wants to stop a configuration that is currently running. What dropdown option needs to be selected to terminate the execution

A.
END
A.
END
Answers
B.
STOP
B.
STOP
Answers
C.
CANcEL
C.
CANcEL
Answers
D.
ABORT
D.
ABORT
Answers
Suggested answer: B
Total 108 questions
Go to page: of 11