ExamGecko
Home Home / Salesforce / Certified Security and Privacy Accredited Professional

Salesforce Certified Security and Privacy Accredited Professional Practice Test - Questions Answers, Page 8

Question list
Search
Search

What user permission is required to view Security Center pages and manage app configurations?

A.
Customize Application
A.
Customize Application
Answers
B.
Manage Security Center
B.
Manage Security Center
Answers
C.
View All Data
C.
View All Data
Answers
D.
Modify All Data
D.
Modify All Data
Answers
Suggested answer: B

Which three are key value points for Security Center?

A.
Simplify Security Management
A.
Simplify Security Management
Answers
B.
Decrease Storage Requirements
B.
Decrease Storage Requirements
Answers
C.
Increase Performance
C.
Increase Performance
Answers
D.
Respond to Threats and Anomalies Faster
D.
Respond to Threats and Anomalies Faster
Answers
E.
Gain Visibility to Drive Insights
E.
Gain Visibility to Drive Insights
Answers
Suggested answer: A, D, E

Which type of field allows tracking with Field Audit Trail?

A.
Last Modified By
A.
Last Modified By
Answers
B.
Formula
B.
Formula
Answers
C.
Currency field
C.
Currency field
Answers
D.
Roll-Up Summary
D.
Roll-Up Summary
Answers
Suggested answer: C

What two selections are available at the field level when building policies to manage data subject rights

A.
Refresh
A.
Refresh
Answers
B.
Delete
B.
Delete
Answers
C.
Retain
C.
Retain
Answers
D.
Insert
D.
Insert
Answers
Suggested answer: B, C

After a user completes setup of a portability policy, what API needs to be run to compile the identified PII?

A.
SOAP API
A.
SOAP API
Answers
B.
Metadata API
B.
Metadata API
Answers
C.
REST API
C.
REST API
Answers
D.
Portability API
D.
Portability API
Answers
Suggested answer: B

Real Time Events are accessible via which three methods when enabled for storage?

A.
Event Monitoring Lightning App
A.
Event Monitoring Lightning App
Answers
B.
SOQL
B.
SOQL
Answers
C.
Einstein Analytics
C.
Einstein Analytics
Answers
D.
Bulk APIAsynchronous SOQL
D.
Bulk APIAsynchronous SOQL
Answers
Suggested answer: B, D

How many records per metric per org are displayed in Security Center?

A.
10000
A.
10000
Answers
B.
1000
B.
1000
Answers
C.
500
C.
500
Answers
D.
5000
D.
5000
Answers
Suggested answer: C

Which method should an admin use to view the Security Center Metrics?

A.
Utilize the built-in dashboard and detail pages
A.
Utilize the built-in dashboard and detail pages
Answers
B.
Use an analytics tool of your choosing
B.
Use an analytics tool of your choosing
Answers
C.
Export to SEIM tool
C.
Export to SEIM tool
Answers
D.
Make a call to the REST API
D.
Make a call to the REST API
Answers
Suggested answer: A

If a user loses their verification method, what are three of the recommended steps an admin should take?

A.
Disconnect the lost verification method
A.
Disconnect the lost verification method
Answers
B.
Generate a temporary verification code so the user can log in
B.
Generate a temporary verification code so the user can log in
Answers
C.
Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity
C.
Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity
Answers
D.
Monitor the user's account activity for suspicious activity
D.
Monitor the user's account activity for suspicious activity
Answers
Suggested answer: A, B, D

For products built on the Salesforce Platform, how is MFA enabled?

A.
On the Identity Verification page in Setup, select the Enable Multi-Factor Authentication checkbox
A.
On the Identity Verification page in Setup, select the Enable Multi-Factor Authentication checkbox
Answers
B.
Create a permission set that includes the "Multi-Factor Authentication for User Interface Logins' permission, then apply the permission set to desired users
B.
Create a permission set that includes the "Multi-Factor Authentication for User Interface Logins' permission, then apply the permission set to desired users
Answers
C.
GMFA is enabled by default, each user simply registers a verification method from their personal settings
C.
GMFA is enabled by default, each user simply registers a verification method from their personal settings
Answers
D.
Click the Enable button in the Launch stage of the Multi-Factor Authentication Assistant
D.
Click the Enable button in the Launch stage of the Multi-Factor Authentication Assistant
Answers
Suggested answer: B
Total 108 questions
Go to page: of 11