ExamGecko
Home Home / Salesforce / Certified Security and Privacy Accredited Professional

Salesforce Certified Security and Privacy Accredited Professional Practice Test - Questions Answers, Page 9

Question list
Search
Search

What are two differences between MFA and Device Activation?

A.
Users can opt out of receiving Device Activation challenges, but can't opt out of MFA challenges
A.
Users can opt out of receiving Device Activation challenges, but can't opt out of MFA challenges
Answers
B.
MFA challenges users on every login; Device Activation challenges users only when they log in from a new device
B.
MFA challenges users on every login; Device Activation challenges users only when they log in from a new device
Answers
C.
Device Activation allows SMS as a verification method while MFA does not
C.
Device Activation allows SMS as a verification method while MFA does not
Answers
D.
MFA is enabled for all users by default, admins must enable Device Activation
D.
MFA is enabled for all users by default, admins must enable Device Activation
Answers
Suggested answer: B

Which two federation or SSO protocols does Salesforce support?

A.
SCIMOpen
A.
SCIMOpen
Answers
B.
ID Connect
B.
ID Connect
Answers
C.
WS-Federation
C.
WS-Federation
Answers
D.
SAML
D.
SAML
Answers
Suggested answer: B, D

Which option does not require My Domain?

A.
Password policies
A.
Password policies
Answers
B.
OpenID Connect into a Salesforce org
B.
OpenID Connect into a Salesforce org
Answers
C.
SAML SSO into a Salesforce org
C.
SAML SSO into a Salesforce org
Answers
D.
The ability to brand the login page
D.
The ability to brand the login page
Answers
Suggested answer: A

You need to limit when and where from users can access Salesforce- to help reduce the risks of unauthorized access. How should you go about this.

A.
Restrict Access based on Login IP Addresses but login hairs can't be set up in conjunction with this feature
A.
Restrict Access based on Login IP Addresses but login hairs can't be set up in conjunction with this feature
Answers
B.
Use MFA to help ensure users are using a more secure login process
B.
Use MFA to help ensure users are using a more secure login process
Answers
C.
Restrict Access based on Login IP Addresses and use the Login Hours feature together
C.
Restrict Access based on Login IP Addresses and use the Login Hours feature together
Answers
D.
Do not allow users to access Salesforce from outside the office.
D.
Do not allow users to access Salesforce from outside the office.
Answers
Suggested answer: B

What are the two typical human emotions/reactions cyber criminals exploit to steal credentials and infiltrate your network?

A.
Curiosity
A.
Curiosity
Answers
B.
Surprise
B.
Surprise
Answers
C.
Fear
C.
Fear
Answers
D.
Rewards
D.
Rewards
Answers
Suggested answer: A, C

10. Can a customer run a penetration test against Salesforce?

A.
Some types of penetration testing are permitted, but not in production
A.
Some types of penetration testing are permitted, but not in production
Answers
B.
No, this is not permitted under any circumstances
B.
No, this is not permitted under any circumstances
Answers
C.
Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment
C.
Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment
Answers
D.
Penetration testing can be carried out at anytime by anyone
D.
Penetration testing can be carried out at anytime by anyone
Answers
Suggested answer: C

Which three capabilities are part of the Health Check tool?

A.
Align your org's security setting with Salesforce-recommended security standards
A.
Align your org's security setting with Salesforce-recommended security standards
Answers
B.
Identify and fix vulnerabilities in your security settingsOrganize user access logs
B.
Identify and fix vulnerabilities in your security settingsOrganize user access logs
Answers
C.
Access event log files to track user activity and feature adoption and troubleshoot issues
C.
Access event log files to track user activity and feature adoption and troubleshoot issues
Answers
D.
Verify that multiple Salesforce applications have the same level of security
D.
Verify that multiple Salesforce applications have the same level of security
Answers
Suggested answer: A, B, D

When is it necessary to set an object configuration to "Run in Serial Mode"?Each time a configuration needs to be run more than one time

A.
For each custom object that is part of the configuration
A.
For each custom object that is part of the configuration
Answers
B.
To mask objects that have multiple records with master detail or lookup relationships to the same re
B.
To mask objects that have multiple records with master detail or lookup relationships to the same re
Answers
C.
When a user needs to replace sensitive data with a random number
C.
When a user needs to replace sensitive data with a random number
Answers
Suggested answer: B

Which two options are good ways to check Filter Criteria before running a Data Mask configuration?

A.
Click Query Preview in the Data Filter to preview your query in SOQL
A.
Click Query Preview in the Data Filter to preview your query in SOQL
Answers
B.
Test the query on workbench or dev console.
B.
Test the query on workbench or dev console.
Answers
C.
Run an initial configuration from end to end without filtering
C.
Run an initial configuration from end to end without filtering
Answers
D.
Execute script in filtered view
D.
Execute script in filtered view
Answers
Suggested answer: A, B

Which two options are available for masking data outside of objects and fields?

A.
Anonymize Case Comments
A.
Anonymize Case Comments
Answers
B.
Update Contacts
B.
Update Contacts
Answers
C.
Query All Entries
C.
Query All Entries
Answers
D.
Delete All Emails
D.
Delete All Emails
Answers
Suggested answer: A, D
Total 108 questions
Go to page: of 11