Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Salesforce Security-and-Privacy-Accredited-Professional Salesforce Security & Privacy Accredited Professional Exam Exam Practice Test

Page: 1 / 11
Total 106 questions

Salesforce Security & Privacy Accredited Professional Exam Questions and Answers

Question 1

What two selections are available at the field level when building policies to manage data subject rights

Options:

A.

Refresh

B.

Delete

C.

Retain

D.

Insert

Question 2

When will a user select the "Unique' check box next to a field as part of their Data Mask configuration?

Options:

A.

If a user wants to mask with data generated using a defined pattern.

B.

When a user wants to prevent unintended reuse of library words or random characters

C.

Whenever a user needs to delete sensitive data entirely, leaving an empty data set

D.

When a user needs to specify a minimum and maximum value for the field.

Question 3

What is an implication of connecting or disconnecting a tenant during the update period?

Options:

A.

All previous metrics are erased

B.

This can cause partial data to load

C.

Data will not be loaded until the following day

D.

An error message will display to the user

Question 4

How does a user reverse the masking of data once the process has completed?

Options:

A.

Data Mask retains any historical data that can be retrieved by an admin

B.

The masking of data is an irreversible process

C.

Data Mask takes snapshots of prior versions of sandbox data that can be viewed

D.

Utilize the "Unmask' feature

Question 5

By which method can Data Classification fields such as Compliance Categorization and Data

Options:

A.

Sensitivity Level be accessed?

B.

Field History Archive

C.

Bulk API

D.

Custom Metadata Types

E.

Apex

Question 6

Within Data Mask, what is an example of a correct custom filter criteria that can be used in the data filter?

Options:

A.

1&& (2||3)

B.

1+(2+3)

C.

1&& (2 OR 3)

D.

1 & (2 OR 3)

E.

1 AND (2 OR 3)

Question 7

Which two reasons explain this?

Options:

A.

Entering codes from text messages is error-prone

B.

Mobile devices can be lost or broken

C.

Email account credentials can be compromised

D.

SIM cards can be hacked

Question 8

What do Right to be Forgotten policies automate?

Options:

A.

How to compile and send PII to customers.

B.

How PII is anonymized

C.

How and when PII is deleted.

D.

How PII is stored and archived

Question 9

Which three options can be controlled through password policies in Salesforce?

Options:

A.

Password expiration

B.

Password complexity

C.

Password length

D.

Password with special characters

E.

Disallowed passwords

Question 10

Which three login types must have MFA enabled when the MFA requirement goes into effect on

February 1, 2022?

Options:

A.

User interface logins

B.

API logins

C.

Delegated authentication logins

D.

Automated test account logins

E.

Federated SSO logins

Question 11

What is the difference between Classic Encryption and Platform Encryption?

Options:

A.

Classic Encryption encrypts standard fields

B.

Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields

C.

Platform Encryption is built on Classic Encryption

D.

Classic Encryption masks characters whereas Platform Encryption does not

Question 12

What are two differences between MFA and Device Activation?

Options:

A.

Users can opt out of receiving Device Activation challenges, but can't opt out of MFA challenges

B.

MFA challenges users on every login; Device Activation challenges users only when they log in from a new device

C.

Device Activation allows SMS as a verification method while MFA does not

D.

MFA is enabled for all users by default, admins must enable Device Activation

Question 13

How does Salesforce protect your org from all other customer orgs on a multitenancy platform?

Options:

A.

Uses a unique identifier which is associated with user's session

B.

Restricts IP addresses users can log in from

C.

Uses only server authentication

D.

Leverages only classic encryption

Question 14

What is the primary difference between Data Mask and Data Encryption?

Options:

A.

Data encryption is used for masking data in a production environment

B.

Data encryption is an add on feature to the Data Mask product

C.

Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.

D.

Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text

Question 15

Which two technologies are used to stream and store real-time event monitoring data?

Options:

A.

Platform Events and Big Objects

B.

Platform Events and Standard Objects

C.

Web Sockets and PostgreSQL

D.

CDC Events and Custom Objects

Page: 1 / 11
Total 106 questions