How does Salesforce protect your org from all other customer orgs on a multitenancy platform?
A. Uses a unique identifier which is associated with user's session
B. Restricts IP addresses users can log in from
C. Uses only server authentication
D. Leverages only classic encryption
Within Data Mask a user wants to stop a configuration that is currently running. What dropdown option needs to be selected to terminate the execution?
A. END
B. STOP
C. CANcEL
D. ABORT
Which Customer 360 Privacy Center capability is used to control how long data is stored in Salesforce?
A. Date Archiving
B. DeteRetention
C. Date Subject Rights
D. Data Privacy Law Compliance
What do Right to be Forgotten policies automate?
A. How to compile and send PII to customers.
B. How PII is anonymized
C. How and when PII is deleted.
D. How PII is stored and archived
Which metric view holds information on the 'Password Never Expires' setting?
A. Permission Metrics
B. Configuration Metrics
C. Authentication Metrics
D. User and Profile Metrics
How frequently can a user gather encryption statistics?
A. Once every month per objectOnce every 24 hours per object
B. Once every hour per object
C. Once every week per object
D. Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via Platform Encryption.
How does a user schedule automated runs for a policy?
A. Execute an APEX script in the Developer Console
B. Set email notifications in Salesforce for when to run a Policy
C. Scheduling of automated executions is not an included feature
D. Under Run Frequency, indicate how often you want the policy to run.
Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?
A. Platform Events
B. Event Monitoring Analytics App
C. Event Manager
D. Transaction Security
Which category is NOT covered by Security Center?
A. Permissions
B. Event Monitoring
C. Authentication
D. Configuration
Which technology enables an admin to query for data or write custom code when enforcing a security policy?
A. An apex based Transaction Security Policy
B. Process Builder
C. Threat Detection
D. Real-Time Events