Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

How do customers access Field Audit Trail data?

A.

Event Log Files

B.

Set-up Audit Trail

C.

Salesforce API

D.

Pre-built Tableau CRM app

Full Access
Question # 5

For products built on the Salesforce Platform, how is MFA enabled?

A.

On the Identity Verification page in Setup, select the Enable Multi-Factor Authentication checkbox

B.

Create a permission set that includes the "Multi-Factor Authentication for User Interface Logins'

permission, then apply the permission set to desired users

C.

GMFA is enabled by default, each user simply registers a verification method from their personal settings

D.

Click the Enable button in the Launch stage of the Multi-Factor Authentication Assistant

Full Access
Question # 6

Real Time Events are accessible via which three methods when enabled for storage?

A.

Event Monitoring Lightning App

B.

SOQL

C.

Einstein Analytics

D.

Bulk APIAsynchronous SOQL

Full Access
Question # 7

A customer prefers to generate an encryption key for Salesforce to use. They prefer to generate it manually, once a year.

What key management capability should the admin advise them to use?

A.

Export the tenant secret

B.

Implement a custom Apex key generation class

C.

Bring your own key, plus opt-out of key derivation

D.

Upload your own tenant secret

Full Access
Question # 8

Which masking option should the client use if they want to replace data with familiar values?

A.

Replace Using Pattern

B.

Replace with Random Characters

C.

Replace From Library

D.

Transform

Full Access
Question # 9

Which two options are available for masking data outside of objects and fields?

A.

Update Contacts

B.

Anonymize Case Comments

C.

Query All Entries

D.

Delete All Emails

Full Access
Question # 10

When is it necessary to set an object configuration to "Run in Serial Mode"?Each time a configuration needs to be run more than one time

A.

For each custom object that is part of the configuration

B.

To mask objects that have multiple records with master detail or lookup relationships to the same re

C.

When a user needs to replace sensitive data with a random number

Full Access
Question # 11

Which two options are available for masking data outside of objects and fields?

A.

Anonymize Case Comments

B.

Update Contacts

C.

Query All Entries

D.

Delete All Emails

Full Access
Question # 12

Within Data Mask a user wants to stop a configuration that is currently running. What dropdown option needs to be selected to terminate the execution

A.

END

B.

STOP

C.

CANcEL

D.

ABORT

Full Access
Question # 13

Which three are key value points for Security Center?

A.

Simplify Security Management

B.

Decrease Storage Requirements

C.

Increase Performance

D.

Respond to Threats and Anomalies Faster

E.

Gain Visibility to Drive Insights

Full Access
Question # 14

What are three implementation activities that should happen prior to enabling MFA for users?

A.

Document processes and troubleshooting information

B.

Enable the Salesforce Authenticator app for the org/tenant

C.

Create the Identity Verification Methods reportTest registration and login flows for each supported verification method

D.

Distribute verification methods and registration instructions to users

Full Access
Question # 15

What are three of the Commerce Cloud features that are available only when MFA is enabled?

A.

Embedded objects in HTML attributes

B.

Javascript in HTML attributes (adding or modifying)

C.

The Jobs module

D.

The Administration module

E.

Generic and application-specific cartridges

Full Access