Which three standard authentication protocols does Salesforce support to integrate external applications using APIs?
A. OpenID Connect
B. Single Sign On (SSO)
C. OMFA
D. Security Assertion Markup Language (SAML)
E. OAuth
You need to limit when and where from users can access Salesforce- to help reduce the risks of unauthorized access. How should you go about this.
A. Restrict Access based on Login IP Addresses but login hairs can't be set up in conjunction with this feature
B. Use MFA to help ensure users are using a more secure login process
C. Restrict Access based on Login IP Addresses and use the Login Hours feature together
D. Do not allow users to access Salesforce from outside the office.
MFA is enabled at which level for Marketing Cloud-Email Studio, Mobile Studio, and Journey Builder?
A. User level
B. Top-level account
C. Role level
D. Business unit level
When is data from a newly connected tenant updated in the Security Center App?
A. Upon triggering the refresh
B. During the next daily update
C. Immediately
D. When the API is called
By which method can Data Classification fields such as Compliance Categorization and Data
A. Sensitivity Level be accessed?
B. Field History Archive
C. Bulk API
D. Custom Metadata Types
E. Apex
Which of the following is a blocker to rolling out MFA?
A. Licensing for Transaction Security Policies
B. Users refusing to install applications on their personal phones
C. Shared accounts or credentials
D. Licensing for Login Flows
The Admin wants to make Salesforce applications more secure. Which set of security settings should be enabled to achieve this?
A. Enable ClickJack protection, Lightning Lockdown, Enable User Certificates
B. Enable ClickJack protection, Health Check, Enable User Certificates
C. Enable Click Jack protection, Require HTTPS, Enable Cross-Site Scripting (XSS) Protection
D. Run Health Check, Require HTTPS, Salesforce Shield
Where would the user go to connect a new tenant to the Security Center app?
A. Setup/Manage Tenants
B. Setup/Security Center
C. Manage Security Tab
D. Connected Tenants Tab
Which three objects is monitored by the Consent Event Stream (CES)?
A. Lead
B. Authorization Form Consent
C. Case
D. Contact
E. Opportunity
Which three MFA verification methods are supported by MuleSoft Anypoint Platform?
A. SMS text messages
B. Encryption Algorithm
C. Built-in Authenticators
D. Security Keys
E. Salesforce Authenticator
How often are Security Center metrics updated?
A. Daily
B. Weekly
C. Hourly
D. Every 30 days
User in one of the monitored orgs has been granted the 'Modify All Data' permission.
Where can the consultant see how the permission was granted?
A. View the Configuration Metrics detail page.
B. View the detail page of the 'View All Data' metric, and check the Context column on the change for the user.
C. See the Permissions dashboard.
D. View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.
Page 2 out of 9 Pages |
Previous |