لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
When is it necessary to set an object configuration to "Run in Serial Mode"?
A. To mask objects that have multiple records with master detail or lookup relationships to the same record
B. For each custom object that is part of the configuration
C. Each time a configuration needs to be run more than one time
D. When a user needs to replace sensitive data with a random number
عرض الإجابة
اجابة صحيحة: A
السؤال #2
For products built on the Salesforce Platform, how is MFA enabled?
A. On the Identity Verification page in Setup, select the Enable Multi-Factor Authentication checkbox
B. Create a permission set that includes the "Multi-Factor Authentication for User Interface Logins' permission, then apply the permission set to desired users
C. GMFA is enabled by default, each user simply registers a verification method from their personal settings
D. Click the Enable button in the Launch stage of the Multi-Factor Authentication Assistant
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which two technologies are used to stream and store real-time event monitoring data?
A. Platform Events and Big Objects
B. Platform Events and Standard Objects
C. Web Sockets and PostgreSQL
D. CDC Events and Custom Objects
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which three MFA verification methods are supported by MuleSoft Anypoint Platform?
A. SMS text messages
B. Encryption Algorithm
C. Built - in Authenticators
D. Security Keys
E. Salesforce Authenticator
عرض الإجابة
اجابة صحيحة: CDE
السؤال #5
Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?
A. Platform Events
B. Event Monitoring Analytics App
C. Event Manager
D. Transaction Security
عرض الإجابة
اجابة صحيحة: C
السؤال #6
MFA is enabled at which level for Marketing Cloud-Email Studio, Mobile Studio, and Journey Builder?
A. User level
B. Top-level account
C. Role level
D. Business unit level
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which masking option should the client use if they want to replace data with familiar values?
A. Replace Using Pattern
B. Replace with Random Characters
C. Replace From Library
D. Transform
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which technology enables an admin to query for data or write custom code when enforcing a security policy?
A. An apex based Transaction Security Policy
B. Process Builder
C. Threat Detection
D. Real-Time Events
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Where would the user go to connect a new tenant to the Security Center app?
A. Setup/Manage Tenants
B. Setup/Security Center
C. Manage Security Tab
D. Connected Tenants Tab
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Where would the user go to connect a new tenant to the Security Center app?
A. Setup/Manage Tenants
B. Setup/Security Center
C. Manage Security Tab
D. Connected Tenants Tab
عرض الإجابة
اجابة صحيحة: D
السؤال #11
What will the user see in the Salesforce user interface when they view a page that includes the field on it?
A. The field label followed by a message indicating that the field value is encrypted
B. The field label followed by the unencrypted field value
C. The field label followed by eight asterisks
D. The field label followed by 256 characters of cipher text
عرض الإجابة
اجابة صحيحة: B
السؤال #12
What are two differences between MFA and Device Activation?
A. Users can opt out of receiving Device Activation challenges, but can't opt out of MFA challenges
B. MFA challenges users on every login; Device Activation challenges users only when they log in from a new device
C. Device Activation allows SMS as a verification method while MFA does not
D. MFA is enabled for all users by default, admins must enable Device Activation
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which three standard authentication protocols does Salesforce support to integrate external applications using APIs?
A. OpenID Connect
B. Single Sign On (SSO)
C. OMFA
D. Security Assertion Markup Language (SAML)
E. OAuth
عرض الإجابة
اجابة صحيحة: ADE
السؤال #14
What are two benefits of conducting a user inventory prior to implementing MFA?
A. Identify users who should be deactivated
B. Identify logical groups of users for a phased rollout
C. Identify users who don't have the correct permissions
D. Identify admins and other privileged users
عرض الإجابة
اجابة صحيحة: BD
السؤال #15
Which two date types are available when filtering on a condition that has the DATETIME object field?
A. Relative
B. Absolute
C. Within
D. Outside
عرض الإجابة
اجابة صحيحة: AC
السؤال #16
If a user loses their verification method, what are three of the recommended steps an admin should take?
A. Disconnect the lost verification method
B. Generate a temporary verification code so the user can log in
C. Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity
D. Monitor the user's account activity for suspicious activity
عرض الإجابة
اجابة صحيحة: ABD
السؤال #17
Which type of field allows tracking with Field Audit Trail?
A. Last Modified By
B. Formula
C. Currency field
D. Roll-Up Summary
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which three options can be controlled through password policies in Salesforce?
A. Password expiration
B. Password complexity
C. Password length
D. Password with special characters
E. Disallowed passwords
عرض الإجابة
اجابة صحيحة: ABC
السؤال #19
How often are Security Center metrics updated?
A. Daily
B. Weekly
C. Hourly
D. Every 30 days
عرض الإجابة
اجابة صحيحة: A
السؤال #20
How do customers access Field Audit Trail data?
A. Set-up Audit Trail
B. Pre-built Tableau CRM app
C. Salesforce API
D. Event Log Files
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which metric view holds information on the 'Password Never Expires' setting?
A. Permission Metrics
B. Configuration Metrics
C. Authentication Metrics
D. User and Profile Metrics
عرض الإجابة
اجابة صحيحة: A
السؤال #22
How does SF control access to its APIs?
A. OAuth Flows
B. OAuth Everywhere
C. Connected Apps
D. Customer 360 API Connect
عرض الإجابة
اجابة صحيحة: C
السؤال #23
What are the actions that an admin can take with Transaction Security?
A. Freeze User, End Session, require 2FA
B. Obfuscate, Encrypt, de-identify
C. Launch Workflow, Require Approval, Send SMS Text
D. Block, Multi-Factor Authentication, and Notifications
عرض الإجابة
اجابة صحيحة: D
السؤال #24
Which of the following is a blocker to rolling out MFA?
A. Licensing for Transaction Security Policies
B. Users refusing to install applications on their personal phones
C. Shared accounts or credentials
D. Licensing for Login Flows
عرض الإجابة
اجابة صحيحة: C
السؤال #25
After a user completes setup of a portability policy, what API needs to be run to compile the identified PII?
A. SOAP API
B. Metadata API
C. REST API
D. Portability API
عرض الإجابة
اجابة صحيحة: B
السؤال #26
What are three tactics for ensuring the success of an MFA implementation?
A. Train users on how to bypass MFA if they forget or lose their verification methods
B. Defer MFA logins for new hires until they're comfortable working in Salesforce
C. Watch for recurring login problems and changes to how many users are logging in Collect and evaluate user feedback
D. Have a clear and easy access recovery process for users who forget or lose their verification method
عرض الإجابة
اجابة صحيحة: ACD
السؤال #27
What is the difference between Classic Encryption and Platform Encryption?
A. Classic Encryption encrypts standard fields
B. Platform Encryption encrypts custom fields only
C. Platform Encryption is built on Classic Encryption
D. Classic Encryption masks characters whereas Platform Encryption does not
عرض الإجابة
اجابة صحيحة: D
السؤال #28
Which two options are available for masking data outside of objects and fields?
A. Update Contacts
B. Anonymize Case Comments
C. Query All Entries
D. Delete All Emails
عرض الإجابة
اجابة صحيحة: BD
السؤال #29
What do Right to be Forgotten policies automate?
A. How to compile and send PII to customers
B. How PII is anonymized
C. How and when PII is deleted
D. How PII is stored and archived
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Which Customer 360 Privacy Center capability is used to control how long data is stored in Salesforce?
A. Date Archiving
B. DeteRetention
C. Date Subject Rights
D. Data Privacy Law Compliance
عرض الإجابة
اجابة صحيحة: B

View The Updated Salesforce Exam Questions

SPOTO Provides 100% Real Salesforce Exam Questions for You to Pass Your Salesforce Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: