لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which three MFA verification methods are supported by MuleSoft Anypoint Platform?
A. SMS text messages
B. Encryption Algorithm
C. Built-in Authenticators
D. Security Keys
E. Salesforce Authenticator
عرض الإجابة
اجابة صحيحة: CDE
السؤال #2
Which two reasons explain this?
A. Entering codes from text messages is error-prone
B. Mobile devices can be lost or broken
C. Email account credentials can be compromised
D. SIM cards can be hacked
عرض الإجابة
اجابة صحيحة: AC
السؤال #3
What kind of threats can be detected by Event Monitoring Threat Detection?
A. Session Hijacking, Credential Stuffing, Report Anomaly
B. Cross Site Scripting, Phishing
C. Login outside of IP Range, Failed Password Attempt
D. Multiple login attempts, SQL injection
عرض الإجابة
اجابة صحيحة: A
السؤال #4
How do triggers and process automations deactivate before running a Data Mask configuration?
A. Triggers and process automation do not need to be deactivated to run a configuration
B. User will manually deactivate all automated actions before running a configuration
C. User will need to run a script in the developer console to deactivate any automated processes
D. While running a configuration, Data Mask will automatically disable triggers and process automation before the masking begins
عرض الإجابة
اجابة صحيحة: D
السؤال #5
What three are driving factors for Data Mask completion time?
A. Number of fields being masked
B. The amount of data in the fields
C. A valid distractor
D. The time of day a config is run
E. Type of masking rules selected
عرض الإجابة
اجابة صحيحة: ABE
السؤال #6
Can a customer run a penetration test against Salesforce?
A. Some types of penetration testing are permitted, but not in production
B. No, this is not permitted under any circumstances
C. Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment
D. Penetration testing can be carried out at anytime by anyone
عرض الإجابة
اجابة صحيحة: C
السؤال #7
How does a user reverse the masking of data once the process has completed?
A. Data Mask retains any historical data that can be retrieved by an admin
B. The masking of data is an irreversible process
C. Data Mask takes snapshots of prior versions of sandbox data that can be viewed
D. Utilize the "Unmask' feature
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Within Data Mask, what is an example of a correct custom filter criteria that can be used in the data filter?
A. 1 & (2 OR 3)
B. 1&& (2||3)
C. 1 AND (2 OR 3)
D. 1&& (2 OR 3)
E. 1+(2+3)
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which feature in Heroku allows an organization to generate a URL that can be used to download selected data in various formats?
A. Heroku Kafka
B. Heroku Postgres Dataclips
C. Heroku Redis
D. Heroku Connect
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which three login types must have MFA enabled when the MFA requirement goes into effect onFebruary 1, 2022?
A. User interface logins
B. API logins
C. Delegated authentication logins
D. Automated test account logins
E. Federated SSO logins
عرض الإجابة
اجابة صحيحة: ACE
السؤال #11
Which three objects is monitored by the Consent Event Stream (CES)?
A. Lead
B. Authorization Form Consent
C. Case
D. Contact
E. Opportunity
عرض الإجابة
اجابة صحيحة: ABD
السؤال #12
Which option does not require My Domain?
A. Password policies
B. OpenID Connect into a Salesforce org
C. SAML SSO into a Salesforce org
D. The ability to brand the login page
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which three are key value points for Security Center?
A. Simplify Security Management
B. Decrease Storage Requirements
C. Increase Performance
D. Respond to Threats and Anomalies Faster
E. Gain Visibility to Drive Insights
عرض الإجابة
اجابة صحيحة: ADE
السؤال #14
Which two options are available for masking data outside of objects and fields?
A. Anonymize Case Comments
B. Update Contacts
C. Query All Entries
D. Delete All Emails
عرض الإجابة
اجابة صحيحة: AD
السؤال #15
Which category is NOT covered by Security Center?
A. Permissions
B. Event Monitoring
C. Authentication
D. Configuration
عرض الإجابة
اجابة صحيحة: B
السؤال #16
How often are Security Center metrics updated?
A. Daily
B. Weekly
C. Hourly
D. Every 30 days
عرض الإجابة
اجابة صحيحة: A
السؤال #17
How frequently can a user gather encryption statistics?
A. Once every month per objectOnce every 24 hours per object
B. Once every hour per object
C. Once every week per object
D. Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via Platform Encryption
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Page 4 MFA is enabled at which level for Marketing Cloud - Email Studio, Mobile Studio, and Journey Builder?
A. User level
B. Top - level account
C. Role level
D. Business unit level
عرض الإجابة
اجابة صحيحة: B
السؤال #19
What consideration should be made when connecting Salesforce orgs hosted in different data centers?
A. Data Residency
B. Fallover
C. IP restrictions
D. Scalability
عرض الإجابة
اجابة صحيحة: C
السؤال #20
When will a user select the "Unique' check box next to a field as part of their Data Mask configuration?
A. If a user wants to mask with data generated using a defined pattern
B. When a user wants to prevent unintended reuse of library words or random characters
C. Whenever a user needs to delete sensitive data entirely, leaving an empty data set
D. When a user needs to specify a minimum and maximum value for the field
عرض الإجابة
اجابة صحيحة: B
السؤال #21
What kind of threats can be detected by Event Monitoring Threat Detection?
A. Session Hijacking, Credential Stuffing, Report Anomaly
B. Cross Site Scripting, Phishing
C. Login outside of IP Range, Failed Password Attempt
D. Multiple login attempts, SQL injection
عرض الإجابة
اجابة صحيحة: A
السؤال #22
When enabled for streaming, Real-Time Events are published where?
A. To the EventMonitoring subscription channel
B. To independent custom object streams
C. To independent event subscription channels
D. To independent Big Objects
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Salesforce does not allow email or SMS text messages as verification methods for MF
A. Which two reasons explain this? (2 options)
عرض الإجابة
اجابة صحيحة: AD
السؤال #24
What format can Event Log Files be downloaded via API?
A. XML
B. serialized
C. JSON
D. CSV
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Which masking option should the client use if they want to replace data with familiar values?
A. Replace Using Pattern
B. Replace with Random Characters
C. Replace From Library
D. Transform
عرض الإجابة
اجابة صحيحة: C
السؤال #26
Within Data Mask, which operators are available for the DATETIME field type when using the data filter?
A. is prior to, is within, is after
B. is before, is within, is after
C. is before, is after, is between
D. yesterday, today, a month ago
عرض الإجابة
اجابة صحيحة: B
السؤال #27
If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?
A. Use field level security or field permissions
B. Use object level security or object permissions
C. Use Apex managed sharing
D. Use record level security settings
عرض الإجابة
اجابة صحيحة: A
السؤال #28
How does a user schedule automated runs for a policy?
A. Execute an APEX script in the Developer Console
B. Set email notifications in Salesforce for when to run a Policy
C. Scheduling of automated executions is not an included feature
D. Under Run Frequency, indicate how often you want the policy to run
عرض الإجابة
اجابة صحيحة: D
السؤال #29
What is the primary difference between Data Mask and Data Encryption?
A. Data encryption is used for masking data in a production environment
B. Data encryption is an add on feature to the Data Mask product
C. Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center
D. Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text
عرض الإجابة
اجابة صحيحة: C
السؤال #30
Which three capabilities are part of the Health Check tool?
A. Align your org's security setting with Salesforce-recommended security standards
B. Identify and fix vulnerabilities in your security settings
C. Access event log files to track user activity and feature adoption and troubleshoot issues
D. Verify that multiple Salesforce applications have the same level of security
عرض الإجابة
اجابة صحيحة: ABD

View The Updated Salesforce Exam Questions

SPOTO Provides 100% Real Salesforce Exam Questions for You to Pass Your Salesforce Exam!

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: