For products built on the Salesforce Platform, how is MFA enabled?
What is an example of the principle of least privilege?
Which technology enables an admin to query for data or write custom code when enforcing a security policy?
What are three implementation activities that should happen prior to enabling MFA for users?
Which three objects is monitored by the Consent Event Stream (CES)?
When is data from a newly connected tenant updated in the Security Center App?
Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?
By which method can Data Classification fields such as Compliance Categorization and Data
What is the type and length of the key used to encrypt data?
What user permission is required to view Security Center pages and manage app configurations?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Salesforce Free Exams |
---|
![]() |