Q1. If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?
A.Use field level security or field permissions
B. Use object level security or object permissions
C. Use Apex managed sharing
D. Use record level security settings
Answer: A
Q2. What kind of threats can be detected by Event Monitoring Threat Detection?
A.Session Hijacking, Credential Stuffing, Report Anomaly
B. Cross Site Scripting, Phishing
C. Login outside of IP Range, Failed Password Attempt
D. Multiple login attempts, SQL injection
Answer: A
Q3. Which technology enables an admin to query for data or write custom code when enforcing a security policy?
A.An apex based Transaction Security Policy
B. Process Builder
C. Threat Detection
D. Real-Time Events
Answer: A
Q4. Which masking option should the client use if they want to replace data with familiar values?
A.Replace Using Pattern
B. Replace with Random Characters
C. Replace From Library
D. Transform
Answer: C
Q5. When is it necessary to set an object configuration to "Run in Serial Mode"?
A.To mask objects that have multiple records with master detail or lookup relationships to the same record
B. For each custom object that is part of the configuration
C. Each time a configuration needs to be run more than one time
D. When a user needs to replace sensitive data with a random number
Answer: A
$ 39
Reviews
There are no reviews yet.