Can a customer run a penetration test against Salesforce?
A. Some types of penetration testing are permitted, but not in production
B. No, this is not permitted under any circumstances
C. Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment
D. Penetration testing can be carried out at anytime by anyone
Which three are key value points for Security Center?
A. Simplify Security Management
B. Decrease Storage Requirements
C. Increase Performance
D. Respond to Threats and Anomalies Faster
E. Gain Visibility to Drive Insights
Within Data Mask a user wants to stop a configuration that is currently running. What dropdown option needs to be selected to terminate the execution
A. END
B. STOP
C. CANcEL
D. ABORT
Which filter operator is supported by Deterministic Encryption?
A. contains
B. like
C. equals
D. starts with
Which activity is not recommended for internal support teams after MFA is enabled?
A. Adjusting policies that enable or disable MFA for Salesforce users
B. Helping users recover access if they've lost or forgotten their verification methods
C. Maintaining a supply of replacement security keys
D. Enabling MFA for new employees as part of the new hire onboarding process
Page 2 out of 21 Pages |
Previous |