Which three objects is monitored by the Consent Event Stream (CES)?
A. Lead
B. Authorization Form Consent
C. Case
D. Contact
E. Opportunity
Which three MFA verification methods are supported by MuleSoft Anypoint Platform?
A. SMS text messages
B. Encryption Algorithm
C. Built-in Authenticators
D. Security Keys
E. Salesforce Authenticator
How often are Security Center metrics updated?
A. Daily
B. Weekly
C. Hourly
D. Every 30 days
User in one of the monitored orgs has been granted the 'Modify All Data' permission.
Where can the consultant see how the permission was granted?
A. View the Configuration Metrics detail page.
B. View the detail page of the 'View All Data' metric, and check the Context column on the change for the user.
C. See the Permissions dashboard.
D. View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.
Which method should an admin use to view the Security Center Metrics?
A. Utilize the built-in dashboard and detail pages
B. Use an analytics tool of your choosing
C. Export to SEIM tool
D. Make a call to the REST API
Page 5 out of 21 Pages |
Previous |