What is the type and length of the key used to encrypt data?
A. AES-256
B. AES-192
C. 3DES
D. RSA-4096
A customer prefers to generate an encryption key for Salesforce to use. They prefer to generate it manually, once a year.
What key management capability should the admin advise them to use?
A. Export the tenant secret
B. Implement a custom Apex key generation class
C. Bring your own key, plus opt-out of key derivation
D. Upload your own tenant secret
For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?
A. Identity Verification Methods report
B. Login History page in Setup
C. Multi-Factor Authentication Dashboard App
D. Multi-Factor Authentication Assistant
E. Custom list view of Users in Setup
When is data from a newly connected tenant updated in the Security Center App?
A. Upon triggering the refresh
B. During the next daily update
C. Immediately
D. When the API is called
Other than IdentityVerificationEvent and LoginEvent, Real-Time Events are stored for how long when enabled for storage
A. One year
B. Thirty days
C. six months
D. Three months
If a user loses their verification method, what are three of the recommended steps an admin should take?
A. Disconnect the lost verification method
B. Generate a temporary verification code so the user can log in
C. Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity
D. Monitor the user's account activity for suspicious activity
After a user completes setup of a portability policy, what API needs to be run to compile the identified PII?
A. SOAP API
B. Metadata API
C. REST API
D. Portability API
What is the primary difference between Data Mask and Data Encryption?
A. Data encryption is used for masking data in a production environment
B. Data encryption is an add on feature to the Data Mask product
C. Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.
D. Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text
Which three are key value points for Security Center?
A. Simplify Security Management
B. Decrease Storage Requirements
C. Increase Performance
D. Respond to Threats and Anomalies Faster
E. Gain Visibility to Drive Insights
When is it necessary to set an object configuration to "Run in Serial Mode"?
A. To mask objects that have multiple records with master detail or lookup relationships to the same record
B. For each custom object that is part of the configuration
C. Each time a configuration needs to be run more than one time
D. When a user needs to replace sensitive data with a random number