Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When enabled for streaming, Real-Time Events are published where?

A.

To the EventMonitoring subscription channel

B.

To independent custom object streams

C.

To independent event subscription channels

D.

To independent Big Objects

Which activity is not recommended for internal support teams after MFA is enabled?

A.

Adjusting policies that enable or disable MFA for Salesforce users

B.

Helping users recover access if they've lost or forgotten their verification methods

C.

Maintaining a supply of replacement security keys

D.

Enabling MFA for new employees as part of the new hire onboarding process

User in one of the monitored orgs has been granted the 'Modify All Data' permission. Where can the consultant see how the permission was granted?

A.

View the Configuration Metrics detail page.

B.

View the detail page of the 'View All Data' metric, and check the Context column on the change for the user.

C.

See the Permissions dashboard.

D.

View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.

What does Salesforce Data Mask do?

A.

Encrypt Salesforce Sandbox data

B.

Change the color scheme of metrics within a production org based on predetermined rules

C.

Anonymize data at rest within a production org

D.

Anonymize, delete, or pseudonymize sensitive Salesforce sandbox data

What are three implementation activities that should happen prior to enabling MFA for users?

A.

Document processes and troubleshooting information

B.

Enable the Salesforce Authenticator app for the org/tenant

C.

Create the Identity Verification Methods reportTest registration and login flows for each supported verification method

D.

Distribute verification methods and registration instructions to users

How often do Event Log Files capture activity?

A.

In near real-time

B.

Hourly and once every 24 hours

C.

Every 5 minutes

D.

Every 30 minutes

Which two options are good ways to check Filter Criteria before running a Data Mask configuration?

A.

Click Query Preview in the Data Filter to preview your query in SOQL

B.

Test the query on workbench or dev console.

C.

Run an initial configuration from end to end without filtering

D.

Execute script in filtered view

What are two ways customers can satisfy the MFA requirement that goes into effect on February 1,

2022?

A.

Enable MFA for all users who log in through a Salesforce product's user interface

B.

Enable MFA for all admins who log in through a Salesforce product's user interface

C.

Enable MFA for your single sign-on identity provider and ensure all Salesforce users log in via SSO

D.

Enable delegated authentication for all products built on the Salesforce Platform

What are three tactics for ensuring the success of an MFA implementation?

A.

Train users on how to bypass MFA if they forget or lose their verification methods

B.

Defer MFA logins for new hires until they're comfortable working in Salesforce

C.

Watch for recurring login problems and changes to how many users are logging in

Collect and evaluate user feedback

D.

Have a clear and easy access recovery process for users who forget or lose their verification method

Within Data Mask, what is an example of a correct custom filter criteria that can be used in the data filter?

A.

1&& (2||3)

B.

1+(2+3)

C.

1&& (2 OR 3)

D.

1 & (2 OR 3)

E.

1 AND (2 OR 3)