Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How do customers access Field Audit Trail data?

A.

Set-up Audit Trail

B.

Salesforce API

C.

Pre-built Tableau CRM app

D.

Event Log Files

What happens to metrics in the parent tenant when a child tenant is disconnected?

A.

The data is retained in the parent tenant, but not viewable in the app.

B.

Metrics for the tenant are deleted immediately.

C.

Metrics for the tenant are deleted during the next update.

D.

The user may see incomplete data in the app

Where would the user go to connect a new tenant to the Security Center app?

A.

Setup/Manage Tenants

B.

Setup/Security Center

C.

Manage Security Tab

D.

Connected Tenants Tab

If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?

A.

Use field level security or field permissions

B.

Use object level security or object permissions

C.

Use Apex managed sharing

D.

Use record level security settings

Which of the following is a blocker to rolling out MFA?

A.

Licensing for Transaction Security Policies

B.

Users refusing to install applications on their personal phones

C.

Shared accounts or credentials

D.

Licensing for Login Flows

Salesforce does not allow email or SMS text messages as verification methods for MFA. Which two reasons explain this? (2 options)

A.

Entering codes from text messages is error-prone

B.

Mobile devices can be lost or broken

C.

Email account credentials can be compromised

D.

SIM cards can be hacked

What is the fastest way to combine CRM data with EventLogFile data?

A.

Write a SOQL join query

B.

Create a custom object

C.

Use the Big Object lightning app

D.

Create a new Tableau CRM recipe in the Event Monitoring Analytics App

What are two differences between MFA and Device Activation?

A.

Users can opt out of receiving Device Activation challenges, but can't opt out of MFA challenges

B.

MFA challenges users on every login; Device Activation challenges users only when they log in from a new device

C.

Device Activation allows SMS as a verification method while MFA does not

D.

MFA is enabled for all users by default, admins must enable Device Activation

For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?

A.

Identity Verification Methods report

B.

Login History page in Setup

C.

Multi-Factor Authentication Dashboard App

D.

Multi-Factor Authentication Assistant

E.

Custom list view of Users in Setup

How often are Security Center metrics updated?

A.

Daily

B.

Weekly

C.

Hourly

D.

Every 30 days