A. Scalability
B. Fallover
C. Data Residency
D. IP restrictions
A. CANcEL
B. ABORT
C. STOP
D. END
A. serialized
B. CSV
C. XML
D. JSON
A. Delete
B. Retain
C. Refresh
D. Insert
A. Replace with Pattern and then input "Country"
B. Replace with Random Characters
C. Replace with Library and select "Address"
D. Replace with Library and select "Country"
A. 1 year
B. 6 months
C. 30 days
D. 1 week
A. Penetration testing can be carried out at anytime by anyone
B. Some types of penetration testing are permitted, but not in production
C. No, this is not permitted under any circumstances
D. Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment
A. Once every hour per object
B. Once every month per objectOnce every 24 hours per object
C. Once every week per object
D. Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via Platform Encryption.
A. Cross Site Scripting, Phishing
B. Login outside of IP Range, Failed Password Attempt
C. Multiple login attempts, SQL injection
D. Session Hijacking, Credential Stuffing, Report Anomaly
A. Data Privacy Law Compliance
B. DeteRetention
C. Date Subject Rights
D. Date Archiving