Security-and-Privacy-Accredited-Professional試験無料問題集「Salesforce Security & Privacy Accredited Professional 認定」

If a user loses their verification method, what are three of the recommended steps an admin should take?

正解:B,C,D 解答を投票する
Which two reasons explain this?

What happens to metrics in the parent tenant when a child tenant is disconnected?

How often do Event Log Files capture activity?

Which two technologies are used to stream and store real-time event monitoring data?

Identify users who don't need MFA18. If the client wants to record the set up changes users are making to fields for a three years, how would the client achieve this with the standard product?

Which two options are available for masking data outside of objects and fields?

How does Salesforce protect your org from all other customer orgs on a multitenancy platform?

How often are Security Center metrics updated?

User in one of the monitored orgs has been granted the 'Modify All Data' permission. Where can the consultant see how the permission was granted?