A. Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity
B. Monitor the user's account activity for suspicious activity
C. Generate a temporary verification code so the user can log in
D. Disconnect the lost verification method
A. Entering codes from text messages is error-prone
B. Email account credentials can be compromised
C. Mobile devices can be lost or broken
D. SIM cards can be hacked
A. The user may see incomplete data in the app
B. Metrics for the tenant are deleted immediately.
C. The data is retained in the parent tenant, but not viewable in the app.
D. Metrics for the tenant are deleted during the next update.
A. In near real-time
B. Every 30 minutes
C. Every 5 minutes
D. Hourly and once every 24 hours
A. Platform Events and Standard Objects
B. Platform Events and Big Objects
C. CDC Events and Custom Objects
D. Web Sockets and PostgreSQL
A. Leverage Platform Encryption and enable the archive feature
B. The Setup Audit Trail is good for 180 days so, use this together with a process of exporting the changes out of Salesforce to another system
C. The Setup Audit Trail is good for 5 years so can be used to record this as standard.
D. Buy Shield as this provides features that can do this
A. Query All Entries
B. Delete All Emails
C. Update Contacts
D. Anonymize Case Comments
A. Restricts IP addresses users can log in from
B. Uses a unique identifier which is associated with user's session
C. Leverages only classic encryption
D. Uses only server authentication
A. Weekly
B. Daily
C. Every 30 days
D. Hourly
A. View the detail page of the 'View All Data' metric, and check the Context column on the change for the user.
B. See the Permissions dashboard.
C. View the Configuration Metrics detail page.
D. View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.