A. Ask the user to submit a lost verification method report before proceeding with any other steps Post about the incident to all Salesforce users as a learning opportunity
B. Monitor the user's account activity for suspicious activity
C. Generate a temporary verification code so the user can log in
D. Disconnect the lost verification method
A. Session time out, Welcome email template, Password complexity requirement
B. Session time out, Welcome email template, Password complexity requirement, Enabled Custom
C. Session time out, Enabled Custom Permissions, Email opt-in
D. Session time out, Password complexity requirement, Login IP Ranges, Login Hours
A. How to compile and send PII to customers.
B. How PII is anonymized
C. How and when PII is deleted.
D. How PII is stored and archived
A. SOAP API
B. REST API
C. Portability API
D. Metadata API
A. 3TB
B. 5TB
C. 1TB
D. 1.5 TB
A. To mask sensitive data on UI and API
B. To protect data from external hackers
C. To encrypt ALL data Salesforce does not allow email or SMS text messages as verification methods for MFA.
D. To meet regulatory compliance mandates
A. Use Apex managed sharing
B. Use field level security or field permissions
C. Use record level security settings
D. Use object level security or object permissions
A. CANcEL
B. ABORT
C. STOP
D. END
A. 1 year
B. 6 months
C. 30 days
D. 1 week
A. 3DES
B. RSA-4096
C. AES-192
D. AES-256