Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Security-and-Privacy-Accredited-Professional PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

Security-and-Privacy-Accredited-Professional PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Salesforce Security & Privacy Accredited Professional Exam
  • Last Update: Sep 12, 2025
  • Questions and Answers: 106
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

Security-and-Privacy-Accredited-Professional Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

Security-and-Privacy-Accredited-Professional Practice Exam Questions with Answers Salesforce Security & Privacy Accredited Professional Exam Certification

Question # 6

Which three capabilities are part of the Health Check tool?

A.

Align your org's security setting with Salesforce-recommended security standards

B.

Identify and fix vulnerabilities in your security settings

Organize user access logs

C.

Access event log files to track user activity and feature adoption and troubleshoot issues

D.

Verify that multiple Salesforce applications have the same level of security

Full Access
Question # 7

Which three login types must have MFA enabled when the MFA requirement goes into effect on

February 1, 2022?

A.

User interface logins

B.

API logins

C.

Delegated authentication logins

D.

Automated test account logins

E.

Federated SSO logins

Full Access
Question # 8

How often do Event Log Files capture activity?

A.

In near real-time

B.

Hourly and once every 24 hours

C.

Every 5 minutes

D.

Every 30 minutes

Full Access
Question # 9

10. Can a customer run a penetration test against Salesforce?

A.

Some types of penetration testing are permitted, but not in production

B.

No, this is not permitted under any circumstances

C.

Penetration testing is allowed, but the Salesforce Agreement needs to be signed before testing can comment

D.

Penetration testing can be carried out at anytime by anyone

Full Access
Question # 10

How frequently can a user gather encryption statistics?

A.

Once every month per objectOnce every 24 hours per object

B.

Once every hour per object

C.

Once every week per object

D.

Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via

Platform Encryption.

Full Access
Question # 11

How much Heroku data storage is included with Privacy Center?

A.

1.5 TB

B.

5TB

C.

1TB

D.

3TB

Full Access
Question # 12

After a user completes setup of a portability policy, what API needs to be run to compile the identified PII?

A.

SOAP API

B.

Metadata API

C.

REST API

D.

Portability API

Full Access
Question # 13

What consideration should be made when connecting Salesforce orgs hosted in different data centers?

A.

Data Residency

B.

Fallover

C.

IP restrictions

D.

Scalability

Full Access
Question # 14

Which three options can be controlled through password policies in Salesforce?

A.

Password expiration

B.

Password complexity

C.

Password length

D.

Password with special characters

E.

Disallowed passwords

Full Access
Question # 15

Which category is NOT covered by Security Center?

A.

Permissions

B.

Event Monitoring

C.

Authentication

D.

Configuration

Full Access
Question # 16

What are two ways customers can satisfy the MFA requirement that goes into effect on February 1,

2022?

A.

Enable MFA for all users who log in through a Salesforce product's user interface

B.

Enable MFA for all admins who log in through a Salesforce product's user interface

C.

Enable MFA for your single sign-on identity provider and ensure all Salesforce users log in via SSO

D.

Enable delegated authentication for all products built on the Salesforce Platform

Full Access
Question # 17

Where would the user go to connect a new tenant to the Security Center app?

A.

Setup/Manage Tenants

B.

Setup/Security Center

C.

Manage Security Tab

D.

Connected Tenants Tab

Full Access
Question # 18

What will the user see in the Salesforce user interface when they view a page that includes the field on it?

A.

The field label followed by a message indicating that the field value is encrypted

B.

The field label followed by the unencrypted field value

C.

The field label followed by eight asterisks

D.

The field label followed by 256 characters of cipher text

Full Access
Question # 19

What is the primary difference between Data Mask and Data Encryption?

A.

Data encryption is used for masking data in a production environment

B.

Data encryption is an add on feature to the Data Mask product

C.

Data Mask prevents malicious attackers from accessing or interacting with sensitive data at rest in the data center.

D.

Data masking prevents developers or other users from viewing sensitive data in the user interface or exporting it as plain text

Full Access
Question # 20

After installing, what tab in Privacy Center 360 does a user need to input their Heroku credentials during the setup process?

A.

Remote Site Settings

B.

Settings

C.

Setup

D.

Home

Full Access
Question # 21

What is the difference between Classic Encryption and Platform Encryption?

A.

Classic Encryption encrypts standard fields

B.

Platform Encryption encrypts custom fields only. Classic Encryption encrypts standard fields

C.

Platform Encryption is built on Classic Encryption

D.

Classic Encryption masks characters whereas Platform Encryption does not

Full Access
Question # 22

What archive options are available for retention policies, as of the Winter '21 release

A.

Heroku

B.

Custom Connectors

C.

S3 Connector

D.

AWS Private Connect

Full Access
Question # 23

What are the actions that an admin can take with Transaction Security?

A.

Freeze User, End Session, require 2FA

B.

Obfuscate, Encrypt, de-identify

C.

Launch Workflow, Require Approval, Send SMS Text

D.

Block, Multi-Factor Authentication, and Notifications

Full Access
Question # 24

User in one of the monitored orgs has been granted the 'Modify All Data' permission. Where can the consultant see how the permission was granted?

A.

View the Configuration Metrics detail page.

B.

View the detail page of the 'View All Data' metric, and check the Context column on the change for the user.

C.

See the Permissions dashboard.

D.

View the detail page of the 'Modify All Data' metric, and check the Context column on the change for the user.

Full Access
Question # 25

Which three objects is monitored by the Consent Event Stream (CES)?

A.

Lead

B.

Authorization Form Consent

C.

Case

D.

Contact

E.

Opportunity

Full Access
Question # 26

Which two reasons explain this?

A.

Entering codes from text messages is error-prone

B.

Mobile devices can be lost or broken

C.

Email account credentials can be compromised

D.

SIM cards can be hacked

Full Access
Question # 27

What does the default Field Audit Trail policy in a production org state?

A.

Archive data after 12 months, store it for 5 years

B.

Archive data after 6 months, store it for 18 months

C.

Archive data after 18 months, store it for 10 years

D.

Archive data after 24 months, store it for 7 years

Full Access
Question # 28

What are the two typical human emotions/reactions cyber criminals exploit to steal credentials and infiltrate your network?

A.

Curiosity

B.

Surprise

C.

Fear

D.

Rewards

Full Access
Question # 29

What is the type and length of the key used to encrypt data?

A.

AES-256

B.

AES-192

C.

3DES

D.

RSA-4096

Full Access
Question # 30

Which two options are available for masking data outside of objects and fields?

A.

Anonymize Case Comments

B.

Update Contacts

C.

Query All Entries

D.

Delete All Emails

Full Access
Question # 31

A customer needs to track field history for more than 20 fields per object? How should the consultant advise them to proceed?

A.

Purchase additional storage capacity to unlock additional field history tracking.

B.

Purchase the Field Audit Trail add-on feature.

C.

Purchase additional field history tracking capacity in blocks of 20 fields.

D.

Enable and save field history tracking settings on the 21st field to automatically add additional field history tracking capacity to the org.

Full Access