What archive options are available for retention policies, as of the Winter '21 release
A. Heroku
B. Custom Connectors
C. S3 Connector
D. AWS Private Connect
How often do Event Log Files capture activity?
A. In near real-time
B. Hourly and once every 24 hours
C. Every 5 minutes
D. Every 30 minutes
Which two federation or SSO protocols does Salesforce support?
A. SCIMOpen
B. ID Connect
C. WS-Federation
D. SAML
How much Heroku data storage is included with Privacy Center?
A. 1.5 TB
B. 5TB
C. 1TB
D. 3TB
Which activity is not recommended for internal support teams after MFA is enabled?
A. Adjusting policies that enable or disable MFA for Salesforce users
B. Helping users recover access if they've lost or forgotten their verification methods
C. Maintaining a supply of replacement security keys
D. Enabling MFA for new employees as part of the new hire onboarding process
Which feature in Heroku allows an organization to generate a URL that can be used to download selected data in various formats?
A. Heroku Kafka
B. Heroku Postgres Dataclips
C. Heroku Redis
D. Heroku Connect
How frequently can a user gather encryption statistics?
A. Once every month per objectOnce every 24 hours per object
B. Once every hour per object
C. Once every week per object
D. Via Field Level Security settings, a Salesforce user has view access to a field that is encrypted via Platform Encryption.
How does a user schedule automated runs for a policy?
A. Execute an APEX script in the Developer Console
B. Set email notifications in Salesforce for when to run a Policy
C. Scheduling of automated executions is not an included feature
D. Under Run Frequency, indicate how often you want the policy to run.
Which technology enables an admin to query for data or write custom code when enforcing a security policy?
A. An apex based Transaction Security Policy
B. Process Builder
C. Threat Detection
D. Real-Time Events
What kind of threats can be detected by Event Monitoring Threat Detection?
A. Session Hijacking, Credential Stuffing, Report Anomaly
B. Cross Site Scripting, Phishing
C. Login outside of IP Range, Failed Password Attempt
D. Multiple login attempts, SQL injection