Salesforce Security-and-Privacy-
Accredited-Professional Exam Questions
With 100% Verified Answers
What are three of the Commerce Cloud features that are available
only when MFA is enabled?
A. Embedded objects in HTML attributes
B. Javascript in HTML attributes (adding or modifying)
C. The Jobs module
D. The Administration module|
E.Generic and application-specific cartridges -
correct answer ✅A, B, D - checked
What two things occur if Platform Encryption is later enabled on
fields that are enabled for Field Audit Trail?
A. Customers must run encryption sync again to encrypt the
previously stored data for these fields
B. All data for these fields will be automatically encrypted
C. Data that was stored prior to encryption enablement can be
encrypted via a support case
D.Only new data in these fields will be encrypted -
correct answer ✅C,D - checked
,Salesforce Security-and-Privacy-
Accredited-Professional Exam Questions
With 100% Verified Answers
What are three tactics for ensuring the success of an MFA
implementation?
A. Train users on how to bypass MFA if they forget or lose their
verification methods
B.Defer MFA logins for new hires until they're comfortable working
in Salesforce
C.Watch for recurring login problems and changes to how many
users are logging in
D.Collect and evaluate user feedback
E.Have a clear and easy access recovery process for users who
forget or lose their verification method -
correct answer ✅C, D,E - checked
Other than IdentityVerificationEvent and LoginEvent, Real-Time
Events are stored for how long when enabled for storage
A One year
B. Thirty days
C. six months
D. Three months -
correct answer ✅C - checked
,Salesforce Security-and-Privacy-
Accredited-Professional Exam Questions
With 100% Verified Answers
How do customers access Field Audit Trail data?
A. Set-up Audit Trail
B. Salesforce API
C.Pre-built Tableau CRM app
D.Event Log Files -
correct answer ✅A - checked
What does encryption statistics display to users?
A.Percentage of records encrypted
B. Percentage of records failing encryption check
C.Number of records created since last sync job was run
D.Number of times encrypted data was accessed by user -
correct answer ✅A - checked
How often do Event Log Files capture activity?
A. In near real-time
B. Hourly and once every 24 hours
C.Every 5 minutes
, Salesforce Security-and-Privacy-
Accredited-Professional Exam Questions
With 100% Verified Answers
D. Every 30 minutes -
correct answer ✅A - checked
How does a user schedule automated runs for a policy?
A. Execute an APEX script in the Developer Console
B. Set email notifications in Salesforce for when to run a Policy
C. Scheduling of automated executions is not an included feature
D. Under Run Frequency, indicate how often you want the policy to
run. -
correct answer ✅D - 50/50
What do Right to be Forgotten policies automate?
A. How to compile and send PII to customers.
B. How PII is anonymized
C. How and when PII is deleted.
D. How PII is stored and archived -
correct answer ✅C - checked
What are three implementation activities that should happen prior
to enabling MFA for users?
Accredited-Professional Exam Questions
With 100% Verified Answers
What are three of the Commerce Cloud features that are available
only when MFA is enabled?
A. Embedded objects in HTML attributes
B. Javascript in HTML attributes (adding or modifying)
C. The Jobs module
D. The Administration module|
E.Generic and application-specific cartridges -
correct answer ✅A, B, D - checked
What two things occur if Platform Encryption is later enabled on
fields that are enabled for Field Audit Trail?
A. Customers must run encryption sync again to encrypt the
previously stored data for these fields
B. All data for these fields will be automatically encrypted
C. Data that was stored prior to encryption enablement can be
encrypted via a support case
D.Only new data in these fields will be encrypted -
correct answer ✅C,D - checked
,Salesforce Security-and-Privacy-
Accredited-Professional Exam Questions
With 100% Verified Answers
What are three tactics for ensuring the success of an MFA
implementation?
A. Train users on how to bypass MFA if they forget or lose their
verification methods
B.Defer MFA logins for new hires until they're comfortable working
in Salesforce
C.Watch for recurring login problems and changes to how many
users are logging in
D.Collect and evaluate user feedback
E.Have a clear and easy access recovery process for users who
forget or lose their verification method -
correct answer ✅C, D,E - checked
Other than IdentityVerificationEvent and LoginEvent, Real-Time
Events are stored for how long when enabled for storage
A One year
B. Thirty days
C. six months
D. Three months -
correct answer ✅C - checked
,Salesforce Security-and-Privacy-
Accredited-Professional Exam Questions
With 100% Verified Answers
How do customers access Field Audit Trail data?
A. Set-up Audit Trail
B. Salesforce API
C.Pre-built Tableau CRM app
D.Event Log Files -
correct answer ✅A - checked
What does encryption statistics display to users?
A.Percentage of records encrypted
B. Percentage of records failing encryption check
C.Number of records created since last sync job was run
D.Number of times encrypted data was accessed by user -
correct answer ✅A - checked
How often do Event Log Files capture activity?
A. In near real-time
B. Hourly and once every 24 hours
C.Every 5 minutes
, Salesforce Security-and-Privacy-
Accredited-Professional Exam Questions
With 100% Verified Answers
D. Every 30 minutes -
correct answer ✅A - checked
How does a user schedule automated runs for a policy?
A. Execute an APEX script in the Developer Console
B. Set email notifications in Salesforce for when to run a Policy
C. Scheduling of automated executions is not an included feature
D. Under Run Frequency, indicate how often you want the policy to
run. -
correct answer ✅D - 50/50
What do Right to be Forgotten policies automate?
A. How to compile and send PII to customers.
B. How PII is anonymized
C. How and when PII is deleted.
D. How PII is stored and archived -
correct answer ✅C - checked
What are three implementation activities that should happen prior
to enabling MFA for users?