Which two options are good ways to check Filter Criteria before running a Data Mask configuration
What are three recommended change management activities to prepare users for MFA?
10. Can a customer run a penetration test against Salesforce?
Which two technologies are used to stream and store real-time event monitoring data?
Which tool does an admin use to enable streaming or storage of Real-Time Event Monitoring events?
Which two options are good ways to check Filter Criteria before running a Data Mask configuration?
Salesforce does not allow email or SMS text messages as verification methods for MFA. Which two reasons explain this? (2 options)
Other than IdentityVerificationEvent and LoginEvent, Real-Time Events are stored for how long when enabled for storage
Where would the user go to connect a new tenant to the Security Center app?
Which three login types must have MFA enabled when the MFA requirement goes into effect on
February 1, 2022?
How does Salesforce protect your org from all other customer orgs on a multitenancy platform?
Which three standard authentication protocols does Salesforce support to integrate external applications using APIs?
What does encryption statistics display to users?
How does a user schedule automated runs for a policy?
Real Time Events are accessible via which three methods when enabled for storage?