What are the two typical human emotions/reactions cyber criminals exploit to steal credentials and infiltrate your network?
Answer : A, C
For products built on the Salesforce Platform, which three tools can admins use to monitor MFA usage patterns?
Answer : A, C, E
When enabled for streaming, Real-Time Events are published where?
Answer : C
If a user is to have access to an object, but limit their access to individual fields in that object, how would a consultant address this?
Answer : A
What are two ways customers can satisfy the MFA requirement that goes into effect on February 1,
2022?
Answer : A, D
Which three standard authentication protocols does Salesforce support to integrate external applications using APIs?
Answer : A, D, E
Which filter operator is supported by Deterministic Encryption?
Answer : C