Question 16
Which two list types can be used as a suppression list on an email send? (Choose two answers.)
Question 17
Which three user role security limits can be added to an individual user account? (Choose three answers.)
Question 18
How is an active visitor different from an identified visitor?
Question 19
An Administrator wants to create a list whose members are all in the prospecting stage of the opportunity. Once the opportunity moves to another stage, the prospect should no longer be a member of this list. Which automation tool should the Administrator use to create this list?
Question 20
A prospect believed to be on a drip program did not receive an email. What troubleshooting step could an Administrator take to determine why the prospect did not receive the email?
Choose 3 answers
Choose 3 answers