Question 16

Which two list types can be used as a suppression list on an email send? (Choose two answers.)
  • Question 17

    Which three user role security limits can be added to an individual user account? (Choose three answers.)
  • Question 18

    How is an active visitor different from an identified visitor?
  • Question 19

    An Administrator wants to create a list whose members are all in the prospecting stage of the opportunity. Once the opportunity moves to another stage, the prospect should no longer be a member of this list. Which automation tool should the Administrator use to create this list?
  • Question 20

    A prospect believed to be on a drip program did not receive an email. What troubleshooting step could an Administrator take to determine why the prospect did not receive the email?
    Choose 3 answers