Question 56
Your Chief Information Security Officer is concerned about phishing.
You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks.
The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.
Where do you find the information your CISO is interested in seeing?
You implemented 2 Factor Authentication and forced hardware keys as a best practice to prevent such attacks.
The CISO is curious as to how many such email phishing attempts you've avoided since putting the 2FA+Hardware Keys in place last month.
Where do you find the information your CISO is interested in seeing?
Question 57
Your-company.com recently bought 2500 Chrome devices and wants to distribute them to various teams globally. You decided that enterprise enrollment would be the best way to enforce company policies for managed Chrome devices. You discovered that Chrome devices currently end up in the top-level organization unit, and this needs to change to the organizational unit of the device administrator.
What should you do?
What should you do?
Question 58
In order to maintain Consultation information with a private sharing model, Get Cloudy Consulting has a custom object. The Product Research group is distributed through the Role Hierarchy based on specialty.
Since the Product Research group often collaborates on Consultations, all users in the Product Research profile require View access to all Consultation records. Occasionally, the Product Research user who owns a Consultation must be able to grant a Branding user access to a Consultation record.
In order to support these requirements, which two platform features can be used? (Choose two.)
Since the Product Research group often collaborates on Consultations, all users in the Product Research profile require View access to all Consultation records. Occasionally, the Product Research user who owns a Consultation must be able to grant a Branding user access to a Consultation record.
In order to support these requirements, which two platform features can be used? (Choose two.)
Question 59
Your company has been engaged in a lawsuit, and the legal department has been asked to discover and hold all email for two specific users. Additionally, they have been asked to discover and hold any email referencing
"Secret Project 123."
What steps should you take to satisfy this request?
"Secret Project 123."
What steps should you take to satisfy this request?
Question 60
When Opportunity Sharing is set to Private with Opportunity Teams enabled, which three user configuration option allows the Owner of the Opportunity to be changed? (Choose three.)