Salesforce Security and Authentication
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a primary way to prevent interference or access from outside intruders in Salesforce?

  • Apex implementation
  • Firewalls and advanced technology (correct)
  • Two-factor authentication
  • Event Monitoring

What is the purpose of requiring a second level of authentication when users log in?

  • To prevent account compromise even if credentials are compromised (correct)
  • To minimize the burden on users
  • To monitor user activity
  • To implement Apex code

What is the tool used to configure two-factor authentication in Salesforce?

  • Event Monitoring
  • Salesforce Authenticator (correct)
  • Apex implementation
  • Real-time security events

Who should be required to set up two-factor authentication?

<p>Admins and users with access to sensitive data (D)</p> Signup and view all the answers

What is the alternative method of authentication if users do not have the Salesforce Authenticator mobile app?

<p>Enter a code from a hardware token (D)</p> Signup and view all the answers

What is the primary goal of implementing two-factor authentication in Salesforce?

<p>To protect user accounts from compromise (C)</p> Signup and view all the answers

What is the primary purpose of Two-Factor Authentication?

<p>To provide additional security layer to prevent unauthorized access (C)</p> Signup and view all the answers

What is an example of a transaction?

<p>Creating a new case (C)</p> Signup and view all the answers

What is the function of menus in an application?

<p>To group related modules for different business functions (B)</p> Signup and view all the answers

What is the main purpose of Authorization?

<p>To allow access to resources based on user permissions (C)</p> Signup and view all the answers

What is an example of highly sensitive information?

<p>Pay slip (B)</p> Signup and view all the answers

What is the categorization of Application Resources?

<p>Logic and data (A)</p> Signup and view all the answers

What are the three general steps to Identity & Access Control?

<p>Identify the user, Authenticate the user, Authorise access to resources (C)</p> Signup and view all the answers

What is the primary goal of Identity & Access Control?

<p>To prevent unnecessary exposure of enterprise data (D)</p> Signup and view all the answers

What is the purpose of Authentication in Identity & Access Control?

<p>To validate the identity of a user based on credentials (D)</p> Signup and view all the answers

What is an example of Two-factor authentication (2FA)?

<p>Username, Password, and OTP sent via SMS (A)</p> Signup and view all the answers

What is the purpose of Password requirements in Identity & Access Control?

<p>To reduce the chance of an account being hacked (A)</p> Signup and view all the answers

What is something that users know as part of Identity & Access Control?

<p>Something that users know, have, are, or do (C)</p> Signup and view all the answers

More Like This

Salesforce Shield Features Quiz
7 questions
5. Security and Access
57 questions

5. Security and Access

TemptingGroup3434 avatar
TemptingGroup3434
Use Quizgecko on...
Browser
Browser