Which of the following is NOT used by the app to regulate acces?

The Salesforce mobile app uses certain permissions to regulate which data is available for users. Which of the following is NOT used by the app to regulate acces?A . User License B. Salesforce Edition C. Profile D. Operating SystemView AnswerAnswer: D

January 10, 2023 No Comments READ MORE +

When a connected app employs a Refresh Token, what does Salesforce return?

When a connected app employs a Refresh Token, what does Salesforce return?A . An Access Token B. An encoded URL C. A boolean value that determines access D. NothingView AnswerAnswer: A

January 10, 2023 No Comments READ MORE +

Which mobile app operating system is supported by the Mobile SDK?

Which mobile app operating system is supported by the Mobile SDK?A . Both B. Android C. iOSView AnswerAnswer: A

January 9, 2023 No Comments READ MORE +

What concept in Mobile app security responds to this definition: ll valuable data used and stored in the app, including secrets and keys.

What concept in Mobile app security responds to this definition: ll valuable data used and stored in the app, including secrets and keys.A . Data at Rest B. Data in Transit C. Backend APIView AnswerAnswer: A

January 9, 2023 No Comments READ MORE +

True or False? If the underlying reports are already generated users will be able to create Dashboard Components from the SF App.

True or False? If the underlying reports are already generated users will be able to create Dashboard Components from the SF App.A . TRUE B. FALSEView AnswerAnswer: B

January 9, 2023 No Comments READ MORE +

True or False? Knowledge Users will be able to edit and create new Knowledge Articles from the Mobile App.

True or False? Knowledge Users will be able to edit and create new Knowledge Articles from the Mobile App.A . FALSE B. TRUEView AnswerAnswer: A

January 8, 2023 No Comments READ MORE +

What Mobile Appsec Term is defined here? A software testing method performed to analyze the runtime behavior of the code.

What Mobile Appsec Term is defined here? A software testing method performed to analyze the runtime behavior of the code.A . Buffer Overflow B. Dynamic Testing C. Authentication D. Static Testing E. AuthorizationView AnswerAnswer: B

January 8, 2023 No Comments READ MORE +

Which of the following is NOT a type of notification that the salesforce app can use?

Which of the following is NOT a type of notification that the salesforce app can use?A . Push notifications B. Email notifications C. In-app notificationsView AnswerAnswer: B

January 8, 2023 No Comments READ MORE +

What is the Mobile App Attack Surface?

What is the Mobile App Attack Surface?A . All the different points where an attacker could get into an app and exfiltrate data. B. Encryption and checksums, access auditing, and data integrity and operational security controls. C. The resource connection and authentication, authorization, activity logging, data validation, and encoding D....

January 7, 2023 No Comments READ MORE +

Is the following security mechanism used to protect data at Rest or in Transit? Checksums

Is the following security mechanism used to protect data at Rest or in Transit? ChecksumsA . Data at Rest B. Data in TransitView AnswerAnswer: A

January 7, 2023 No Comments READ MORE +