When requesting a log analysis for Sales force's information Security department, an administrator will NOT get it.
Click on the arrows to vote for the correct answer
A. B. C. D.D.
When requesting a log analysis for Salesforce's Information Security department, there are certain things that an administrator should NOT expect to receive. These include:
A. An encrypted version of the log file - If an administrator requests a log analysis, they should not expect to receive an encrypted version of the log file. The purpose of a log analysis is to review the contents of the log file, and an encrypted file would not provide any useful information.
B. The User ID of the person being investigated - While an administrator may be investigating a specific user, they should not expect to receive the User ID of that person from Salesforce's Information Security department. This information would likely be considered confidential, and disclosing it could potentially violate privacy laws or company policies.
C. Coaching on how to create the actual view of information - While Salesforce's Information Security department may provide guidance or support on how to create a log view, an administrator should not expect to receive coaching or extensive training on this topic. It is ultimately the administrator's responsibility to create the appropriate view of the log file based on their investigation needs.
D. The password to decrypt the log file in the same document as the log file - If a log file is encrypted, an administrator should not expect to receive the password to decrypt the log file in the same document as the log file. This would be a serious security risk, as anyone who obtained the document could potentially access sensitive information. Instead, the password should be provided separately and securely, such as through a password-protected email or secure file transfer protocol.