A company’s security assessment noted vulnerabilities on the unmanaged packages in its Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce.
Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure. (Choose two.)
- Named Credentials
- Encrypted Custom Fields
- Protected Custom Settings
- Protected Custom Metadata Types
Reveal Solution Next Question