New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Certified Marketing Cloud Email Specialist (MC-202) Exam - Topic 1 Question 27 Discussion

Actual exam question for Salesforce's Salesforce Certified Marketing Cloud Email Specialist (MC-202) exam
Question #: 27
Topic #: 1
[All Salesforce Certified Marketing Cloud Email Specialist (MC-202) Questions]

The marketing team at a bank needs to receive a file of all subscribers who were sent payment reminder emails and opened them each week. The file needs to be encrypted and placed on the bank's external SFTP.

How should the scheduled automation be configured to achieve this?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Ollie
4 months ago
Definitely need that encryption step for security!
upvoted 0 times
...
Ricki
4 months ago
Isn't it risky to send sensitive data over SFTP?
upvoted 0 times
...
Charlette
4 months ago
Wait, why would you use a Filter Activity first? Seems off.
upvoted 0 times
...
Joaquin
4 months ago
I think option B makes the most sense here.
upvoted 0 times
...
Rosalyn
4 months ago
Sounds like a classic SQL query setup!
upvoted 0 times
...
Laurena
5 months ago
I thought the Filter Activity was essential for narrowing down the list, so I’m considering option B, but I’m not completely confident.
upvoted 0 times
...
Ronald
5 months ago
I practiced a similar question where we had to automate file transfers, but I can't recall if the Data Extract should be first or last.
upvoted 0 times
...
Lizette
5 months ago
I'm not entirely sure, but I feel like the SQL Query should come after the Data Extract Activity. That makes me lean towards option A.
upvoted 0 times
...
Kallie
5 months ago
I remember we discussed the importance of filtering the right subscribers before extracting data, so I think option B might be the way to go.
upvoted 0 times
...
Micaela
5 months ago
This looks pretty straightforward. I'll just use the provided credentials to initiate the SSH connection, then search for the flag.txt file and read its contents.
upvoted 0 times
...
Felicidad
5 months ago
I'm feeling pretty confident about this one. I think Option C is the best approach - set up two VPC networks, peer them together, and then configure a custom route on each network to the virtual appliance.
upvoted 0 times
...
Queenie
5 months ago
This looks like a straightforward configuration question. I'll carefully read through the options and try to identify the three key actions needed to meet the requirements.
upvoted 0 times
...
Amalia
5 months ago
Okay, I've got this. The question is asking about situations that wouldn't involve a certain auditing standard. I'll go through the options and eliminate the ones that do apply.
upvoted 0 times
...

Save Cancel