This seems straightforward - I'd go with option A and use the Encryption Policy to update the existing records. Contacting Salesforce is a good idea to ensure everything is set up properly.
Hmm, I'm not totally sure about this one. The question is asking which step involves embedding intruder code, so it could be either weaponization or exploitation. I'll have to think this through carefully.
Odette
3 months agoShaunna
3 months agoCletus
3 months agoGlory
4 months agoJeanice
4 months agoCaprice
4 months agoDean
4 months agoJacklyn
4 months agoHenriette
5 months agoGlenn
5 months agoTeri
5 months agoCatarina
5 months agoJuan
5 months agoDalene
5 months agoCarmen
5 months agoShawn
5 months agoJanet
2 years agoArtie
2 years agoNaomi
2 years agoEnola
2 years agoAmie
2 years agoJacquline
2 years agoVincenza
2 years agoJame
2 years agoJanet
2 years agoJosephine
2 years agoMartha
2 years agoRicki
2 years agoArlette
2 years agoLeota
2 years agoShasta
2 years agoDacia
2 years agoKimbery
2 years agoTrinidad
2 years agoMaile
2 years agoTesha
2 years agoWynell
2 years agoGeoffrey
2 years agoArtie
2 years agoPamella
2 years agoLuann
2 years agoVirgie
2 years agoJaney
2 years ago