(Security and Access 13%) Review Flashcards

1
Q

What checks are done when users try to access a salesforce organization?

A

Profile level login hours, Profile Level IP ranges, Company Level Trusted IP Ranges, Activation Code Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of standard profiles?

A

Standard user, Solution Manager, Marketing user, Contract Manger, Read Only, System Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why and how are custom profiles created?

A

There’s restrictions on what can be changed in a standard profile. Custom Profiles are created by cloning a standard profile to be able to customize profile settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is object access controlled?

A

Object access is controlled at the profile-level, including permission sets and visibility to the tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are permission sets?

A

A group of permissions and settings that can be assigned to one or more users that grant additional privileges beyond the profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do profile permissions grant?

A

Permissions to app-specific actions customized actions built, or system- wide actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the role hierarchy related to record access?

A

Users will have access to other users’ records if they have a role above the record owner in the role hierarchy and grant access through hierarchies is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do organization-wide defaults settings do?

A

Determine access to records the user does not own and sets base record access for the org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do sharing rules work?

A

Rules can be created to grant access to groups of users for certain records based on record owner criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does field-level security control?

A

Controls if a field is visible or read only at the profile level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should be considered when changing OWD settings?

A

If increasing default access, changes will take effect immediately if decreasing, changes may take significant time depending on data volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Manual Sharing?

A

Manual sharing allows a user to use ‘Sharing’ button to grant access to a specific record to other users, roles, roles & subordinates, territories, territories & subordinates, and public groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the security health check work?

A

measures setting values in password policies, Network Access config and session settings against baseline values and calculates a percentage score to indicate risk. 100% means all settings meet or exceed the standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the purpose of a public group?

A

It’s a way of grouping users, roles, and territories so that sharing settings and permissions can be granted efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When is identity verification invoked?

A

when a user logs in from an unrecognized (based on cookies) browser or device, and outside the trusted IP range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what can be enabled that helps the administrator spot suspicious login activity

A

login forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can folder access be controlled

A

Folder can be private or shared. Permissions and visibility can be set for users, roles, territories, or public groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are folders used for?

A

To store and organize reports documents, dashboards and email templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are two methods to find a folder quickly in the salesforce org?

A

folders can be favorited or searched for in global search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the different access levels that can be granted to a folder?

A

viewer, editor(edit, move, save and delete) or Manager (share and rename folder)

21
Q

How can reports and dashboards be organized in lightning experience?

A

A subfolder hierarchy can be created to organize reports and dashboards in a logical structure.

22
Q

What are the different risk categories associated with a security health check in salesforce?

A

High, Medium, Low, and Informational

23
Q

Which sharing setting allows a user to manually share their own user record with other users of an organization?

A

‘Manual user record sharing’ checkbox on the ‘sharing settings’ page in setup

24
Q

Which organization-wide default sharing setting can be used for the campaign member object to allow all users to see only the campaign members associated with the campaigns they have access to?

A

controlled by campaign

25
Q

what password requirements can an administrator set?

A

Minimum password length, complexity, password history enforcement, expiration period, minimum password lifetime

26
Q

which profile can be used to grant least-privilege access to a group of users?

A

Minimum Access -Salesforce

27
Q

what are the ways you can secure your org at the org level?

A
  1. Managing password policies
  2. Restrict IP ranges
  3. Restrict by time
  4. Restrict user email domain
28
Q

what is managing password policies mean in org security

A

Level of complexity the password must have. Min length, what is the password required to have inside it, when will it expire, what is the lock out period

29
Q

what does restricting IP ranges mean in org security

A

Restricts access to your org to certain locations. Can be set at org level or profile level.
org level: If user tries to log in they’ll have to be verified by OTP.
profile level: users cannot access the org outside the IP range at all.

30
Q

What is something that is very important to have before you IP restrict you users?

A

ISP is providing you a static IP! Without it, if you set IP restrictions at the profile level even the admin wont be able to login!

31
Q

What does restricting you org by time mean?

A

Your users will only be able to log in within a certain time frame. If they are still logged in they’ll be logged out if they’re there after the time.

32
Q

What does restricting you org my email domain mean?

A

restrict user email domain, they’ll only be able to login using the companies domain email and can’t be changed to a person email address.

33
Q

What tool in salesforce will analyze your orgs health and compares it salesforce industry standards and gives you a detailed list of how it can be more secure

A

health check

34
Q

What is Object level Security responsible for?

A

preventing users or groups of users from creating, viewing, editing, or deleting records of an object by setting permissions on the object.

35
Q

what are the two ways of setting object permissions

A

profiles and permission sets

36
Q

what do profiles do

A

they control what user can do and see through settings and permissions

37
Q

what are the different standard profiles?

A

standard user, read only, marketing user, solution manager, contract manager: view, read, edit are the permission for most of standard profiles unless otherwise restricted like read only

38
Q

why are custom profiles need to be created?

A

because object permissions cannot be edited on a standard profile. They are predefined.

39
Q

what do permission sets do?

A

collection of settings and permissions that determine which data and features user will have access to. They grant additional access to users without having to modify the existing profile. They are only additive cannot restrict access only give.

40
Q

field level security

A

controls whether a user can see and edit the value for a particular field on an object

41
Q

field level security vs just changing page layout

A

field level security secures the visibility of fields in any part of the app page layouts only controls the detail and related pages of that record.

42
Q

is it possible to disable role hierarchy on a standard object?

A

no!

43
Q

What objects should you only assign sharing rules to?

A

public read only or private because you can open more access with these. write/edit has all the access they need

44
Q

two types of sharing rules

A

owner based and criteria based

45
Q

what is owner based sharing rules?

A

share particular records for a particular user or group of users

46
Q

what are criteria based sharing rules?

A

share records that match a certain criteria

47
Q

what three questions should you ask before you share a record?

A
  1. Share what records?
  2. With whom the records need to be shared?
  3. What kind of access do you want to give these records?
48
Q

when should you use manual rules over sharing rules

A

When it is not possible to define a consistent group of users who need access or its not possible to share the record use manual sharing.

49
Q

when will the manual sharing button available for a record

A

when the OWD is set to read only or private. You can restrict access!