Configuration & Setup Flashcards

1
Q

Universal Containers wants to increase the security of their org by requiring stricter user passwords
Which two of the following should an administrator configure?
Choose 2 answers

A. Prevent common words
B. Password different than username
C. Minimum password length
D. Password complexity requirement

A

C. Minimum password length

D. Password complexity requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Universal Containers has a public read only sharing model on accounts. A new sales team has been created that will be dealing with high-security customers. The administrator has been asked to hide these accounts from anyone NOT on this team.
Which two steps must be taken to hide these accounts without impacting access to the rest of the Sales team? Choose 2 answers

A. Create ownership-based sharing rules
B. Create a new account type to separate both teams.
C. Change the new team role to be outside the company hierarchy.
D. Change organization-wide default on account to private.

A

A. Create ownership-based sharing rules.

C. Change the new team role to be outside the company hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The administrator for AW Computing is working with a user who is having trouble logging in to Salesforce
What should the administrator do to identify why the user is unable to log in?

A. Review the password policies.
B. Review the login history.
C. Review the password history.
D. Review the security token.

A

B. Review the login history.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud Kicks has the organization-wide sharing default set to private on the Shoe object. The sales manager should be able to view a report containing shoe records for all of the sales reps on their team.
Which three items should the administrator configure to provide appropriate access to the report? Choose 3 answers

A. Report Subscription
B. Role Hierarchy
C. Folder Access
D. Field-Level Security
E. Custom Report Type

A

B. Role Hierarchy
D. Field-Level Security
E. Custom Report Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Northern Trail Outfitters Is using one profile for all of its marketing users, providing read- only access to the Campaign object. A few marketing users now require comprehensive edit access on Campaigns.
How should an administrator fulfill this request?

A. Organization-wide defaults
B. Permission sets
C. Marketing user checkbox
D. Field-level security

A

C. Marketing user checkbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which two prompts will happen when one of the users attempts to log In to Data Loader?
Choose 2 answers

A. Users need to connect an authenticator app to their Salesforce account.
B. Users need to get a security token from a trusted network using Reset My Security Token.
C. Users need to download and install an authenticator app on their mobile device.
D. Users need to enter a verification code from email or SMS, whichever has higher priority.

A

C. Users need to download and install an authenticator app on their mobile device.
D. Users need to enter a verification code from email or SMS, whichever has higher priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which tool should an administrator use to identify and fix potential session vulnerabilities?

A. Setup Audit Trail
B. Field History Tracking
C. Organization-Wide Defaults
D. Security Health Check

A

D. Security Health Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

QUESTION 225
The administrator at Cloud Kicks created a new field for tracking returns on their new cloud shoe. A user has submitted a case to the administrator indicating that the new field is unavailable.
Which two steps should an administrator do to troubleshoot this issue?
Choose 2 answers

A. Review the field-level security of the field for the user profile.
B. Ensure that the page layout for the user’s profile has been updated.
C. Run the setup audit trail for the organization.
D. Update the organization-wide defaults for the object.

A

A. Review the field-level security of the field for the user profile.
B. Ensure that the page layout for the user’s profile has been updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Universal Containers wants to prevent its service team from accessing deal records. While service users are unable to access deal list views, they are able to find deal records via a search.
What option should the administrator adjust to fully restrict access?

A. App permissions and search terms
B. Record settings and search index
C. Page layouts and field-level security
D. Permissions and tab visibility

A

C. Page layouts and field-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When a user logs in the first time to Salesforce, the following takes place (check all that apply)

A. A cookie is placed in the their browser
B. Pop ups are automatically disabled
C. Their IP address is added to a trusted list
D. They are prompted to answer a security question

A

A. A cookie is placed in the their browser

C. Their IP address is added to a trusted list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The system administrator needs to prevent telesales teams from logging into Salesforce outside of the office.
How will he/she do this?

A. There is not way to do this
B. Setup | Security Controls | Network Access and specify the team’s range of IP addresses
C. Add the range of IP addresses to the team’s profile(s)
D. Contact salesforce.com as this feature must be enabled

A

C. Add the range of IP addresses to the team’s profile(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If Field Level Security prevents a user from viewing the Credit Card field on the Opportunity record, the user will also be prevented from seeing this field (choose all that apply)

A. In a related list
B. In search results
C. In reports
D. In list views
E. All of the above
F. None of the above

A

E. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You will need a security token to access Salesforce via (choose all that apply)

A. Import Wizard
B. Data Loader
C. Salesforce for Outlook
D. All of the above

A

B. Data Loader

C. Salesforce for Outlook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The page layout allows users to see the Next Steps field on an Opportunity record, Field Level Security dictates that the field is hidden, how will the field appear to the user?

A. The field will be hidden from the user
B. The field will be read only
C. The field will be visible and editable to the user
D. None of the above

A

A. The field will be hidden from the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Once a field is hidden from a Profile using ‘Field Level Security’, a User associated to that Profile can still see the field using the following:

A. List Views
B. Reports
C. Search
D. None of the above, the user cannot see the field at all

A

D. None of the above, the user cannot see the field at all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fields hidden using Field Level Security are subject to Data Validation Rules.

A. True
B. False

A

A. True

17
Q

Where are active currencies located? 2

A. Security Control
B. User record (Personal Setup)
C. Company Profile
D. None of the above

A

B. User record (Personal Setup)
C. Company Profile

18
Q

Record locking prevents users from editing a record only if they have certain field-level security or sharing settings.

A True
B. False

A

B. False

19
Q

Universally required fields always display on edit pages regardless of field-level security.

A. True
B. False

A

A. True

20
Q

What would prevent a user from including fields when running a report?

A. Field-level security & page layouts
B. Page layouts only
C. Field-level security only
D. None of the above

A

C. Field-level security only

21
Q

You can customize to restrict users ability to log in to saleforce.

A. Profile
B. Role
C. Page Layout
D. Record Type
E. Security Settings

A

A. Profile

22
Q

All dashboard viewers see data based on the security settings of the Running User–regardless of their own personal security settings?

A. True
B. False

A

A. True

23
Q

What are the three core building blocks of Security and Access in Salesforce?

A. Profile Restriction
B. Organization-wide Defaults
C. Profiles
D. Role Hierarchy
E. Sharing
F. Chatter Groups

A

B. Organization-wide Defaults

D. Role Hierarchy

E. Sharing

24
Q

Users can be restricted to view a particular field in views, searches and reports by hiding the field at

A. Page Layout
B. Field Level Security
C. User Profile
D. None of the Above

A

B. Field Level Security

25
Q

Where does the click path Your Name –> Set up -> Security controls -> Sharing settings lead to?

A. Custom Profile
B. Organization wide Defaults
C. Trusted IP Ranges

A

B. Organization wide Defaults

26
Q

Record locking in a workflow approval process prevents users from editing a record only if they have a certain field-level security or sharing settings.

A. True
B. False

A

B. False

27
Q

To log into the Data Loader, the IP address must be a trusted IP or the User must know their security token.

A. True
B. False

A

A. True

28
Q

Which of these are inherited from objects on homepage in a console layout?

A. Related lists
B. Custom objects
C. Field level security
D. Page layout

A

B. Custom objects

C. Field level security

29
Q

The IT manager at universal Containers is doing an audit of the systems security.
How should the administrator provide a summary of the org’s security health?

A. Change the Organization-Wide Default to private to restrict visibility.
B. Turn on Event Monitoring to track user events.
C. Download the last six months of user login data.
D. Run a Health Check to identify vulnerabilities.

A

D. Run a Health Check to identify vulnerabilities.

30
Q

Formula cannot reference any field that is restricted by Field level security

A. True
B. False

A

B. False

31
Q

Select the user permissions which override field-level security (Select all that apply):

A. Modify All Data
B. View All Data
C. Configure UI
D. View Encrypted Data

A

A. Modify All Data
B. View All Data
D. View Encrypted Data

32
Q

The relationship group wizard lets you create and edit relationship groups regardless of field-level security.

A. True
B. False

A

A. True

33
Q

Which three settings are controlled by a users profile? Choose 3 answers

A. Locale settings
B. Field -level security
C. a Record type assignment
D. Feature license assignment
E. Assigned apps

A

B. Field -level security
C. a Record type assignment
E. Assigned apps

34
Q

What will happen when a user attempts to log In to Salesforce from an IP address that is outside the login
IP range on the user’s profile but within the organization-wide trusted IP range?

A. The user will be able to log in without activating the computer.
B. The user will be able to log in after answering a security question.
C. The user will not be able to log In at all.
D. The user will be able to log in after the computer is activated.

A

C. The user will not be able to log In at all.

35
Q

QUESTION 127
Users in separate departments are able to see and edit different fields on Opportunities. The Sales team can edit all fields on the Opportunity while the Support team has read-only access to these fields.
Where is field -level Security controlled for users on these teams?

A. Sharing Rules
B. Role
C. Profile
D. Public Groups

A

C. Profile

36
Q

At Universal Containers, a user’s department determines which fields the user can see and edit on Opportunities. For example, users on the Sales team can edit all fields on the Opportunity, while users on the Support team have read-only access to these fields.
In which location is field-level security controlled for users on these teams?

A. Role
B. Sharing Rules
C. Profile
D. Public Groups

A

C. Profile

37
Q

Sales reps miss key fields when filling out an opportunity record through the sales process. Reps need to move forward in stages but are unable to enter a previous stage. Which three options should the administrator use to address this need? Choose 3 answers

A. Use validation rules.
B. Configure Opportunity Path.
C. Enable guided selling.
D. Mark fields required on the page layout
E. Use Flow to mark fields required.

A

A. Use validation rules.
B. Configure Opportunity Path.
E. Use Flow to mark fields required.

38
Q

Northern Trail Outfitters wants to use Contact Hierarchy in its org to display Contact association. What should the administrator take into consideration regarding the Contact Hierarchy?

A. Contacts displayed in the Contact Hierarchy are limited to record-level access by user.

B. Contact Hierarchy is limited to only display 3,000 contacts at one time.

C. Customizing hierarchy columns changes the Recently Viewed Contacts list view.

D. Sharing settings are ignored by contacts displayed in the Contact Hierarchy.

A

A. Contacts displayed in the Contact Hierarchy are limited to record-level access by user.

39
Q

Users at DreamHouse Realty are only allowed to see opportunities they own. Leadership wants an enterprise-wide dashboard of all open opportunities in the pipeline so that users can see how the company is performing at any point in time. How should an administrator create the dashboard without changing any sharing settings?

A. Build individual dashboards for profiles that need to see the enterprise results.

B. Create a dashboard with the running user set as someone who can see all opportunities.

C. Update the dashboard folder settings to manager for the sales reps role.

D. Add a filter to the dashboard to filter the opportunities by owner role.

A

A. Build individual dashboards for profiles that need to see the enterprise results.