Security And Access Flashcards

1
Q

What does Manager Group Sharing allow?

A

It allows records to be shared up and down the management chain using the Manager field on the user record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is field access controlled?

A

Field-level security is set at the profile or permission set level and can set fields to be read-only or not visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is record access controlled?

A

By using Object Permissions, Role Hierarchy, Manager Group Sharing, Sharing Settings (OWD), and Sharing Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does manual sharing allow?

A

It allows records to be manually shared with other users, roles, territories, and public groups. The access level can be set to read/write or read only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the high level steps to use Enterprise Territory Management?

A

Build a Territory, Assign Users to Territories, Create Territory Account Assignment Rules, Preview the Model, Activate the Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Enterprise Territory Management do?

A

It allows accounts to be assigned to territories automatically using territory assignment rules, and users to be assigned to territories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are custom profiles created?

A

If the permissions defined in a standard profile do not meet requirements. There are restrictions on what can be changed in a standard profile. A custom profile is fully customizable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can a Delegated Administrator do?

A

Certain Admin functions, including unlocking users, resetting passwords, creating users, assigning profiles and public groups and managing custom objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a permission set?

A

A set of permissions that can be assigned to one or more users that gives additional permissions to what is defined in their profile. It can include almost all permissions in a profile, including object, field and system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which territory access levels are available when organization-wide default sharing settings for Contacts is set to ‘Private’?

A

‘No Access’, ‘View’, and ‘View and Edit’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is used as an identifier for a particular kind of territory in a territory hierarchy?

A

Territory Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What represents a complete territory management system that includes a
territory hierarchy, assignment rules and assigned users?

A

Territory Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a graphical representation of the entire territory structure in a territory model?

A

Territory Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which organization-wide default sharing setting can be used for the Campaign Member object to allow all users to see only the campaign members associated with the campaigns they have access to?

A

Controlled by Campaign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which sharing setting allow a user to manual share their own user record with other users of an organization?

A

‘Manual User Record Sharing’ checkbox on the ‘Sharing Settings’ page in Set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which organization-wide default sharing setting can be used for the Campaign Member object to allow all users to see only the campaign members associated with the campaigns they have access to?

A

Controlled by Parent

17
Q

With regard to record access, with capability is available when using the original territory management functionality?

A

Access can be granted to accounts and related opportunities and cases based on custom criteria, regardless of who owns the records.

18
Q

What are some of the customizations that are possible when managing a custom object as a delegated administrator?

A

Adding a picklist value to a field, creating a custom tab, modifying the page layout, etc.

19
Q

Which term is used in salesforce for a contact that does not have an associated account record?

A

Private Contact

20
Q

What can be done to allow a user to view all data in an organization?

A

Create and assign a permission set with ‘View All Data’ permission.

21
Q

When are sharing rules re-evaluated automatically?

A

When changes are made to groups, roles, and territories, sharing rules are re-evaluated to add or remove access as necessary.

22
Q

Which least-privilege profile allows users to access activities and Chatter features?

A

‘Minimum Access - Salesforce’ profile

23
Q

When managing a custom object, what cannot be modified by a delegated administrator?

A

Relationships on the object and organization-wide default sharing setting

24
Q

What protocol does social sign-on use?

A

OpenID Connect

25
When Enterprise Territory Management is enabled, how can records by users in a territory be shared with users in another territory?
By setting up a sharing rule based on users assigned to a territory
26
What password requirements can an administrator set?
Minimum password length, complexity, password history enforcement, expiration period, minimum password lifetime
27
In Salesforce Classic, how can a user manually share a record with members of a territory?
By using the 'Sharing' button on the record and searching for & adding the territory in the 'Share With' column
28
What does social sign-on enable?
Lets users login using credentials from a social network such as LinkedIn.
29
When is identity verification invoked?
When a user logs in from an unrecognized (based on cookies) browser or device, and outside the trusted IP range.
30
Which form of social sign on is enabled by default for all users?
Federated authentication
31
Which authentication method lets users login with typing a password?
Lightning Login
32
When configuring Login Discovery for My Domain, which interface should a Login Discovery Handler class implement?
MyDomainLoginDiscoveryHandler
33
How can a 2-factor authentication code be provided?
Text message, email or an authenticator app
34
What should be deployed to enable certificate-based authentication in an org?
My Domain