Configuration and Setup 3 Flashcards

1
Q

What checks are done when users try to access a Salesforce organization?

A

Profile Level Login Hours, Profile Level IP Ranges, Company Level Trusted IP Ranges, Activation Code Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the Security Health Check work?

A

Security Health Check measures settings values in Password Policies, Network Access Config and Session Settings against baseline values and calculates a percentage score to indicate risk. 100% means all settings meet or exceed the standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When is identity verification invoked?

A

When a users logs in from an unrecognized (based on cookies) browsers or device, and outside the trusted IP range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be enabled that helps the administrator spot suspicious login activity?

A

Login Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different risk categories associated with a Security Health Check in Salesforce?

A

High, Medium, Low, and informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What password requirements can an administrator set?

A

Minimum password length, complexity, password history enforcement, expiration period, minimum password lifetime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where can sessions security settings be configured at the organization level and the profile level in an org?

A

On the ‘Session Settings’ page at the organization level and in a user profile at the profile level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which session setting can be configure to log out inactive users in an org?

A

Session Timeout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is the role hierarchy related to record access?

A

Users will have access to other users’ records if they have a role above the record owner in the role hierarchy and grant access through hierarchies is enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do organization-wide default settings do?

A

Determine access to records the users does not own and sets base record access for the org.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do sharing rules work?

A

Rules can be created to grant access to groups of users for certain records based on record owner or criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does filed level-security control?

A

Controls if a field is visible or read-only at the profile level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should be considered when changing OWD settings?

A

If increasing default access, changes will take effect immediately. If decreasing, changes may take significant time depending on data volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Manual Sharing?

A

Manual sharing allows a user to use the ‘Sharing’ button to grant access to a specific record to other users, roles, roles and subordinates, territories, territories and subordinates, and public groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of a public group?

A

It’s a way of grouping users, roles, and territories so that sharing settings and permissions can be granted efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly