Configuration and Setup (Obj. 3,4) Flashcards

1
Q

An Admin is currently setting up the password policies for the company’s Salesforce org. Which of the following statements about the settings in the Password Policies page are correct? (2)

A.) The default password length is 8 characters but can be changed anywhere from 3-100 characters.

B.) Password complexity always requires that passwords should have numbers, uppercase letter, lowercase letter, and special characters

C.) The password history enforcement can be modified

D.) The lockout effective period can be set to ‘Forever’

A

C.) The password history enforcement can be modified

D.) The lockout effective period can be set to ‘Forever’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An Admin would like to absolutely deny login access to the company’s Salesforce org if users are logging in outside the specified login hours and IP range. What are the different options that can be used? (2)

A.) Profile based IP restrictions

B.) Organization-wide IP restrictions

C.) Organization-based login hour restrictions

D.) Profile-based login hour restrictions

A

A.) Profile based IP restrictions

D.) Profile-based login hour restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A user has reported that they do not see the ‘Contact Type’ field on the contact detail page. What should the Admin check first? (1)

A.) The role assigned to the user

B.) Field level security assigned to the user

C.) The contact page layout assigned to the user

D.) The contact page layout displayed for the profile assigned to the user

A

D.) The contact page layout displayed for the profile assigned to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user has contacted the Admin as they need to create a Campaign and do not see the ‘New’ button when they navigate to the Campaigns screen. They do have visibility to Campaign records. What can the Admin do to resolve this? (2)

A.) Ensure that the ‘Create Campaigns’ checkbox on the user record is selected

B.) Ensure that the ‘Marketing User’ checkbox on the user record is selected

C.) Ensure that the user’s profile has the correct Campaign page layout

D.) Ensure that the user’s profile has the Create permission on the Campaign object

A

B.) Ensure that the ‘Marketing User’ checkbox on the user record is selected

D.) Ensure that the user’s profile has the Create permission on the Campaign object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user has left your company and you need to ensure immediately that they cannot log in to Salesforce. In what situations would you choose to freeze the user instead of deactivating them? (2)

A.) If the user may return to the company

B.) If the user is part of custom hierarchy fields

C.) If the user is a default owner of Leads or Cases

D.) If the user is the owner of Account records

A

B.) If the user is part of custom hierarchy fields

C.) If the user is a default owner of Leads or Cases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An Admin is told to look through the login forensics to spot any suspicious attempts to gain access to the org. Which of the following can login forensics provide? (3)

A.) The number of logins per role and profile

B.) Who logged in during non-business hours

C.) Who logged in more than the average number of times

D.) The number of logins per profile

E.) The average number of logins per user per a specified time period

A

B.) Who logged in during non-business hours

C.) Who logged in more than the average number of times

E.) The average number of logins per user per a specified time period

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Recently, a new Candidate tab requested by the HR team of Telco Inc. was created for the recruitment application. The HR team is unable to locate the tab within the application. What should the Admin check to resolve the issue? (3)

A.) Check if the field-level security for the Candidate object is enabled for the HR team users.

B.) Check if the Candidate custom tab is visible for the HR team user profile

C.) Check if the object permission is correctly applied to the HR profile

D.) Check the assigned app settings for the profile

E.) Check if the Candidate custom tab is added to the recruitment application

A

B.) Check if the Candidate custom tab is visible for the HR team user profile

C.) Check if the object permission is correctly applied to the HR profile

E.) Check if the Candidate custom tab is added to the recruitment application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An Admin needs to add 10 users to the system and is considering using the ‘Add Multiple Users’ feature. Which of the following statements are true regarding the ‘Add Multiple Users’ functionality? (3)

A.) Users will have usernames that are different from their email addressed

B.) Users can be allocated different roles

C.) First names are required to create the user records

D.) Users can be allocated the same or different profiles

E.) Each user will be allocated the same license type

A

B.) Users can be allocated different roles

D.) Users can be allocated the same or different profiles

E.) Each user will be allocated the same license type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Every month, new users report having first-time access issues due to expired account verification links. What can an Admin do to reduce access issues related to this? (1)

A.) Enable automatic account verification after 7 days.

B.) Ensure that the manager is copied in the account verification email to the user

C.) Extend the number of days before the account verification link expires

D.) Disable account verification through email

A

C.) Extend the number of days before the account verification link expires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A sales representative has just left Cosmic Enterprise Solutions. What should be done to ensure that the user can no longer log in to Salesforce? (1)

A.) Deactivate the user contact

B.) Deactivate the user record

C.) Delete the user contact

D.) Delete the user account record

A

B.) Deactivate the user record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Amazing Inc. is a global manufacturer in the field of audio equipment. They recruited an Admin to start the implementation for their global sales operations team. The Admin found that there is a matrix organizational structure, and many users have 2 managers. How can he ensure that the managers for each user can be recorded? (1)

A.) Use the standard Manager field and create an additional User manager field as a standard lookup to the User object.

B.) Create 2 hierarchical relationship fields to set up User managers.

C.) Create 2 self lookup User object manager fields

D.) Use the standard Manager field on the User record and create an additional hierarchical relationship manager field.

A

D.) Use the standard Manager field on the User record and create an additional hierarchical relationship manager field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An Admin is setting up a new org for a company with over 300 employees that will require setup of several roles and profiles. Which statement regarding profiles and roles is correct? (1)

A.) A role determines what parts of the application the user can access

B.) The role hierarchy determines record access in a private data sharing model

C.) A profile controls what records a user can see in the application

D.) The profile hierarchy determines record access in a read only sharing model

A

B.) The role hierarchy determines record access in a private data sharing model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a private sharing model, if the admin needs to make some exceptions to give access to records, what features can you use? (3)

A.) Sharing Rules

B.) Manual Sharing

C.) Sharing Exception Rules

D.) Account Teams

A

A.) Sharing Rules

B.) Manual Sharing

D.) Account Teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user logged into Salesforce in the morning and updated some records. He didn’t come back to it again until the afternoon. He found that he was logged out. What should the Admin explain to the user? (1)

A.) Users are logged out after a certain period of inactivity according to the session timeout value

B.) Users are always automatically logged out after 1 hour of inactivity

C.) Users are automatically logged out at lunchtime

D.) When users close a browser window, they are automatically logged out of Salesforce.

A

A.) Users are logged out after a certain period of inactivity according to the session timeout value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cosmic Supermarket would like to allow its employees to log in to Salesforce using their Google credentials. An Admin of the company is required to configure single sign-on (SSO) using Google as the third-party authentication provider. However, the employees should be required to prove their identity using multifactor authentication (MFA). Which of the following are valid considerations related to this use case? (2)

A.) A managed package must be installed to set up multi-factor authentication when Google is used as the third-party authentication provider.

B.) Multi-factor authentication can be configured for users by setting the ‘Session Security Level Required at Login’ in their profiles.

C.) ‘Multi-factory Authentication’ should be in the ‘High Assurance’ column on the ‘Session Settings’ page in Setup.

D.) By default, multi-factor authentication (MFA) is enforced for users who log in through an authentication provider that supports single sign-on (SSO).

A

B.) Multi-factor authentication can be configured for users by setting the ‘Session Security Level Required at Login’ in their profiles.

C.) ‘Multi-Factor Authentication’ should be in the ‘High Assurance’ column on the ‘Session Settings’ page in Setup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A user has called you as they have forgotten their password. What should you suggest? (1)

A.) Tell the user you will send a temporary password to their cell phone via text message

B.) Tell the user to reset the password themselves from the Forgot Password link on the login page

C.) Tell the user to email Salesforce support

D.) Tell the user that passwords can only be reset by Salesforce Administrator and you will need to do it every time

A

B.) Tell the user to reset the password themselves from the Forgot Password link on the login page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is true regarding setting up users? (2)

A.) The username and email address can be different, except when setting up multiple users.

B.) A user can have multiple roles but only one profile

C.) The administrator sets a temporary password and this is automatically emailed to the new users

D.) The profiles available depend on the license type selected

A

A.) The username and email address can be different, except when setting up multiple users.

D.) The profiles available depend on the license type selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A recently terminated sales representative is assigned as the sole recipient of a workflow email alert. What should a Salesforce Administrator do to prevent the user from logging in to Salesforce? (1)

A.) Deactivate the user

B.) Freeze the user

C.) Delete the user

D.) Delete user’s contact

A

B.) Freeze the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A user has left their phone at home which is usually used for multi-factor authentication. What can the Salesforce Administrator do? (1)

A.) Reset the password for the user

B.) Generate a temporary username

C.) Generate a temporary verification code

D.) Remove multi-factor authentication

A

C.) Generate a temporary verification code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A company would not like that its employees access Salesforce from home. How can this be achieved? (1)

A.) Define Trusted Login IP ranges

B.) Enable ‘Trusted Login Only’ setting

C.) Define Login IP Ranges for all profiles

D.) Define Permission Sets

A

C.) Define Login IP Ranges for all profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A Salesforce Administrator often deals with record-level security. Which of the following are correct regarding record-level security? (2)

A.) Sharing rules can never be stricter than the organization-wide sharing defaults

B.) Organization-wide sharing defaults are always used for opening record access to the user

C.) Roles are used to open up the record access among the user groups (i.e. horizontally)

D.) Roles are used to create a sharing hierarchy among the users

A

A.) Sharing rules can never be stricter than the organization-wide sharing defaults

D.) Roles are used to create a sharing hierarchy among the users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The CIO of a technology company has directed the Salesforce Administrator to enable single sign-on with delegated authentication for the org. Which of the following are the benefits of delegated authentication? (2)

A.) It allow the sending of authentication and authorization data between affiliated but unrelated web services

B.) It can be configured to use a stronger form of user authentication, such as integration with a secure identity provider

C.) It applies to all users once enabled

D.) It makes the login page private and accessible only behind a corporate firewall

A

B.) It can be configured to use a stronger form of user authentication, such as integration with a secure identity provider.

D.) It makes the login page private and accessible only behind a corporate firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Salesforce Administrator often helps the users with their concerns about the Salesforce org. He realizes that it would be easier if he could log in to the org as the users experiencing the problem so that he can view the org from their perspective. What is the most efficient way of achieving this? (1)

A.) Contact Salesforce support and request ‘Login As’ access for all users

B.) Request each affected user to Grant Login Access to the Salesforce Administrator

C.) Ask each affected user to send their password to the Salesforce Administrator

D.) Ensure the ‘Administrator Can Log In As Any User’ setting in the Login Access Policies page is enabled

A

D.) Ensure the ‘Administrator Can Log In As Any User’ setting in the Login Access Policies page is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following are password policy settings that can be modified in a Salesforce org? (3)

A.) Minimum password length

B.) Use username as password

C.) Password expiration

D.) Enforce password history

E.) Enable password generator

A

A.) Minimum password length

C.) Password expiration

D.) Enforce password history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What options are available to set the length of time after which the system logs out inactive users? (2)

A.) Session timeout can be set using a permission set

B.) Session timeout can be set at the profile level

C.) Session timeout can be set at the organization level

D.) Session timeout can be set by individual user

A

B.) Session timeout can be set at the profile level

C.) Session timeout can be set at the organization level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What should be done to ensure that a Salesforce Administrator can troubleshoot on a user’s behalf, without having to request login access from the user? (1)

A.) Turn on the ‘Log In As Any User’ permission on the System Administrator profile

B.) Turn on the ‘Administrator Can Log In As Any User’ setting in the Login Access Policies page

C.) Turn on the ‘Modify All Data’ permission

D.) Contact Salesforce to enable the ‘Administrator Can Login In As Any User’ feature

A

B.) Turn on the ‘Administrator Can Log In As Any User’ setting in the Login Access Policies page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The Salesforce Administrator received a task to create 100 user records in his organization. He is planning to use Data Loader, preparing a data load file, and verifying that all required field information is present. From the list, which of the following fields are required fields to create a user with Data Loader? (1)

A.) First Name, Last Name, Username, Alias, Email, ProfileId

B.) First Name, Username, Email, Role, and User License

C.) First Name, Last Name, ProfileId, and User License

D.) First Name, Last Name, Email, ProfileId, and Role

A

A.) First Name, Last Name, Username, Alias, Email, ProfileId

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The Salesforce org of Cosmic Sporting Goods has a Security Health Check score of 75%. Based on the Salesforce Baseline Standard, which grade does this score correspond to in Salesforce? (1)

A.) Fair

B.) Satisfactory

C.) Good

D.) Acceptable

A

C.) Good

29
Q

Sam, a marketing executive, has resigned and joined a new company. The Salesforce Administrator from his previous company needs tp remove this user from the system. He has decided to deactivate Sam in the system. What are some considerations when deactivating users in Salesforce? (3)

A.) A user that’s assigned as the sole recipient of a workflow email alert cannot be deactivated.

B.) His record can be transferred to another user.

C.) Deactivated users retain access to records manually shared with them.

D.) Any records created by the inactive user are transferred to the system administrator.

E.) Sam will not be deleted from the system but will no longer be able to log in to Salesforce.

A

A.) A user that’s assigned as the sole recipient of a workflow email alert cannot be deactivated.

B.) His records can be transferred to another user.

E.) Sam will not be deleted from the system but will no longer be able to log in to Salesforce.

30
Q

Cosmic Solutions has recently set up ‘My Domain’ for their Salesforce org. What are some of the things that a Salesforce Administrator can do to make sure that its deployment is successful? (3)

A.) Test tabs and links to see if they display the new subdomain

B.) Log in using the My Domain subdomain name

C.) Update all application URLs

D.) Deploy the new subdomain when there is high traffic to make sure everyone can access the new subdomain

E.) Communicate the change of the subdomain only after deployment

A

A.) Test tabs and links to see if they display the new subdomain

B.) Log in using the My Domain subdomain name

C.) Update all application URLs

31
Q

After attempting to log in to Salesforce with invalid passwords, a user is now locked out. What are the possible solutions a Salesforce Administrator can do to assist the user? (2)

A.) Unlock the user

B.) Ask the user to reset the password themselves

C.) Update the user’s password to a temporary one and email it

D.) Reset the password using the Reset Password button

A

A.) Unlock the user

D.) Reset the password using the Reset Password button

32
Q

Salesforce has provided a number of auditing features, which can be useful in diagnosing potential or real security issues. Which of the following auditing features are available in Salesforce? (3)

A.) Debug logs

B.) Login History

C.) eDiscovery logs

D.) Field History Tracking

E.) Setup Audit Trail

A

B.) Login History

D.) Field History Tracking

E.) Setup Audit Trail

33
Q

How can a feature license be assigned to a user? (1)

A.) By giving the user a Permission Set which contains the feature license

B.) From the Feature license related list of the Company Information page

C.) By creating a new feature license record related to the user

D.) By selecting the checkbox next to the feature to be enabled on the user record

A

D.) By selecting the checkbox next to the feature to be enabled on the user record

34
Q

Which of the following statements are true about resetting passwords when users get locked out? (2)

A.) Any user can reset their own password by navigating to their profile

B.) The user’s account is automatically unlocked after their password is reset

C.) The user’s security token is reset after resetting the password

D.) A Salesforce Administrator can only reset a password 5 times in a 24-hour period

A

B.) The user’s account is automatically unlocked after their password is reset.

C.) The user’s security token is reset after resetting the password

35
Q

A user was deactivated several months ago. What can be done to reactivate the user? (1)

A.) Disable the active checkbox

B.) Create a new contact

C.) Create a new user

D.) Enable the active checkbox

A

D.) Enable the active checkbox

36
Q

What is true regarding the Security Health Check? (2)

A.) All settings contribute equally to the score

B.) A high score means there are many high risk settings

C.) Values are compared against the Salesforce baseline standard

D.) Settings are grouped into High Risk, Medium Risk, Low Risk, and Informational

A

C.) Values are compared against the Salesforce baseline standard

D.) Settings are grouped into High Risk, Medium Risk, Low Risk, and Informational

37
Q

A group of managers needs to have access to several objects of a Salesforce app for a limited time. The Salesforce Administrator intends to assign several permission sets to these users in order to give them the required access but wants to make sure that their access is removed after a certain period of time. How can the Salesforce Administrator most efficiently address this requirement? (1)

A.) Create session-based permission sets, and assign them to the managers

B.) Create a permission set group that contains the permission sets, assign it to the managers, and remove the assignments at the end of the predetermined time period

C.) Create a session-based permission set group that contains the permissions, and assign them to the managers

D.) Create the permission sets, assign them to the managers, and remove the assignments at the end of the predetermined time period

A

C.) Create a session-based permission set group that contains the permissions, and assign them to the managers

38
Q

A Salesforce Administrator needs to set up users in a production organization and also in a sandbox organization. What does the Salesforce Administrator need to consider when setting up the users? (2)

A.) The username must be in the format of an email address

B.) Two users cannot have the same email address

C.) Salesforce will check to ensure the username is a valid email address

D.) The usernames need to be unique across all production organizations globally

A

A.) The username must be in the format of an email address

D.) The usernames need to be unique across all production organizations globally

39
Q

The leadership of a large online apparel company wishes to enable the My Domain feature in Salesforce. What does the Salesforce Administrator need to consider before enabling the My Domain feature? (2)

A.) Users will not be able to log in from https://login.salesforce.com

B.) Visualforce page URLs will change

C.) After the new domain has been deployed, it cannot be reversed

D.) My Domain cannot be used in a sandbox environment

A

B.) Visualforce page URLs will change

C.) After the new domain has been deployed, it cannot be reversed

40
Q

What options does a Salesforce Administrator have regarding setting the page displayed after a user logs out of Salesforce? (3)

A.) Display the standard Salesforce login page

B.) Display a custom logout page

C.) Display a custom single sign-on page

D.) Display the ‘Home’ page of a custom application in Salesforce

E.) Display the ‘Setup’ page of the Salesforce org

A

A.) Display the standard Salesforce login page

B.) Display a custom logout page

C.) Display a custom single sign-on page

41
Q

All internal users are being prompted to verify their identity when they login to Salesforce from a new computer or device. The Admin has been asked if it is possible to modify this behavior. Which of the following statements can the Admin reply with? (1)

A.) Yes - Device Activation can be deactivated for particular users on the user record

B.) No - All users must verify their identity when logging in for the first time on a new device

C.) Yes - Device Activation can be turned off in settings for all users

D.) Yes - Device Activation can be bypassed by adding a range of trusted IP addresses

A

D.) Yes - Device Activation can be bypassed by adding a range of trusted IP addresses

42
Q

A sales manager is planning to send an email to a few hundred leads and wants each email to include the name of the intended recipient. The sales manager is wondering if there is a feature in Lightning Experience that would let them email multiple leads at the same time but would modify each email to contain the intended recipient’s name. What Salesforce feature would allow them to do this? (1)

A.) Mass Email Leads

B.) Einstein Activity Capture

C.) Lightning Sync

D.) List Email

A

D.) List Email

43
Q

A user is not able to login. What could be the reason for this? (2)

A.) The user is attempting to log in from an IP address outside of the org wide trusted IP range

B.) The user is attempting to log in outside of the login hours defined for their profile

C.) The user is logging in from an IP address outside of the defined range for their profile.

D.) The user is attempting to log in outside of the org wide login hours

A

B.) The user is attempting to log in outside of the login hours defined for their profile

C.) The user is logging in from an IP address outside of the defined range for their profile

44
Q

For any customer-centric organization, the opportunity or deal record data are sensitive. A sales manager has requested the Admin to monitor some of the important fields that are getting changed by multiple teams from time to time during the sales lifecycle. Which security option can the Admin choose to achieve this? (1)

A.) Enable organization-wide default sharing settings for the opportunity object to set it to sales manager level

B.) Provide the ‘View All Data’ permission to the sales manager to allow seeing all changes

C.) Provide the ‘View All’ permission to the sales manager to allow seeing all changes.

D.) Enable field history tracking for the opportunity object and create a report

A

D.) Enable field history tracking for the opportunity object and create a report

45
Q

Which of the following are organization-level security access controls? (3)

A.) Platform encryption

B.) Multi-Factor Authentication

C.) Permission sets

D.) Trusted IP ranges

E.) Password policies

A

B.) Multi-Factor Authentication

D.) Trusted IP ranges

E.) Password policies

46
Q

Where can an Admin find information on a user’s login attempts? (3)

A.) Login History related list on a user record

B.) Login History Page

C.) Login Attempts Page

D.) User Detail section on a user record

E.) Login Security Page

A

A.) Login History related list on a user record

B.) Login History Page

D.) User Detail section on a user record

47
Q

An Admin is tasked with securing the company’s Salesforce org. What feature should the Admin start with that can be used to identify and fix security vulnerabilities in the org? (1)

A.) Health Overview

B.) Health Fix

C.) Health Check

D.) System Monitor

A

C.) Health Check

48
Q

An Admin wants to insert records using Data Loader, but he does not have access to his email where the security token has been sent. How can he proceed? (1)

A.) Add the IP address to the trusted IP ranges

B.) Uncheck ‘Use Security Token’ in Data Loader settings

C.) Raise a Case to Salesforce Support

D.) Ensure that the IP address is not within the restricted IP range

A

A.) Add the IP address to the trusted IP ranges

49
Q

Which of the following are valid identity verification methods? (2)

A.) Using the verification code in an email that is sent to the address associated with the account

B.) Using an API key pair that includes a unique secret key to verify the account activity

C.) Using the Salesforce Authenticator mobile app to verify the account activity

D.) Entering a mobile number every time during login to receive a verification code in a text message

A

A.) Using the verification code in an email that is sent to the address associated with the account

C.) Using the Salesforce Authenticator mobile app to verify the account activity

50
Q

On Sunday you need to restrict access to your Salesforce organization for all users in order to perform maintenance of the system. What is the best way to accomplish this? (1)

A.) Deactivate all users on Sunday morning and activate again on Monday morning

B.) Add Company IP Address restrictions on Sunday to prevent any logins

C.) Add Login Hours restrictions to all profiles except the system administrator profile

D.) Add the system administrator IP address to the trusted IP address list for Sunday only

A

C.) Add Login Hours restrictions to all profiles except the system administrator profile

51
Q

Which features can an Admin use to control record sharing? (3)

A.) Role Hierarchy

B.) Permission Sets

C.) Profiles

D.) Sharing Rules

E.) Organization Wide Default Settings

A

A.) Role Hierarchy

D.) Sharing Rules

E.) Organization Wide Default Settings

52
Q

United Technologies is looking to customize their internal Salesforce URL to their branding, planning on leveraging Single Sign-On (SSO), as well as developing custom Lightning components. Which of the following is required in order to utilize these features? (1)

A.) Custom URL

B.) My Domain

C.) Custom Sites Domain

D.) Public Sites

A

B.) My Domain

53
Q

The company’s security manager has reported that they are not able to view the Health Check page of the Salesforce org. What could be the problem? (2)

A.) The user does not have ‘Manage Login Access Policies’ and ‘Manage Password Policies’ permissions

B.) The user does not have ‘View Health Check’ permission

C.) The user does not have ‘View Setup and Configuration’ permission

D.) The user does not have ‘Customize Application’ permission

A

B.) The user does not have ‘View Health Check’ permission

C.) The user does not have ‘View Setup and Configuration’ permission

54
Q

The HR managers of Cosmic Express often need to create User records for new employees. A new security policy requires that the ‘Email’ field on any new User records contain an email address that uses the company’s email domain. How can a system administrator configure Salesforce to restrict the email domain for this use case? (1)

A.) The ‘Allowed Email Domains’ list can be updated in the profile assigned to the HR managers who need to create User records.

B.) The company’s email domain can be added to the list of allowed domains on the ‘User Management Settings’ page in Setup.

C.) An ‘Email Domain Filter’ that excludes the company’s domain name can be created on the ‘Email Domain Filters’ page in Setup

D.) ‘Email Domain Allowlist’ can be enabled, and the company’s email domain can be added to the ‘Allowed Email Domains’.

A

D.) ‘Email Domain Allowlist’ can be enabled, and the company’s email domain can be added to the ‘Allowed Email Domains’.

55
Q

Brewmount Inc. has established single sign on (SSO) for their Salesforce org recently. With the SSO implementation, the users started reporting that they are unable to reset their passwords. What is trued in this situation? (2)

A.) The ‘Reset my Password’ option in all user profiles needs to be enabled.

B.) SSO users cannot reset their passwords within Salesforce

C.) Salesforce password policies do not apply for SSO users.

D.) A case should be opened with Salesforce support.

A

B.) SSO users cannot reset their passwords within Salesforce.

C.) Salesforce password policies do not apply for SSO users.

56
Q

The Admin wants to make the org more secure with network-based security. When should network-based security be used? (3)

A.) When she wants to limit who can login

B.) When she wants to make it difficult o use stolen credentials

C.) When she wants to specify user authentication protocols

D.) When she wants to limit when people can login

E.) When she wants to limit where people can login

A

B.) When she want to make it difficult to use stolen credentials

D.) When she wants to limit when people can login

E.) When she wants to limit where people can login

57
Q

Which of the following is true regarding the addition of an identity verification method to a user’s account? (1)

A.) An email confirmation is sent to the user if a new identity verification method (e.g. mobile phone) is added.

B.) Salesforce calls the user to confirm that the identity verification method is valid

C.) Salesforce blocks the added identity verification method until the email is confirmed

D.) Only a Salesforce Administrator can add identity verification methods for users.

A

A.) An email confirmation is sent to the user if a new identity verification method (e.g. mobile phone) is added.

58
Q

The Salesforce Administrator has set up login hour restrictions on the Marketing team profile so that they could access the application between 8:00 a.m. to 4:00 p.m.. What will happen if a user logged in at 3:45 p.m. and continues to work until 4:01 p.m.? (1)

A.) The user is logged out upon navigation to a new page or data update operation (create, save, edit, delete)

B.) The user is asked in a popup window if he would like to extend his session

C.) The user can keep working continuously without any issues

D.) The user is automatically logged out

A

A.) The user is logged out upon navigation to a new page or data update operation (create, save, edit, delete)

59
Q

Under which of the following conditions can a user NOT be deactivated? (2)

A.) User is owner of records in Salesforce

B.) User is assigned to an account team

C.) User is selected in a custom hierarchy field

D.) User is the sole recipient of a workflow email alert

A

C.) User is selected in a custom hierarchy field

D.) User is the sole recipient of a workflow email alert

60
Q

If a user is working in Salesforce when the login hours end, what will happen? (1)

A.) The user can continue working, but no new users can log in.

B.) A warning message is displayed and the user is logged out immediately.

C.) The user can continue to work with no impact.

D.) The user can continue viewing the page they are currently on, but if they take further action or navigate to a new page they will be logged out.

A

D.) The user can continue viewing the page they are currently on, but if they take further action or navigate to a new page they will be logged out.

61
Q

HR has informed you that a Salesforce user has left the company.
What is the best course of action? (1)

A.) Leave the user record active and use for the next user that needs to be set up by updating the name and email address

B.) Leave the user record but unassign the Salesforce license

C.) Deactivate the user after ensuring the user is not the sole recipient of a workflow email alert

D.) Delete the user after transferring any records owned to another user

A

C.) Deactivate the user after ensuring the user is not the sole recipient of a workflow email alert

62
Q

What are the implications of freezing a user? (2)

A.) After freezing a user account, the user license will be made available for use by another user in the organization.

B.) Access can be allowed again by unfreezing the user.

C.) The user will no longer be able to log in.

D.) The user will be able to log in, but will not be able to update any records.

A

B.) Access can be allowed again by unfreezing the user.

C.) The user will no longer be able to log in.

63
Q

A user would like to change the language that the user interface is displayed in. How can the Admin accomplish this? (2)

A.) Change the Default Language setting in the Company Profile

B.) Advise the user to change the Language setting under ‘My Personal Information’

C.) Change the Locale for the user

D.) Change the Language setting for the user in the user detail page in Setup

A

B.) Advise the user to change the Language setting under ‘My Personal Information’

D.) Change the Language setting for the user in the user detail page in Setup

64
Q

An organization is using My Domain, and it prevents login from the Salesforce URL. A user has reported to an administrator that they are not able to log in. The administrator has checked the login history but does not see an entry for the time when the user was attempting to log in. What could be the issue? (1)

A.) The user did not use the My Domain URL for login

B.) The user is locked out due to invalid login attempts

C.) The user entered an incorrect password

D.) The user entered an incorrect username

A

D.) The user entered an incorrect username

65
Q

The users with the Sales profile should no longer have access to several fields on a custom object. The Admin. employs field-level security for these fields. What should the Admin. consider before changing the page layout and field-level security settings? (2)

A.) Fields can be set as hidden in the page layout but users will still be able to access the fields in reports, search, and list views

B.) If a field is set to be read-only using field-level security for a user’s profile but the user has edit access to the object, the user is able to update the field

C.) If a field is hidden using field-level security, it does not appear in page layouts, search results, related lists, and list views but it will appear in reports

D.) If a field is hidden using field-level security, it does not appear in page layouts, search results, related lists, list views, or reports

A

A.) Fields can be set as hidden in the page layout but users will still be able to access the fields in reports, search, and list views

D.) If a field is hidden using field-level security, it does not appear in page layouts, search results, related lists, list views, or reports

66
Q

Martin, the Admin, will be on vacation for 3 days. He used the ‘Delegated Administration’ function to allow Andrew, the Sales Manager, to do certain administrative duties. Which tasks would Andrew be able to do as a result of being a delegated administrator? (3)

A.) Create and edit users in specific profiles and roles

B.) Modify permission sets

C.) Assign a new profile that has a ‘Modify All Data’ permission

D.) Assign specific permission sets

E.) Reset passwords for users in specific roles

A

A.) Create and edit users in specific profiles and roles

D.) Assign specific permission sets

E.) Reset passwords for user in specific roles

67
Q

An organization has a Security Health Check score of 55%. The Admin of the organization needs to identify and fix potential vulnerabilities in security settings that are at high risk in order to remediate them. If the default Salesforce Baseline Standard is used for the health check, which of the following are high risk security settings? (2)

A.) Number of expired certificates

B.) Maximum invalid login attempts

C.) Minimum password length

D.) Days until certificate expiration

A

A.) Number of expired certificates

B.) Maximum invalid login attempts

68
Q

John Ray is a Salesforce Administrator at Newport Inc. He need to create 200 users but he does not want to notify the users of their login details. What is the most efficient way to achieve this? (1)

A.) Use Data Loader to create users

B.) Create each user manually and deselect the ‘Generate new password and notify the user immediately’ option

C.) Use the Create Multiple Users feature and deselect the ‘Generate new password and notify the user immediately’ option

D.) Open a case with Salesforce to create the users and request no email notifications

A

A.) Use Data Loader to create users