Configuration & Setup Flashcards
Universal Containers wants to increase the security of their org by requiring stricter user passwords
Which two of the following should an administrator configure?
Choose 2 answers
A. Prevent common words
B. Password different than username
C. Minimum password length
D. Password complexity requirement
C. Minimum password length
D. Password complexity requirement
Universal Containers has a public read only sharing model on accounts. A new sales team has been created that will be dealing with high-security customers. The administrator has been asked to hide these accounts from anyone NOT on this team.
Which two steps must be taken to hide these accounts without impacting access to the rest of the Sales team? Choose 2 answers
A. Create ownership-based sharing rules
B. Create a new account type to separate both teams.
C. Change the new team role to be outside the company hierarchy.
D. Change organization-wide default on account to private.
A. Create ownership-based sharing rules.
C. Change the new team role to be outside the company hierarchy.
The administrator for AW Computing is working with a user who is having trouble logging in to Salesforce
What should the administrator do to identify why the user is unable to log in?
A. Review the password policies.
B. Review the login history.
C. Review the password history.
D. Review the security token.
B. Review the login history.
Cloud Kicks has the organization-wide sharing default set to private on the Shoe object. The sales manager should be able to view a report containing shoe records for all of the sales reps on their team.
Which three items should the administrator configure to provide appropriate access to the report? Choose 3 answers
A. Report Subscription
B. Role Hierarchy
C. Folder Access
D. Field-Level Security
E. Custom Report Type
B. Role Hierarchy
D. Field-Level Security
E. Custom Report Type
Northern Trail Outfitters Is using one profile for all of its marketing users, providing read- only access to the Campaign object. A few marketing users now require comprehensive edit access on Campaigns.
How should an administrator fulfill this request?
A. Organization-wide defaults
B. Permission sets
C. Marketing user checkbox
D. Field-level security
C. Marketing user checkbox
Which two prompts will happen when one of the users attempts to log In to Data Loader?
Choose 2 answers
A. Users need to connect an authenticator app to their Salesforce account.
B. Users need to get a security token from a trusted network using Reset My Security Token.
C. Users need to download and install an authenticator app on their mobile device.
D. Users need to enter a verification code from email or SMS, whichever has higher priority.
C. Users need to download and install an authenticator app on their mobile device.
D. Users need to enter a verification code from email or SMS, whichever has higher priority.
Which tool should an administrator use to identify and fix potential session vulnerabilities?
A. Setup Audit Trail
B. Field History Tracking
C. Organization-Wide Defaults
D. Security Health Check
D. Security Health Check
QUESTION 225
The administrator at Cloud Kicks created a new field for tracking returns on their new cloud shoe. A user has submitted a case to the administrator indicating that the new field is unavailable.
Which two steps should an administrator do to troubleshoot this issue?
Choose 2 answers
A. Review the field-level security of the field for the user profile.
B. Ensure that the page layout for the user’s profile has been updated.
C. Run the setup audit trail for the organization.
D. Update the organization-wide defaults for the object.
A. Review the field-level security of the field for the user profile.
B. Ensure that the page layout for the user’s profile has been updated.
Universal Containers wants to prevent its service team from accessing deal records. While service users are unable to access deal list views, they are able to find deal records via a search.
What option should the administrator adjust to fully restrict access?
A. App permissions and search terms
B. Record settings and search index
C. Page layouts and field-level security
D. Permissions and tab visibility
C. Page layouts and field-level security
When a user logs in the first time to Salesforce, the following takes place (check all that apply)
A. A cookie is placed in the their browser
B. Pop ups are automatically disabled
C. Their IP address is added to a trusted list
D. They are prompted to answer a security question
A. A cookie is placed in the their browser
C. Their IP address is added to a trusted list
The system administrator needs to prevent telesales teams from logging into Salesforce outside of the office.
How will he/she do this?
A. There is not way to do this
B. Setup | Security Controls | Network Access and specify the team’s range of IP addresses
C. Add the range of IP addresses to the team’s profile(s)
D. Contact salesforce.com as this feature must be enabled
C. Add the range of IP addresses to the team’s profile(s)
If Field Level Security prevents a user from viewing the Credit Card field on the Opportunity record, the user will also be prevented from seeing this field (choose all that apply)
A. In a related list
B. In search results
C. In reports
D. In list views
E. All of the above
F. None of the above
E. All of the above
You will need a security token to access Salesforce via (choose all that apply)
A. Import Wizard
B. Data Loader
C. Salesforce for Outlook
D. All of the above
B. Data Loader
C. Salesforce for Outlook
The page layout allows users to see the Next Steps field on an Opportunity record, Field Level Security dictates that the field is hidden, how will the field appear to the user?
A. The field will be hidden from the user
B. The field will be read only
C. The field will be visible and editable to the user
D. None of the above
A. The field will be hidden from the user
Once a field is hidden from a Profile using ‘Field Level Security’, a User associated to that Profile can still see the field using the following:
A. List Views
B. Reports
C. Search
D. None of the above, the user cannot see the field at all
D. None of the above, the user cannot see the field at all