Data Security Flashcards

1
Q

____—provide the bluntest way to control data access. You can prevent a user from seeing, creating, editing, or deleting any instance of a particular object type, such as a lead or opportunity, by using ______. You can hide tabs and objects from selected users, so that they don’t even know that type of data exists.

A

Object-level security—or object permissions

object permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ are collections of settings and permissions that determine what a user can do in the application

A

Permission sets and profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ are defined by a user’s job function, such as Salesforce admin or sales representative. You can assign one _____ to many users, but you can assign only one _____ per user.

(same word all 3)

A

profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You can use ______ to grant more ____ and access settings to users. Now it’s easier to manage users’ _____ and access because you can assign multiple ______ to a single user.

A

permission sets

permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

control whether a user can see, edit, and delete the value for a particular field on an object. You can protect sensitive fields without hiding the entire object.

A

Field-level security—or field permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ control the visibility of fields in any part of the app, including related lists, list views, reports, and search results.

A

Field permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ lets you give users access to some object records, but not others.

A

Record-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a hierarchy, users higher in the hierarchy always have the same access to users below them in the hierarchy. T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To specify record-level security, set your organization-wide sharing settings, define a hierarchy, and create sharing rules

A

Organization-wide

Role hierarchy

Sharing rules

Manual sharing

User sharing

Apex managed sharing

Restriction rules

Scoping rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With ____ rules you can set criteria to help your users see only records that are relevant to them. ____ rules don’t restrict the record access that your users already have. They ____ the records that your users see. Your users can still open and report on all records that they have access to per your sharing settings.

A

scoping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When a ____ rule is applied to a user, the data that they had read access to via your sharing settings is further scoped to only records matching the record criteria that you set. This behavior is similar to how you can filter results in a list view or report, except that it’s permanent

A

restriction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If sharing rules and manual sharing don’t provide the required control, you can use ____ ____ ____. ____ allows developers to programmatically share custom objects. When you use ____ on a custom object, only users with the Modify All Data permission can add or change the sharing on the custom object’s record. The sharing access is maintained across record owner changes.

A

Apex managed sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With _____, you can show or hide an internal or external user from another user in your organization. ______ rules are based on membership to a public group, role, or territory, so you must create the appropriate public groups, roles, or territories before creating ______. Each _____ shares members of a source group with members of the target group. Users inherit the same access as users below them in the role hierarchy.

A

User sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Sometimes it’s impossible to define a consistent group of users who need access to a particular set of records. Record owners can use _____ to give read and edit permissions to users who don’t have access any other way. _____ isn’t automated like organization-wide sharing settings, role hierarchies, or sharing rules. But it gives record owners the flexibility to share records with users that must see them.

A

Manual sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With _____ you can make automatic exceptions to organization-wide sharing settings for sets of users. Use _____ to give these users access to records they don’t own or can’t normally see. _____, like role hierarchies, are only used to give more users access to records—they can’t be stricter than your organization-wide default settings.

A

sharing rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After you specify organization-wide sharing settings, the first way to give wider access to records is with a ______. Similar to an organization chart, a _______ is the level of data access that a user or group of users needs. The _______ ensures that users higher in the hierarchy can always access the same data as users who are lower, regardless of the organization-wide default settings. Each role in the hierarchy can represent a level of data access that a user or group of users needs rather than matching your organization chart

A

role hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The first step in record-level security is to determine the _____ for each object. ______ specify the default level of access that users have to each others’ records.

A

Organization-wide sharing settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You use ____ to lock your data to the most restrictive level. Use the other record-level security and sharing tools to selectively give access to other users.

A

organization-wide sharing settings

For example, users have object-level permissions to read and edit opportunities, and the organization-wide sharing setting is Read-Only. By default, those users can read all opportunity records, but can’t edit any unless they own the record or are granted other permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ lets you give the right people the right access to the right resources at the right time.

A

Salesforce Identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_____ lets users access all authorized resources without logging in separately to each one—and without having to create (and remember) different user credentials for each app

A

Single sign-on (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

And what are those “authorized resources” that your signed-on users have access to?

A

connected apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

With ______ users log in to a Salesforce org with their username and password from an external authentication provider, like Facebook, Twitter, LinkedIn, or Google. You can set up any of these providers with a few clicks. With a little bit of work, you can set up other providers, like PayPal and Amazon.

A

social sign-on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social sign-on is especially useful when you want customers to be able to log in to an _____ site without having to create (and remember) a new username and password. Customers can log in to an ______ site using their Facebook or LinkedIn account

same word

A

Experience Cloud

24
Q

users have to provide two or more pieces of evidence—or factors—when they log in. One factor is the user’s username and password combination. The requirement for additional factors is satisfied through the use of a verification method that the user has in their possession, such as an authenticator app or a Universal Second Factor (U2F) security key.

A

multi-factor authentication

25
Q

authentication helps ensure that even if an attacker acquires a user’s password, the attacker can’t log in and do harm.

A

multi-factor authentication

26
Q

With the _____, you can customize your Salesforce URL to include your company or brand name. With the ______ feature, you can customize your login page to reflect your company’s design scheme and messaging—your brand.

A

My Domain Identity feature

27
Q

____ user account management means that admins can manage all their user account tasks in one place. Administrators can easily grant users access to other apps and revoke or freeze access when they have to.

A

Centralized

28
Q

_____ provides greater control over security, helps reduce access-related risk, and makes life easier for end users.

A

centralized management

29
Q

Many people with Salesforce accounts also have accounts in other clouds, such as Google Apps, Office365, Concur, or Box. ____ ______ provides a single location where admins can create, update, delete, and manage those user accounts.

A

Salesforce user provisioning

30
Q

The ______ presents tiles for all the standard apps, custom apps, and connected apps in your Salesforce org

A

App Launcher

31
Q

How do admins and businesses benefit from Salesforce Identity?

A

Convenient one-click access to all apps so users can be more productive

32
Q

What’s the difference between single sign-on (SSO) and social sign-on?

A

With Single Sign On (SSO) users can access services without logging in to each one. With social sign on users can access a service using their social account credentials

33
Q

And if you’re up for a bit of coding, you can create a custom authentication provider plug-in to authenticate users with any provider that uses ____.

A

OAuth

34
Q

Identity solutions benefit only employees

A

My Domain

Identity Connect

User Provisioning

35
Q

Identity solutions benefit only customers

A

Communities

Self-Registration

36
Q

Identity solutions benefit both customers and employees

A

Connected Apps

App Launcher

Single Sign On

Profiles and permission sets

Two factor Authentication

Auth Providers (Social Sign on)

37
Q

How do users benefit from Salesforce Identity?

A

They can use one username and password to access everything they need.

38
Q

Which of the following is a benefit for customers and partners but not employees

A

Communities & Self-Registration

39
Q

What is important to consider when customizing user registration for your org or site?

A

Launching other business processes to support registration

40
Q

_____ provides important information for diagnosing potential security issues or dealing with real ones. Someone in your organization should _____ regularly to detect potential abuse

A

Auditing, audit

41
Q

All objects include fields to store the name of the user who created the record and who last modified the record. This provides some basic auditing information.

A

Record Modification Fields

42
Q

You can review a list of successful and failed login attempts for the past six months

A

Login History

43
Q

You can turn on auditing to automatically track changes in the values of individual fields.

A

Field History Tracking

Although field-level auditing is available for all custom objects, only some standard objects allow it

44
Q

_____ logs when modifications are made to your organization’s configuration.

A

Setup Audit Trail

45
Q

What are the methods for controlling record-level access

A

Organization-wide
Role hierarchies
Sharing rules
Manual sharing

46
Q

You can configure access to data at all of the following levels

A

Organization, Objects & Records

47
Q

Each user is assigned one ___. Users can be assigned one or more ____ sets.

A

one profile

permission sets

48
Q

A user’s ____ determines the objects they can access and the things they can do with any object record (such as create, read, edit, or delete).

A

profile

49
Q

_____ sets grant additional permissions and access settings to a user.

A

Permission

50
Q

The ____ in a user’s profile determine whether the user can see a particular app, tab, field, or record type.
The permissions in a user’s ____ determine whether the user can create or edit records of a given type, run reports, and customize the app

A

settings

profile

51
Q

There are permissions in a profile and then there are other permissions that give extra access. Profiles are the lowest of access while permissions give extra access to certain things T/F

A

T

52
Q

____ User can create and edit records

A

Standard

53
Q

_____ Access - Salesforce user can view records, but not create or edit them

A

Minimum

54
Q

The ______ profile has the widest access to data and the greatest ability to configure and customize Salesforce.

A

System Administrator

55
Q

The System Administrator profile also includes two special permissions:
____

_____

A

View All Data

Modify All Data