Data Security Flashcards

1
Q

You can manage record-level access in these four ways

A

Organization-wide defaults
Role hierarchies
Sharing rules
Manual sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You can configure access to data at all of the following levels, except:

1 - Organization
2- Objects
3- Page Layouts
4- Records

A

3- Page Layouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
You can secure data at the organization level, using all of these methods, except:
1 - Limit login IP addresses
2- Limit login hours
3 - Set password policies
4- Use hardware token
A

4- Use hardware token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of these is not a method for controlling record-level access?

1- Organization-Wide Defaults”,
2- Role Hierarchy
3- Profiles
4- Sharing Rules

A

3 - Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Levels of Data Access

A

Organization
Objects
Fields
Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The license determines which profiles are available for each user.
1- True
2- False

A

1- True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can delete a user that was created
1- True
2- False

A

2- False

“You can’t delete a user, but you can deactivate an account so a user can’t log in. Deactivated users lose access to all records. (That includes records that are shared with them individually and records shared with them as team members.) However, you can still transfer this data to other users and view the names on the Users page.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the options available if you can’t immediately deactivate an account (for example, when the user is selected in a custom hierarchy field)

A

you can freeze their account. That prevents the user from logging in to your organization while you’re working on deactivating them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A user can have

1- Many profiles and many permission sets
2- one profile and one permission set
3- one profile and many permission sets
4- Many profiles and one permission set

A

3- one profile and many permission sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Profile

A
Collection of settings and permissions
Apps
Tabs
Field Permissions
Record type??
Objects
Login Time
Admin Permissions
User Permissions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You can edit the object permissions on a standard profile

1- True
2- False

A

2- False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You can restrict the access to a Accounts object on a Standard System Administrator profile

1- True
2- False

A

2- False

“You can’t edit the object permissions on a standard profile.
The System Administrator profile also includes two special permissions:
View All Data
Modify All Data”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Field settings can be applied either by

A

modifying profiles or
permission sets or
from the Field Accessibility menu in Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

By default, the Grant Access Using Hierarchies option is enabled for all objects.

1- True
2- False

A

1- True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You can change Grant Access Using Hierarchies option for Standard objects.

1- True
2- False

A

2- False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Field-level security prevents searching on the values in a field?

True or False?

A

False.

Field-level security doesn’t prevent searching on the values in a field. To set up your organization to prevent users from searching and retrieving records that match a value in a field hidden by field-level security, contact Salesforce.com Customer Support.

17
Q

Field-level security prevents searching on the values in a field?

True or False?

A

False.

Field-level security doesn’t prevent searching on the values in a field. To set up your organization to prevent users from searching and retrieving records that match a value in a field hidden by field-level security, contact Salesforce.com Customer Support.

18
Q

You can restrict access below your organization-wide default levels.

True or False?

A

False

19
Q

You can assign a Profile to an entire team. True or False?

A

True

20
Q

Standard profiles provide access to newly created custom objects assigned to active users.

True or False?

A

False. Standard profiles do not become as useful when assigned to active users since they no longer provide access to newly created custom objects.

21
Q

When you delete a sharing rule, the sharing access created by that rule is automatically removed.

True or False?

A

True

22
Q

If multiple sharing rules give a user different levels of access to a record, what access level will the user ultimately receive?

A

The user gets the most permissive access level.

23
Q

Name the six standard profiles and what they can do:

A
  1. Standard User
    Create, Read, Edit, Delete on records they can access
  2. Read Only
    Only view records that they can access
  3. System Administrator
    Super powers! View all data & modify all data
  4. Solution Manager
    Standard User + manage published solutions
  5. Marketing Manager
    Standard users + import leads
  6. Contract Manager
    Standard user + manage contracts
24
Q

What do you have to do to prevent objects from showing in reports and dashboards?

A

Remove read permission from Profile to completely remove object from Profile.

25
Q
What permission is set in a user's profile?
Choose 3 answers
A. Object Permissions
B. Marketing User
C. Mass Email
D. Active
E. Run Reports
A

A. Object Permissions
C. Mass Email
E. Run Reports

26
Q

What will happen when a user attempts to log in to Salesforce from an IP address that is outside the login IP range on the user’s profile but within the organization-wide trusted IP range?

A. The user will not be able to log in at all.
B. The user will be able to log in without activating the computer.
C. The user will be able to log in after the computer is activated.
D. The user will be able to log in after answering a security question.

A

C. The user will be able to log in after the computer is activated.

27
Q
If two objects have a parent-child relationship, how can a user access the child record from the parent record?
A. Related list
B. Lookup field
C. Custom link
D. Child field
A

A. Related list

28
Q

A user is having trouble logging into Salesforce. The user’s login history shows that this person has attempted log in
multiple times and has been locked out of organization.
How can the system administrator help the user log into Salesforce? Choose 2 answers
A. Click Reset Password on the user’s record detail page.
B. Log in as the user and enter a new password.
C. Click unlock on the user’s record detail page.
D. Send an email to the user containing the user’s password.

A

A. Click Reset Password on the user’s record detail page.

C. Click unlock on the user’s record detail page.

29
Q

A user profile has login hour restrictions set to Monday through Friday, 8:00 a.m. to 5:00 p.m. The user logged in at
4:30 p.m. on a Tuesday and it is now 5:01 p.m.
Which behavior of the application should the user expect?
A. The user will be able to continue working and start new sessions.
B. The user will be logged out and any unsaved work-in-process will be saved.
C. The user will be able to continue working, but will be unable to start any new sessions.
D. The user will be logged out and any unsaved work-in-process will be lost.

A

C. The user will be able to continue working, but will be unable to start any new sessions.

https://help.salesforce.com/articleView?id=users_profiles_epui_login_hours_edit.htm&type=0

30
Q
When using sharing rules, what users can records be shared with?
Choose 2 answers
A. Public groups
B. Roles and subordinates
C. Profiles
D. Queues
A

A. Public groups

B. Roles and subordinates

31
Q
What record level access can be given through sharing
1 Read 
2 Read/Write 
3 Read/Edit/Transfer 
4 Read/Edit/Transfer/Delete
A

2 Read/Write

3 Read/Edit/Transfer