Data Security Flashcards
You can manage record-level access in these four ways
Organization-wide defaults
Role hierarchies
Sharing rules
Manual sharing
You can configure access to data at all of the following levels, except:
1 - Organization
2- Objects
3- Page Layouts
4- Records
3- Page Layouts
You can secure data at the organization level, using all of these methods, except: 1 - Limit login IP addresses 2- Limit login hours 3 - Set password policies 4- Use hardware token
4- Use hardware token
Which of these is not a method for controlling record-level access?
1- Organization-Wide Defaults”,
2- Role Hierarchy
3- Profiles
4- Sharing Rules
3 - Profiles
Levels of Data Access
Organization
Objects
Fields
Records
The license determines which profiles are available for each user.
1- True
2- False
1- True
You can delete a user that was created
1- True
2- False
2- False
“You can’t delete a user, but you can deactivate an account so a user can’t log in. Deactivated users lose access to all records. (That includes records that are shared with them individually and records shared with them as team members.) However, you can still transfer this data to other users and view the names on the Users page.”
What are the options available if you can’t immediately deactivate an account (for example, when the user is selected in a custom hierarchy field)
you can freeze their account. That prevents the user from logging in to your organization while you’re working on deactivating them.
A user can have
1- Many profiles and many permission sets
2- one profile and one permission set
3- one profile and many permission sets
4- Many profiles and one permission set
3- one profile and many permission sets
Profile
Collection of settings and permissions Apps Tabs Field Permissions Record type?? Objects Login Time Admin Permissions User Permissions
You can edit the object permissions on a standard profile
1- True
2- False
2- False
You can restrict the access to a Accounts object on a Standard System Administrator profile
1- True
2- False
2- False
“You can’t edit the object permissions on a standard profile.
The System Administrator profile also includes two special permissions:
View All Data
Modify All Data”
Field settings can be applied either by
modifying profiles or
permission sets or
from the Field Accessibility menu in Setup
By default, the Grant Access Using Hierarchies option is enabled for all objects.
1- True
2- False
1- True
You can change Grant Access Using Hierarchies option for Standard objects.
1- True
2- False
2- False
Field-level security prevents searching on the values in a field?
True or False?
False.
Field-level security doesn’t prevent searching on the values in a field. To set up your organization to prevent users from searching and retrieving records that match a value in a field hidden by field-level security, contact Salesforce.com Customer Support.
Field-level security prevents searching on the values in a field?
True or False?
False.
Field-level security doesn’t prevent searching on the values in a field. To set up your organization to prevent users from searching and retrieving records that match a value in a field hidden by field-level security, contact Salesforce.com Customer Support.
You can restrict access below your organization-wide default levels.
True or False?
False
You can assign a Profile to an entire team. True or False?
True
Standard profiles provide access to newly created custom objects assigned to active users.
True or False?
False. Standard profiles do not become as useful when assigned to active users since they no longer provide access to newly created custom objects.
When you delete a sharing rule, the sharing access created by that rule is automatically removed.
True or False?
True
If multiple sharing rules give a user different levels of access to a record, what access level will the user ultimately receive?
The user gets the most permissive access level.
Name the six standard profiles and what they can do:
- Standard User
Create, Read, Edit, Delete on records they can access - Read Only
Only view records that they can access - System Administrator
Super powers! View all data & modify all data - Solution Manager
Standard User + manage published solutions - Marketing Manager
Standard users + import leads - Contract Manager
Standard user + manage contracts
What do you have to do to prevent objects from showing in reports and dashboards?
Remove read permission from Profile to completely remove object from Profile.
What permission is set in a user's profile? Choose 3 answers A. Object Permissions B. Marketing User C. Mass Email D. Active E. Run Reports
A. Object Permissions
C. Mass Email
E. Run Reports
What will happen when a user attempts to log in to Salesforce from an IP address that is outside the login IP range on the user’s profile but within the organization-wide trusted IP range?
A. The user will not be able to log in at all.
B. The user will be able to log in without activating the computer.
C. The user will be able to log in after the computer is activated.
D. The user will be able to log in after answering a security question.
C. The user will be able to log in after the computer is activated.
If two objects have a parent-child relationship, how can a user access the child record from the parent record? A. Related list B. Lookup field C. Custom link D. Child field
A. Related list
A user is having trouble logging into Salesforce. The user’s login history shows that this person has attempted log in
multiple times and has been locked out of organization.
How can the system administrator help the user log into Salesforce? Choose 2 answers
A. Click Reset Password on the user’s record detail page.
B. Log in as the user and enter a new password.
C. Click unlock on the user’s record detail page.
D. Send an email to the user containing the user’s password.
A. Click Reset Password on the user’s record detail page.
C. Click unlock on the user’s record detail page.
A user profile has login hour restrictions set to Monday through Friday, 8:00 a.m. to 5:00 p.m. The user logged in at
4:30 p.m. on a Tuesday and it is now 5:01 p.m.
Which behavior of the application should the user expect?
A. The user will be able to continue working and start new sessions.
B. The user will be logged out and any unsaved work-in-process will be saved.
C. The user will be able to continue working, but will be unable to start any new sessions.
D. The user will be logged out and any unsaved work-in-process will be lost.
C. The user will be able to continue working, but will be unable to start any new sessions.
https://help.salesforce.com/articleView?id=users_profiles_epui_login_hours_edit.htm&type=0
When using sharing rules, what users can records be shared with? Choose 2 answers A. Public groups B. Roles and subordinates C. Profiles D. Queues
A. Public groups
B. Roles and subordinates
What record level access can be given through sharing 1 Read 2 Read/Write 3 Read/Edit/Transfer 4 Read/Edit/Transfer/Delete
2 Read/Write
3 Read/Edit/Transfer