Salesforce Admin Flashcards
How do admins and businesses benefit from Salesforce Identity?
Convenient one-click access to all apps so users can be more productive
What’s the difference between single sign-on (SSO) and social sign-on?
With SSO, users can access services without logging in to each one. With social sign-on, users can access a service using their social account credentials
How do users benefit from Salesforce Identity?
They can use one username and password to access everything they need.
What is a good reason to customize the user registration for your org or site?
To better support business processes after registration
Which protocol allows secure data sharing between applications?
OAuth
Which of the following is true when Salesforce acts as an identity provider to an external application?
What can you do with Salesforce campaigns?
Keep track of the status, details, and performance of all of your marketing initiatives
What’s one way to describe a Salesforce campaign?
A folder that helps organize marketing efforts
What information can you see with a campaign hierarchy?
The number of responses in the hierarchy
What is the most common number of levels in a campaign hierarchy?
3
How do you create a campaign hierarchy?
Entering a campaign name in the parent campaign field on a campaign record
What can you do with campaign record types?
Track different details for different kinds of campaigns
Who can be added to campaigns as members?
Leads, contacts, and person accounts
What is the best practice for defining your campaign member statuses?
Use the same set of values for all campaigns of the same type
How many campaign member statuses can count as a member response?
As many as you need
Where can you find the built-in campaigns reports?
In the campaigns folder on the reports tab
What kind of information can you see with the built-in Campaign reports?
Who has responded to each campaign
What is the Service Cloud?
An easy-to-use customer service application
To update a customer case with a comment:
select the case from the cases tab, and share a post
What are two key benefits of Lightning Service Setup?
Service metrics and setup flows
To get to Lightning Service Setup:
click the gear icon then setup services
The second stage in the setup process for Service Cloud is to:
Add channels so that your team can respond to customers
What does Web-to-Case support?
Generating HTML to send to your web developer, Letting customers submit cases to your team from a website form, supporting case fields you choose, generating up to 5000 cases a day
Self-Service Help Centers:
Are self-service web experiences for your customers
What’s true about duplicate records?
They can waste your reps’ time
How can controlling duplicate records help admins?
Sales teams trust that you manage your CRM system with their success in mind.
Eliminating duplicate data:
Takes the guesswork out of wondering whether a prospect is already a customer. Ensures that one rep doesn’t try to qualify a lead that a colleague already owns.
Standard duplicate rules are available:
If your Salesforce org was created in Spring ‘15 or later
Duplicate Management helps sales reps:
Know when they’re creating a potential duplicate record
Matching rules work on
Accounts, contacts and leads
Matching rule EX: First Name AND Last Name AND Account name
Blank Fields don’t equal a match
In an approval process, the parts you define are:
Submissions, authorizations, and lightning actions
True or false: there’s no reason to plan an approval process before you start creating it.
False
What does good password hygiene mean?
Using strong passwords and never reusing passwords
What is a way that password managers protect you?
Generating random passwords and collecting username and password combinations in a secure database
The key advantage to privileged access management systems is:
They automate user privilege management and account discovery
What is an example of implementing the principle of least privilege?
Granting users access to only the fewest number of systems they need to do their work
What is an example of a coding shortcut that can lead to secrets exposure?
Including credentials in your code when using open source repositories like GIT
You need a My Domain in place to do which of the following?
Work in multiple Salesforce orgs in the same browser. Set up single sign-on (SSO) with third -party identity vendors
What requests does the My Domain redirect policy affect?
Requests to your org’s instances URLs, such as https://na140.lightning.force.com
What is privileged access management (PAM)?
The Strategies that the organization uses to control levels of access and permissions for administrative users
What is a typical job task for a privileged user?
Create or modify system configurations
How does implementing least privilege minimize privileged access abuse?
It ensures users only access systems and databases they need to do their work.
What describes a best practice of privileged access management?
Require multi-factor authentication (MFA) for all access points. Set all access points to least privilege and just-in-time access
How would an admin require two-factor authentication when a user logs in to a connected app?
Select “High assurance session required” in the app’s session policies
What happens when an admin blocks a connected app?
All current users sessions are ended and future sessions are prevented
What happens when a connected app is uninstalled from an org?
The OAuth policies related to the app are removed but users can still access the app
How should an admin view who installed the connected app?
From the Connected App Detail page
How should an admin view who has used a connected app?
Select “User Count” from the Connected Apps OAuth Usage page. Also View OAuth Connected Apps from the user record
Which standard report type includes data from Identity Verification History, Login History, Login IP Email, User, and other objects?
User
Which login attempts appear in the Identity Verification History log?
Only login attempts with an identity verification challenge
Which example describes a use case for a custom login flow?
Collect and update user data, such as an email address, phone number, or mailing address
If a delegate makes a setup change on behalf of an end user, which information is logged in Setup Audit Trail?
The username of the delegate user and end user
Which statement accurately describes the principle of least privilege?
Users are granted the absolute minimum permission necessary to perform their job activities
What should an admin use to delete records from field history tracking?
Data Loader or any other API tool
Where should a system administrator assign a default record type for a user?
Profile
How does a custom lookup field impact record access?
There is no impact on record access
What prevents a user from creating a record with a specific record type?
The record type needs to be assigned to the user
Which method controls the records a user sees?
Scoping Rules and Restriction Rules
Custom objects A and B have a master-detail relationship where A is the parent. Which organization-wide sharing setting will B have?
Controlled by Parent
In order to create a sharing rule for the Opportunity object, which organization-wide default must be set for the object?
Private or Public Read-Only
A user is unable to view a field on a record but is able to view it in reports, search results, and list views. What is the likely cause?
The field was hidden from the page layout
Which permission allows users to create list views?
Create and Customize List Views And Read access for the record type included in the list
A child object has a broken permission dependency with the Modify All or View All permissions. Which permission is automatically enabled for the parent object?
View All
What is true about the Expire All Passwords action?
Passwords are expired for all users except those with the Password Never Expires permission
What is one way an admin could allow users to log in to external service providers with their Salesforce credentials?
Enable the org as a SAML identity provider and integrate with the service provider
What is the first step an admin should take if a user has not received a device activation verification code?
Check Identity Verification history to see where the verification code is being sent
What tools can be used to monitor user authentication and history?
Login History, Identity Verification History, Reports
Which Salesforce tool should an admin use to monitor critical permission assignments, active sharing rules, and unassigned custom profiles in one place?
Salesforce Optimizer
Where should an admin review and take action on release-specific security changes that may impact your org?
Release Updates in Setup
Which of the following impacts a user’s ability to view or edit a report?
The folder it’s stored in.
Which describes a best practice for creating roles in a Salesforce org?
Users should be grouped in roles based on access requirements
How should an admin prevent manual sharing for records in a specific object?
Remove the sharing buttom for the object from the page layout
For which standard object can records be imported with the Data Import Wizard?
Leads
Which of the following cannot be added to a compact layout?
Multi-select picklist
Which of the following can be controlled at the profile level but not in a permission set?
Page Layout assignments
Which feature is used to grant report folder access?
Public Groups
How should an admin create a group for multiple categories within a report?
By using report buckets
What is a function of a custom summary formula field?
Formulas treat blank (null) report cells as zero values.
Where should access to Accounts be managed for anyone in the org?
Manual sharing rules
Where is access provided to create and customize list views?
Profiles and permission sets
How should automatic exceptions to organization-wide defaults be granted?
Sharing rules
What is the maximum number of components that can be added to a single dashboard?
20
When can you not deactivate a user?
If the user is the only user of a workflow email.
Login IP Ranges
What IP addresses users can login from
Trusted IP Ranges
What IP addresses users don’t have to dual authenticate from