Security Flashcards

1
Q

Which statement is true regarding field-level secruity?(Choose Two)

  1. It is enforced through the UI and the API
  2. It can be used to prevent users from seeing specific records
  3. It can be used to make a field required
  4. It determines which fields are hidden, read-only, and read/write for a particular profile
A

Answer: 1 and 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which statement best describes the purpose of the profile?

  1. It controls access to records within your organization
  2. It is a way for the Sys Admin to determine who can see specific opportunites in your org
  3. It determines what users can do with the records hat they can access
  4. It is a way for the sys Admin to determine who can use the workflow feature
A

Answer: 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These contain user permissions and access settings that control what users can do

A

Profiles

Profiles give users permission to each object and determine what a user can do to records within the object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Set the baseline of what users can see

A

Org-wide defaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This/These control how much data users can see

A

Role hierarchies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

These allow users to see/edit data they don’t own in an otherwise private setup

A

Sharing rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who can manually share a record?

A
  1. Owner
  2. Anyone above the owner in the hierarchy
  3. Admins
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

At what levels can you restrict logging in by IP address ranges?

A
  1. Org wide level
  2. Profile level
  • Org wide level: Go to Setup > Security Controls > Network access*
  • Users logging in to salesforce.com with a browser from trusted networks are allowed to access salesforce.com without having to activate their computers.*
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a user always able to edit records they own?

A

DEPENDS: If their profile is not given READ access to that object then NO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the maximum number of roles that can be created?

A

500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between settings and permissions on a profile? List some of them.

A
  • Settings determine what users can see in the user interface, for example, apps, tabs, record types, page layouts, and fields.
  • Permissions determine what users can do with the data they have access to, for example, customize app, run reports, mass email, create leads, edit opportunities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do object permissions control?

A

The kind of records (object) users can view, create, edit, or delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What information is contained in a user record?

A
  • Personal information, such as name and contact details
  • Security and access information, such as usemame, profile, role, and login history
  • Locale information, such as time zone, locale, language, and currency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does enabling Chatter Invitations require additional CRM licenses?

A

No, it uses no CRM licenses. However, each invitee that accepts the invitation to join

Chatter is assigned one of the 5,000 Chatter Free licenses that come with each erg.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One of your users receives an error message when they try to log in. Where could you look to
troubleshoot the issue?

A

The Login History related list on the user record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which standard profile has these permissions?

Standard User Permissions+ can
import leads for the organization

A

Marketing User

17
Q

Which standard profile has these permissions?

Can view, edit and delete their own
records

A

Standard User

18
Q

How can you restrict login access to an organization?

A

You can restrict access to an organization by specifying login hours or login IP ranges
on user profiles.

19
Q

What do organization-wide defaults control?

A

The default level of access users have to records they do not own, in each object

20
Q

What does the role hierarchy control?

A

The role hierarchy lets you open up record access to users who may have been denied access by the organization-wide defaults. Users in higher roles inherit the special ownership privileges on all records owned by users in roles below them.

Additionally, the role hierarchy appears at the top of opportunity reports, allowing users to drill down to data at different levels of the hierarchy.

21
Q

How does a profile differ from a role?

A

A profile determines what users can do with records they have access to, for example,
view or edit. A role determines what individual records users have access to.

22
Q

Why are sharing rules used?

A

To grant additional record access to groups of users on an object-by-object basis,
allowing you to create exceptions to the organization-wide defaults

23
Q

When would you choose to build a public group?

A

To simplify the creation of sharing rules when more than one sharing rule is required

24
Q

Where can you configure field-level security?

A

You can configure field-level security when you create a new custom field, when you edit
an existing field in Setup, or by editing a profile.