Security & Access Control Flashcards

1
Q

Q. What are the key layers of security in Salesforce?

A

A. Organization-Level Security, Object-Level Security, Field-Level Security, and Record-Level Security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q. What is Salesforce’s security model designed for?

A

A. To provide data protection while allowing flexible access control for different users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q. What is organization-wide security in Salesforce?

A

A. Security settings that control access at the organization level, including IP restrictions, login hours, and multi-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q. What are Trusted IP Ranges?

A

A. A list of allowed IP addresses that can access Salesforce without requiring identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q. What are Login Hours?

A

A. Time restrictions applied to user profiles to control when they can log in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q. What is Single Sign-On (SSO) in Salesforce?

A

A. A method that allows users to log in once and access multiple systems without needing separate credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q. What authentication methods does Salesforce support?

A

A. Username-password, SAML-based SSO, OAuth, OpenID Connect, and Multi-Factor Authentication (MFA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q. What are profiles in Salesforce?

A

A. Profiles define user permissions, object access, field-level security, and page layouts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q. What is the difference between profiles and permission sets?

A

A. Profiles define base permissions for users, while permission sets grant additional permissions without modifying the profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q. What are standard and custom profiles?

A

A. Standard profiles come prebuilt in Salesforce, while custom profiles are created by administrators for specific needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q. How does object-level security work?

A

A. It is controlled via profiles and permission sets, determining whether a user can Create, Read, Edit, or Delete (CRUD) records of an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q. What is field-level security?

A

A. A setting that controls user access to specific fields within an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q. How can field-level security be controlled?

A

A. Via profiles and permission sets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q. Can field-level security override object permissions?

A

A. Yes, even if a user has access to an object, they may be restricted from viewing or editing specific fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Q. What is record-level security in Salesforce?

A

A. A mechanism that controls access to individual records based on ownership and sharing rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q. What are Organization-Wide Defaults (OWD)?

A

A. The baseline security settings that define the default access level for records in an object.

17
Q

Q. What are the different OWD settings?

A

A. Private, Public Read-Only, Public Read/Write, Public Read/Write/Transfer, and Controlled by Parent.

18
Q

Q. How do role hierarchies impact record access?

A

A. Users higher in the hierarchy automatically inherit access to records owned by users below them.

19
Q

Q. What are sharing rules in Salesforce?

A

A. Rules that grant additional record access to users based on record criteria.

20
Q

Q. What is manual sharing?

A

A. A feature that allows users to share individual records with specific users or groups.

21
Q

Q. What is the difference between manual sharing and sharing rules?

A

A. Manual sharing is done per record, while sharing rules are applied automatically to multiple records.

22
Q

Q. What is a permission set in Salesforce?

A

A. A collection of permissions that grant additional access to users without changing their profile.

23
Q

Q. What is a permission set group?

A

A. A collection of multiple permission sets that can be assigned to users for better access control.

24
Q

Q. When should you use permission sets instead of profiles?

A

A. When granting additional permissions to specific users without modifying their profile.

25
Q

Q. What are user roles in Salesforce?

A

A. Roles define a user’s position in the organization hierarchy and determine record visibility.

26
Q

Q. How do roles differ from profiles?

A

A. Profiles control object and field access, while roles control record visibility through sharing rules.

27
Q

Q. What is the difference between roles and public groups?

A

A. Roles are hierarchical, while public groups are collections of users for sharing purposes.

28
Q

Q. What is a delegated administrator?

A

A. A user assigned limited admin privileges to manage other users without full system access.

29
Q

Q. What is the purpose of the Sharing and Visibility Architecture?

A

A. To ensure the right users have the right level of access to data in Salesforce.

30
Q

Q. What are the key components of record sharing?

A

A. OWD, Role Hierarchy, Sharing Rules, Manual Sharing, and Teams.

31
Q

Q. What is the Apex Sharing Reason?

A

A. A feature that allows developers to create programmatic sharing rules for custom objects.

32
Q

Q. What is Salesforce Shield?

A

A. A security suite that includes encryption, event monitoring, and field audit tracking.

33
Q

Q. What is field audit tracking?

A

A. A feature that logs changes to specific fields for compliance and auditing.

34
Q

Q. How does Salesforce handle GDPR compliance?

A

A. By providing data privacy tools like Data Masking, Consent Management, and Data Export.

35
Q

Q. What are some best practices for Salesforce security?

A
  • Use MFA for all users
  • Follow the principle of least privilege
  • Regularly audit user permissions
  • Enable field-level encryption for sensitive data
  • Use IP whitelisting and trusted networks
36
Q

Q. What is the Security Health Check in Salesforce?

A

A. A tool that assesses an org’s security settings and provides recommendations to improve security posture.