Security And Access Flashcards

1
Q

What does Manager Group Sharing allow?

A

It allows records to be shared up and down the management chain using the Manager field on the user record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is field access controlled?

A

Field-level security is set at the profile or permission set level and can set fields to be read-only or not visible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is record access controlled?

A

By using Object Permissions, Role Hierarchy, Manager Group Sharing, Sharing Settings (OWD), and Sharing Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does manual sharing allow?

A

It allows records to be manually shared with other users, roles, territories, and public groups. The access level can be set to read/write or read only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the high level steps to use Enterprise Territory Management?

A

Build a Territory, Assign Users to Territories, Create Territory Account Assignment Rules, Preview the Model, Activate the Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Enterprise Territory Management do?

A

It allows accounts to be assigned to territories automatically using territory assignment rules, and users to be assigned to territories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are custom profiles created?

A

If the permissions defined in a standard profile do not meet requirements. There are restrictions on what can be changed in a standard profile. A custom profile is fully customizable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can a Delegated Administrator do?

A

Certain Admin functions, including unlocking users, resetting passwords, creating users, assigning profiles and public groups and managing custom objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a permission set?

A

A set of permissions that can be assigned to one or more users that gives additional permissions to what is defined in their profile. It can include almost all permissions in a profile, including object, field and system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which territory access levels are available when organization-wide default sharing settings for Contacts is set to ‘Private’?

A

‘No Access’, ‘View’, and ‘View and Edit’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is used as an identifier for a particular kind of territory in a territory hierarchy?

A

Territory Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What represents a complete territory management system that includes a
territory hierarchy, assignment rules and assigned users?

A

Territory Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a graphical representation of the entire territory structure in a territory model?

A

Territory Hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which organization-wide default sharing setting can be used for the Campaign Member object to allow all users to see only the campaign members associated with the campaigns they have access to?

A

Controlled by Campaign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which sharing setting allow a user to manual share their own user record with other users of an organization?

A

‘Manual User Record Sharing’ checkbox on the ‘Sharing Settings’ page in Set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which organization-wide default sharing setting can be used for the Campaign Member object to allow all users to see only the campaign members associated with the campaigns they have access to?

A

Controlled by Parent

17
Q

With regard to record access, with capability is available when using the original territory management functionality?

A

Access can be granted to accounts and related opportunities and cases based on custom criteria, regardless of who owns the records.

18
Q

What are some of the customizations that are possible when managing a custom object as a delegated administrator?

A

Adding a picklist value to a field, creating a custom tab, modifying the page layout, etc.

19
Q

Which term is used in salesforce for a contact that does not have an associated account record?

A

Private Contact

20
Q

What can be done to allow a user to view all data in an organization?

A

Create and assign a permission set with ‘View All Data’ permission.

21
Q

When are sharing rules re-evaluated automatically?

A

When changes are made to groups, roles, and territories, sharing rules are re-evaluated to add or remove access as necessary.

22
Q

Which least-privilege profile allows users to access activities and Chatter features?

A

‘Minimum Access - Salesforce’ profile

23
Q

When managing a custom object, what cannot be modified by a delegated administrator?

A

Relationships on the object and organization-wide default sharing setting

24
Q

What protocol does social sign-on use?

A

OpenID Connect

25
Q

When Enterprise Territory Management is enabled, how can records by users in a territory be shared with users in another territory?

A

By setting up a sharing rule based on users assigned to a territory

26
Q

What password requirements can an administrator set?

A

Minimum password length, complexity, password history enforcement, expiration period, minimum password lifetime

27
Q

In Salesforce Classic, how can a user manually share a record with members of a territory?

A

By using the ‘Sharing’ button on the record and searching for & adding the territory in the ‘Share With’ column

28
Q

What does social sign-on enable?

A

Lets users login using credentials from a social network such as LinkedIn.

29
Q

When is identity verification invoked?

A

When a user logs in from an unrecognized (based on cookies) browser or device, and outside the trusted IP range.

30
Q

Which form of social sign on is enabled by default for all users?

A

Federated authentication

31
Q

Which authentication method lets users login with typing a password?

A

Lightning Login

32
Q

When configuring Login Discovery for My Domain, which interface should a Login Discovery Handler class implement?

A

MyDomainLoginDiscoveryHandler

33
Q

How can a 2-factor authentication code be provided?

A

Text message, email or an authenticator app

34
Q

What should be deployed to enable certificate-based authentication in an org?

A

My Domain