User Setup (7%) Flashcards
Which of the following statements are true about resetting passwords? Choose 2 answers
A.) Any user can reset their password by navigating to their profile.
B.) The user’s account is automatically unlocked after their password is rest.
C.) The users security token is reset after resetting their password
D.) And Admin can only reset a password 5 times in a 24 hour period
B.) The user’s account is automatically unlocked after their password is rest.
C.) The users security token is reset after resetting their password
A user can click the forgot password link on the login page to receive an email with steps to reset a password. However, only admins can reset the passwords of single-sign on users. Locked accounts are automatically unlocked after an admin resets a user’s password. user security tokens are reset for the user after their password is reset. Users can request their passwords through the forgot password link a max of 5 times in a 24 hour period but an admin can reset a user’s password as many times as needed.
All internal users are being prompted to verify their identity when they login to SFDC for the first time. As an admin, you have been asked if it is possible to modify this behavior. What would you suggest?
A.) No - All users must verify their identity when logging in for the first time
B.) Yes - Identity verification can be bypassed by adding a range of trusted IP addresses
C.) Yes - Identity verification can be deactivated for particular users on the user record.
D.) Yes - Identity verification can be turned off in settings for all users
B.) Yes - Identity verification can be bypassed by adding a range of trusted IP addresses
If users are logging in for the very first time or they log in from an unrecognized browser or application, they are required to verify their identity. The prompt for identity verification will be bypassed if the computer is within a trusted IP range.
A user was deactivated several months ago. What can be done to reactivate the user? Choose 1 answer
A.) Enable the active checkbox
B.) Create a new user
C.) Create a new contact
D.) Disable the active checkbox
A.) Enable the active checkbox
A user can be reactivated by enabling the active checkbox on the user record.
After attempting to log in to SFDC with invalid passwords, a user is now locked out. What are the possible solutions a SFDC admin can do to assist the user? Choose 2 answers
A.) Reset the password using the Reset Password button
B.) Update the user’s password to a temporary one and email it
C.) Unlock the user
D.) Ask the user to rest the password themselves
A.) Reset the password using the Reset Password button
C.) Unlock the user
Resetting a locked-out user’s password automatically restores his access to the account. Users do not have permission to reset their own passwords once they are already locked. Another workaround is to unlock the user from the user record. Please take note that the button appears only when a user is locked out,
Technology Inc has a large number of external community and external Chatter users, and the admin spends a lot of time processing deactivation requests when users change jobs. How could this be addressed? Choose 1 answer
A.) Set “Auto Deactivation” after 90 days of inactivity
B.) Assign all deactivation requests to one admin
C.) Enable “Mass External User Deactivation
D.) Enable “User Self Deactivate”
D.) Enable “User Self Deactivate”
User self deactivate can be enabled in user Management Settings to allow external community and external Chatter users deactivate their own accounts.
What is true regarding setting up users? Choose 2 answers
A.) The username and email address can be different, except when setting up multiple users
B.) A user can have multiple roles but only one profile
C.) The admin sets a temporary password and this is automatically emailed to the new users
D.) The profiles available depend on the license type selected
A.) The username and email address can be different, except when setting up multiple users
D.) The profiles available depend on the license type selected
When setting up a single user, the username and email address can be different. When setting up multiple users, the email address becomes the username. The profiles available depend on the license type, for example, if Chatter Free is selected as the license type, the profiles available are Chatter Free User and Chatter Moderator User. A user can only have one role and profile assigned. An admin does not set a temporary password that is emailed to new users
HR has informed you that a SFDC user has left the company. What is the best course of action? Choose 1 answer
A.) Leave the user record active and use for the next user that needs to be set up by updating the name and email address
B.) Deactivate the user after ensuring the user is not the sole recipient of a workflow email alert
C.) Delete the user after transferring any records owned to another user
D.) Leave the user record but unassign the Salesforce license
B.) Deactivate the user after ensuring the user is not the sole recipient of a workflow email alert
SFDC users cannot be deleted. Users can be deactivated if they are not the sole recipient of an email alert or assigned as a customer portal admin. Before deactivating, to prevent users from logging in, admins can freeze user records while they check it they are on any workflow email alerts or reference elsewhere in the application.
A user is having trouble resetting their password. The default password policy settings have not been changed. Which of the following would an admin advise? Choose 2
A.) The password needs to have at least one alphabetic character and one number
B.) The password needs to have at least eight characters
C.) If a user enters too many incorrect passwords, the user will be locked out and will have to wait 10 minutes to try again
D.) The password cannot be one of the last four passwords
A.) The password needs to have at least one alphabetic character and one number
B.) The password needs to have at least eight characters
SFDC checks if new passwords conform to password security policies. If users are locked out, they must wait until the lockout period expires, which is set in password policies. The default password policy settings require that the password be at least 8 characters with at least one letter and one number, cannot be the sale as the last 3 passwords, and expire in 90 days.
Martin, the admin, will be on vacation for 3 days. He used “Delegated Administration” function to allow Andrew, the Sales Manager, to do certain admin duties. Which tasks would Andrew be able to do as a result of being a delegated admin? Choose 3 answers
A.) Modify permission sets
B.) Create and edit users in specific profiles and roles
C.) Assign specific permission sets
D.) Reset passwords for users in specific roles
B.) Create and edit users in specific profiles and roles
C.) Assign specific permission sets
D.) Reset passwords for users in specific roles
Users in a delegated group would be able to create and edit users in specific profiles and roles, reset passwords for users in specific roles, assign permission sets, assign users in specific roles to specific profiles, and assign users to specific public groups.
A recently terminated sales rep is assigned as the sole recipient of a workflow email alert. What should an admin do to prevent the user from logging in to Salesforce? Choose 1
A.) Deactivate the user
B.) Freeze the user
C.) Delete the user
D.) Delete the user’s contact
B.) Freeze the user
If a user is the sole recipient of a workflow email alert, that user cannot be deactivated immediately. However, one user can freeze the user account of the user to prevent them from logging in to SFDC.
Where can an Admin find information on a user’s login attempts? Choose 3 answers
A.) Login history related list on a user record B.) Login Attempts Page C.) Login Security Page D.) User Detail section on a user record E.) Login History Page
A.) Login history related list on a user record
D.) User Detail section on a user record
E.) Login History Page
Recently, a new candidate tab requested by the HR team of Telco Inc was created for the recruitment application. The HR team is unable to locate the tab within the application. What should the admin check to resolve the issue? Choose 3
A.) Check if the field-level security for the candidate object is enabled for the HR team users
B.) Check if the candidate custom tab is added to the recruitment application
C.) Check if the candidate tab is visible for the HR team user profile
D.) Check if the object permission is correctly applied to the HR profile
E.) Check the assigned app settings for the profile
B.) Check if the candidate custom tab is added to the recruitment application
C.) Check if the candidate tab is visible for the HR team user profile
D.) Check if the object permission is correctly applied to the HR profile
A user is not able to login. What could be the reason for this? Choose 2
A.) The user is attempting to log in outside of the org wide login hours
B.) The user is attempting to log in from an IP address outside of the org wide trusted IP range
C.) The user is logging in from an IP address outside the defined range for their profile
D.) The user is attempting to log in outside of the login hours defined for their profile
C.) The user is logging in from an IP address outside the defined range for their profile
D.) The user is attempting to log in outside of the login hours defined for their profile
Login IP Address Ranges can be set on a profile basis and define the range of IP addresses from which the users can log in. If a user attempts to log in from an IP address outside of this range, access is denied. This feature is only available in Enterprise, Performance, Unlimited, Developer, and Database.com editions
Login hour restrictions are set on a profile basis and login attempts outside of the hours defined are denied.
What should you do to ensure that an admin can troubleshoot on a user’s behalf, without having to request login access from the user? Choose 1 answer
A.) Turn on the “Administrator Can Log In As Any User” setting in the login access policies page
B.) Contact SFDC to enable the “Administrator Can Log In As Any User” feature
C.) Turn on the “Log in as any user” permission on the System Admin profile
D.) Turn on the “Modify all data” permission
A.) Turn on the “Administrator Can Log In As Any User” setting in the login access policies page
John Ray is an admin at Newport Inc. He needs to create 200 users but he does not want to notify the users of their login details. What is the most efficient way to achieve this? Choose 1 answer
A.) User Data Loader to create users
B.) Open a case with SFDC to create the users and request no email notifications
C.) Use the Create Multiple Users feature and deselect the “Generate new password and notify the user immediately” option
D.) Create each user manually and deselect the “Generate new password and notify the user immediately” option
A.) User Data Loader to create users
The best way to create 200 users is with Data Loader. Users created with Data Loader will not have a password generated.