Discount Offer
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

Advanced-Administrator Practice Test

Whether you're a beginner or brushing up on skills, our Advanced-Administrator practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 5 out of 44 Pages

What should the administrator consider before enabling Person Accounts?


A. Person Account cannot be disabled.


B. Person Account requires less data storage.


C. Person Account and Business Accounts cannot be in the same sharing model.


D. All standard Account news can be converted to Person Account field.





A.
  Person Account cannot be disabled.

Explanation: Person Account cannot be disabled is something that the administrator should consider before enabling Person Accounts. Person Accounts are a special type of accounts that allow storing information about individual people who are not associated with an organization or business account. Once Person Accounts are enabled, they cannot be disabled or removed from the org without contacting Salesforce support

The administrator at Universal Containers does a soft launch of the Salesforce Authenticator app and allows users to optionally use it to log In. The administrator would now like to look at how many users have successfully used it since It was rolled out.
What are two ways the administrator can get this Information?
Choose 2 answers


A. Create a new view In Identity Verification History, specifying Method.


B. Open the Login Access Policies In Setup which shows how many users are using MFA.


C. Run a session setting report, specifying login methods by user.


D. Export Login History and filter based off of Authentication Method Reference,





A.
  Create a new view In Identity Verification History, specifying Method.

D.
  Export Login History and filter based off of Authentication Method Reference,

Explanation: Salesforce Authenticator is an app that adds an extra layer of security for logging into Salesforce by requiring users to verify their identity using their mobile device after entering their username and password on Salesforce login page. To see how many users have successfully used Salesforce Authenticator since it was rolled out, an administrator can use two methods:
A) Create a new view In Identity Verification History, specifying Method.
Identity Verification History is a tool that shows information about each identity verification event for users in your org, such as the date and time, the verification method used, the IP address, and the status of the verification. By creating a new view in Identity Verification History and specifying the method as Salesforce Authenticator, an administrator can see how many users have used the app to verify their identity when logging in.
D) Export Login History and filter based off of Authentication Method Reference. Login History is a tool that shows information about each login attempt for users in your org, such as the date and time, the username, the source IP address, the login type, and the status of the login. By exporting Login History as a CSV file and filtering based on the Authentication Method Reference column, an administrator can see how many users have used Salesforce Authenticator as their authentication method when logging in.

AW Computing is conducting an audit and wants to understand how many objects have been shared as public externally.
which tool should the administrator use to quickly obtain this details?


A. Security Health Check


B. Setup Audit Trail


C. Session Security Settings


D. Object Manager





C.
  Session Security Settings

Explanation: The data masking tool is a tool that allows you to mask sensitive data in your full sandbox by replacing it with fictitious data. This can help you protect your data privacy and comply with regulations while testing in a realistic environment. You can use the data masking tool to mask data for standard and custom objects, including person accounts, and choose from different masking formats and options.

Cloud Kicks has organization-wide snaring defaults on the opportunity set to prvete. However, members of the finance team need to see closed won opportunities. The Drama team members all have roles under the finance director, while the sales team members have roles under the sales marager.
Which two options should the administrator use to meet these criteria?
Choose 2 answers


A. Share with roles and subordinates of the finance cirector role.


B. Make an owner-based sharing rule where the wnn field - true.


C. Create a criteria-based sharing rule where the won field = true.


D. Select all opportunities owned by the sales manager role.





A.
  Share with roles and subordinates of the finance cirector role.

C.
  Create a criteria-based sharing rule where the won field = true.

Explanation: Two options that the administrator should use to meet these criteria are:
Share with roles and subordinates of the finance director role. This option allows you to grant access to records based on the role hierarchy of your org. You can share records with users who are in a specific role or in roles below that role in the hierarchy. In this case, you can share records with roles and subordinates of the finance director role, which includes all the members of the finance team.
Create a criteria-based sharing rule where the won field = true. This option allows you to grant access to records based on certain field values or formulas. You can create a criteria-based sharing rule on opportunities that grants access to records where the won field is true, which means that the opportunity stage is closed won.
The other two options are incorrect because:
Make an owner-based sharing rule where the won field = true is not an option because owner-based sharing rules do not allow you to specify field values or formulas as criteria. Owner-based sharing rules only allow you to share records based on who owns them or what role or group they belong to.
Select all opportunities owned by the sales manager role is not an option because it does not meet the criteria of sharing all closed won opportunities. It only shares opportunities that are owned by users who are in the sales manager role, regardless of their stage.

An administrator at Clod Kicks has build a flow that delivers status update email to customers. Recently, there’s been an increasae in support cases from customers reporting they had not received the email.
Where should the administrator look to investigate the issue?


A. Paused Flow Interviews


B. Process Automation Setting


C. Email Logs


D. Setup Audit Trail





C.
  Email Logs

Explanation: Email logs are files that provide information about email delivery and activity in your Salesforce org. Email logs contain details such as sender, recipient, subject, date, status, error code, and more for each email sent or received within a specified time range. You can use email logs to investigate issues with email delivery or performance in your org. In this case, you can use email logs to check if the status update emails were sent successfully or if there were any errors or failures.


Page 5 out of 44 Pages
Previous