What should the administrator consider before enabling Person Accounts?
A. Person Account cannot be disabled.
B. Person Account requires less data storage.
C. Person Account and Business Accounts cannot be in the same sharing model.
D. All standard Account news can be converted to Person Account field.
Explanation: Person Account cannot be disabled is something that the administrator should consider before enabling Person Accounts. Person Accounts are a special type of accounts that allow storing information about individual people who are not associated with an organization or business account. Once Person Accounts are enabled, they cannot be disabled or removed from the org without contacting Salesforce support
The administrator at Universal Containers does a soft launch of the Salesforce
Authenticator app and allows users to optionally use it to log In. The administrator would
now like to look at how many users have successfully used it since It was rolled out.
What are two ways the administrator can get this Information?
Choose 2 answers
A. Create a new view In Identity Verification History, specifying Method.
B. Open the Login Access Policies In Setup which shows how many users are using MFA.
C. Run a session setting report, specifying login methods by user.
D. Export Login History and filter based off of Authentication Method Reference,
Explanation:
Salesforce Authenticator is an app that adds an extra layer of security for logging into
Salesforce by requiring users to verify their identity using their mobile device after entering
their username and password on Salesforce login page. To see how many users have
successfully used Salesforce Authenticator since it was rolled out, an administrator can use
two methods:
A) Create a new view In Identity Verification History, specifying Method.
Identity Verification History is a tool that shows information about each identity verification
event for users in your org, such as the date and time, the verification method used, the IP
address, and the status of the verification. By creating a new view in Identity Verification
History and specifying the method as Salesforce Authenticator, an administrator can see
how many users have used the app to verify their identity when logging in.
D) Export Login History and filter based off of Authentication Method Reference.
Login History is a tool that shows information about each login attempt for users in your
org, such as the date and time, the username, the source IP address, the login type, and
the status of the login. By exporting Login History as a CSV file and filtering based on the
Authentication Method Reference column, an administrator can see how many users have
used Salesforce Authenticator as their authentication method when logging in.
AW Computing is conducting an audit and wants to understand how many objects have
been shared as public externally.
which tool should the administrator use to quickly obtain this details?
A. Security Health Check
B. Setup Audit Trail
C. Session Security Settings
D. Object Manager
Explanation: The data masking tool is a tool that allows you to mask sensitive data in your full sandbox by replacing it with fictitious data. This can help you protect your data privacy and comply with regulations while testing in a realistic environment. You can use the data masking tool to mask data for standard and custom objects, including person accounts, and choose from different masking formats and options.
Cloud Kicks has organization-wide snaring defaults on the opportunity set to prvete.
However, members of the finance team need to see closed won opportunities. The Drama
team members all have roles under the finance director, while the sales team members
have roles under the sales marager.
Which two options should the administrator use to meet these criteria?
Choose 2 answers
A. Share with roles and subordinates of the finance cirector role.
B. Make an owner-based sharing rule where the wnn field - true.
C. Create a criteria-based sharing rule where the won field = true.
D. Select all opportunities owned by the sales manager role.
Explanation:
Two options that the administrator should use to meet these criteria are:
Share with roles and subordinates of the finance director role. This option allows
you to grant access to records based on the role hierarchy of your org. You can share records with users who are in a specific role or in roles below that role in the
hierarchy. In this case, you can share records with roles and subordinates of the
finance director role, which includes all the members of the finance team.
Create a criteria-based sharing rule where the won field = true. This option allows
you to grant access to records based on certain field values or formulas. You can
create a criteria-based sharing rule on opportunities that grants access to records
where the won field is true, which means that the opportunity stage is closed won.
The other two options are incorrect because:
Make an owner-based sharing rule where the won field = true is not an option
because owner-based sharing rules do not allow you to specify field values or
formulas as criteria. Owner-based sharing rules only allow you to share records
based on who owns them or what role or group they belong to.
Select all opportunities owned by the sales manager role is not an option because
it does not meet the criteria of sharing all closed won opportunities. It only shares
opportunities that are owned by users who are in the sales manager role,
regardless of their stage.
An administrator at Clod Kicks has build a flow that delivers status update email to
customers. Recently, there’s been an increasae in support cases from customers reporting
they had not received the email.
Where should the administrator look to investigate the issue?
A. Paused Flow Interviews
B. Process Automation Setting
C. Email Logs
D. Setup Audit Trail
Explanation: Email logs are files that provide information about email delivery and activity in your Salesforce org. Email logs contain details such as sender, recipient, subject, date, status, error code, and more for each email sent or received within a specified time range. You can use email logs to investigate issues with email delivery or performance in your org. In this case, you can use email logs to check if the status update emails were sent successfully or if there were any errors or failures.
Page 5 out of 44 Pages |
Previous |