Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

Sharing-and-Visibility-Architect Practice Test


Page 1 out of 48 Pages

Topic 1: Exam Pool A

The sales managers at the Universal Containers (UC) requested their teams to define each user’s role on their accounts in order to provide an easy way to establish accountability and collaboration. Sales managers also requested that sales associates should only get the following permissions:

  • Read access to the accounts.
  • Read access to cases related to the accounts
  • No access to deals related to the accounts
The sales associates may be granted access to opportunities when needed. Assuming the overall sharing model of the organization is private and no sharing rules are configured on the account objects. How can an Architect achieve these requirements?


A. Use Account teams and use Sharing rules to share cases with sales associates. No change required to the opportunity object


B. Use Account teams, Case teams. No configuration required for the opportunity object.


C. Use Account teams, Opportunity teams, and Case teams.


D. Use Account Teams to define access to accounts as well as opportunities and cases related to accounts





C.
  Use Account teams, Opportunity teams, and Case teams.

Using Account teams, Opportunity teams, and Case teams is the best way to achieve these requirements. Account teams allow you to share accounts and related records with a group of users. Opportunity teams allow you to share opportunities with a group of users who can have different levels of access. Case teams allow you to share cases and related records with a group of users who can have different roles and levels of access. Using Sharing rules to share cases with sales associates will not work, because sharing rules can only be based on record owner or criteria, not on account team membership. Using Account Teams to define access to accounts as well as opportunities and cases related to accounts will not work, because account team members can only have read-only access to cases by default.

Universal Containers (UC) has a private Organization-Wide Defaults (OWD) model for the Account object and needs to control the access of records and fields according to these requirements:

  • Sales reps can view/edit only their own records and cannot access the field "segment" in account page.
  • Service reps need to view all accounts but cannot edit any information.
  • Sales managers can modify any account of reps reporting to them.
  • Service managers can modify any account.
How can a Salesforce architect provide an optimal solution for this scenario?


A. Use profiles, sharing rules, and change OWD to public read-only.


B. Use profiles, manual sharing, and field-level security.


C. Use profiles, permission sets, and field-level security.


D. Use profiles, permission sets, role hierarchy, and field-level security.





D.
  Use profiles, permission sets, role hierarchy, and field-level security.

Profiles and Permission Sets can be used to control the object-level and field level access for different types of users. For example, sales reps can have read/write access to Account object but not to the segment field, while service reps can have read only access to Account object and all fields. Role Hierarchy can be used to control the record-level access for users based on their position in the organization. For example, sales managers can access and modify any account of reps reporting to them, while service managers can access and modify any account regardless of ownership. Field-Level Security can be used to override the profiles and permission sets for specific fields on specific records. For example, service managers can edit the segment field on any account, even if their profile does not allow it. Therefore, the answer D is correct and the other options are incorrect3.

What vulnerability can exist when controllers use dynamic rather than static queries and bind variables?


A. SOQL Injection.


B. Buffer Overflow Attacks.


C. Cross-site scripting.


D. Record Access Override.





A.
  SOQL Injection.

SOQL injection is a vulnerability that can exist when controllers use dynamic rather than static queries and bind variables. SOQL injection is a technique that exploits a security vulnerability by inserting malicious SOQL statements into an existing query. This can result in data loss, data exposure, or unauthorized access1. Buffer overflow attacks, cross-site scripting, and record access override are not vulnerabilities related to dynamic queries and bind variables.

Sales Operations at Universal Containers (UC) has created Public Report and Dashboard folders for sales managers that report to the VP of sales. Sales Operations currently spends a few hours each month updating users that should have access to edit items in these folders. In which two ways can UC grant access to sales managers to automate access to these Reports and Dashboards folders? (Choose 2 answers)


A. Share the folders lowest roles in the role hierarchy, Superiors will get access automatically.


B. Share the folders with the “VP of Sales” Role and Subordinates.


C. Share the folders with the “Sales Managers” Queue.


D. Share the folders with a “Sales Managers” Public Group.





B.
  Share the folders with the “VP of Sales” Role and Subordinates.

D.
  Share the folders with a “Sales Managers” Public Group.

Sharing the folders with the “VP of Sales” Role and Subordinates and sharing the folders with a “Sales Managers” Public Group are two ways that UC can grant access to sales managers to automate access to these Reports and Dashboards folders. Folder sharing allows users to share reports and dashboards with other users based on roles, subordinates, public groups, or individual users. Option A is incorrect, since sharing the folders with lowest roles in the role hierarchy would not give access to superiors automatically, but only to subordinates. Option C is incorrect, since sharing the folders with a queue is not possible.

The Corporate Identity and Access Team needs to audit User setup in the Salesforce. What two permissions should be granted to this team so they can perform their audit? (Choose 2 answers)


A. View permission on the User object


B. View Setup and Configuration


C. View All Users


D. View All Data





B.
  View Setup and Configuration

C.
  View All Users

Explanation: To audit user setup in Salesforce, the team needs to have both View Setup and Configuration and View All Users permissions. View Setup and Configuration allows them to access the setup menu and see the user profiles, roles, and permission sets. View All Users allows them to see all the user records and their details, such as login history and assigned licenses.


Page 1 out of 48 Pages