What should the administrator consider before enabling Person Accounts?
A. Person Account cannot be disabled.
B. Person Account requires less data storage.
C. Person Account and Business Accounts cannot be in the same sharing model.
D. All standard Account news can be converted to Person Account field.
Explanation: Person Account cannot be disabled is something that the administrator should consider before enabling Person Accounts. Person Accounts are a special type of accounts that allow storing information about individual people who are not associated with an organization or business account. Once Person Accounts are enabled, they cannot be disabled or removed from the org without contacting Salesforce support
The administrator at Universal Containers does a soft launch of the Salesforce
Authenticator app and allows users to optionally use it to log In. The administrator would
now like to look at how many users have successfully used it since It was rolled out.
What are two ways the administrator can get this Information?
Choose 2 answers
A. Create a new view In Identity Verification History, specifying Method.
B. Open the Login Access Policies In Setup which shows how many users are using MFA.
C. Run a session setting report, specifying login methods by user.
D. Export Login History and filter based off of Authentication Method Reference,
Explanation:
Salesforce Authenticator is an app that adds an extra layer of security for logging into
Salesforce by requiring users to verify their identity using their mobile device after entering
their username and password on Salesforce login page. To see how many users have
successfully used Salesforce Authenticator since it was rolled out, an administrator can use
two methods:
A) Create a new view In Identity Verification History, specifying Method.
Identity Verification History is a tool that shows information about each identity verification
event for users in your org, such as the date and time, the verification method used, the IP
address, and the status of the verification. By creating a new view in Identity Verification
History and specifying the method as Salesforce Authenticator, an administrator can see
how many users have used the app to verify their identity when logging in.
D) Export Login History and filter based off of Authentication Method Reference.
Login History is a tool that shows information about each login attempt for users in your
org, such as the date and time, the username, the source IP address, the login type, and
the status of the login. By exporting Login History as a CSV file and filtering based on the
Authentication Method Reference column, an administrator can see how many users have
used Salesforce Authenticator as their authentication method when logging in.
AW Computing is conducting an audit and wants to understand how many objects have
been shared as public externally.
which tool should the administrator use to quickly obtain this details?
A. Security Health Check
B. Setup Audit Trail
C. Session Security Settings
D. Object Manager
Explanation: The data masking tool is a tool that allows you to mask sensitive data in your full sandbox by replacing it with fictitious data. This can help you protect your data privacy and comply with regulations while testing in a realistic environment. You can use the data masking tool to mask data for standard and custom objects, including person accounts, and choose from different masking formats and options.
Cloud Kicks has organization-wide snaring defaults on the opportunity set to prvete.
However, members of the finance team need to see closed won opportunities. The Drama
team members all have roles under the finance director, while the sales team members
have roles under the sales marager.
Which two options should the administrator use to meet these criteria?
Choose 2 answers
A. Share with roles and subordinates of the finance cirector role.
B. Make an owner-based sharing rule where the wnn field - true.
C. Create a criteria-based sharing rule where the won field = true.
D. Select all opportunities owned by the sales manager role.
Explanation:
Two options that the administrator should use to meet these criteria are:
Share with roles and subordinates of the finance director role. This option allows
you to grant access to records based on the role hierarchy of your org. You can share records with users who are in a specific role or in roles below that role in the
hierarchy. In this case, you can share records with roles and subordinates of the
finance director role, which includes all the members of the finance team.
Create a criteria-based sharing rule where the won field = true. This option allows
you to grant access to records based on certain field values or formulas. You can
create a criteria-based sharing rule on opportunities that grants access to records
where the won field is true, which means that the opportunity stage is closed won.
The other two options are incorrect because:
Make an owner-based sharing rule where the won field = true is not an option
because owner-based sharing rules do not allow you to specify field values or
formulas as criteria. Owner-based sharing rules only allow you to share records
based on who owns them or what role or group they belong to.
Select all opportunities owned by the sales manager role is not an option because
it does not meet the criteria of sharing all closed won opportunities. It only shares
opportunities that are owned by users who are in the sales manager role,
regardless of their stage.
An administrator at Clod Kicks has build a flow that delivers status update email to
customers. Recently, there’s been an increasae in support cases from customers reporting
they had not received the email.
Where should the administrator look to investigate the issue?
A. Paused Flow Interviews
B. Process Automation Setting
C. Email Logs
D. Setup Audit Trail
Explanation: Email logs are files that provide information about email delivery and activity in your Salesforce org. Email logs contain details such as sender, recipient, subject, date, status, error code, and more for each email sent or received within a specified time range. You can use email logs to investigate issues with email delivery or performance in your org. In this case, you can use email logs to check if the status update emails were sent successfully or if there were any errors or failures.
Users at Ursa Major Solar want to create complex dashboards with supporting charts
based on data to come from a variety of sources, some of which live on the Internal
company shared drives.
Which product should the administrator recommend to meet the users' needs?
A. Lightning Dashboard Builder
B. Report Bulkier
C. List views
D. Tableau CRM
Explanation: Tableau CRM is a product that allows users to create complex dashboards with supporting charts based on data from a variety of sources, some of which live on internal company shared drives. Tableau CRM can connect to external data sources using connectors or dataflows and store the data in datasets within Salesforce. Tableau CRM can also use artificial intelligence and machine learning to provide insights and recommendations based on the data
A user at Cloud Kicks has informed the administrator that they are unable to log in to
Salesforce via multi-factor authentication.
Which two area should the administrator review to understand potential root causes?
Choose 2 answers
A. Identity Verification History
B. Login History
C. Debug Logs
D. Setup Audit Trail
Explanation: Identity Verification History is a tool that tracks the verification methods used by users when they log in to Salesforce via multi-factor authentication. It can help identify any issues or errors related to verification methods such as email, phone, or app. Login History is a tool that tracks the login attempts and status of users who access Salesforce. It can help identify any issues or errors related to login credentials, IP addresses, browser types, or locations.
Select power users want the ability to make configuration changes to a specific custom
object.
What tool should the administrator assign to the power users to enable this?
A. View Setup and Configuration
B. Delegated Administration
C. Sharing Rule
D. Modify All Data
Explanation: Delegated Administration is a feature that allows administrators to delegate some administrative tasks to other users without giving them full access to Setup. Delegated administrators can manage users and assign permissions for specific custom objects, tabs, apps, and fields. This can help reduce the workload of the system administrator and empower power users to make configuration changes to a specific custom object
Sales teams at Cloud Kicks ask each visiting customer to fill out a form that capturing their
contact information and some basic footwear preferences. This information is saved to a
spreadsheet and used by the sales team to alert their contacts when new shows are added
to the inventory that matches their preferences. The sales team wants to be able to track
this in Salesforce and see the information when viewing the contact
Record.
Which two ways should the administrator configure this requirement?
Choose 2 answers
A. Data Loader
B. Lookup Field
C. Lightning Object Creator
D. Schema Builder
Explanation: Data Loader is a tool that allows administrators to import, export, insert, update, delete, or upsert records in Salesforce using CSV files. Data Loader can handle large data sets and complex data transformations. Data Loader can be used to import records for a custom object from a spreadsheet. Lightning Object Creator is a tool that allows administrators to create custom objects in Salesforce from spreadsheets. Lightning Object Creator can automatically map spreadsheet columns to fields and create relationships between objects. Lightning Object Creator can be used to create a custom object from a spreadsheet and import records at the same time.
When should an administrator consider when using Person Accounts'
A. In a complex business model and the users find it easiest to record Opportunity information on Contacts rather than Accounts.
B. In a B2B business model and is selling to the primary contact at a business organization.
C. In a B2C business model and the consumer is the intended recipient of sates and marketing attention.
D. In a business model that needs a separate Contact and Account to be included on all Case records submitted.
Explanation: An administrator should consider using Person Accounts when they have a B2C business model and the consumer is the intended recipient of sales and marketing attention. Person Accounts allow administrators to store information about individual consumers without requiring a separate account record for each contact.
Page 3 out of 22 Pages |
Previous |