Topic 1: Exam Pool A
The sales managers at the Universal Containers (UC) requested their teams to define each user’s role on their accounts in order to provide an easy way to establish accountability and collaboration. Sales managers also requested that sales associates should only get the following permissions:
A. Use Account teams and use Sharing rules to share cases with sales associates. No change required to the opportunity object
B. Use Account teams, Case teams. No configuration required for the opportunity object.
C. Use Account teams, Opportunity teams, and Case teams.
D. Use Account Teams to define access to accounts as well as opportunities and cases related to accounts
Using Account teams, Opportunity teams, and Case teams is the best way to achieve these requirements. Account teams allow you to share accounts and related records with a group of users. Opportunity teams allow you to share opportunities with a group of users who can have different levels of access. Case teams allow you to share cases and related records with a group of users who can have different roles and levels of access. Using Sharing rules to share cases with sales associates will not work, because sharing rules can only be based on record owner or criteria, not on account team membership. Using Account Teams to define access to accounts as well as opportunities and cases related to accounts will not work, because account team members can only have read-only access to cases by default.
Universal Containers (UC) has a private Organization-Wide Defaults (OWD) model for the
Account object and needs to control the access of records and fields according to these
requirements:
A. Use profiles, sharing rules, and change OWD to public read-only.
B. Use profiles, manual sharing, and field-level security.
C. Use profiles, permission sets, and field-level security.
D. Use profiles, permission sets, role hierarchy, and field-level security.
Profiles and Permission Sets can be used to control the object-level and field level access for different types of users. For example, sales reps can have read/write access to Account object but not to the segment field, while service reps can have read only access to Account object and all fields. Role Hierarchy can be used to control the record-level access for users based on their position in the organization. For example, sales managers can access and modify any account of reps reporting to them, while service managers can access and modify any account regardless of ownership. Field-Level Security can be used to override the profiles and permission sets for specific fields on specific records. For example, service managers can edit the segment field on any account, even if their profile does not allow it. Therefore, the answer D is correct and the other options are incorrect3.
What vulnerability can exist when controllers use dynamic rather than static queries and bind variables?
A. SOQL Injection.
B. Buffer Overflow Attacks.
C. Cross-site scripting.
D. Record Access Override.
SOQL injection is a vulnerability that can exist when controllers use dynamic rather than static queries and bind variables. SOQL injection is a technique that exploits a security vulnerability by inserting malicious SOQL statements into an existing query. This can result in data loss, data exposure, or unauthorized access1. Buffer overflow attacks, cross-site scripting, and record access override are not vulnerabilities related to dynamic queries and bind variables.
Sales Operations at Universal Containers (UC) has created Public Report and Dashboard folders for sales managers that report to the VP of sales. Sales Operations currently spends a few hours each month updating users that should have access to edit items in these folders. In which two ways can UC grant access to sales managers to automate access to these Reports and Dashboards folders? (Choose 2 answers)
A. Share the folders lowest roles in the role hierarchy, Superiors will get access automatically.
B. Share the folders with the “VP of Sales” Role and Subordinates.
C. Share the folders with the “Sales Managers” Queue.
D. Share the folders with a “Sales Managers” Public Group.
Sharing the folders with the “VP of Sales” Role and Subordinates and sharing the folders with a “Sales Managers” Public Group are two ways that UC can grant access to sales managers to automate access to these Reports and Dashboards folders. Folder sharing allows users to share reports and dashboards with other users based on roles, subordinates, public groups, or individual users. Option A is incorrect, since sharing the folders with lowest roles in the role hierarchy would not give access to superiors automatically, but only to subordinates. Option C is incorrect, since sharing the folders with a queue is not possible.
The Corporate Identity and Access Team needs to audit User setup in the Salesforce. What two permissions should be granted to this team so they can perform their audit? (Choose 2 answers)
A. View permission on the User object
B. View Setup and Configuration
C. View All Users
D. View All Data
Explanation: To audit user setup in Salesforce, the team needs to have both View Setup and Configuration and View All Users permissions. View Setup and Configuration allows them to access the setup menu and see the user profiles, roles, and permission sets. View All Users allows them to see all the user records and their details, such as login history and assigned licenses.
Universal Containers (UC) is in legal dispute regarding several orders. UC has found out these records were removed from system. The VP of Sales has asked to ensure this cannot happen in the future. What approach would meet this requirement?
A. Remove the delete button from the Order page layout.
B. Change the record type/page layout assignment for orders to be read-only.
C. Remove order delete permission from profiles and permission sets.
D. Implement a sharing rule that changes access for the records to read.
Explanation: Removing order delete permission from profiles and permission sets is the best approach to ensure that order records cannot be removed from the system in the future. This way, only users with the Modify All Data permission can delete order records. Option A is incorrect, since removing the delete button from the order page layout would not prevent users from deleting order records using other methods, such as data loader or API. Option B is incorrect, since changing the record type/page layout assignment for orders to be read-only would not affect the delete permission, but only the edit permission. Option D is incorrect, since implementing a sharing rule that changes access for the records to read would not prevent users from deleting order records that they own.
The Finance team at Universal Containers usually does not need access to Account and Contract records A given Opportunity access for a big deal to help with tax calculation. She can now also access Account and C. Which two reasons could be causing this issue? (Choose2 answers)
A. Contact records can be accessed due to implicit sharing from Account.
B. Account records can be accessed due to implicit sharing from Opportunity.
C. Contact records can be accessed due to implicit sharing from Opportunity.
D. Account records can be access due to role hierarchy.
Explanation: Account records can be accessed due to implicit sharing from Opportunity and Account records can be accessed due to role hierarchy are two reasons that could be causing this issue. Implicit sharing grants access to parent records when a user has access to a child record. For example, if a user has access to an opportunity, they also have access to its related account and contract records. Role hierarchy grants access to records owned by or shared with users who are below in the hierarchy. For example, if a user is above another user in the role hierarchy, they can access any records that the lower user can access. Option A is incorrect, since contact records cannot be accessed due to implicit sharing from account, as implicit sharing does not grant access to child records. Option C is incorrect, since contact records cannot be accessed due to implicit sharing from opportunity, as implicit sharing does not grant access to child records.
Universal Containers has expanded to sell virtual containers for data storage. Virtual container work orders are provisioned immediately by the system and therefore cannot be changed by a sales representative. What is an optimal approach to implement these requirements?
A. Remove the Work Order Edit permission from the sales representative Profile.
B. Remove the edit button from the work order page layout.
C. Change the record type/page layout assignment for Work Order to be Read Only.
D. Implement a sharing rule that changes access for all Work Order to Read.
Explanation: Removing the Work Order Edit permission from the sales representative profile is the optimal approach to implement these requirements, as it will prevent sales representatives from changing virtual container work orders that are provisioned immediately by the system. Option B is incorrect, since removing the edit button from the work order page layout would not prevent sales representatives from editing work orders using other methods, such as inline editing or data loader. Option C is incorrect, since changing the record type/page layout assignment for Work Order to be Read Only would not affect the edit permission, but only the layout configuration. Option D is incorrect, since implementing a sharing rule that changes access for all Work Order to Read would not prevent sales representatives from editing work orders that they own.
The architect at Universal Containers is trying to ensure that security vulnerabilities are not present within the Salesforce organization. What two tests should the architect verify? (Choose 2 answers)
A. Test Cross-Site Scripting on Apex queries
B. Test Cross-Site Scripting on custom pages
C. Test for SOQL Injection
D. Test for invalid user access attempts
Explanation: Cross-Site Scripting (XSS) and SOQL Injection are two common types of security vulnerabilities that can affect Salesforce applications. XSS occurs when malicious code is injected into a web page that can execute in the browser of a user who visits that page6. SOQL Injection occurs when user input is used to construct a SOQL query without proper validation or escaping, which can allow an attacker to manipulate the query and access unauthorized data7. To prevent XSS, developers should use appropriate encoding methods when displaying user input on custom pages8. To prevent SOQL Injection, developers should use bind variables or thee scape Single Quotes() method when building SOQL queries with user input9. Option A is incorrect, since Apex queries are not vulnerable to XSS. Option D is incorrect, since testing for invalid user access attempts is not related to security vulnerabilities within the Salesforce organization.
Bob uploads a PDF to his Files Home private library. Who can view this file?
A. Bob and users above Bob in the role hierarchy
B. Bob and users with View All Data permission
C. Bob and users with Modify All Data permission
D. Only Bob
Explanation: Only Bob can view the file that he uploads to his Files Home private library. Users above Bob in the role hierarchy, users with View All Data permission, or users with Modify All Data permission cannot access the file unless Bob explicitly shares it with them.
Page 1 out of 24 Pages |