Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

What is determined by a profile?

(select 2)

A. Which tabs and apps are visible in the user interface

B. Which currencies are available to users.

C. What users can do with records of a particular object.

D. Which individual records users can view and edit.

What tasks can be performed by a user who is assigned to the standard System Administrator
profile? (select 2)

A. Access a log of the records a user has viewed.

B. Create and assign custom profiles to users.

C. Reset user passwords.

D. Delete user records.

Support users at AW Computing can view, create, and edit accounts. However,
the management team does not want support users to delete accounts in the
organization. How can an administrator meet this requirement?

A. Assign the Standard User profile to support users.

B. Assign the Read Only profile to support users. Which individual records users
can view and edit.

C. Create a custom profile that has the View All permission enabled for the
account object and assign the custom profile to support users.

D. Create a custom profile that has the Delete permission disabled for the
account object and assign the custom profile to support users.
When creating a new user, what information is captured on the user record?  (select 2)

A. Profile assigned to the user

B. List of apps that the user can access

C. Name, email address, and username of the user

D. User interface settings that can be enabled for the user

E.

What does Salesforce authenticate before allowing a user to log in through the user interface?
(select 2)

A. Whether the user's profile is API enabled.

B. Whether the organization has trusted IP addresses.

C. Whether the user's profile has login hour restrictions.

D. Whether the user's role has login IP range restrictions.

What feature sets the default level of access users have to records they do not own, in
each object?

A. Sharing rules

B. Organization-wide defaults

C. Role hierarchy

D. Manual Sharing

What does field-level security control?  

A. Which fields are automatically generated by the system.

B. Which fields users can view and edit based on their profile.

C. Which fields are required in the user interface.

D. Which fields are encrypted to users based on their profile.


At AW Computing, the organization-wide default for cases is set to Private. The management
team wants several product specialists to assist with all cases that have been escalated. Only
these product specialists need the ability to view and update all escalated cases. How can an
administrator meet this requirement?

A. Create an ownership-based sharing rule for cases that gives read/write access to a
role.

B. Change the organization-wide default for cases to Public Read/Write.

C. Create a criteria-based sharing rule for cases that gives read/write access to a public
group.

D. Create a new product specialist role in the role hierarchy which is above the VP of
Services role.

In AW Computing, product managers do not have access to opportunities. How can a system
administrator grant them access to opportunities if the product managers are assisting with a
specific deal?

A. Add the product managers to the account teams for specific accounts.

B. Add the product managers to the opportunity teams for specific opportunities.

C. Add the product managers to a public group associated with specific opportunities.

D. Add the product managers to the role above sales reps in the role hierarchy.

How can the system administrator give the executive assistant the ability to view, edit, and
transfer ownership of all records, but not allow her to delete the records?

A. Create a sharing rule for each object that gives Read/Write access for all records to the
executive assistant and assign her to the highest role in the role hierarchy.

B. Change the organization-wide default for all objects to Public Read Only.

C. Assign the System Administrator profile to the executive assistant.

D. Assign the executive assistant the highest role in the role hierarchy and a custom
profile with the Delete object permission disabled for all objects.

You might also like