0
3

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 1 year has passed since last update.

Salesforce Administrator Practice Test 81~90(ONLY ENGLISH)

Posted at

Please check this URL.
https://developer.salesforce.com/files/ti/thi/THI-000393/administratorpracticetest.html

NO81

Salesforce users at Universal Containers complain that global search returns too many records.

Which two configurations should a System Administrator perform to help users manage search results?

Choose 2 options.

1.Specify the Search Filter Fields for the object's search layout.
2.Specify the Keywords and include them into the object's search layout.
3.Reduce the number of records displayed for each object in the Search Results page.
4.Enable Sidebar Search Auto-Complete in the object's search settings.

ANSWER
1.Specify the Search Filter Fields for the object's search layout.
Customize search settings, search result filters, and lookup search.
3.Reduce the number of records displayed for each object in the Search Results page.
Customize search settings, search result filters, and lookup search.

FALSE
2.Specify the Keywords and include them into the object's search layout.
Customize search settings, search result filters, and lookup search.
4.Enable Sidebar Search Auto-Complete in the object's search settings.
Customize search settings, search result filters, and lookup search.

NO82

What are two reasons a user cannot be deactivated?

Choose 2 options.

1.The user account is frozen.
2.The user is the recipient of Workflow Email Alerts.
3.The user is a Customer Community Administrator.
4.The user is the Owner of open Opportunities.

ANSWER
2.The user is the recipient of Workflow Email Alerts.
If a user is active in a workflow, it will prevent the user from being deactivated.
3.The user is a Customer Community Administrator.
The user cannot be deactivated if they are a Customer Community Administrator.

FALSE
1.The user account is frozen.
A user account can be frozen if unable to be deactivated, but it does not prevent an account from being deactivated.
4.The user is the Owner of open Opportunities.
The user can still be deactivated if they are the owner of open opportunities. The ownership can then be transferred to another user account.

NO83

What is a benefit of entering Trusted IP Ranges in the Network Access section?

1.Users that log in within the network will not be required to verify their identity.
2.All attempts to log in from outside the network will be denied.
3.Users are unable to log in through the API on networks not marked as trusted.
4.AppExchange packages can communicate with an external site.

ANSWER
1.Users that log in within the network will not be required to verify their identity.
Entering Trusted IP Ranges in the Network Access section allows users to bypass verification.

FALSE
2.All attempts to log in from outside the network will be denied.
If they are not logging in from a trusted IP, users can use a verification code or security token to authenticate and then log in.
3.Users are unable to log in through the API on networks not marked as trusted.
If they are not logging in from a trusted IP, users are able to log in through the API using a verification code or security token.
4.AppExchange packages can communicate with an external site.
All apps can communicate with an external site as long as a verification code or security token is used to authenticate.

NO84

How can a System Administrator discover who added a field to the account page layout?

1.Create a poll in the Admin Chatter group.
2.Run an Account History report.
3.Download the Setup Audit Trail.
4.Review the Account Last Modified By field.

ANSWER
3.Download the Setup Audit Trail.
The Setup Audit Trail tracks field history.

FALSE
1.Create a poll in the Admin Chatter group.
Creating a poll is not a verified way to track field changes to the account page layout.
2.Run an Account History report.
Running a report will not show changes to the Account page.
4.Review the Account Last Modified By field.
The Account Last Modified By might show a change made after the information you would be looking for.

NO85

Which two changes are tracked in the Setup Audit Trail?

Choose 2 options.

1.Using the Data Import Wizard
2.Resetting a user's password
3.Using the Data Loader
4.Creating a List View

ANSWER
1.Using the Data Import Wizard
The Setup Audit Trail tracks the use of the Data Import Wizard.
2.Resetting a user's password
The Setup Audit Trail tracks password resets.

FALSE
3.Using the Data Loader
The Setup Audit Trail does not track use of Data Loader
4.Creating a List View
The Setup Audit Trail does not track List View creation.

NO86

Universal Containers uses a private sharing model for Cases. Each product line has several product specialists who want to have visibility to all Cases involving their product line.

How should the System Administrator meet this requirement?

1.Add the product specialists to the Account Team for each Account that has purchased a product from the product line.
2.Create a pre-defined Case Team for each group of product specialists and assign the team using Case Assignment Rules.
3.Create an owner-based Case Sharing Rule to share corresponding Cases with the product specialist role.
4.Change the Org-Wide Default for Cases to Controlled By Parent and add product specialists to Account Teams.

ANSWER
2.Create a pre-defined Case Team for each group of product specialists and assign the team using Case Assignment Rules.
A case team is a group of people that work together to solve cases.

FALSE
1.Add the product specialists to the Account Team for each Account that has purchased a product from the product line.
3.Create an owner-based Case Sharing Rule to share corresponding Cases with the product specialist role.
4.Change the Org-Wide Default for Cases to Controlled By Parent and add product specialists to Account Teams.
Use a case team to allow the group of people to work together to solve cases.

NO87

Universal Containers utilizes a private sharing model for Accounts, Contacts, and Opportunities. When account owners are on vacation, a back-up sales rep needs access to all Accounts with the rating of Hot.

How should the System Administrator give the back-up sales rep access to Hot Accounts?

1.Use a workflow rule to change ownership for all the Hot Accounts where the owner's On Vacation field is checked.
2.Create a criteria-based sharing rule to share all Hot Accounts with the user in the back-up rep account field.
3.Instruct the Hot Account owner to manually share the Accounts with the back-up rep before leaving on vacation.
4.Create a criteria-based sharing rule to share all Hot Accounts with all the users in the back-up rep's public group.

ANSWER
3.Instruct the Hot Account owner to manually share the Accounts with the back-up rep before leaving on vacation.
Allow the user to manually share records.

FALSE
1.Use a workflow rule to change ownership for all the Hot Accounts where the owner's On Vacation field is checked.
2.Create a criteria-based sharing rule to share all Hot Accounts with the user in the back-up rep account field.
4.Create a criteria-based sharing rule to share all Hot Accounts with all the users in the back-up rep's public group.
Changing sharing rules is not needed. Allow the user to manually share records.

NO88

Universal Containers uses a custom object within the product development team. Product development, executives, and System Administrators should be the only users with access to records of this object. Product development needs read/write access to all the records within the object, while the executives should only be able to view the records.

How can the System Administrator configure the security model to meet these requirements?

1.Set the Organization-Wide Defaults for the custom object to Private; give the Product Development Profile Modify All for the object; give the Executive Profile View All access.
2.Set the Organization-Wide Defaults for the custom object to Public Read Write; Give the Product Development Profile Read, Create, Edit permissions; give the Executive Profile Read Only permissions for that object.
3.Set the Organization-Wide Defaults for the custom object to Public Read Write; create a Read Only Sharing Rule to share all records in the object with the Executive Public Group.
4.Set the Organization-Wide Defaults for the custom object to Private; add the Executive users to the default team for the object; add the default team to all the records.

ANSWER
2.Set the Organization-Wide Defaults for the custom object to Public Read Write; Give the Product Development Profile Read, Create, Edit permissions; give the Executive Profile Read Only permissions for that object.
Assign default access to Controlled by Parent, Private, Public Read Only, or Public Read/Write. Object permissions specify the base-level access users have to create, read, edit, and delete records for each object. Manage object permissions in permission sets and profiles.

FALSE
1.Set the Organization-Wide Defaults for the custom object to Private; give the Product Development Profile Modify All for the object; give the Executive Profile View All access.
3.Set the Organization-Wide Defaults for the custom object to Public Read Write; create a Read Only Sharing Rule to share all records in the object with the Executive Public Group.
4.Set the Organization-Wide Defaults for the custom object to Private; add the Executive users to the default team for the object; add the default team to all the records.

NO89

Universal Containers uses a hybrid sharing model where Accounts and Contacts are Read Only and Opportunities and Cases are Private. Account Executives (AE) own all the Accounts. Some Contacts are owned by AEs, and other Contacts are owned by support reps.

How should the System Administrator ensure the AEs can edit all the Contacts associated with their Accounts, no matter who owns the Contact?

1.Account owner privileges give the AE edit access to all related records by default.
2.Select the edit all associated contacts option for the AE Role in the Role Hierarchy.
3.Create a read/write Sharing Rule to share all related Contacts with the Account owner.
4.Use the Mass Transfer Tool to transfer ownership of all Contacts to the AEs.

ANSWER
2.Select the edit all associated contacts option for the AE Role in the Role Hierarchy.
The user may have inherited Read access from a subordinate in the role hierarchy. If the user who has access is on a different branch of the hierarchy from the account owner, check the sharing rules, account teams, and account territory.

FALSE
1.Account owner privileges give the AE edit access to all related records by default.
3.Create a read/write Sharing Rule to share all related Contacts with the Account owner.
4.Use the Mass Transfer Tool to transfer ownership of all Contacts to the AEs.

NO90

The Password Policy shows that the length of time until passwords expire is 90 days. However, some users find that their passwords expire every 30 days.

Where should the System Administrator change the password expiration period for these users?

1.Individual User records
2.Permission Sets assigned to the Users
3.Profiles assigned to the Users
4.Roles assigned to the Users

ANSWER
3.Profiles assigned to the Users
Changes to org-wide password policies don't apply to users of a profile that has its own password policies.

FALSE
1.Individual User records
2.Permission Sets assigned to the Users
4.Roles assigned to the Users

0
3
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
3

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?