An administrator installed a managed package that contains a permission set group. The permission set group that was installed includes Delete access on several objects, and the administrator needs to prevent users in the permission set group from being able to delete records. What should the administrator do to control Delete access?
A. Use a muting permission set with a permission set group to mute selected permissions.
B. Create a new permission set that has Delete access deselected for the objects.
C. Create a new role that prevents Delete permissions from rolling up to the users.
D. Edit the profile for the users to remove Delete access from the objects.
A. Use a muting permission set with a permission set group to mute selected permissions.
An administrator gets a rush request from Human Resources to remove a user’s access to Salesforce immediately. The user is part of a hierarchy field called Direct Manager.
What should the administrator do to fulfill the request?
A. Freeze the user to prevent them from logging in while removing them from being referenced in the Direct Manager field.
B. Deactivate the user and delete any records where they are referenced in the Direct Manager field.
C. Change the user’s profile to read-only while removing them from being referenced in the Direct Manager field.
D. Delete the user and leave all records where they are referenced in the Direct Manager field without changes.
A. Freeze the user to prevent them from logging in while removing them from being referenced in the Direct Manager field.
An administrator has assigned a permission set group with the Two-Factor Authentication for User Interface Logins permission and the Two-Factor Authentication for API Logins permission to a group of users. Which two prompts will happen when one of the users attempts to log in to Data Loader? (Choose 2 answers)
A. Users need to connect an authenticator app to their Salesforce account.
B. Users need to get a security token from a trusted network using Reset My Security Token.
C. Users need to download and install an authenticator app on their mobile device.
D. Users need to enter a verification code from email or SMS, whichever has higher priority.
A. Users need to connect an authenticator app to their Salesforce account.
D. Users need to enter a verification code from email or SMS, whichever has higher priority.
An administrator at Universal Containers has been asked to prevent users from accessing Salesforce from outside of their network. What are two considerations for this configuration? (Choose 2 answers)
A. IP address restrictions are set on the profile or globally for the org.
B. Users can change their password to avoid login IP restrictions.
C. Enforce Login IP Ranges on Every Request must be selected to enforce IP restrictions.
D. Single sign-on will allow users to log in from anywhere.
A. IP address restrictions are set on the profile or globally for the org.
C. Enforce Login IP Ranges on Every Request must be selected to enforce IP restrictions.
When users log in to Salesforce via the user interface, which two settings does the system check for authentication? (Choose 2 answers)
A. The user’s Two-Factor Authentication for API Logins permission
B. The role IP address restrictions
C. The user’s profile login hours restrictions
D. The user’s Two-Factor Authentication for User Interface Logins permission
C. The user’s profile login hours restrictions
D. The user’s Two-Factor Authentication for User Interface Logins permission
An administrator has reviewed an upcoming critical update. How should the administrator proceed with activation of the critical update?
A. Activate the critical update in a sandbox.
B. Allow the critical update to auto-activate.
C. Activate the critical update in production.
D. Allow the critical update to auto-activate in a sandbox.
A. Activate the critical update in a sandbox.
A team of support users at Cloud Kicks is helping inside sales reps make follow-up calls to prospects that filled out an interest form online. The team currently does not have access to the Lead object. How should an administrator provide proper access?
A. Create a new profile
B. Configure permission sets
C. Assign a new role
D. Set up manual sharing
B. Configure permission sets
An administrator supporting a global team of Salesforce users has been asked to configure company settings. Choose 2 options.
A. Currency Locale
B. Default Language
C. Password Policy
D. Login Hours
A. Currency Locale
B. Default Language
Universal Containers wants to restrict access to its Salesforce org so that users can log in only during business hours. Where should the administrator configure this?
A. Company Information
B. Profile Settings
C. Role Settings
D. Permission Sets
B. Profile Settings
The administrator at Ursa Major Solar needs to restrict users from deleting Opportunities.
Which feature should the administrator use?
A. Role Hierarchy
B. Permission Sets
C. Profiles
D. Sharing Rules
C. Profiles
The administrator at DreamHouse Realty wants to give sales managers access to view, edit, and report on all Opportunities, regardless of ownership. Which feature should the administrator configure?
A. Role Hierarchy
B. Sharing Rules
C. Permission Sets
D. Public Groups
A. Role Hierarchy
The administrator at Northern Trail Outfitters has been asked to make sure that users cannot delete Accounts. What should the administrator do?
A. Remove the Delete permission from users’ profiles.
B. Create a validation rule on the Account object.
C. Modify the role hierarchy settings.
D. Use a sharing rule to restrict deletion.
A. Remove the Delete permission from users’ profiles.
Universal Containers wants to ensure that only managers can delete Opportunities. Which feature should the administrator use?
A. Sharing Rules
B. Role Hierarchy
C. Profiles
D. Permission Sets
C. Profiles
Universal Containers wants to restrict users from logging in outside business hours. Where should the administrator configure this?
A. Permission Sets
B. Profiles
C. Roles
D. Company Information
B. Profiles