The Cloud Kicks security team has seen an increase in unattended device attacks, where hackers can view sensitive information when users leave devices unlocked in public settings. The security team wants to ensure Salesforce data cannot be viewed after 10 minutes of inactivity.
What is the recommended security setting to configure?
A. Enforce login IP ranges onevery request.
B. Lock sessions to the domain in which they were first used.
C. Require a high assurance session.
D. Force logout on session timeout.
The AW Computing administrator team does significant amounts of work around process automation and ensuring data integrity. When an administrator created a new validation rule in production, the development team complained that their deployment to production failed.
What should be implemented to prevent this conflict from happening?
A. Review the setup audit trail prior to changes.
B. Refresh the full copy sandbox daily.
C. Test changes in a shared sandbox.
D. Build automation and validation rules usingscreen flows.
After setting up field history tracking on the Account object, the administrator for AW Computing wants to retrieve the field history data for analysis. How should the administrator acquire this data?
A. Create a report of Accounts and export it to Excel.
B. Query and export the Account History object using Data Loader.
C. Use the Data export service insetup.
D. Create a list view of Account History and print using the Printable View action.
An administrator has found a free app on the AppExchanged and would like to install it. Which three items should the administrator take to consideration before installed he managed package?
Choose 3 answers
A. Custom objects and custom fields used by the app count against the org's limits.
B. Managed apps do not undergo a formal security review by Salesforce.
C. Apps may require certain Salesforce editions or features to be enabled.
D. Apps may require external, third-party web services to function properly.
E. Apps must be installed in production before the app can be installed in a sandbox.
The administrator at CloudKicks has been asked to delete a large number of quote line items. The/ receive a .csv fife with the record IDs to be deleted. The administrator uses Data Loader to delete them and selects Use Sulk APL When the job runs, every record shows an 'entity Is deleted' error In the error file that is created.
What is the reason for the error?
A. The batch size selected was greater than the 200 record limit.
B. Deleting with Data Loader can only be done In Batch API mode.
C. One of the IDs in the batch referenced arecord that was In the recycle bin.
D. This Is the standard error message when records are deleted using Bulk API.
Cloud Kicks has an export of Order and Order Item data froman enterprise resource planning (ERP) system. The data must be imported into the Salesforce Order and Order Product objects, while maintaining the relationships in the data.
What are two ways the administrator should load the data?
Choose 2 answers
A. Usean Upsert operation to load data.
B. Use an Insert operation to load data.
C. Replace the Salesforce record ID with the External ID.
D. Map an External ID data value to the object.
Ursa Major Solar (UMS) wants to improve Its customers' ability to search for knowledge articles. UMS has already created categories for articles.
Which two additional chances should be made to improve search capabilities?
Choose 2 answers
A. Configure Global Search for specific search terms.
B. Create synonyms for specific search terms.
C. Configure Einstein Search for specific search terms.
D. Promote specific search terms for specific articles.
An administrator has been asked to enable permissions for users on the account services team to be able to edit and change ownership of Accounts owned by any of the team members. What should the administrator configure?
A. Set organization-wide sharing for Account as Public Read Only.
B. Create a Sharing Rule on the Account object for all members of the account services role to have Read/Write access.
C. Update the profile Accountobject to Modify All.
D. Enable Account Teams and grant Read record-level access to account team members for the Account object
AW Computing continues to grow and has concerns about the volume of sensitive data being stored in its org. Theadministrator suggests utilizing Salesforce Shield. What should the team consider before Implementing Salesforce Shield?
A. Encrypted f elcz art j-ab e to be referenced in flows.
B. Einstein Lead Scoring is available on encrypted fields.
C. Paused flows can cause data to be saved in an unencrypted state.
D. Shield Platform Encryption can be used with custom metadata types.
An administrator need a business process automated, but only for certain user and profiles. The administrator will need to frequently update which users and profiles will use the process. After evaluating the declarative options, it was determined that this functionality must be done via an Apex trigger.
What software requirement should the administrator request sothat process execution can be declaratively controlled?
A. Use Process Automation Setting in Setup to the appropriate users or profiles.
B. Use a System permission that is assigned to the user or profile.
C. Use Apex Class Access to assign the Apex code tothe user or profile.
D. Use a custom permission set that is assigned to the user.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Salesforce exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ADVANCED-ADMINISTRATOR exam preparations and Salesforce certification application, do not hesitate to visit our Vcedump.com to find your solutions here.