Universal Containers provides 24x7 support for its customers worldwide using call centers in three different countries with each one covering an 8-hour shift in different time zones. Service reps in a call center have access to the same information but only during their local working hours. Which feature in Salesforce controls access for specific login hours?
A. Set the login hours on user records
B. Permission sets
C. Custom permissions
D. Profiles
Universal Containers wants to create a way to store sensitive Invoice Data in Salesforce. A User who owns an Account should not see every Invoice, but only invoices that they or their subordinates own. Which two features should be considered during this solution implementation? Choose 2 answers.
A. Deploy the Relationship between Accounts and the Invoices Object as Master-Detail.
B. Ensure that the Organization-Wide Default sharing for Invoices is set to Private.
C. Create a Workflow that populates the Invoice sharing object upon Insert.
D. Deploy the Relationship between Accounts and the Invoices Object as Lookup.
Universal Containers has a strict security model enforced through object, field, and row-based security
mechanisms. The Architect would like to ensure the security model is being thoroughly tested using Apex
automated tests.
Which three considerations should be made when using the runAs() method to design Apex until tests?
A. runAs() does not enforce user permissions or field-level permissions in test classes
B. runAs() can be used inside of test classes to validate record-level security
C. runAs() can be used inside of test classes to validate field-level permissions
D. runAs() can be used outside of test classes to bypass record-level security
E. runAs () counts towards total DML statements issued within transaction
Which three areas should the Architect review in order to increase performance of "Record Access" and "Sharing" calculations? Choose 3 answers.
A. Custom Object data, to ensure that no Account has more than 10,000 Custom Objects that look up to it.
B. Opportunity data, to ensure that no Account has more than 10,000 Opportunity records that are related to it.
C. Record ownership, to ensure that no user owns more than 10,000 Object records in the system.
D. Apex Managed Sharing triggers, to ensure that no trigger is querying more that 10,000 Object records.
The architect at Universal Containers would like to prevent users from editing encrypted fields.
Assuming no customizations are implemented, which two options should the Architect choose to support
the requirement?
Choose 2 answers
A. Validation Rules
B. Page Layout settings
C. Apex Triggers
D. Workflow Rules
Which three capabilities are available with Enterprise Territory Management? Choose 3 answers
A. Create a public group with Territory
B. Share a report or dashboard folder with a Territory
C. Metadata API Support
D. Integration with Collaborative Forecasting
E. Assignment of Territory on Opportunities
The Architect notices that there are many duplicate Account records and numerous sharing rules created in Salesforce. What would be the reason?
A. The Organization-Wide Default for the Account object is Private.
B. The Organization-Wide Default for the Account object is Public Read/Write.
C. The Organization-Wide Default for the Account object is Public Read-Only.
D. The Object permissions for the Account object are Create, Read, and Edit.
What is required to implement Filter-Based Opportunity Territory Assignment?
A. Define an account assignment with a filter criteria rule for Filter-Based Opportunity Territory Assignment.
B. Define a Territory assignment rule with filter criteria for Filter-Based Opportunity Territory Assignment.
C. Define a custom Apex class for Filter-Based Opportunity Territory Assignment in the system.
D. Define an Opportunity assignment rule with filter criteria for Filter-Based Opportunity Territory Assignment.
Which two are potential vulnerabilities in the following code snippet?
SOQLController { public String name { get { return name;} set {name=value;} } public PageReference
query() { String qryString='SELECT Id FROM Contact WHERE '+ '(IsDeleted = false and Name like \'%' +
name + '%\'}'; queryResult = Database.query(qryString); retunr null; } } Choose 2 answers
A. FLS check
B. SOQL Injection
C. Data Access Control
D. Arbitrary Redirects
By Viewer Access you can see the data in a report or dashboard, but you can't make any changes, except by cloning it into a new report or dashboard.
A. True
B. False
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Salesforce exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SHARING-AND-VISIBILITY-DESIGNER exam preparations and Salesforce certification application, do not hesitate to visit our Vcedump.com to find your solutions here.