What does a Profile Control?

What does a Profile Control?A .  Access to ApplicationB .  Record Type AccessC .  PermissionsD .  Data VisibilityE .  Hours of IP AddressView AnswerAnswer: A,B,C,E

August 11, 2019 No Comments READ MORE +

What is the maximum number of values you can have in a picklist?

What is the maximum number of values you can have in a picklist?A .  500B .  250C .  600D .  1.000E .  2.000View AnswerAnswer: A

August 11, 2019 No Comments READ MORE +

What is a Running User?

CORRECT TEXT What is a Running User?View AnswerAnswer: Determines the level of access to the dashboard data

August 11, 2019 No Comments READ MORE +

A system administrator can opt to lock users out of the Salesforce org if they exceed a certain number of failed login attempts.

A system administrator can opt to lock users out of the Salesforce org if they exceed a certain number of failed login attempts.A .  TrueB .  FalseView AnswerAnswer: A

August 10, 2019 No Comments READ MORE +

Reports and views are not renamed based on the new label value 

Reports and views are not renamed based on the new label value A . TrueB .  FalseView AnswerAnswer: A

August 10, 2019 No Comments READ MORE +

Documents count toward Data Storage.

Documents count toward Data Storage.A .  TrueB .  FalseView AnswerAnswer: B

August 10, 2019 No Comments READ MORE +

What should a system administrator consider before importing a set of records into Salesforce.

What should a system administrator consider before importing a set of records into Salesforce.A .  The import file should include a record owner for each recordB .  Validation rules are not triggered when importing data using the import wizardC .  Data should be de-duplicated in the import file prior to...

August 10, 2019 No Comments READ MORE +

Where does the click path Your Name --> Set up -> Security controls -> Sharing settings lead to?

Where does the click path Your Name --> Set up -> Security controls -> Sharing settings lead to?A .  Custom ProfileB .  Organization wide DefaultsC .  Trusted IP RangesView AnswerAnswer: B

August 10, 2019 No Comments READ MORE +

Can a user restrict access with the help of the sharing rules?

Can a user restrict access with the help of the sharing rules?A .  YesB .  NoView AnswerAnswer: B

August 10, 2019 No Comments READ MORE +

Auto response rules can be used to send an automated yet tailored response to customers based on the information they provide via the Web-to-lead form.

Auto response rules can be used to send an automated yet tailored response to customers based on the information they provide via the Web-to-lead form.A .  TrueB .  FalseView AnswerAnswer: A

August 10, 2019 No Comments READ MORE +