Practice Free Plat-Admn-301 Exam Online Questions
AW Computing has a 4-hour SLA in its support guarantee. The company recently received feed that customers art reporting long wait times before an agent responds to a new case after it has been submitted.
How should an administrator ensure cases are properly prioritized?
- A . Auto-Response Rules
- B . Escalation Rules
- C . Assignment Rules
- D . Workflow Rules
C
Explanation:
Escalation rules are rules that automatically escalate cases if they have not been resolved within a certain time frame or meet certain criteria such as priority or status. Escalation rules can perform actions such as changing ownership of cases, sending email notifications, or creating tasks for users or queues. By using escalation rules, AW Computing can ensure that cases are properly prioritized and handled within their SLA time limit.
Assignment rules are rules that automatically assign cases to users or queues based on criteria such as case origin, type, or product. Assignment rules can also send email notifications to users or customers when a case is assigned. By using assignment rules, AW Computing can ensure that cases are routed to the right agents or teams based on their skills and availability.
Reference:
https://help.salesforce.com/s/articleView?id=sf.case_escalation_rules_overview.htm&type=5
https://help.salesforce.com/s/articleView?id=sf.customize_caseassign.htm&type=5
At Cloud Kicks, users are able to run reports. However, when users try to export a report, they are taken to a login screen and prompted for additional verification.
What is causing this issue?
- A . Users need to update their browser to the latest version.
- B . The users are logged Into an Insecure network.
- C . The users’ profile is missing the Export Reports permission.
- D . Exporting Is configured to require a high assurance session.
D
Explanation:
A high assurance session is a type of session security level that requires users to verify their identity using a second factor of authentication, such as Salesforce Authenticator, a verification code, or a security key. Administrators can configure certain actions or permissions to require a high assurance session, such as exporting reports, viewing encrypted data, or accessing connected apps.
If users are able to run reports but are taken to a login screen and prompted for additional verification when they try to export a report, it could be because exporting is configured to require a high assurance session. This means that users need to use a second factor of authentication to export reports, even if they have already logged in with their username and password.
Reference:
https://help.salesforce.com/s/articleView?id=sf.identity_verification.htm&type=5 https://help.salesforce.com/s/articleView?id=sf.security_sessions.htm&type=5
Cloud Kicks uses a Lightning web component to provide instructions to sales reps. An administrator needs to correct a spelling error in the displayed text in one of the Lightning web components.
What is the recommended tool to make the change?
- A . Developer Org
- B . VisualStudio Code
- C . Salesforce Lightning Inspector
- D . Developer Console
B
Explanation:
VisualStudio Code is a recommended tool to make the change in the displayed text in one of the Lightning web components. VisualStudio Code is an integrated development environment (IDE) that supports Salesforce development tools such as Salesforce Extensions for Visual Studio Code, Salesforce CLI, and Lightning Web Components. You can use VisualStudio Code to create, edit, debug, and deploy Lightning web components and other Salesforce metadata. To make the change in the displayed text, you need to open the HTML file of the Lightning web component in VisualStudio Code and modify the text element accordingly.
Reference:
https://developer.salesforce.com/tools/vscode
https://developer.salesforce.com/docs/component-library/documentation/en/lwc/lwc.create_components
Ursa Major Solar’s administrator has configured multiple record-triggered flows to run before or after the record is saved on the Account object.
What should the administrator consider when a record-triggered flow executes first?
- A . Assign the highest priority to the record-triggered flow which should execute first.
- B . The flow with the longest execution time will execute first.
- C . The flow with the shortest execution time will execute first.
- D . The order in which those flows are executed is not guaranteed.
D
Explanation:
The order in which record-triggered flows are executed is not guaranteed. If there are multiple record-triggered flows on the same object and trigger type, Salesforce does not guarantee which one runs first. Therefore, the administrator should consider this when designing record-triggered flows that depend on each other’s outcomes.
Reference: https://help.salesforce.com/s/articleView?id=sf.flow_concepts_trigger_order.htm&type=5
The administrator at Cloud Kicks has been requested to provide access to the Leads object to a contractor. The contractor currently has a profile that has access to a project management app within Salesforce. The contractor should only have View access to all of the Lead records.
What should the administrator handle this request?
- A . Assign a permission set that has View All on Leads.
- B . Add an app with the Leads tab to the user’s profile.
- C . Assign the contractor a public group with Lead access.
- D . Create a profile with Read Only for all Leads.
A
Explanation:
Permission sets are collections of settings and permissions that give users access to various tools and functions without changing their profile or requiring multiple profiles for users who perform different tasks across apps in your org. By assigning a permission set that has View All on Leads to the contractor, Cloud Kicks can grant them view access to all lead records without modifying their profile or creating a new one.
Reference: https://help.salesforce.com/s/articleView?id=sf.perm_sets_overview.htm&type=5
Cloud Kicks (CK) has deployed several new custom apps that use Lightning Web components. The administrator is now concerned that they may need to make some adjustments to CK’s org to make it more secure.
Which tools should the administrator use to expose possible security risks within a Lightning web component?
- A . Health Check
- B . Master Encryption Keys
- C . Salesforce Optimizer
- D . Self-signed Certificates
A
Explanation:
The most suitable tool to identify potential security risks associated with Lightning Web Components is the Health Check. Health Check allows Salesforce administrators to evaluate and monitor the security posture of their Salesforce org by comparing its settings against Salesforce’s recommended security baseline. This feature provides visibility into settings like session security, password policies, and more, which can directly impact the security of custom apps using Lightning Web Components.
Health Check:
Salesforce Health Check examines various security settings in your Salesforce org and provides a score based on how closely your settings align with Salesforce’s recommended security baseline.
By using this tool, administrators can identify vulnerabilities and see specific actions to remediate any security gaps found within the org.
Health Check is especially relevant when evaluating new custom applications and components since it can highlight areas that require tightening security to meet organizational standards.
Other options listed:
Master Encryption Keys is relevant for managing encryption but not directly for identifying security risks.
Salesforce Optimizer is used for overall performance and usage insights and doesn’t specifically focus on security assessments.
Self-signed Certificates are primarily used for secure communications and do not serve as a tool for security risk assessment.
Therefore, Health Check is the best tool to help the administrator expose potential security risks within the custom Lightning Web Components.
Reference: As per Salesforce documentation, Health Check provides a comprehensive view of the security health of your org, making it an essential tool for identifying and managing security settings within Salesforce.
Cloud Kicks (CK) completed a project in a sandbox environment and wants to migrate the changes to production. CK split the deployment into two distinct change sets. Change set 1 has new custom objects and fields. Change set 2 has updated profiles and automation.
What should the administrator consider before deploying the change sets?
- A . The Field-Level Security will not be deployed with the profiles in change set 2.
- B . Change set 2 needs to be deployed first.
- C . Automations need to be deployed in the same change set in order to be activated.
- D . Both change sets must be deployed simultaneously.
A
Explanation:
When deploying profiles using change sets, the field-level security settings are not included unless the fields themselves are also part of the change set. Therefore, the administrator should consider adding the new custom fields to change set 2 along with the profiles, or manually adjust the field-level security after deployment.
Reference: https://help.salesforce.com/articleView?id=changesets_about_components.htm&type=5
The administrator at Ursa Major Solar has set up IT policies for all user passwords to be a minimum length of 3 characters and have an expiration period of 90 days. The security team recently decided that administrators of any system should have a 15-character minimum password with a 30-day expiration period.
Where should the administrator make this change?
- A . Organi2ation-wide password policies
- B . Password complexity requirements on the permission set
- C . Password Policies on the System Administrator profile.
- D . Session Settings on the User record
C
Explanation:
Password Policies on the System Administrator profile is a feature that allows administrators to set different password requirements for users with different profiles. Password Policies can specify the minimum length, complexity, expiration period, history enforcement, lockout interval, and warning message for passwords. Password Policies can be used to enforce stricter password requirements for system administrators than for other users
users at Northern Trail Outfitters have a lot of fields on their new account records because they track their accounts and competitors on the Account object. For accounts created for customers, they need access to different fields than the accounts used to track competitors. For partner accounts, they need different values in the Industry field.
What should the administrator use to resolve the issues?
- A . Business Processes
- B . Required Fields
- C . Flow Builder
- D . Record Types
D
Explanation:
record types allow administrators to offer different business processes, picklist values, and page layouts to different users based on their profiles. By using record types for accounts and contacts at AW Computing, administrators can track their accounts and competitors on different record types with different fields on their page layouts. For partner accounts, they can also use record types to specify different values in the Industry picklist field.
Reference: https://help.salesforce.com/s/articleView?id=sf.customize_recordtype.htm&type=5
An administrator at Clod Kicks has build a flow that delivers status update email to customers. Recently, there’s been an increasae in support cases from customers reporting they had not received the email.
Where should the administrator look to investigate the issue?
- A . Paused Flow Interviews
- B . Process Automation Setting
- C . Email Logs
- D . Setup Audit Trail
C
Explanation:
Email logs are files that provide information about email delivery and activity in your Salesforce org. Email logs contain details such as sender, recipient, subject, date, status, error code, and more for each email sent or received within a specified time range. You can use email logs to investigate issues with email delivery or performance in your org. In this case, you can use email logs to check if the status update emails were sent successfully or if there were any errors or failures.
Reference:
https://help.salesforce.com/s/articleView?id=sf.email_logs.htm&type=5
https://help.salesforce.com/s/articleView?id=sf.email_logs_format.htm&type=5
