Practice Free Plat-Admn-301 Exam Online Questions
An administrator is planning he release process for the year. The team will be using change sets to process deployment to production.
Which three best practices should be considered?
- A . Plan your deployments around the production and sandbox maintenance schedules.
- B . Use matching names for global publisher layouts and Outlook publisher layouts.
- C . Be sure to test only after business hours the data after deployment.
- D . Make sure to deploy all dependent components.
- E . Make sure change sets are limited to 10,000 files.
A,D,E
Explanation:
Planning deployments around maintenance schedules ensures that there are no interruptions or delays in the deployment process. Deploying all dependent components ensures that there are no missing metadata or references that could cause errors or failures in the deployment.Limiting change sets to 10,000 files ensures that the deployment does not exceed the maximum size limit for change sets
An auto-response rule sends en email using Template when the field Case Source Is ’email’ and Template when Case Source is blank. A Process Builder updates Case Source to ’email’ when a case is created using Email-to-Case and to web’ when a case Is created using Web-to-Case. Otherwise, Case Source Is blank.
What will occur when a case is created from an Incoming email?
- A . Case Source updates to ’email’ and an email is sent out using Template2.
- B . An email is sent out using Template and then Case Source updates to email’.
- C . An email la sent out using Template and then Case Source updates to ’email’.
- D . Case Source updates to email and an email Is sent out using Template1.
A
Explanation:
Case Source updates to ‘email’ before the record is saved because the Process Builder runs before the auto-response rule. Then, an email is sent out using Template2 because the auto-response rule evaluates the Case Source value after it is updated by the Process Builder and matches the criteria for Template2
When should an administrator consider when using Person Accounts’
- A . In a complex business model and the users find it easiest to record Opportunity information on Contacts rather than Accounts.
- B . In a B2B business model and is selling to the primary contact at a business organization.
- C . In a B2C business model and the consumer is the intended recipient of sates and marketing attention.
- D . In a business model that needs a separate Contact and Account to be included on all Case records submitted.
C
Explanation:
An administrator should consider using Person Accounts when they have a B2C business model and the consumer is the intended recipient of sales and marketing attention. Person Accounts allow administrators to store information about individual consumers without requiring a separate account record for each contact.
Reference: https://help.salesforce.com/s/articleView?id=sf.account_person_behavior.htm&type=5
Northern Trail Outfitters has many users set up as system administrators to perform Salesforce Administration.
Which two functions would a delegated administrator be able to perform in order to help the existing Salesforce Administrator? Choose 2 answers
- A . Set up users and password management.
- B . Configure updates to sharing rules.
- C . Manage custom objects and customize nearly every aspect.
- D . Make updates to permission set configurations.
A,B
Explanation:
Delegated administrators in Salesforce are designated users who are given limited administrative privileges to assist system administrators without having full access to all administrative functions. The two functions they can typically perform, which align with the permissions available to delegated admins, are:
Set up users and password management:
Delegated administrators can create and manage user accounts, which includes setting up new users, resetting passwords, and updating user details.
This is particularly useful for helping with user management tasks without providing full system administrator access.
Configure updates to sharing rules:
Delegated administrators can manage sharing rules within their specific groups or roles, which helps control access to records based on criteria set within the organization.
This level of access allows them to modify sharing rules to ensure appropriate data access without requiring full administrative control over all settings.
The other options listed are not within the scope of delegated administrator capabilities:
Manage custom objects and customize nearly every aspect: Delegated administrators do not have the ability to manage custom objects or perform extensive customization. These functions are reserved for system administrators with broader privileges.
Make updates to permission set configurations: Delegated administrators cannot create or modify permission sets. This is also restricted to full administrators, as it involves controlling access at a granular level across the org.
By utilizing delegated administrators for user and sharing rule management, organizations can maintain security and control while also sharing some administrative workload.
Reference: According to Salesforce documentation, delegated administrators have specific permissions, such as managing users and sharing rules, which support system administrators while limiting access to high-level customizations and configurations.
AW Computers has created a custom field called Government ID on a custom object. Most users with a custom Sales profile should be unable to access this field. A select group of Sales users called the Institutional Team should be able to access the Government ID field via reports.
How should an administrator accommodate this request?
- A . Create a permission set with Read access to the field. Assign the permission set to the Institutional Team.
- B . Configure a report type with the Government ID field. Assign this report type to the Institutional Team via a permission set.
- C . Mark the field as Read Only on the sales profile. Create a permission set to re-enable reporting for the Institution Team.
- D . Make a report with the Government ID field included. Share this report to the Institutional Team in a public reports folder.
A
Explanation:
A permission set is a collection of settings and permissions that give users access to various tools and functions in Salesforce. A permission set can be used to extend users’ functional access without changing their profiles. You can assign permission sets to individual users or groups of users based on their business needs. In this case, you can create a permission set with Read access to the Government ID field on the custom object and assign it to the Institutional Team users who need access to this field via reports.
Reference:
https://help.salesforce.com/s/articleView?id=sf.perm_sets_overview.htm&type=5
https://help.salesforce.com/s/articleView?id=sf.perm_sets_create.htm&type=5
What would prevent a user from syncing a quote with an opportunity?
- A . The quote has a validation rule preventing it from being updated.
- B . Another quote is already synced with the opportunity and is awaiting approval.
- C . Another quote is already synced with the opportunity.
- D . The quote has already passed its expiration date.
B
Explanation:
Another quote is already synced with the opportunity will prevent a user from syncing a quote with an opportunity. Only one quote can be synced with an opportunity at a time. If a user tries to sync another quote, they will get an error message saying that the opportunity already has a synced quote.
Reference: https://help.salesforce.com/s/articleView?id=sf.quotes_syncing.htm&type=5
AW Computing is conducting an audit and wants to understand how many objects have been shared as public externally.
which tool should the administrator use to quickly obtain this details?
- A . Security Health Check
- B . Setup Audit Trail
- C . Session Security Settings
- D . Object Manager
A
Explanation:
The Security Health Check tool in Salesforce provides a detailed overview of an organization’s security posture, which includes information on how objects are shared externally. This tool is particularly useful for administrators who need to review and assess various security configurations, including the visibility of objects to external users.
Security Health Check:
This tool helps administrators quickly identify and manage risks related to security settings, including those pertaining to data sharing externally.
By using Health Check, administrators can access a report that shows the sharing settings of objects, allowing them to confirm if any objects have been shared as "Public" externally, which is crucial during an audit.
It provides insights into high-risk settings and areas where the configuration does not align with Salesforce security best practices, such as public access levels.
Use Case:
For an audit focused on understanding external access to objects, Security Health Check is the most appropriate choice because it gives a quick snapshot of how data sharing settings compare against Salesforce’s recommended security baseline.
This can help AW Computing immediately identify which objects have broader public access than desired, addressing potential security vulnerabilities.
Incorrect options:
Setup Audit Trail: This tool tracks configuration changes within Salesforce over time, but it does not provide specific details about data sharing settings or external visibility of objects.
Session Security Settings: These settings control session policies and timeouts but are not related to object sharing or external visibility.
Object Manager: While Object Manager allows administrators to configure object-specific settings, it does not provide an overall view or quick audit of external sharing configurations.
Reference: Salesforce documentation highlights that the Security Health Check tool is designed for comprehensive security assessments, including the review of public data exposure and external sharing settings.
