Topic 2, Volume B
What are the4 steps in authenticating users when they log into Sales force?
Answer: 1. If the user's login is from a browser that includes a Sales force cookie, the login is
allowed. The browser will have the Sales force cookie if the user has previously used that browser
to log in to Sales force, and has not cleared the browser cookies.
2. If the user's login is from an IP address in your organization's trusted IP address list, the login is
allowed.
3. If the user's login is from neither a trusted IP address nor a browser with a Sales force cookie,
the login is blocked.
4. Whenever a login is blocked or returns an API login fault, Sales force must verify the user's
identity using a temporary verification code sent to the user's email account.
What are the 5 main places you can go to receive support for Apex?
Answer: 1. Extensive documentation on the Apex Developer Network site.
2. The Eclipse IDE plugin
3. Mandatory creation of test scripts that can be run in a development environment
4. In the UI
5. Sales force support personnel
What arc the benefits of Apex versus other applications?
Select all that apply:
A.
Runs Natively on SFDC servers
B.
Faster than non-server code
C.
Supported by SFDC
Runs Natively on SFDC servers
Faster than non-server code
Supported by SFDC
What arc the benefits of using Visual force pages over S controls?
Answer: Flexibility-you have complete control over the UI
Reuse- Common UI elements can be referenced and reused so you don't start from scratch.
Logic Model - You can leverage the full power of Apex to create UI behaviors and replace only the
parts you need for greater control.
Development model - code is easy to create and is easily managed.
What arc the potential reasons why different people may have different numbers when they create
and run reports?
Answer: They used different criteria:
1. Time frames
2. My vs all ownership criteria
3. Advanced fillers
What are the recommended steps to protect Sales force users from security concerns such as
phishing?
Answer: l. Educate your users
2. Identify your primary security contact
3. Secure employee systems (including staying current on latest browsers)
4. Implement IP restrictions
5. Strengthen password requirements
6. Require secure sessions
7. Decreased session timeouts
8. Consider 2factor authentication (RSA token plus user name/pass word), Contact SFDC for help
What are the system prerequisites for Territory Management?
Select all that apply:
A.
Customizable Forecasting
Enabled
B.
Sales Teams Set up
C.
Marketing Users enabled
D.
Sandbox enabled
E.
None of the above
F.
All of the above
Customizable Forecasting
Enabled
Sandbox enabled
Sales Teams and Marketing user permission do not need to
be used for Territorymanagement.
What are the three types of S-Controls?
A.
HTML, Component, Controller
B.
A J AX, Component, Controller
C.
HTML, Snippet, URL
D.
AJAX, Snippet, URL
HTML, Snippet, URL
What arc the two keys to setting up Territory Management?
Select all that apply:
A.
Enable customizable forecasting
B.
Advanced currency management
C.
Have an Active Sandbox
D.
Marketing User permission enabled
Enable customizable forecasting
Have an Active Sandbox
What are the two major pieces to most s-controls?
A.
HTML (Visual Presentation)
B.
CSS Style Sheet
C.
Javascript (Function /Code)
D.
IFrame
HTML (Visual Presentation)
Javascript (Function /Code)
What are the two primary components of the Visual force framework?
Select all that apply:
A.
Components
B.
S-Controls
C.
Apex Pages
D.
Controllers
E.
Static Resources
Components
Controllers
What arc the two questions that you should ask yourself when trying to decide how to set
Organization Wide Default permissionsfor an object?
Select all that apply:
A.
Who is the most restricted user?
B.
Are there objects that should not he viewed/edited by a user?
C.
How often will users change roles?
D.
Who is the least restricted user?
Who is the most restricted user?
Are there objects that should not he viewed/edited by a user?
Page 11 out of 32 Pages |
Previous |