Salesforce-Slack-Administrator Practice Test Questions

200 Questions


Large Inc. is a consumer goods company that uses the Slack Enterprise Grid org. Large Inc.'s Human Resources (HR) Director is looking to streamline how HR disseminates policy information and handles sensitive hiring manager questions related to recruiting and hiring. HR has its own designated workspace. How should you advise the HR Director use Slack for this use case? (Select the best answer.)


A. Create an org wide public channel for recruiting and hiring, and add all hiring managers in the organization.


B. Create an org wide private channel for recruiting and hiring, and add all hiring managers in the organization.


C. Create a private channel in the HR workspace, and add all hiring managers in the organization


D. Create a public channel in the HR workspace, and add all hiring managers in the organization.





C.
  Create a private channel in the HR workspace, and add all hiring managers in the organization

Explanation:

To ensure confidentiality and centralization, the HR Director should use a private, org-wide channel. This ensures sensitive HR and recruiting conversations remain private but accessible across multiple workspaces (i.e., Enterprise Grid). This balances the need for secure access and organization-wide collaboration.

✅ Correct Answer:

B. Create an org-wide private channel for recruiting and hiring, and add all hiring managers in the organization.
In an Enterprise Grid environment, an org-wide private channel allows members from multiple workspaces (like HR and other departments) to securely collaborate while maintaining privacy. HR-related topics — including recruiting decisions and policy discussions — often contain sensitive personal or organizational information. A private org-wide channel ensures that only approved hiring managers and HR personnel can view or participate in the conversation, while still allowing cross-workspace access without duplicating efforts or risking visibility to unintended audiences. This configuration supports centralization, confidentiality, and efficient HR collaboration at scale.

❌ Incorrect Answers:

A. Create an org-wide public channel for recruiting and hiring, and add all hiring managers in the organization.
This option allows for org-wide access but fails to protect sensitive HR information. Recruiting and hiring conversations may include confidential candidate evaluations, interview feedback, or internal HR strategies — none of which should be visible to the full organization. Public channels are accessible by all workspace members by default, so this option would violate data privacy best practices and Slack's recommendations for secure information sharing.

C. Create a private channel in the HR workspace, and add all hiring managers in the organization.
While this ensures privacy, it limits access to only users who are members of the HR workspace. Since most hiring managers belong to other workspaces (e.g., department-specific), they may not have access unless you manually grant them workspace membership. This makes user management harder, introduces access friction, and breaks the Enterprise Grid principle of connecting workspaces through org-wide channels.

D. Create a public channel in the HR workspace, and add all hiring managers in the organization.
Similar to option A, this method exposes sensitive HR discussions to anyone in the HR workspace and could be discoverable by others if mistakenly joined. Public channels should be used for broadly applicable announcements, not private or regulated information. Additionally, not all hiring managers may be part of the HR workspace, so access gaps could occur, making this setup both insecure and inconsistent.

📘 Reference:
Slack Help: About private channels
Slack Help: Channel management in Enterprise Grid
Slack Enterprise Grid Overview

You're an Org Owner on the Slack Enterprise Grid plan responsible for posting new for your entire organization to read. You want to limit posting permissions to admins only.
Sometimes the newsletters contain important action items, so it’s important that everyone in your organization sees the message.
What is the best way to post your message? (Select the best answer)


A. Create a default org-wide channel called #announcements, and post your newsletter in this channel.


B. Send your newsletter to your team's channel and then copy/paste the link to your message to each team channel in your organization.


C. Send your newsletter in all of your department-specific channels to maximize visibility.


D. Send your newsletter to your organizations #general channel, and use the @channel notification





A.
  Create a default org-wide channel called #announcements, and post your newsletter in this channel.

Explanation:

To effectively communicate across the entire organization, you should use a default org-wide announcement channel and limit posting permissions to admins or designated roles. This ensures clarity, reduces clutter, and makes messages reliable and visible to all users without overwhelming noise.

✅ Correct Answer:

A. Create a default org-wide channel called #announcements, and post your newsletter in this channel.
Creating a default channel like #announcements ensures that every user in every workspace is automatically added, including those who join in the future. Slack Enterprise Grid allows Org Owners to restrict posting in specific channels using channel management settings, so only Org Admins or designated roles can publish content in the channel. This allows newsletters and critical information to be shared in a trusted, centralized location where all users know to look for updates. Using this approach promotes clarity, increases engagement with important announcements, and maintains consistent delivery across the entire Slack organization.

❌ Incorrect Answers:

B. Send your newsletter to your team's channel and then copy/paste the link to your message to each team channel in your organization.
This method is highly manual and inefficient, especially in a large organization. It introduces inconsistencies, increases the chance of mistakes or missed updates, and causes redundancy. It also fragments communication by requiring users to click through to find the original message rather than having a consistent source of truth. This solution does not scale with an Enterprise Grid setup, where centralized communication is critical.

C. Send your newsletter in all of your department-specific channels to maximize visibility.
Posting in multiple department channels creates information overload and inconsistency. Team channels are typically used for department-level discussion, not org-wide announcements. Important action items may get buried in unrelated conversations, and the duplication of messages can create confusion about where to reply or seek clarification. Unlike a centralized announcement channel, this strategy lacks uniform visibility and posting control.

D. Send your newsletter to your organization’s #general channel, and use the @channel notification.
Using the #general channel for announcements is not reliable in Slack Enterprise Grid, where #general is workspace-specific — meaning each workspace has its own version. A message sent to the #general channel of one workspace won’t reach members in others unless they are part of that specific workspace. Additionally, frequent use of @channel can lead to notification fatigue. Instead, creating a custom org-wide default channel like #announcements ensures consistent and targeted communication.

📘 Reference:
Slack Help: Manage default channels for new members
Slack Help: Set posting permissions in a channel
Slack Enterprise Grid: Channels Overview

Amy is an Org Owner on an Enterprise Grid plan.
A workspace Admin informs Amy that a confidential file has been uploaded to a public channel by mistake. Amy needs to remove the file and determine who has downloaded it.
What should Amy do to accomplish this goal?


A. Using an integrated Data Loss Prevention (DLP) solution, delete the file, and then review the Audit Logs API to see who downloaded the file.


B. Using MDM, disable file downloads and then use session management to see who was logged in and downloaded the file.


C. Using a third-party eDiscovery app, delete the file and use data exports to determine who downloaded the file.


D. Using Slack Enterprise Key Management (EKM), revoke key access for the file, and review the EKM logs to see who downloaded the file.





A.
  Using an integrated Data Loss Prevention (DLP) solution, delete the file, and then review the Audit Logs API to see who downloaded the file.

Explanation:

The best approach is to remove the sensitive content quickly and use Slack's Audit Logs API to trace download events. When integrated with a DLP (Data Loss Prevention) tool, Slack can monitor, control, and automate actions like file removal, while the Audit Logs API provides visibility into sensitive activity — including file access.

✅ Correct Answer:

A. Using an integrated Data Loss Prevention (DLP) solution, delete the file, and then review the Audit Logs API to see who downloaded the file.
Slack Enterprise Grid supports integration with leading DLP platforms to help manage compliance and mitigate risk. These tools can automate detection and response actions — such as deleting a confidential file posted in a public channel. Once the file is removed, Slack’s Audit Logs API enables Org Owners and Admins to track user actions, including file access and downloads. This ensures that Amy can act swiftly to minimize exposure and maintain visibility into the incident. This option provides the necessary control, security, and traceability that Enterprise-grade compliance requires.

❌ Incorrect Answers:

B. Using MDM, disable file downloads and then use session management to see who was logged in and downloaded the file.
Mobile Device Management (MDM) primarily manages mobile device access and session behavior, but does not provide visibility into specific file downloads. Session management can show who was logged in but not whether they accessed or downloaded a specific file. Moreover, disabling downloads reactively via MDM would not help in identifying who already downloaded the file before it was removed. It also does not offer file removal or automated compliance action capabilities like DLP tools.

C. Using a third-party eDiscovery app, delete the file and use data exports to determine who downloaded the file.
eDiscovery apps are designed for legal compliance and long-term data archiving. While they may allow message/file search and export, they do not track download activity or provide real-time file deletion. Additionally, Slack’s standard data exports (especially in Enterprise Grid) do not include file access logs. This approach is inefficient for rapid response and lacks the auditing granularity required to identify who downloaded the file.

D. Using Slack Enterprise Key Management (EKM), revoke key access for the file, and review the EKM logs to see who downloaded the file.
Slack EKM lets organizations control their encryption keys, but EKM logs only track when data is accessed and decrypted, not when a file is downloaded or who downloaded it. It does not offer the ability to delete content or prevent file sharing retroactively. EKM is not a file management or content moderation tool — it's an encryption and access control mechanism. Therefore, it cannot fulfill the requirements in this scenario.

📘 Reference:
Slack Help: Use Slack with DLP tools
Slack Developer Docs: Audit Logs API
Slack Enterprise Grid Security
Slack EKM Overview

As an Org Admin in your organization's Slack Enterprise Grid instance, you manage the existing four workspaces. Since your org is rapidly growing, you need a way to communicate upcoming trainings that are available to the entire company. What is the best action to ensure these communications are seen in each current and future workspace? (Select the best answer.)


A. Create an org-wide channel dedicated to company trainings.


B. Create a multi-workspace channel for training that exists in each workspace.


C. Have each Workspace Admin post in the correct public training channel.


D. Create a Slack Connect channel dedicated to company trainings.





A.
  Create an org-wide channel dedicated to company trainings.

Explanation:

To ensure consistent communication across all current and future workspaces, the most scalable and efficient method is to create an org-wide channel. This allows Enterprise Grid administrators to broadcast messages across the entire organization regardless of the number of workspaces, ensuring everyone sees the training information.

✅ Correct Answer:

A. Create an org-wide channel dedicated to company trainings.
In Enterprise Grid, org-wide channels are a powerful tool to distribute information to all users across every workspace, both now and in the future. When you create an org-wide channel, all current members are added automatically, and new members (or newly created workspaces) are also joined automatically. This eliminates the need to manage multiple channels across different workspaces. For company-wide training, this ensures everyone receives the announcement without relying on individual admins to communicate locally. It is the most centralized and reliable option for critical information dissemination.

❌ Incorrect Answers:

B. Create a multi-workspace channel for training that exists in each workspace.
While multi-workspace channels do span more than one workspace, they must be manually configured and maintained. They do not automatically include all future workspaces or members. Additionally, they require administrative overhead to ensure they stay in sync as your org scales, making them less effective than an org-wide channel for broad announcements.

C. Have each Workspace Admin post in the correct public training channel.
This method lacks consistency and central control. It depends on each Workspace Admin to remember to share training announcements and do so correctly and on time. This introduces variability, risk of missed communication, and additional coordination overhead. It’s not scalable or reliable for a growing organization.

D. Create a Slack Connect channel dedicated to company trainings.
Slack Connect is designed for cross-company collaboration, not internal communications. It enables you to connect with external organizations, vendors, or partners. It cannot be used to span multiple internal workspaces within your Enterprise Grid org. Using Slack Connect for internal training announcements would be inappropriate and ineffective.

📘 Reference:
Slack Help: About org-wide channels
Slack Enterprise Grid: Admin Guide
Slack: Channels in Enterprise Grid

You're a Workspace Admin on a Slack Enterprise Grid plan. Your marketing team is working with an external contractor to prepare for a new product launch where multiple internal teams will need to work with the contractor. The contractor does not have Slack, so the marketing team asks you to add the contractor as a full member to Slack so they can join the numerous active project channels within the marketing workspace. Which type of access should you recommend for the contractor?


A. Multi-Channel Guest with access to all relevant project channels


B. Slack Connect direct message (DM) between the contractor and project lead


C. Single-Channel Guest with access to one project channel


D. Full member with access to the marketing workspace





A.
  Multi-Channel Guest with access to all relevant project channels

Explanation:

Slack provides guest account types to help organizations securely collaborate with external individuals without giving them full access to internal communications. Since the contractor needs access to multiple project channels, a Multi-Channel Guest account is the most appropriate option. This maintains security and control while enabling collaboration.

✅ Correct Answer:

A. Multi-Channel Guest with access to all relevant project channels
Slack Enterprise Grid supports Multi-Channel Guest accounts, which are designed for external collaborators who need to participate in more than one channel. This is ideal for a contractor who’s helping multiple teams, as it allows them to access only the channels they need — nothing more. Admins can control their channel access, set expiration dates for their membership, and manage their visibility across workspaces. This option ensures compliance with company policies, minimizes security risk, and supports seamless collaboration for the duration of the project.

❌ Incorrect Answers:

B. Slack Connect direct message (DM) between the contractor and project lead
Slack Connect DMs are suitable for quick communication with someone from another Slack organization, but the contractor does not have Slack, so they can’t participate in Slack Connect. Also, DMs don’t support collaboration across multiple teams and channels. It’s too limited for the described use case.

C. Single-Channel Guest with access to one project channel
Single-Channel Guest accounts are limited to just one channel. This is not appropriate when a contractor needs to work with multiple teams and participate in various channels across the marketing workspace. Assigning them as a Single-Channel Guest would hinder productivity and require creating multiple accounts to span multiple channels, which is not scalable or manageable.

D. Full member with access to the marketing workspace
This option gives the contractor excessive access. Full members can browse all public channels within a workspace and may inadvertently access sensitive or unrelated information. Since the contractor is external, granting full membership would violate security best practices. Slack strongly recommends using guest roles for external collaborators to maintain compliance and reduce risk.

📘 Reference:
Slack Help: Types of Slack accounts
Slack Help: Manage Slack Connect and guest accounts
Slack Enterprise Grid: User provisioning

You're a Support Agent on the admin team for your organizations Slack Enterprise Grid workspace. You receive a service request from one of your employees to add 15 new members from a single external company to slack in order to support a 12-month joint marketing partnership. The team requires multiple channels and members for external collaboration. How should you respond to the service request? (Select the best answer.)


A. Approve the employee's request, then invite the external users to your workspace as Multi-Channel Guests with a 12-month expiration date.


B. Advise the employee to initiate one or more Slack Connect channels to collaborate with the external organization. The external organization can set up a free Slack instance if they are not already using Slack.


C. Advise the employee to request the external users be added to your identity provider (IdP) so they can authenticate to your workspace with SAME single sign-on (SS0).


D. Advise the employee to set up a separate Slack workspace that is jointly owed by both organizations.





B.
  Advise the employee to initiate one or more Slack Connect channels to collaborate with the external organization. The external organization can set up a free Slack instance if they are not already using Slack.

Explanation:

Slack Connect is specifically designed to enable secure, scalable communication with external organizations. It allows users from different companies to collaborate in shared channels — without giving them guest access or requiring internal provisioning. Since this is a long-term collaboration with multiple users and channels involved, Slack Connect provides flexibility, centralized security controls, and seamless access.

✅ Correct Answer:

B. Advise the employee to initiate one or more Slack Connect channels to collaborate with the external organization. The external organization can set up a free Slack instance if they are not already using Slack.
Slack Connect enables organizations to securely communicate with partners, vendors, or clients — each side maintains control over its own users. The external company can participate in shared channels using their own Slack instance (even a free plan), ensuring role-based access, SSO security, and compliance auditing remain intact for both parties. It scales easily, supports multiple users, and avoids the administrative overhead of managing external guest accounts in your internal workspace.

❌ Incorrect Answers:

A. Approve the employee's request, then invite the external users to your workspace as Multi-Channel Guests with a 12-month expiration date.
While Multi-Channel Guest access allows some flexibility, it is intended for individual collaborators, not entire teams or organizations. Provisioning 15 external guests introduces security risks and admin overhead. You lose visibility and control on how the guest users collaborate, and they would exist within your internal Slack instance, which is not recommended for large-scale external engagements.

C. Advise the employee to request the external users be added to your identity provider (IdP) so they can authenticate to your workspace with SAME single sign-on (SSO).
This suggestion is inappropriate for external collaborators. Adding users to your internal IdP means treating them like full internal employees, which poses serious compliance, security, and privacy issues. It violates best practices and exposes internal systems to external identities.

D. Advise the employee to set up a separate Slack workspace that is jointly owned by both organizations.
Creating a new shared workspace is complex and unnecessary. It lacks the centralized security features of Enterprise Grid and Slack Connect. Plus, managing a jointly owned Slack workspace introduces governance issues, versioning discrepancies, and redundant effort. Slack Connect is purpose-built for cross-company work and eliminates the need for setting up new shared environments.

📘 Reference:
Slack Help: Slack Connect Overview
Slack Help: Share a channel with a partner organization
Slack Blog: Why Slack Connect is better than email

Which of the following statements describes the effect of configuring mandatory Two Factor authentication (2FA) in Slack?


A. Members must have a sophisticated and complex password that is updated regularly.


B. Members must use a biometric reader to authenticate with Slack.


C. Members use single sign-on (SSO) to handle the exchange of usernames and passwords on behalf of Slack.


D. Members must submit a verification code along with their password each time they sign in.





D.
  Members must submit a verification code along with their password each time they sign in.

Explanation:

Two-Factor Authentication (2FA) is a security process that requires two distinct forms of identification before granting access. The "two factors" typically fall into these categories:

✔️ Something you know: This is usually your password.
✔️ Something you have: This is typically a physical device like a smartphone (for an authenticator app or SMS code) or a security key.
✔️ Something you are: This refers to biometrics (fingerprint, face scan).

When 2FA is configured as mandatory in Slack, it means that in addition to their password (something they know), users will be prompted for a second factor (something they have, like a code from an authenticator app like Google Authenticator or Authy, or an SMS code, or a hardware security key). This verification code acts as the second layer of security.

The statement "Members must submit a verification code along with their password each time they sign in" precisely describes this process, where both factors are required for successful authentication. This significantly enhances security by making it much harder for unauthorized individuals to gain access, even if they manage to compromise a password.

🔴 Incorrect Options:

❌ A. Members must have a sophisticated and complex password that is updated regularly.

While having strong, complex, and regularly updated passwords is a good security practice and often recommended or enforced by password policies, it is not the direct effect of enabling 2FA. 2FA adds an additional layer of security on top of the password, rather than modifying the password's complexity requirements itself. Password complexity rules are typically enforced separately from 2FA, often by the platform's password policy settings or an integrated Identity Provider (IdP).

❌ B. Members must use a biometric reader to authenticate with Slack.

Biometric authentication (like fingerprint or face scan) falls under the "something you are" category of multi-factor authentication. While biometrics can be used as a second factor in some 2FA implementations (e.g., if a mobile device's biometric reader unlocks the authenticator app), 2FA in Slack (and generally) doesn't mandate the use of a biometric reader. Users typically have options like authenticator apps, SMS codes, or security keys, none of which strictly require a biometric reader. This option describes only one potential type of second factor, not the universal effect of 2FA.

❌ C. Members use single sign-on (SSO) to handle the exchange of usernames and passwords on behalf of Slack.

Single Sign-On (SSO) is a distinct authentication method that allows users to log in once with one set of credentials to access multiple applications. While SSO can integrate with 2FA (meaning your IdP might enforce 2FA before granting access to Slack), SSO itself is about delegating authentication to an external Identity Provider, not about the mechanics of 2FA. If SSO is configured, Slack defers the username/password and 2FA process to the IdP. However, the question specifically asks about the effect of configuring mandatory Two-Factor authentication (2FA) in Slack, which implies Slack's direct 2FA enforcement or the general concept of 2FA, not necessarily the delegation of authentication to an SSO provider. Even without SSO, Slack can enforce its own 2FA.

☰ Reference:

Slack Help Center: Set up two-factor authentication

ℹ️ This official documentation clearly explains what 2FA is and how it functions for users signing into Slack, requiring a code in addition to their password.
ℹ️ You can typically find this by searching "Slack 2FA" in their help center.
ℹ️ Understanding the core definition of 2FA as requiring two distinct factors for authentication is key to answering this type of question correctly.

You're an IT Manager and Slack Workspace Owner leading a team of employees on Slacks Business plan. Your security team has requested that you put a governance process in place for installing and approving Slack apps requested by users. They want to ensure that your team reviews each app before installation to ensure it meets compliance requirements They also want to audit requests and approvals, and to require a rationale for why the app is being requested. What is the best approach that uses native functionality to address the security teams request to manage app installations and approvals?


A. Preapprove the most common tools that workspace members would need, and provide the security team with this list Restrict apps that are not currently approved for use.


B. Turn on app approval within the Manage Apps dashboard, and require end users to provide a comment for each installation request in the App Directory. Add the members of your team to the list of App Managers, and send all approval requests to a public ffplz-apps channel.


C. Turn on app approval within the Manage Apps dashboard. Limit app approval to Workspace Owners only using Slackbot. and let the security team know when new apps are approved in the ^team-security channel.


D. Create a public channel called ^triage apps. Implement a Workflow Builder workflow with a form that asks end users to submit their app request name and a v' rationale App Managers can then review and approve or deny the app from the App Directory.





B.
  Turn on app approval within the Manage Apps dashboard, and require end users to provide a comment for each installation request in the App Directory. Add the members of your team to the list of App Managers, and send all approval requests to a public ffplz-apps channel.

Explanation:

A. Preapprove the most common tools that workspace members would need, and provide the security team with this list. Restrict apps that are not currently approved for use.

Why it's wrong:
While "pre-approving" and "restricting" apps are parts of Slack's app management capabilities, this option does not address all the requirements of the security team, especially the need for a process to review each new app request with a rationale and auditing. If you restrict unapproved apps, users can't request them through a formal process with a rationale; they simply can't install them. This approach also doesn't inherently provide an audit trail of requests. It's a reactive approach ("here's what's already approved/restricted") rather than a proactive governance process for new requests.

B. Turn on app approval within the Manage Apps dashboard, and require end users to provide a comment for each installation request in the App Directory. Add the members of your team to the list of App Managers, and send all approval requests to a public #it-app-requests channel.

Why it's the Correct Answer:
This option aligns perfectly with all the security team's requirements using native Slack functionality.

✔️ "Turn on app approval within the Manage Apps dashboard": This is the foundational step. Slack has a built-in feature to require app approval. When this is enabled, members cannot install apps without an admin's review.
✔️ "require end users to provide a comment for each installation request in the App Directory": This directly addresses the "require a rationale" request. When app approval is enabled, Workspace Owners can configure Slack to require a comment from the user when they submit an app request. This comment serves as the rationale.
✔️ "Add the members of your team to the list of App Managers": Slack allows Workspace Owners to designate specific members (like your IT/security team) as "App Managers." These managers receive app requests and have the permissions to approve or restrict apps. This addresses the "your team reviews each app" requirement.
✔️ "send all approval requests to a public #it-app-requests channel": When app approval is turned on, you can configure where the requests go. Sending them to a public channel (or a private one if preferred by the security team) allows for visibility, discussion, and an inherent audit trail within that channel. The conversation history in the channel serves as a record of the request, the rationale, and the approval/denial action. This fulfills the "audit requests and approvals" requirement.

C. Turn on app approval within the Manage Apps dashboard. Limit app approval to Workspace Owners only using Slackbot, and let the security team know when new apps are approved in the #team-security channel.

Why it's wrong:
❌ "Limit app approval to Workspace Owners only using Slackbot": While app approval requests can go to Workspace Owners via Slackbot DMs by default, this doesn't allow you to delegate the review process to your IT/security team if they are not Workspace Owners. The prompt states "leading a team of employees," implying that the IT Manager (you) is the Workspace Owner, but the "security team" are likely just members or App Managers, not necessarily Owners. Option B's "App Managers" is more flexible and appropriate for delegating this task.

❌ "let the security team know when new apps are approved in the #team-security channel": This only notifies them after approval. It doesn't create a process where they review each app before installation as requested. The core requirement is for the team to review before approval, not just be informed after the fact. It also doesn't explicitly require a rationale from the user in the initial request.

D. Create a public channel called #triage-apps. Implement a Workflow Builder workflow with a form that asks end users to submit their app request name and a rationale. App Managers can then review and approve or deny the app from the App Directory.

Why it's wrong:
❌ "Implement a Workflow Builder workflow with a form": While Workflow Builder is a fantastic native tool for collecting information and automating processes, it's not the primary or most direct native mechanism for app approval. While you could use a Workflow Builder form to collect requests, the actual approval/denial still needs to happen through Slack's built-in app approval system.

❌ "App Managers can then review and approve or deny the app from the App Directory": This part is correct if App Managers are configured, but the workflow builder doesn't directly trigger the app approval process in the same integrated way that Slack's native app approval feature does. The native feature is specifically designed to handle the entire request-to-approval lifecycle, including the comment/rationale field built right into the app request UI that users see. A Workflow Builder form would be a separate step that would then require the admin to manually go to the app directory to approve, potentially duplicating effort or leading to disconnects.

❌ Less Integrated: This approach creates a two-step process (form submission, then manual approval in the App Directory) instead of leveraging Slack's integrated app approval flow where the user requests directly from the App Directory, and the request appears for approval within the Slack admin interface.

Conclusion:
Option B is the best approach because it fully leverages Slack's native app approval settings to meet all the stated requirements: requiring pre-approval, capturing rationale, delegating review to a specific team (App Managers), and providing an audit trail in a designated channel.

☰ Reference:
Slack Help Center: Manage app approval for your workspace
5 steps to managing apps securely and at scale

GoodAdvertisements Inc works with several companies to support global advertising campaigns and are on a paid plan. They are preparing for a campaign launch that requires input from multiple companies. GoodAdvertisements Inc wants the ability to coordinate effectively with the companies before and during their respective launch in a private channel, but it is not clear whether the companies use paid Slack plans. The Admins at the company want to take security precautions before inviting any outside individuals into their Slack workspace. What is the best way for the Admins to have the individuals from the outside companies join the Slack workspace and ensure the process scales for future launches with other companies?


A. Require that invitations get approval via a #guest-invitation-approval channel so Admins can action the requests and inform project leaders to invite individuals from outside companies as Single-Channel Guests. Set expiry dates for the Single-Channel Guests.


B. Require that invitations get approval via a #guest-invitation-approval channel so Admins can action the requests and inform project leaders to invite individuals from outside companies as Multi-Channel Guests. Set expiry dates for the Multi-Channel Guests.


C. Have the Admins individually send out Single-Channel Guest invitations.


D. Ask the outside companies to upgrade to the paid plan. Then, share the launch channel externally to the companies, and set a reminder to unshare the channel when the launch is complete.





D.
  Ask the outside companies to upgrade to the paid plan. Then, share the launch channel externally to the companies, and set a reminder to unshare the channel when the launch is complete.

Explanation:

❌ A. Require that invitations get approval via a #guest-invitation-approval channel so Admins can action the requests and inform project leaders to invite individuals from outside companies as Single-Channel Guests. Set expiry dates for the Single-Channel Guests.

🔴 Why it's wrong:
✖️ Single-Channel Guests Limitation: Single-Channel Guests are limited to one channel. The scenario states "requires input from multiple companies" and implies coordination, which often means needing to bring different external individuals into the same private channel for a campaign. While you could create a specific private channel for each external company as a single-channel guest, this becomes cumbersome and doesn't allow for multi-company collaboration within a single unified space for the campaign.

✖️ Scaling: Manually inviting many single-channel guests for numerous campaigns could be tedious and less scalable than other options.

✖️ "Inform project leaders to invite individuals": While guest invitation approval workflows are good for security, tasking project leaders to invite as single-channel guests might not be the most efficient or secure method for large, multi-company campaigns, especially if the project leaders aren't well-versed in guest management.

❌ B. Require that invitations get approval via a #guest-invitation-approval channel so Admins can action the requests and inform project leaders to invite individuals from outside companies as Multi-Channel Guests. Set expiry dates for the Multi-Channel Guests.

🔴 Why it's wrong:
✖️ Cost Implication: Multi-Channel Guests are billed as regular members on your paid plan. The problem states "it is not clear whether the companies use paid Slack plans," implying that GoodAdvertisements Inc. wants to avoid incurring significant costs for all external collaborators, especially if there will be many or if collaboration is temporary. Inviting multiple individuals from multiple companies as Multi-Channel Guests would quickly increase GoodAdvertisements Inc.'s Slack bill.

✖️ Security & Scalability: While Multi-Channel Guests offer more flexibility than Single-Channel, the cost and the fact that they are essentially internal accounts with limited access make them less ideal for inter-company collaboration where the external company has its own Slack presence (which is often the case for "companies" involved in a campaign).
This is generally suitable for contractors or long-term partners who need access to several channels but aren't full-fledged employees, and where your company is willing to pay for their access.

❌ C. Have the Admins individually send out Single-Channel Guest invitations.

🔴 Why it's wrong:
✖️ Single-Channel Guest Limitation: Same issue as option A – limited to one channel.

✖️ Scalability: "Individually send out invitations" is highly unscalable. If there are multiple companies and many individuals, this would be a massive administrative burden for the Admins, especially for "future launches with other companies." This option completely fails the scalability requirement.

✖️ Approval Process: This option doesn't mention any approval process, which contradicts the "security precautions" aspect and the desire for a "governance process."

✔️ D. Ask the outside companies to upgrade to the paid plan. Then, share the launch channel externally to the companies, and set a reminder to unshare the channel when the launch is complete.

Why it's the Correct Answer:
This option leverages Slack Connect, which is specifically designed for secure inter-company collaboration, and it addresses all the requirements effectively.

✅ "Ask the outside companies to upgrade to the paid plan.": This is the prerequisite for using Slack Connect. While it's a request to the external companies, it's a fundamental part of making Slack Connect work, and the benefits often outweigh the cost for active collaboration. Slack Connect channels require both sides to be on a paid plan. The question states "it is not clear whether the companies use paid Slack plans," indicating this is the decision point. If they want to scale effectively and maintain security while collaborating with other companies, Slack Connect is the answer, which necessitates paid plans on both sides.
✅ "share the launch channel externally to the companies": This refers to creating a Slack Connect channel. Slack Connect allows you to share channels with external organizations, enabling seamless, real-time collaboration between separate Slack workspaces. This provides a dedicated private channel for the campaign where all relevant individuals from all participating companies can join, fulfilling the "coordinate effectively with the companies... in a private channel" requirement.
✅ "ensure the process scales for future launches with other companies": Slack Connect is highly scalable. Once a connection is established with an organization, creating new shared channels is straightforward. Each organization manages its own members within their own workspace, reducing the administrative burden on GoodAdvertisements Inc. compared to managing numerous guest accounts.

Security Precautions: Slack Connect channels are inherently secure. Each company retains control over its data, apps, and members within its own workspace. Admins on both sides approve connections and channels, providing robust security and auditing capabilities. It eliminates the need for external users to log into GoodAdvertisements Inc.'s workspace as guests, which can sometimes be perceived as a higher security risk by external parties.

✅ "set a reminder to unshare the channel when the launch is complete": This is a good practice for offboarding and managing access after the project concludes, easily done with Slack Connect channels.

Summary:
Guest accounts are for bringing individuals into your workspace with limited access. Slack Connect is for companies to collaborate seamlessly between their own separate workspaces. Since the scenario involves "multiple companies" and emphasizes "scaling for future launches with other companies" while maintaining strong "security precautions," Slack Connect is the superior solution. The primary hurdle is that both sides need a paid plan, which the question directly addresses as a consideration ("not clear whether the companies use paid Slack plans") leading to the logical step of asking them to upgrade.

Reference:
🏠 Slack Help Center: An introduction to sharing channels and guest accounts
🏠 Slack Help Center: Get started with Slack Connect
These resources explain the fundamental differences and use cases for Guest Accounts vs. Slack Connect, highlighting that Slack Connect is designed for inter-organizational collaboration when both parties are on paid Slack plans.

You re a Workspace Owner for a Slack Business+ workspace. Your organizations sales team expresses interest in working with their customers in Slack. Customer relationships tend to be long term, though representatives tend to transition accounts frequently. Given that the sales rep assigned to a given customer often changes, which best practice process should you establish to allow the sales team to engage with their customers in the Business+ workspace?


A. Invite the customers la the respective existing account channels as Single Channel Guests and archive the channels when the relationship ends.


B. Create new account channels and share them with the respective customers using Slack Connect.


C. Create new account channels and add the respective customers as Single Channel Guests with an expiration date of 1 year


D. Create a new free Slack workspace, and invite the sales team and the customer care teams as full members.





B.
  Create new account channels and share them with the respective customers using Slack Connect.

Explanation:

🔴 A. Invite the customers in the respective existing account channels as Single Channel Guests and archive the channels when the relationship ends.

Why it's wrong:
❌ Single-Channel Guest Limitations for Long-Term: While Single-Channel Guests are good for limited, short-term access, the scenario states "customer relationships tend to be long term." For long-term relationships, managing many individual Single-Channel Guests across multiple accounts (and potentially needing to re-invite them if a new channel is needed) becomes administratively heavy and less flexible.
❌ Frequent Rep Transitions: If a sales rep leaves, their DMs and other one-to-one communications might be hard to transfer. More importantly, if the customer is only a Single-Channel Guest, and the channel is tied to a specific rep's workflow or a small, ephemeral project, it doesn't easily facilitate the seamless transition of the relationship as a new rep takes over. The continuity of the channel itself might be at risk if it's too closely tied to the specific rep.
Cost: While not explicitly mentioned as a concern here, remember that Multi-Channel Guests cost money. Single-Channel Guests are free, but their limitations are the primary issue here.

🟢 B. Create new account channels and share them with the respective customers using Slack Connect.

Why it's the Correct Answer:
This option directly addresses all the key constraints and aligns with Slack best practices for inter-company collaboration, especially for long-term relationships.
"Share them with the respective customers using Slack Connect": Slack Connect is designed precisely for this. It allows two separate organizations (your company and the customer's company, both on paid Slack plans) to share a channel.

✔️ Long-Term Relationships: With Slack Connect, the channel becomes the enduring communication hub for the customer relationship, independent of which sales rep is currently assigned. If a sales rep leaves or a new one takes over, the customer's presence in the shared channel remains, and the new rep simply joins the channel on your company's side. This ensures continuity and avoids re-inviting customers or losing context.
✔️ Frequent Rep Transitions: This is the most crucial advantage. When a sales rep transitions accounts, the new rep simply joins the existing Slack Connect channel. All past conversations, files, and context within that shared channel are immediately available to the new rep. The customer's experience remains seamless, as they continue communicating in the same channel. There's no need to re-invite the customer or migrate conversations.
✔️ Customer Experience: Customers remain in their own Slack workspace, reducing the friction of logging into a guest account.
✔️ Security & Scalability: Each company manages its own users and security settings. This is highly scalable as you add more customers and more sales reps. You control who from your organization has access, and they control who from their organization has access.

🔴 C. Create new account channels and add the respective customers as Single Channel Guests with an expiration date of 1 year.

Why it's wrong:
❌ Single-Channel Guest Limitations for Long-Term: Same issue as option A. While a 1-year expiration date might seem to address "long-term," it still necessitates manual re-invitation or extension after a year. For truly long-term relationships (which can span many years), this is not efficient.
❌ Frequent Rep Transitions: This option still faces challenges with rep transitions. While the channel exists, the management of the guest accounts and ensuring the new rep has seamless access to the customer's side of the conversation can be more cumbersome than with Slack Connect. The core issue remains that the guest account is an individual's access into your workspace, rather than a shared space between two distinct organizations.

🔴 D. Create a new free Slack workspace, and invite the sales team and the customer care teams as full members.

Why it's wrong:
❌ Security & Compliance Nightmare: Creating a free Slack workspace for this purpose is a major security and compliance risk. Free workspaces have limited message history (90 days), no custom retention policies, no compliance exports, no guaranteed uptime, and very limited administrative control compared to a Business+ plan. This completely contradicts "best practice process" and the implied need for robust, long-term customer communication.
❌ Lack of Integration: This separate workspace would be entirely disconnected from GoodAdvertisements Inc.'s main Business+ workspace, leading to information silos, lack of integration with internal tools, and forcing sales reps to switch workspaces constantly.
❌ No Customer Integration: This option focuses on an internal workaround for your sales and customer care teams, but it doesn't actually address how to invite the customers themselves into this workspace securely or efficiently, which is the core problem statement.

Conclusion:
Given the critical requirements of long-term customer relationships and frequent sales rep transitions, Slack Connect (Option B) is the most robust, scalable, and best-practice solution. It creates a persistent, shared communication channel that transcends individual sales rep assignments and allows both companies to manage their own internal users, ensuring continuity and security.

☰ Reference:
📄 Slack Help Center: Get started with Slack Connect
Specifically review the benefits of Slack Connect for external partners and how it enables persistent shared channels.

📄 Slack Help Center: An introduction to sharing channels and guest accounts
Understand the limitations of guest accounts for long-term, inter-organizational collaboration compared to Slack Connect.

Jorge is starting an Employee Resource Group for volunteers at his company to collaborate from across different business units. This group requires a workspace that is visible to all members of his organization, so that they can volunteer to join and follow the group’s progress. However, the group’s leaders want the rights to approve any members before they join. Which access level should Jorge set for this workspace?


A. Open


B. Invite Only


C. By Request


D. Hidden





B.
  Invite Only

Explanation:

❌ A. Open

✖️ Why it's wrong:

Visibility: An "Open" workspace is visible to all members of the organization, fulfilling Requirement 1.

Approval: However, "Open" workspaces allow any member of the organization to join without requiring approval. This directly contradicts Requirement 2, where the group's leaders want to approve members.

❌ B. Invite Only

✖️ Why it's wrong:

Visibility: An "Invite Only" workspace is not visible to all members of the organization in the directory. Members must be explicitly invited by a Workspace Owner or Admin (or sometimes by other members if settings allow). This fails Requirement 1 ("visible to all members... so that they can volunteer to join").

Approval: While it gives control over who joins (via invitation), it doesn't allow for a "request and approve" workflow by the leaders if the workspace isn't discoverable.

✅ C. By Request

✔️ Why it's the Correct Answer:

This option perfectly aligns with both requirements.

Visibility: A "By Request" workspace is visible to all members of the organization in the workspace directory. This fulfills Requirement 1, allowing members to discover the ERG and express interest.

Approval: When a member sees a "By Request" workspace and wants to join, they submit a request. This request then goes to the Workspace Owners/Admins (who, in this case, would be the group's leaders delegated that authority, or who would process these requests on behalf of the leaders). The Owners/Admins then have the explicit "rights to approve any members before they join," fulfilling Requirement 2. This creates the desired controlled entry point with visibility.

❌ D. Hidden

✖️ Why it's wrong:

Visibility: A "Hidden" workspace is not visible to any non-member within the organization directory. It is the most restrictive visibility setting. This completely fails Requirement 1 ("visible to all members... so that they can volunteer to join"). It's typically used for highly confidential or temporary administrative workspaces.

Approval: While it allows for control over who joins (only by direct invitation from an Owner/Admin), its lack of discoverability makes it unsuitable for a volunteer group that wants members to find and request to join.

Conclusion:
"By Request" is the ideal access level because it strikes the perfect balance between discoverability for the entire organization and controlled approval by the group's leaders, which are the two critical requirements in this scenario.

Reference:
Slack Help Center: Set permissions for a workspace (or similar articles detailing workspace access levels like "Open," "By Request," "Invite Only," and "Hidden"). These documents explain how each access level impacts visibility and joining methods.

Large Inc has a number of apps pre-approved in the App Directory for their teams to use, but their admins want to nominate a group of "App Approval Ambassadors" in addition to their Workspace Owners. These "Ambassadors" will be responsible for reviewing and approving or denying apps in a #plz-app-request channel. How can the Org Admin ensure that these "Ambassadors" are able to most efficiently approve or deny apps?


A. Have the "Ambassadors" conduct app review in the channel, using emoji to alert the Admins to whitelist the app.


B. Promote the "Ambassadors" to Workspace Owners in Slack.


C. Promote the "Ambassadors" to Workspace Admins in Slack.


D. Add the "Ambassadors" as "selected members or groups" to manage Approved Apps.





D.
  Add the "Ambassadors" as "selected members or groups" to manage Approved Apps.

Explanation:

🔴 A. Have the "Ambassadors" conduct app review in the channel, using emoji to alert the Admins to whitelist the app.

Why it's wrong:

❌ Efficiency: This is highly inefficient. It creates a two-step manual process. The "Ambassadors" review and signal, but the actual approval still relies on a Workspace Owner or Org Admin to manually go into the App Directory to whitelist the app. This adds unnecessary delay and potential for miscommunication or oversight.

❌ Native Functionality: It doesn't leverage Slack's built-in app approval delegation capabilities.

❌ Direct Control: The "Ambassadors" don't have direct control over the approval/denial process, only advisory input.

🔴 B. Promote the "Ambassadors" to Workspace Owners in Slack.

Why it's wrong:

❌ Over-Permissioning: Promoting individuals to Workspace Owners grants them a vast array of permissions beyond just app approval (e.g., managing members, channels, billing, security settings, deleting the workspace). This is a major security risk and goes against the principle of least privilege. The scenario explicitly states "Ambassadors" for app approval, not full workspace management.

❌ Not Most Efficient: While they could approve apps, giving them excessive permissions is not the "most efficient" or secure way to achieve a single task.

🔴 C. Promote the "Ambassadors" to Workspace Admins in Slack.

Why it's wrong:

❌ Over-Permissioning (Still): Similar to Workspace Owners, Workspace Admins have significant administrative control within a workspace (e.g., managing members, archiving channels, installing many types of apps without approval if app approval is off). While it's a step down from Owner, it's still generally more permission than needed just for app approval if other specific roles exist.

❌ Specific Role vs. Broad Role: The scenario implies a dedicated group just for app approvals. Assigning them a broad "Admin" role might still grant more power than intended.

🟢 D. Add the "Ambassadors" as "selected members or groups" to manage Approved Apps.

Why it's the Correct Answer: This option directly leverages Slack's granular permission settings for app management, which is part of its Enterprise Grid (and potentially Business+ in some aspects) capabilities.

✔️ "Selected members or groups to manage Approved Apps": Slack allows Org Owners/Admins (and Workspace Owners depending on the plan and settings) to designate specific individuals or user groups as "App Managers" or to grant them specific permissions related to app approval. This is often found under "App management settings" or "Approved Apps" within the Slack administration console. You can specify who receives app requests and has the authority to approve or deny them.

✔️ Efficiency: When an app request is made by a user, it goes directly to the designated "App Managers" (the "Ambassadors" in this case), often appearing as a notification in the configured channel (#plz-app-request as specified). From there, the Ambassadors can directly review the app details and take the approval or denial action within the Slack interface. This is a streamlined, one-step process.

✔️ Least Privilege: This method grants only the necessary permissions for app approval, avoiding the over-permissioning of making them full Workspace Owners or Admins.

✔️ Meeting All Requirements: It ensures the "Ambassadors" can review and approve/deny, in the specified channel, efficiently, without granting them undue access to other workspace settings.

🔒 Conclusion:
Slack's administrative features allow for granular control over who can manage apps. The most efficient and secure way to empower "App Approval Ambassadors" without granting them excessive permissions is to assign them the specific role that allows them to manage approved apps directly. This feature is typically found by adding them as "App Managers" or configuring them under specific "App Approval" settings within the Slack Admin dashboard.

🔒 Reference:
Slack Help Center: Manage app approval settings
Slack Help Center: Set permissions for a workspace (specifically looking at the "App Management" or "Integrations" permissions within different roles).
These resources detail how to set up app approval workflows and delegate app management responsibilities to specific individuals or groups, which is the core of Option D.


Page 3 out of 17 Pages
Previous