Dreamhouse Realty recently learned that the major listing service it utilizes can accept messages to a specific endpoint. The realtors want to utilize this to be able to quickly update the listing price on properties after it has
been approved.
What automation tool should the administrator configure?
An administrator wants to determine if brute-force password attacks are being used against the org. A brute-force attack is when multiple password combinations are attempted in a short time period.
Where should the administrator look for more information?
The security department at AW Computing wants to prevent users from exporting more data than they need. Included in this request is limiting records containing sensitive information, such as bank accounts and Personal Identifiable Information (PII).
Which feature should an administrator recommend to help limit what data is exported?
An administrator at AW Computing noticed that a custom field on the Contact object was changed from text to text area.
What tool should the administrator use to investigate this change?
Cloud Kicks (CK) wants the forecast numbers to be shown by territory regardless of who owns the record. CK also wants a way to forecast based on role hierarchy.
Which three options should an administrator recommend?
Choose 3 answers
Ursa Major Solar offers customers annual service contracts. Account owners should receive an email renewal reminder l month before their customer's planned expiration date. The administrator builds a flow to automate the process, which runs when a record is created, and tests several possible scenarios.
What win occur if the expiration date is changed from January 1 of the next year to yesterday?
The AW Computing administrator team does significant amounts of work around process automation and ensuring data integrity. When an administrator created a new validation rule in production, the development team complained that their deployment to production failed.
What should be implemented to prevent this conflict from happening?
The Cloud Kicks security team has seen an increase in unattended device attacks, where hackers can view sensitive information when users leave devices unlocked in public settings. The security team wants to ensure Salesforce data cannot be viewed after 10 minutes of inactivity.
What is the recommended security setting to configure?
Cloud Kicks (CK) has an email parsing tool. CK wants to ensure that when certain field are updated, the Case Owner is notified by email.
What should the administrator use to email the Case Owner?
An administrator at Universal Containers has been asked by the compliance team to understand end track various sensitivity levels for its data In Salesforce. The administrator has enabled Data Classification end configured appropriate sensitivity levels. The compliance team would Ike a report showing field level sensitivity and classification.
What should the administrator recommend?