Practice Free Certified Advanced Administrator Exam Online Questions
At Cloud Kicks, users are able to run reports. However, when users try to export a report, they are taken to a login screen and prompted for additional verification.
What is causing this issue?
- A . Users need to update their browser to the latest version.
- B . The users are logged Into an Insecure network.
- C . The users’ profile is missing the Export Reports permission.
- D . Exporting Is configured to require a high assurance session.
D
Explanation:
A high assurance session is a type of session security level that requires users to verify their identity using a second factor of authentication, such as Salesforce Authenticator, a verification code, or a security key. Administrators can configure certain actions or permissions to require a high assurance session, such as exporting reports, viewing encrypted data, or accessing connected apps.
If users are able to run reports but are taken to a login screen and prompted for additional verification when they try to export a report, it could be because exporting is configured to require a high assurance session. This means that users need to use a second factor of authentication to export reports, even if they have already logged in with their username and password.
Reference:
https://help.salesforce.com/s/articleView?id=sf.identity_verification.htm&type=5
https://help.salesforce.com/s/articleView?id=sf.security_sessions.htm&type=5
Administrator has been tasked with creating a new custom field on the Account object called Government Der. The compliance department has determined that this field contains sensitive Information and needs to be encrypted using Classic Encryption.
How will this impact users when reading, editing, or reporting on Accounts?
- A . Encrypted fields are unable to be used the report criteria or list views filters.
- B . Users will need the View Encrypted Data permission to edit the field.
- C . Encrypted fields can be added to a list view and rule filters.
- D . Users with the View Encrypted Data permission can see the field, regardless of Field-Level Security.
DreamHouse Realty manages Its accounts and contacts In Salesforce using a B2C account model. The business has requested that third-party loan advisors be tracked in Salesforce along with the customers they work with.
Hour should the administrator track third-party financial advisors and the customers they work with?
- A . Create a Hierarchical lookup on Account to track loan advisors’ customers.
- B . Set up Contacts to Multiple Accounts for loan advisors.
- C . Use a B2B Account Model to track loan advisors’ customers.
- D . Use a Hierarchical lookup on Contact to track loan advisors’ customers,
B
Explanation:
Contacts to Multiple Accounts is a feature that allows administrators to relate a contact to multiple accounts without creating duplicate contacts for each account. This feature is useful for scenarios where a contact has business relationships with more than one account, such as consultants, brokers, or loan advisors. By setting up Contacts to Multiple Accounts for loan advisors at DreamHouse Realty, administrators can track which loan advisors work with which customers and which accounts without
creating duplicate contacts for each account.
Reference: https://help.salesforce.com/s/articleView?id=sf.contacts_multiple_accounts_overview.htm&type=5
As part of their yearly audit, the compliance team at Cloud Kicks would like to track when a user’s profile has been changed and who changed the data.
What should the administrator review to meet this requirement?
- A . Field History Tracking
- B . Setup Audit Trail
- C . Historical Trending
- D . Analytic Snapshot
B
Explanation:
The Setup Audit Trail is a tool that allows you to view and download a log of changes made in your org’s Setup area. The log shows up to 20 fields of information for each change, such as who made it, when it was made, what type of change it was, and what values were changed. You can use the Setup Audit Trail to track configuration changes directly in production and identify any unauthorized or problematic changes. One of the changes that the Setup Audit Trail tracks is when a user’s profile is changed and who changed it. This means that you can use the Setup Audit Trail to see when a user’s profile has been changed and who changed the data.
Reference: https://help.salesforce.com/s/articleView?id=sf.monitorsetup.htm&type=5
Which three fields should be used as filter criteria? Choose 3 answers
- A . A phone field that provides the full phone number of the seller.
- B . A multi-select picklist field that designates features of the listing.
- C . A number field that designates the square footage of the listing.
- D . A formula field that calculates a price for the listing.
- E . A picklist field that designates the county of the listing.
A, C, E
Explanation:
A phone field that provides the full phone number of the seller, a number field that designates the square footage of the listing, and a picklist field that designates the county of the listing should be used as filter criteria because they are fields that can be used to narrow down the report results based on specific values or ranges. A multi-select picklist field that designates features of the listing and a formula field that calculates a price for the listing should not be used as filter criteria because they are fields that cannot be filtered on in reports.
Reference:
https://help.salesforce.com/s/articleView?id=sf.reports_filtering.htm&type=5
https://help.salesforce.com/s/articleView?id=sf.reports_fields_unavailable.htm&type=5
Cloud Kicks needs to track government-issued identification numbers for its customers. The security team requires that the identification number cannot changed by users and must be masked when displayed, except the last two digits.
Which two recommended configurators should administrator create? Choose 2 answers
- A . Use a field with Classic Encryption.
- B . Enable Shield Platform Encryption.
- C . Configure a Field Encryption Policy
- D . SetRead-Only Field-Level Security in the user Profile
B, C
Explanation:
Shield Platform Encryption is a Salesforce feature that allows you to encrypt sensitive data at rest while preserving critical platform functionality. It uses a combination of tenant secrets, encryption keys, and masking policies to protect your data. A field encryption policy is a set of rules that defines which fields are encrypted and how they are masked when displayed. A field encryption policy can be used to encrypt and mask the identification number field, except for the last two digits.
Reference:
https://help.salesforce.com/s/articleView?id=sf.security_pe_overview.htm&type=5
https://help.salesforce.com/s/articleView?id=sf.security_pe_field_encryption_policies.htm&type=5
An administrator at AW Computing noticed that a custom field on the Contact object was changed from text to text area.
What tool should the administrator use to investigate this change?
- A . Developer Console
- B . Field History Tracking
- C . Debug Log
- D . View Setup Audit Trail
D
Explanation:
The View Setup Audit Trail page lets you view the 20 most recent setup changes made to your org. You can also download a file of the last six months of setup changes.
Reference: https://help.salesforce.com/s/articleView?id=sf.monitoring_setup_audit_trail.htm&type=5
The administrator at Cloud Kicks built a flow in a sandbox. After testing and validating the flow, the administrator plant to promote the flow to the production environment with a change set.
Which three considerations should the administrator be aware of when moving flows with a change sat? Choose 3 answers
- A . Flows deployed are inactive and need to be manually activated.
- B . Flow allows only one version of the flow when deployed with a change sat.
- C . Deploying or redeploying a flow with change sets creates a version of the flow in the destination org.
- D . All flow dependencies are automatically added to the change set.
- E . Flows ere automatically activated upon deployment.
ACD
Explanation:
Flows deployed with change sets are inactive by default and need to be manually activated in the destination org before they can run. Deploying or redeploying a flow with change sets creates a new version of the flow in the destination org, which preserves the previous versions and allows for rollback if needed. All flow dependencies, such as custom fields, objects, or variables, are automatically added to the change set when a flow is added
An administrator would Like to know If any other administrators or delegated administrators are using the Log In As a User feature.
Where the administrators should are using the Log in As a User feature.
- A . Grant Account Login Access
- B . Setup Audit Trail
- C . Connected App Usage
- D . Login History
B
Explanation:
The Setup Audit Trail is a tool that allows you to view and download a log of changes made in your org’s Setup area. The log shows up to 20 fields of information for each change, such as who made it, when it was made, what type of change it was, and what values were changed. You can use the Setup Audit Trail to track configuration changes directly in production and identify any unauthorized or problematic changes. One of the changes that the Setup Audit Trail tracks is when a user grants login access to another user. This means that you can use the Setup Audit Trail to see if any other administrators or delegated administrators are using the Log In As a User feature.
Reference:
https://help.salesforce.com/s/articleView?id=sf.monitorsetup.htm&type=5
https://help.salesforce.com/s/articleView?id=sf.remoteaccess_granting_login_access.htm&type=5
An administrator needs to Import a large amount of historical data (more than 100,000 records) from another system.
how should the administrator import the data?
- A . SOAP based API with Developer console
- B . Data Loader with Bulk API Enabled
- C . An AppExchange package
- D . Import Wizard with Add Only
B
Explanation:
Data Loader is a tool that allows administrators to import or export large amounts of data (more than 50,000 records) from or to Salesforce using CSV files. Data Loader can be used for inserting, updating, deleting, upserting, exporting, or extracting data. Bulk API is an API that allows administrators to process large batches of records asynchronously in the background. Bulk API can handle millions of records with high performance and minimal system resources. By using Data Loader with Bulk API enabled, an administrator can import a large amount of historical data (more than 100,000 records)
from another system efficiently and securely.
Reference:
https://help.salesforce.com/s/articleView?id=sf.data_loader.htm&type=5 https://help.salesforce.com/s/articleView?id=sf.loader_api.htm&type=5 https://help.salesforce.com/s/articleView?id=sf.bulk_api_intro.htm&type=5