loader image

Security Core Principles Checkpoint

These questions are designed to ensure that you understand the concepts. They are NOT intended to simulate questions that may be asked on an actual exam.

1. Which of the following types of security is evaluated when a user attempts to log in to Salesforce?

Question 1 of 4

2. Which of the following types of security are evaluated to determine if a user may create an account record, with a value in the "Type" field?  (Select all that apply)

Question 2 of 4

3. Which of the following types of security are evaluated to determine if User A can modify the "Type" field of an account owned by User B? (Select all that apply)

Question 3 of 4

4. What record level security is required in order to delete a record?

Question 4 of 4


 

Objectives for this Resource:

Security at all applicable levels is required in order to complete an action.

For example, in order to create a lead record, a user must authenticate (organization security) and must have create access to the lead object (object security).  Field-level security will then determine which fields the user can view and modify.

All actions require an active session (organization security allowed), and:

  • Create a record: Create on Object, Edit on Field
  • View a record: Read on Object, Read on Record, Read on Field
  • Edit a record: Edit on Object, Read/Write on Record, Edit on Field
  • Delete a record: Delete on Object, Full Access on Record

Feedback:

2 thoughts on “Security Core Principles Checkpoint”

Leave a Reply