Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Advanced-Administrator Salesforce Exam Lab Questions

Salesforce Certified Advanced Administrator (SP25) Questions and Answers

Question 29

The security department at AW Computing wants to prevent users from exporting more data than they need. Included in this request is limiting records containing sensitive information, such as bank accounts and Personal Identifiable Information (PII).

Which feature should an administrator recommend to help limit what data is exported?

Options:

A.

Salesforce Platform Encryption

B.

Export Data Settings

C.

Salesforce Shield

D.

Muted Permission Sets

Question 30

Cloud Kicks (CK) has deployed several new custom apps that use Lightning Web components. The administrator is now concerned that they may need to make some adjustments to CK’s org to make it more secure.

Which tools should the administrator use to expose possible security risks within a Lightning web component?

Options:

A.

Health Check

B.

Master Encryption Keys

C.

Salesforce Optimizer

D.

Self-signed Certificates

Question 31

The Cloud Kicks security team has seen an increase in unattended device attacks, where hackers can view sensitive information when users leave devices unlocked in public settings. The security team wants to ensure Salesforce data cannot be viewed after 10 minutes of inactivity.

What is the recommended security setting to configure?

Options:

A.

Enforce login IP ranges on every request.

B.

Lock sessions to the domain in which they were first used.

C.

Require a high assurance session.

D.

Force logout on session timeout.

Question 32

The AW Computing administrator team does significant amounts of work around process automation and ensuring data integrity. When an administrator created a new validation rule in production, the development team complained that their deployment to production failed.

What should be implemented to prevent this conflict from happening?

Options:

A.

Review the setup audit trail prior to changes.

B.

Refresh the full copy sandbox daily.

C.

Test changes in a shared sandbox.

D.

Build automation and validation rules using screen flows.