Weekend Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Complete Tableau-CRM-and-Einstein-Discovery-Consultant Salesforce Materials

Salesforce Tableau CRM Einstein Discovery Consultant(SP23) Questions and Answers

Question 33

What happens if you first disable Analytics, and then you re-enable Analytics later? Select 2

Options:

A.

User permissions are removed from each defined permission set if Analytics is disabled. (Missed)

B.

User permissions are not removed from each defined permission set if Analytics is disabled.

C.

You must define the permission sets again if Analytics is re-enabled. (Missed)

D.

You must not define the permission sets again if Analytics is re-enabled.

Question 34

A data architect wants to use a dataflow transformation to implement row-level security that is based on role hierarchy in Salesforce. Which transformation should be used to level the dataset hierarch?

Options:

A.

digest transformation

B.

flatten transformation

C.

delta transformation

D.

sfdcDigest transformation

Question 35

Which Einstein Analytics asset or assets are created when using an App Template to create an app?

Options:

A.

The app, dataflows and datasets, dashboards, and permission sets

B.

The app, dataflows and datasets, and dashboards

C.

The app, dataflows and datasets, and users

D.

An empty app

Question 36

Which three statements are true regarding sharing inheritance? Choose 3 answers

Options:

A.

If a user can see more than 3,000 records on the object in Salesforce, but the user does not have the "View All Data" permission,

sharing inheritance is not used. The backup security predicate takes effect. This limitation does not apply to the Opportunity object.

B.

Sharing inheritance supports Account, Campaign, Case, Contact, Opportunity, Lead, Order, User, and custom objects. If you use

other objects, such as Idea or Site, you must use security predicates for those objects.

C.

A dataset using sharing must also have a security predicate defined.

D.

Sharing inheritance supports a foreign key for enforcing security.

E.

When sharing inheritance is enabled, security predicates are ignored.