Salesforce Admin Questions
Questions And Answers
Company Asked: Salesforce Experience: 3+ years.
1)What is cloud computing?
Ans)
Cloud computing denotes the on-demand provision of computing resources via the internet. These resources encompass physical or virtual servers, data storage solutions, networking capabilities, tools for application development, various software, and AI-powered analytics. Cloud computing enables individuals and companies to utilize these resources without the obligation to maintain physical infrastructure, offering a pay-per-use model.
Please include the following points if the interviewer is not satisfied with the previous answer.
Cost-effectiveness: You pay only for the cloud-based infrastructure and resources you use, rather than owning and maintaining physical data centers and servers.
Increased speed and agility: Enterprise applications can be accessed in minutes, empowering development teams to leverage cloud-based software and support infrastructure.
Unlimited scalability: Cloud services provide elasticity, allowing you to scale capacity up or down based on traffic spikes or dips.
Enhanced strategic value: Organizations can leverage cutting-edge technologies and innovations to gain a competitive edge.
Company Asked: Salesforce Experience: 3+ years.
2)What is the view all and modify all?
Ans)
View All:
Users with the View All permission can see all records of a specific object, regardless of ownership or sharing rules.
This permission is often granted to system administrators or users who need a broad view of data for reporting or troubleshooting purposes.
Modify All:
Users with the Modify All permission can edit, delete, and transfer ownership of all records of a specific object, regardless of ownership or sharing rules.
It provides extensive control over data.
Company Asked: ITC InfoTech Experience: 3+ years.
3)What is 151 exception in salesforce and how we handle it?
- System Validation Rules: Salesforce checks for required fields, field formats, and maximum field length.
- Before Triggers: Custom code that runs before the specified Salesforce operation.
- System Validation Rules (again): Salesforce re-checks the record for required fields and custom validation rules.
- Duplicate Rules: If a duplicate is found and the rule uses the block action, the record isn’t saved.
- Save the Record: The record is saved to the database but not yet committed.
- After Triggers: Custom code that runs after the record is saved.
- Assignment Rules: If applicable, leads or cases are assigned.
- Auto-Response Rules: Automated responses are sent.
- Workflow Rules: Any workflow rules are executed.
- Process Builder: Processes built with Process Builder are executed.
- Escalation Rules: If applicable, escalation rules are applied.
- Entitlement Rules: If applicable, entitlement rules are applied.
- Roll-Up Summary Fields: Roll-up summary fields are updated.
- Parent Roll-Up Summary Fields: Parent roll-up summary fields are updated.
- Commit: The record is finally committed to the database.
- Post-Commit Logic: Any post-commit logic, such as sending emails, is executed.
Profiles control:
- Object Permissions: Access to objects like Accounts, Contacts, Opportunities, etc.
- Field Permissions: Access to specific fields within an object.
- User Permissions: General permissions like API access, mass email, etc.
- Tab Settings: Visibility of tabs for different objects.
- Record Types: Access to different record types.
- Page Layouts: Which page layouts a user can see.
- App Settings: Access to different apps within Salesforce.
- Extended Access: Permission sets enable the extension of functional access for users without changing their profiles, which is beneficial for providing specific users with additional permissions as required.
- Multiple Assignments: While users can have only one profile, they can be assigned multiple permission sets, offering flexibility in user permission management.
- Task-Based: Permission sets can be designed around specific tasks or job functions. For instance, a permission set can be created for users who need to delete and transfer leads.
- Object and Field Permissions: These sets encompass permissions for objects, fields, and other settings, akin to profiles.
- Custom and Standard Options: Custom permission sets can be developed to meet the unique needs of your organization, or you can utilize the standard ones available in Salesforce..
Profiles:
- Purpose: Define what a user can do within Salesforce.
- Scope: Control access to objects, fields, and various functions.
- Settings: Include permissions for creating, reading, editing, and deleting records, as well as access to specific fields and tabs.
- Assignment: Every user must have one profile.
- Example: A Sales Rep profile might allow access to Leads, Opportunities, and Accounts, with permissions to create and edit these records.
Roles :
- Purpose: Define what data a user can see based on their position in the hierarchy.
- Scope: Control record-level access and data visibility.
- Settings: Determine which records a user can view or edit, based on their role in the organization.
- Assignment: Users can have no role or one role, and roles are organized hierarchically.
- Example: A Sales Manager role might allow access to all records owned by Sales Reps under them in the hierarchy.
Key Differences :
- Profiles control permissions (what users can do), while Roles control data visibility (what users can see).
- Profiles are mandatory for every user, but Roles are optional.
- Profiles are not hierarchical, whereas Roles follow a hierarchical structure.
- Login IP Ranges: If your profile has defined IP range values, the option to reset the security token will be unavailable. You must either remove the Login IP Ranges or switch to a profile without Login IP Ranges listed.
- Network Access: The reset option may not appear if Network Access settings are absent from Security Controls. Verify that Network Access is set up properly.
- User Profile Issues: A corrupted user profile can sometimes occur. Attempt to edit and save the user profile without any changes; this action may reset the profile and enable the token reset option.
- License Type: Users with Chatter-External and Chatter-Free licenses lack the option to reset their security tokens.
- Multi-Factor Authentication (MFA): Should your admin assign you the Multi-Factor Authentication for API Logins permission, an authenticator app's generated code may be required instead of a security token.
Feel free to post any comments regarding mistakes, corrections, ideas, and suggestions related to the article.
Thank you for reading the article.
Jayanth A
Comments
Post a Comment