Exam Logo

Salesforce (CRT403) Exam Questions And Answers page 32

Ursa Major Solar has made a great app that leadership wants to share with the world for free via AppExchange.

What should an app builder consider about the type of package when uploading to AppExchange?
Business Logic and Process Automation Security
Which three field types should be referenced by a Roll-Up Summary field using SUM? (Choose three.)
Business Logic and Process Automation Data Management
The Service Manager would like to highlight case age. When a case is new, they would like to see a green flag on the case record. The flag should be yellow if the case is still open after one day. The flag should be red when cases are open after three days.

Which two options should an app builder use to implement this requirement? (Choose two.)
User Interface Data Management
Accounts at Universal Containers are currently readable by all users but editable only by their owners. Management wants to designate some Accounts as VIP Accounts. Only Account owners should have read access to these VIP accounts.

What two actions should an app builder take to meet the requirements? (Choose two.)
Business Logic and Process Automation Security
Which two field types can be referenced by a Roll-Up Summary field using MIN or MAX? (Choose two.)
Data Modeling and Management Data Management
Which two report formats can be used as a source report to configure a reporting snapshot? (Choose two.)
Data Management Analytics
At Universal Containers, all US Sales Reps should be able to view the US Team Dashboard. However, only the US Sales Directors should be able to see the data in the component and view its source report.

How can an app builder ensure the proper access is granted?
User Interface Security
What is the name for an object that enables a many-to-many relationship between two other objects?
Data Modeling and Management Data Management
What is true when a field update is set to re-evaluate the workflow rule? (Choose three.)
Business Logic and Process Automation Data Management
Which feature sets the base level of access to an object?
Security