Salesforce (CRT403) Exam Questions And Answers page 39
An app builder needs to deploy a new account detail page layout from sandbox to production.
Which three components should an app builder include in the Change Set to ensure it deploys successfully and visually as expected? (Choose three.)
Which three components should an app builder include in the Change Set to ensure it deploys successfully and visually as expected? (Choose three.)
System administrator profile
Lightning App Builder
Custom fields
Custom actions
User Interface
Business Logic and Process Automation
Which Salesforce Formula Function can return a value based on more than two different field parameters?
Contains
Case Statement
Beings
IF Statement
Business Logic and Process Automation
Data Management
Universal Containers would like to show different values to different groups of users in a custom picklist field.
What should be configured?
What should be configured?
Page layouts
Record Types
Field-level security
Permission sets
User Interface
Security
Representatives at Cloud Kicks use Salesforce to record information for new Leads. When new prospects are added, an outbound message is sent to the data warehouse with the Lead s information.
What automation tool should an app builder use to meet this requirement?
What automation tool should an app builder use to meet this requirement?
Design an approval process that sends an outbound message.
Create a workflow rule with an outbound message as the action.
Create a process using Process Builder to send an outbound message.
Use Lightning Flow to send an outbound message.
Business Logic and Process Automation
Data Management
Universal Containers sales reps can modify fields on an Opportunity until it is closed. Only the Sales Operations team can modify the Post-Close Follow-up Date and Post-Close Follow-up Comments fields.
How can these requirements be met?
How can these requirements be met?
Use multiple record types, page layouts, and profiles.
Use field-level security on page layouts to restrict editing fields.
Use record types with field sets and restrict editing fields using field-level security.
Use field-level security to mark fields as read-only on the Sales profile.
User Interface
Security
Which feature should an app builder use to ensure that new Leads are automatically sent to the appropriate Sales Rep?
Workflow Rules
Visual Flow
Lead Assignment Rules
Lead Convert
Business Logic and Process Automation
Security
What is true regarding changing the field type of a rich text area?
It is not possible to change the field type of a rich text area.
Rich text area fields can be converted but only to a long text area field type.
Images in a rich text area are deleted when the field type is converted.
Rich text area fields can be converted to a text area field type but data may be truncate.
Security
Data Management
Which developer tool can be used to create a data model? (Choose two.)
Application data model wizard
Force.com IDE
Force.com data loader
Schema builder
Data Modeling and Management
Data Management
Universal Containers needs to create a roll-up summary field on a custom object that counts the number of related records on another custom object.
What type of field must exist before the roll-up summary can be created, and where should it be located?
What type of field must exist before the roll-up summary can be created, and where should it be located?
A lookup relationship field on the parent object.
A lookup relationship field on the child object.
A master-detail relationship field on the parent object.
A master-detail relationship field on the child object.
Business Logic and Process Automation
Data Management
A customer service representative at Cloud Kicks wants to be able to collect information from customers using a series of question prompts. Once the questions are completed, an email should be sent to the customer with a feedback form.
What should be used to accomplish this?
What should be used to accomplish this?
Lightning Flow
Process Builder
Apex Trigger
Einstein Next Best Action
User Interface
Security
Comments