Skip to content
Pass Microsoft, Cisco, Sap and Salesforce Exams
Menu
  • Home
  • Exams
  • Certifications
  • Cloud Computing
  • Cyber Security
  • Contact Us
  • Log in
  • Sign up
Menu

Einstein Bots – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-10-142024-09-09 by zeusexam

Einstein Bots Although this is beyond the scope of this book, I want to spend a few minutes talking about Einstein Bots. Einstein Bots, which is an add-on for Live Agent (Chat), provides us with an automated way to interact with customers without using one of the precious resources of our call center: the agent’s…

Read more

Einstein Bots 2 – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-10-142024-09-09 by zeusexam

A new entitlement is automatically created based on the Entitlement Template’s configuration. SLAs can be as easy as checking whether a customer has support for their contract, though they can be more complex if we need to enforce case resolution within a given amount of time. Entitlement processes configure the timeline with steps (called Milestones)…

Read more

802.11 Original Authentication Methods

Posted on 2024-10-142024-09-09 by examcert

802.11 Original Authentication Methods (39.6.9) Although SSID cloaking and MAC address filtering would deter most users, the reality is that neither feature would deter a crafty intruder. SSIDs are easily discovered even if APs do not broadcast them, and MAC addresses can be spoofed. The best way to secure a wireless network is to use…

Read more

Improving Data Quality with Duplicate Management

Posted on 2024-10-132024-09-09 by zeusexam

Improving Data Quality with Duplicate Management After looking at key sales and service features, let’s go back to data quality. In this chapter, you’ll learn how to provide data consistency using duplicate management for standard and custom objects by defining duplicate and matching rules. Using duplicate record management, we can keep data clean and accurate…

Read more

Man-in-the-Middle Attack – 100-150 Exam Study Guide

Posted on 2024-10-132024-09-09 by examcert

Man-in-the-Middle Attack (39.6.5) In a man-in-the-middle (MITM) attack, also known as an on-path attack, the hacker is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties. There are many ways in which to create an MITM attack. A popular wireless MITM attack is called…

Read more

Local duplicate management – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-10-132024-09-09 by zeusexam

Local duplicate management Local duplicate management is the part of duplicate management that is related to how the user interacts with duplicates. To have a look at the standard rules, navigate to Setup | Data | Duplicate Management | Duplicate Rules to bring up the following page: Duplicate Rules main page Let’s edit the Contact…

Read more

Wireless Security Overview – 100-150 Exam Study Guide

Posted on 2024-10-132024-09-09 by examcert

Wireless Security Overview (39.6.2) A WLAN is open to anyone within range of a wireless access point (AP) and the appropriate credentials to associate to it. With a wireless NIC and knowledge of cracking techniques, an attacker may not have to physically enter the workplace to gain access to its network over a WLAN. Attacks…

Read more

Global duplicate management – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-10-122024-09-09 by zeusexam

Global duplicate management What if we decide to activate duplicate management after our sales reps have already created lots of leads? We cannot ask all our sales reps to open leads one by one to check duplicates and merge them; that will definitely be a waste of time. For this purpose, we can use duplicate…

Read more

Host-Based Firewalls – 100-150 Exam Study Guide

Posted on 2024-10-122024-09-09 by examcert

Host-Based Firewalls (39.5.6) Host-based personal firewalls are standalone software programs that control traffic entering or leaving a computer. Firewall apps are also available for Android phones and tablets. Host-based firewalls may use a set of predefined policies, or profiles, to control packets entering and leaving a computer. They also may have rules that can be…

Read more

Exploring and customizing rules

Posted on 2024-10-122024-09-09 by zeusexam

Exploring and customizing rules In this section, we will learn how to customize the duplicate and matching rules. Customizing duplicate rules As we have already seen in the previous sections, duplicate rules are used to alert on potential duplicates or prevent potential duplicates for a given record (if it is used on objects other than…

Read more
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 72
  • Next

Categories

  • 100-150 Study Course
  • AWS Study Course
  • AZ-104 Study Course
  • Certified Advanced Salesforce Admin
  • Cisco Study Course
  • CLF-C02 Study Course
  • Google
  • Google Associate Cloud Engineer
  • Microsoft Study Course
  • Salesforce
  • Study Course
© 2024 Zeusexam, Inc. All rights reserved. | Privacy Statement | Terms of Use | Use of Cookies | Trust | Accessibility | Cookie Preferences | Your Privacy Choices