Skip to content
Pass Microsoft, Cisco, Sap and Salesforce Exams
Menu
  • Home
  • Exams
  • Certifications
  • Cloud Computing
  • Cyber Security
  • Contact Us
  • Log in
  • Sign up
Menu

Buffer Overflow – 100-150 Exam Study Guide

Posted on 2024-10-022024-09-09 by examcert

Buffer Overflow (38.5.3) Buffers are memory areas allocated to an application. A buffer overflow occurs when data is written beyond the limits of a buffer. By changing data beyond the boundaries of a buffer, the application can access memory allocated to other processes. This can lead to a system crash or data compromise, or provide…

Read more

Selecting the right charting option – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-10-012024-09-09 by zeusexam

Selecting the right charting option In the previous chapter, we saw some different ways to create a chart, and dashboard charts are no different. Indeed, we can create bar charts, stacked bar charts, line charts, donut charts, funnel charts, and scatter charts. Gauge and Metric charts are not available on the report charting options. The…

Read more

Filtering dashboards – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-10-012024-09-09 by zeusexam

Filtering dashboards Before talking about filtering a dashboard, let’s see the previous dashboard from the Save As action. Create a new Sales Amazing Dashboard, which will cover only opportunity-related stuff (I’ve added a simple metric component that shows the number of opportunities for the current year): Dashboard created by cloning another dashboard using the Save…

Read more

Application Attacks – 100-150 Exam Study Guide

Posted on 2024-10-012024-09-09 by examcert

Application Attacks (38.5) Applications are also vulnerable to attacks. This section explores some of the more common attacks and how they can best be mitigated. Cross-Site Scripting (38.5.1) Attacks carried out through web applications are becoming increasingly common. Threat actors exploit vulnerabilities in the coding of a web-based application to gain access to a database…

Read more

Subscribing to a dashboard – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-10-012024-09-09 by zeusexam

Subscribing to a dashboard Dashboards are not refreshed every time we open them; that’s the reason behind the refresh button. Like reports, we can enable users to subscribe to the dashboard to refresh them automatically and receive the results by mail. We can create a daily recap of the status of the call center (unclosed…

Read more

Radio Frequency Jamming – 100-150 Exam Study Guide

Posted on 2024-09-302024-09-09 by examcert

Radio Frequency Jamming (38.4.3) Wireless signals are susceptible to electromagnetic interference (EMI), radio frequency interference (RFI), and even lightning strikes or noise from fluorescent lights. Attackers can take advantage of this fact by deliberately jamming the transmission of a radio or satellite station to prevent a wireless signal from reaching the receiving station. To successfully…

Read more

Automation with Workflows – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-09-302024-09-09 by zeusexam

Automation with Workflows Before closing this book, we’ll dive into process automation and show the main features for providing a highly efficient process design. In this chapter, we’ll see what process automation is and which tools the Salesforce platform delivers for an administrator to enhance process automation; then we’ll focus on workflow rules, a platform…

Read more

Building workflow rules – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-09-302024-09-09 by zeusexam

Building workflow rules If you are on your path to become an advanced administrator, I assume you are already familiar workflows. As a quick reminder, workflows are the oldest tool available on the Salesforce platform to run automations in an organization. This feature is a so-called if/then statement tool, which means that if a condition…

Read more

Defending Against Attacks – 100-150 Exam Study Guide

Posted on 2024-09-302024-09-09 by examcert

Organizations can take several steps to defend against various attacks. These include the following: Check Your Understanding—Cyber Attacks (38.3.13)Refer to the online course to complete this activity. Wireless and Mobile Device Attacks (38.4)Protecting wireless and mobile devices present their own challenges. This section discusses many of these attacks and how to prevent them. Grayware and…

Read more

Layer 2 Attacks – 100-150 Exam Study Guide

Posted on 2024-09-292024-09-09 by examcert

Layer 2 Attacks (38.3.6)Layer 2 refers to the data link layer in the Open Systems Interconnection (OSI) data communication model.This layer is used to move data across a linked physical network. IP addresses are mapped to each physical device address (also known as media access control [MAC] address) on the network, using a procedure called…

Read more
  • Previous
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 72
  • Next

Categories

  • 100-150 Study Course
  • AWS Study Course
  • AZ-104 Study Course
  • Certified Advanced Salesforce Admin
  • Cisco Study Course
  • CLF-C02 Study Course
  • Google
  • Google Associate Cloud Engineer
  • Microsoft Study Course
  • Salesforce
  • Study Course
© 2024 Zeusexam, Inc. All rights reserved. | Privacy Statement | Terms of Use | Use of Cookies | Trust | Accessibility | Cookie Preferences | Your Privacy Choices