Skip to content
Pass Microsoft, Cisco, Sap and Salesforce Exams
Menu
  • Home
  • Exams
  • Certifications
  • Cloud Computing
  • Cyber Security
  • Contact Us
  • Log in
  • Sign up
Menu

Automated actions – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-09-292024-09-09 by zeusexam

Automated actions When a workflow rule’s criteria is matched, the related actions (called automated actions) are executed: they can be built and reused whenever necessary, meaning that more than one workflow can trigger the same actions. Workflows can use the following actions: All these actions can be used on the approval and entitlement processes as…

Read more

Cross-object field updates – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-09-292024-09-09 by zeusexam

Cross-object field updates When an object is a child of another object, it is possible to update a parent object field from a child object field update; this feature only works on custom-to-custom, custom-to-standard, and some standard-to-standard master-detail relationships. Only the following parent standard objects are supported in custom-to-standard master details: For standard-to-standard master-details, these…

Read more

Logic Bombs – 100-150 Exam Study Guide

Posted on 2024-09-292024-09-09 by examcert

Logic Bombs (38.3.2) A logic bomb is a malicious program that waits for a trigger, such as a specified date or database entry, to set off malicious code. Until this trigger event happens, the logic bomb will remain inactive. Once activated, a logic bomb implements malicious code that causes harm to a computer in various…

Read more

Outbound message actions – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-09-282024-09-09 by zeusexam

Outbound message actions Outbound messages are used to send some of the record data to an external system (it can be an ERP, an inventory system, a product management system, or whatever your CRM is integrated with). Although outbound message actions can be configured in point and click mode, they require a bit of developer’s…

Read more

Piggybacking and Tailgating

Posted on 2024-09-282024-09-09 by examcert

Piggybacking and Tailgating (38.2.6)Piggybacking or tailgating occurs when a criminal follows an authorized person to gain physical entry into a secure location or a restricted area. Criminals can achieve this by: One way of preventing this is to use two sets of doors. This is sometimes referred to as a mantrap and means individuals enter…

Read more

Time-dependent actions – Certified Advanced Salesforce Admin Exam Guide

Posted on 2024-09-282024-09-09 by zeusexam

Time-dependent actions Actions can be executed hours or days after a given date. To add time-dependent actions, the workflow must be inactive and the evaluation criteria must not be set to Evaluate the rule when a record is created, and any time it’s edited to subsequently meet the criteria. Remove the Notify if Lead is…

Read more

Deception – 100-150 Exam Study Guide

Posted on 2024-09-282024-09-09 by examcert

Deception (38.2)Deception comes in many forms. This section explores some of the different ways attackers can attempt to deceive a person or organization. Social Engineering (38.2.1)Social engineering is a non-technical strategy that attempts to manipulate individuals into performing risky actions or divulging confidential information.Rather than software or hardware vulnerabilities, social engineering exploits human nature by…

Read more

Automating Record Approval with Approval Processes

Posted on 2024-09-272024-09-09 by zeusexam

Automating Record Approval with Approval Processes After workflow rules, another important member of the process automation family is approval processes. They are a way to define criteria to decide whether Salesforce users can submit a record for approval to managers and automatically apply the required actions depending on whether the record is approved or rejected….

Read more

Threat Complexity – 100-150 Exam Study Guide

Posted on 2024-09-272024-09-09 by examcert

Threat Complexity (38.1.12)The threat landscape has continued expand not only in the number of vectors, but also in their complexity. An advanced persistent threat (APT) is a continuous attack that uses elaborate espionage tactics involving multiple actors and/or sophisticated malware to gain access to the target’s network. Attackers remain undetected for a long period of…

Read more

Threats to the Local Area Network

Posted on 2024-09-272024-09-09 by examcert

Threats to the Local Area Network (38.1.7)The local area network (LAN) is a collection of devices, typically in the same geographic area, connected by cables (wired) or airwaves (wireless).Because users can access an organization’s systems, applications, and data from the LAN domain, it is critical that it has strong security and stringent access controls.Examples of…

Read more
  • Previous
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 72
  • Next

Categories

  • 100-150 Study Course
  • AWS Study Course
  • AZ-104 Study Course
  • Certified Advanced Salesforce Admin
  • Cisco Study Course
  • CLF-C02 Study Course
  • Google
  • Google Associate Cloud Engineer
  • Microsoft Study Course
  • Salesforce
  • Study Course
© 2024 Zeusexam, Inc. All rights reserved. | Privacy Statement | Terms of Use | Use of Cookies | Trust | Accessibility | Cookie Preferences | Your Privacy Choices