Question 46
A company using G Suite has reports of cyber criminals trying to steal usernames and passwords to access critical business data. You need to protect the highly sensitive user accounts from unauthorized access.
What should you do?
What should you do?
Question 47
You have configured your G Suite account on the scheduled release track to provide additional time to prepare for new product releases and determine how they will impact your users. There are some new features on the latest roadmap that your director needs you to test as soon as they become generally available without changing the release track for the entire organization.
What should you do?
What should you do?
Question 48
Get Cloudy Consulting has the following requirements:
- Users should only see Accounts they or their subordinates own.
- All Accounts with the custom field "Key Customer" should be visible to all Senior Account Managers.
- There is a custom field on the Account record that contains sensitive information and should be hidden from all users, except 10 designated users who require view and edit access.
- These 10 users come from different user groups, and will change occasionally.
Which three platform security features are required to support these requirements with the minimum amount of effort? (Choose three.)
- Users should only see Accounts they or their subordinates own.
- All Accounts with the custom field "Key Customer" should be visible to all Senior Account Managers.
- There is a custom field on the Account record that contains sensitive information and should be hidden from all users, except 10 designated users who require view and edit access.
- These 10 users come from different user groups, and will change occasionally.
Which three platform security features are required to support these requirements with the minimum amount of effort? (Choose three.)
Question 49
Cloud Kicks has multiple business partners that assist with product fulfillments, and requires a web service to be exposed to the business partners.
Each business partner needs to be able to query Cloud Kicks' Salesforce instance to retrieve the status of orders. Additionally, each business partner should only be allowed access to orders for which the business partner is the fulfillment vendor.
The Architect does NOT want the business partners to utilize the standard APIs and would prefer a custom API be developed.
Which three design elements should the Architect consider in order to ensure the data security of the solution? (Choose three.)
Each business partner needs to be able to query Cloud Kicks' Salesforce instance to retrieve the status of orders. Additionally, each business partner should only be allowed access to orders for which the business partner is the fulfillment vendor.
The Architect does NOT want the business partners to utilize the standard APIs and would prefer a custom API be developed.
Which three design elements should the Architect consider in order to ensure the data security of the solution? (Choose three.)
Question 50
After making a recent migration to G Suite, you updated your Google Cloud Directory Sync configuration to synchronize the global address list. Users are now seeing duplicate contacts in their global directory in G Suite. You need to resolve this issue.
What should you do?
What should you do?