Sharing-and-Visibility-Architect Dumps

Sharing-and-Visibility-Architect Free Practice Test

Salesforce Sharing-and-Visibility-Architect: Salesforce Certified Sharing and Visibility Architect (SU23)

QUESTION 6

Besides their own team accounts, sales managers at Universal Containers (UC) need Read access to all accounts of the same segment in other countries. Role Hierarchy was implemented accordingly (based on countries), but a sales manager in the U.S. is complaining that he cannot view account records of the same segment in Canada.
What should UC do to grant access properly?

Correct Answer: A
✑ Role Hierarchy and Sharing Rules:
✑ Why Option A is Correct:
✑ Why Others Are Incorrect:
For details, refer to Salesforce Sharing Rules documentation: https://help.salesforce.com/

QUESTION 7

If a Case requires involvement from one of the Legal team, the Case owner adds one of the corporate lawyers to the Legal SME field on the case.
Since cases are private, how can we grant a lawyer access to a specific case when their assistance is needed?

Correct Answer: B
Since Cases are private, standard sharing mechanisms like criteria-based sharing rules cannot grant access to a specific user identified in the Legal SME field. Apex Managed Sharing offers the flexibility to programmatically share the record with the identified lawyer whenever the Legal SME field is updated.
✑ Option A: Criteria-based sharing rules cannot dynamically share records with a
specific user in the Legal SME field.
✑ Option C: Sharing to a Legal Public Group is unnecessary if only one lawyer (not the entire group) needs access.
References:
✑ Apex Managed Sharing Overview

QUESTION 8

A sales rep at Universal Containers was added to an opportunity team with Read/Write permissions.
Which action is she allowed to perform in the opportunity?

Correct Answer: A
The Opportunity Team feature allows collaboration by granting specific permissions (Read, Read/Write, or access defined by roles) to users added to an opportunity. In this scenario, the sales rep has Read/Write permissions, which means they can:
✑ View and update the opportunity, including editing fields like the opportunity stage.
✑ They cannot perform administrative tasks like transferring ownership or managing the opportunity team unless explicitly granted "Full Access" or assigned additional roles that permit these actions.
✑ Option A (Correct): Updating the opportunity stage is allowed as part of Read/Write access.
✑ Option B: Replacing the opportunity owner requires administrative privileges, which are not included in standard Read/Write permissions.
✑ Option C: Adding or removing members in the opportunity team requires "Full Access," which exceeds Read/Write permissions.
References:
✑ Opportunity Team Management
✑ Salesforce Sharing and Permissions Documentation

QUESTION 9

An architect has a requirement to create a criteria-based sharing rule based on the customer Social Security Number. However, when setting up the rule in Contact Sharing, the field is not shown on the list of available fields.
What is causing this issue?

Correct Answer: A
✑ Field-Level Encryption and Sharing Rules:
✑ Why Option A is Correct:
✑ Why Others Are Incorrect:
For further reference, see Salesforce Shield Platform Encryption documentation: https://help.salesforce.com/

QUESTION 10

Universal Containers (UC) uses a custom Lightning component with an Apex class to display shipment information (custom object, Private organization-wide default). UC sales managers are complaining about two important points: Shipment records that belong to their teams can be seen by other users. Shipment amount should be visible only by managers, but sales reps are able to view it.
Which feature did the development team miss that is causing the problems?

Correct Answer: B
✑ Field-Level Security in Apex: The isAccessible() method in Apex is used to verify whether a user has the necessary permissions to view a particular field. This ensures that users see only fields they are permitted to access based on their profile or permission set.
✑ Why Option B is Correct:
✑ Why Others Are Incorrect:
For detailed reference, see Salesforce Security Documentation: https://help.salesforce.com/