Sharing-and-Visibility-Architect Practice Test Questions

Total 77 Questions


Last Updated On : 2-Jun-2025



Preparing with Sharing-and-Visibility-Architect practice test is essential to ensure success on the exam. This Salesforce SP25 test allows you to familiarize yourself with the Sharing-and-Visibility-Architect exam questions format and identify your strengths and weaknesses. By practicing thoroughly, you can maximize your chances of passing the Salesforce certification spring 2025 release exam on your first attempt.

Surveys from different platforms and user-reported pass rates suggest Sharing-and-Visibility-Architect practice exam users are ~30-40% more likely to pass.

A banking company wants their customers Date of Birth Field searchable by Banking Reps, but only editable by Customer Support Reps.
Which approach is recommended to meet this requirement?



A. Create 2 Validation rule in the Data of Birth field so the rule returns true only when user.profilename matches Customer Support Rep.


B. Set the Field Level Security for the Date of Birth field to be Visible to Customer Support Rep Profile, and set the Date of Birth field Visible and Readonly to Banking Rep profile.


C. Add Date of Birth field to the Search layout of the Contact Object. Modify the Page layout assigned to Customer Support Rep and add Date of Birth field as Required.





B.
  Set the Field Level Security for the Date of Birth field to be Visible to Customer Support Rep Profile, and set the Date of Birth field Visible and Readonly to Banking Rep profile.

Explanation:

Field Level Security (FLS) controls whether a field is visible or editable for users based on their profile or permission sets. To meet the requirement, the field must be searchable and visible to Banking Reps but not editable. Setting the Date of Birth field as Visible but Read-Only for Banking Reps allows them to search and view the field without editing capability. Meanwhile, the Customer Support Reps' profile can have the field set as Visible and Editable. Validation rules are more suited to enforcing complex logic but are not ideal for simple access control, as they cannot control searchability. Adding the field to the search layout ensures searchability but does not enforce edit permissions. Hence, adjusting FLS is the recommended, declarative, and secure approach.

Universal Containers is planning to pilot a new application to a small set of sales reps. What is the optimal way to grant only those sales reps access to the new functionality,
while hiding the legacy functionality?



A. Clone the Sales Rep profile, adjust settings, and assign the pilot users the new profile.


B. Revoke access to legacy functions in the Sales Rep profile and create a permission set for the new functionality.


C. Create a permission set to grant access to the new functionality and hide the old functionality.





A.
  Clone the Sales Rep profile, adjust settings, and assign the pilot users the new profile.

Explanation:

Profiles define a user’s baseline permissions and visible apps/tabs. Cloning the existing Sales Rep profile allows you to create a customized profile where you can enable the new functionality and remove legacy app visibility or permissions. This method cleanly separates users and controls UI elements effectively. Using permission sets to add new functionality (option B or C) can grant access but cannot hide legacy features already assigned via the profile. Profiles remain the fundamental way to restrict or grant access to core app functions and visibility.

Universal Containers implemented Sales Cloud and requested that sales agents have access to products and prices the company sells, and to be able to createopportunities for its customers.
What should the organization-wide defaults be for pricebook?



A. Public Read-Only


B. View


C. Use





A.
  Public Read-Only

Explanation:

For sales agents needing access to products and prices with ability to create opportunities, "Public Read-Only" is the correct organization-wide default for pricebooks. This setting allows all users to view pricebooks (required for seeing products and prices) while preventing unauthorized edits, as only users with "Manage Price Books" permission can modify them. "View" (Option B) isn't a valid pricebook sharing option. "Use" (Option C) would allow editing pricebooks, which exceeds the requirement. Public Read-Only strikes the right balance - sales agents can reference pricebooks when creating opportunities without risking unauthorized changes to pricing data. This aligns with the principle of least privilege while meeting business requirements. The solution also scales well as the sales team grows and maintains data integrity by preventing accidental modifications to critical pricing information. Additional control can be layered through permission sets if specific users need edit access.

Which functionality does the system method "runAs()" verify when writing test methods?



A. Enforcement of s user's record sharing


B. Enforcement of a user's Field Level Security


C. Enforcement of a user's permissions





A.
  Enforcement of s user's record sharing

Explanation:

The runAs() system method in Apex test classes primarily verifies enforcement of a user's record sharing settings (Option A). When testing with runAs(), the system executes code with the specified user's sharing context, allowing verification of sharing rules, role hierarchy, and manual sharing. While it runs in the user's context, it doesn't fully enforce Field-Level Security (Option B) - field accessibility must be tested separately. It also doesn't verify all user permissions (Option C) as some permissions like API access aren't restricted in test context. The primary purpose of runAs() is to test record-level visibility, crucial for validating sharing models in private or controlled org-wide defaults. This enables comprehensive testing of security models without requiring actual user logins. Developers use runAs() to ensure records are properly shared or restricted according to org sharing settings, making it an essential tool for testing sharing and visibility requirements in complex implementations with multiple user types and access levels.

An architect from a previous project implemented Platform Shield Encryption for a company. However, based on a recent audit, the company's Privacy Team identified three additional fields in their Account Records (Billing Street, BillingCity and Phone) that needs to be secure and protected.
How should an architect proceed with this new policy change?



A. Use Classic Encryption toensure all fields are protected and contact Salesforce for help with encryption verification.


B. Use Encryption Policy and wait for an email from Salesforce indicating the field values are encrypted.


C. Use Encryption Policy and contact Salesforce to update the existing records so that their field values are encrypted.





C.
  Use Encryption Policy and contact Salesforce to update the existing records so that their field values are encrypted.

Explanation:

For adding new fields to Platform Shield Encryption, Option C is correct. The proper process is to use Encryption Policy to select the new fields (Billing Street, Billing City, and Phone) and then contact Salesforce to encrypt existing records, as historical data isn't automatically encrypted. Option A is incorrect because Classic Encryption is deprecated and shouldn't be mixed with Platform Encryption. Option B is incomplete because while Encryption Policy defines what to encrypt, it doesn't address existing data encryption without Salesforce assistance. Platform Encryption requires a specific implementation process: 1) Define encryption policy for new fields, 2) Deploy changes, 3) Contact Salesforce Support to encrypt existing records, as this operation requires backend processing. This approach maintains consistency with the existing encryption implementation while expanding protection to the newly identified sensitive fields. It also ensures compliance with the audit requirements by properly securing all historical data in the newly identified fields, not just future entries. The solution follows Salesforce best practices for encryption expansion projects.

Universal Containers created a public group with certain sales engineers to help on complex deals, as well as a sharing rule to grant access to these opportunities. The Opportunity organization-wide default is Private.
What is the impact of these sharing settings?



A. Sales engineers and their managers in the Role Hierarchy will also have access to these records.


B. Subordinates of managers who have sales engineersin the public group will also have access to these records.


C. Other sales engineers who are in the same Role Hierarchy as the sales engineers of the public group will also have access to these records.





A.
  Sales engineers and their managers in the Role Hierarchy will also have access to these records.

Explanation:

With Opportunity OWD set to Private and a sharing rule granting access to a public group of sales engineers, Option A correctly identifies that managers in the role hierarchy will also gain access. In Salesforce's sharing model, when records are shared with users (in this case via public group membership), those users' managers in the role hierarchy automatically gain equal or greater access. This is a fundamental aspect of Salesforce's role hierarchy behavior. Option B is incorrect because subordinates don't inherit access upwards. Option C is wrong because merely being in the same role hierarchy doesn't grant access - the sharing must be explicit or through hierarchy. The scenario demonstrates how sharing rules combine with role hierarchy to determine access. Organizations must consider this behavior when designing sharing models, especially with private OWD settings. It's often desirable as it allows managerial oversight, but can lead to unintended access if not properly planned for during security design.

Universal1 Containers (UC) is a non-profit organization with more than 20,000,000 members (donors). UC decided to assign those accounts to donations reps based on their regions. Donations reps ended up owning more than 50,000donors each. The donation reps started to see significant degradation of the system performance.
What is the reason for this problem?



A. There is an Account ownership data skew problem.


B. The donations reps' access to the assigned accounts is wrong.


C. Salesforce sharing recalculation kicked off.





A.
  There is an Account ownership data skew problem.

Explanation:

The performance degradation is caused by an account ownership data skew problem (Option A). When individual users own more than 10,000 records (in this case 50,000+ donors each), Salesforce experiences performance issues due to sharing table calculations. This is a well-documented limit in Salesforce architecture. Option B is incorrect because access being "wrong" wouldn't necessarily cause performance degradation. Option C is inaccurate because while sharing recalculations occur, they're a symptom not the root cause. The core issue is the data model assigning too many records to single users, violating Salesforce best practices for data distribution. Solutions include: implementing account teams to distribute access without transferring ownership, using territory management, or revising the assignment rules to better balance record ownership. The situation highlights the importance of considering data skew during design phases for large-volume objects, especially when implementing ownership-based sharing models. Performance can be maintained by ensuring no single user owns excessive records and that data is evenly distributed across the user base.

Universal Containers (UC) has a team that analyzes customer orders looking for fraud. This team needs access to Invoice records (custom object, Private organization-wide default). UC has complex rulesto control users’ access. Thearchitect recommended using Apex managed sharing to meet these requirements.
Which recommendation should a developer consider when implementing the changes?



A. Use "Without Sharing” keyword to make sure record visibility will be considered.


B. Use "With Sharing” keyword to enforce Field-Level Security.


C. Use runAs system method to test different users accessing these records.





C.
  Use runAs system method to test different users accessing these records.

Explanation:

For testing Apex managed sharing implementations, Option C is correct - using runAs() to test different user contexts is essential. This allows verification that sharing works as intended for various user profiles. Option A is incorrect because "Without Sharing" would ignore sharing rules entirely, contrary to the requirement. Option B is wrong because "With Sharing" enforces record-level security, not Field-Level Security. When implementing Apex managed sharing, developers should: 1) Create sharing records programmatically based on business rules, 2) Use runAs() in test classes to verify visibility from different user perspectives, and 3) Ensure tests cover both positive and negative cases (users who should and shouldn't have access). This approach provides comprehensive testing of the complex sharing requirements while maintaining security. The solution supports the audit team's need for controlled access to private Invoice records while allowing for flexible, rule-based sharing that can evolve with the company's fraud detection processes. Proper testing with runAs() ensures the implementation meets all security requirements.

Besides their own team accounts, sales managers at Universal Containers (UC) need Read access to all accounts of the same segment in other countries. Role Hierarchy was implemented accordingly (based on countries), but a sales manager inthe U.S. is complaining that he cannot view account records of the same segment in Canada.
What should UC do to grant access properly?



A. Create an owner-based sharing rule to grant access to account records, that have the same segment, to all sales manager roles.


B. Create a public group and include all accounts of the same segment, and then grant access with a permission set.


C. Change the Role Hierarchy and put all the sales managers in the U.S. and Canada in the same role.





A.
  Create an owner-based sharing rule to grant access to account records, that have the same segment, to all sales manager roles.

Explanation:

To grant U.S. sales managers read access to same-segment Canadian accounts, Option A is correct - creating an owner-based sharing rule is the most appropriate solution. Sharing rules can grant access based on record characteristics (like segment) to entire roles or public groups, crossing hierarchy boundaries. Option B is less ideal as permission sets don't directly grant record access and maintaining public groups of accounts is cumbersome. Option C would break the logical country-based role hierarchy unnecessarily. Owner-based sharing rules are powerful tools for granting horizontal access across role hierarchies while maintaining the vertical hierarchy structure. The rule would: 1) Identify accounts by segment field, 2) Specify sales manager roles as recipients, and 3) Grant read access. This provides clean, maintainable access that automatically adjusts as accounts change segments or managers change roles. The solution respects the existing role hierarchy while meeting the business requirement for cross-border visibility within segments. It's also scalable if additional countries or segments are added later, and performs well because sharing rules are calculated asynchronously.

A consulting company uses the Salesforce mobile app for its field consultants and uses Case object to track customer specific consulting done by field consultants. The company also has a large number of customer servicerepresentatives who takes calls from customers on company issued desktops and uses case object to track customer issues and grievances. The company would like to capture images of customer site captured by field consultants while they are editingthe case record during customer site visit. The Director of IT wants to minimize customization and promote reuseability of code artifacts wherever possible.
What recommendations should an architect give to the company to implement the image capture requirement, while ensuring customer that the service rep can continue to use same lightning pages they were trained to use?



A. Use Lightning Component as an override for “Edit” action on mobile view allowing image capture feature. No Change required for desktop users.


B. Use Lightning Component as an override for “Edit” action on lightning experience allowing image capture feature. Detect the form factor of the device and redirect the user to the default notoverridden view.


C. Create a separate button “Edit in Mobile”, which opens a custom lightning component that will allow field consultants to add an image. No change required for desktop users.





A.
  Use Lightning Component as an override for “Edit” action on mobile view allowing image capture feature. No Change required for desktop users.

Explanation:

Option A provides the optimal solution by using a Lightning Component override specifically for mobile edit actions, requiring no changes for desktop users. This approach: 1) Minimizes customization by only modifying what's necessary, 2) Promotes reusability through Lightning Components, 3) Maintains existing desktop functionality exactly as is, and 4) Provides a tailored mobile experience. Option B is overcomplicated by attempting device detection in the component itself. Option C creates UI inconsistency by adding a separate button. The override solution cleanly separates mobile and desktop experiences at the action level, following Salesforce best practices for form-factor specific customization. The Lightning Component can encapsulate all mobile-specific functionality including image capture, while desktop users continue using their familiar interface unchanged. This solution also future-proofs the implementation as Salesforce continues enhancing mobile capabilities. It respects the requirement to minimize disruption to trained service reps while adding valuable functionality for field consultants in the most maintainable way possible. The component can be reused elsewhere if similar mobile-specific functionality is needed for other objects.

Page 2 out of 8 Pages
Sharing-and-Visibility-Architect Practice Test Home