Questions
Here are some questions to test your knowledge of this chapter:
- What is the purpose of app-level security in CRMA?
- How can you control CRMA security from Salesforce objects and field access?
- When a dataflow job runs, CRMA uses the permissions of ____________ user to extract data from Salesforce objects and fields.
- What are three limitations of Salesforce sharing inheritance?
- What are three use case scenarios for security predicates?
- A security predicate expression must not exceed how many characters?
- Is this is a valid predicate expression? Why, or why not?
"Revenue">100
- A security predicate expression is case-sensitive – true or false?