AW Computing has a 4-hour SLA in its support guarantee. The company recently received feed that customers art reporting long wait times before an agent responds to a new case after it has been submitted.How should an administrator ensure cases are properly prioritized?
Answer(s): B
Escalation rules are rules that automatically escalate cases if they have not been resolved within a certain time frame or meet certain criteria such as priority or status. Escalation rules can perform actions such as changing ownership of cases, sending email notifications, or creating tasks for users or queues. By using escalation rules, AW Computing can ensure that cases are properly prioritized and handled within their SLA time limit.
https://help.salesforce.com/s/articleView?id=sf.case_escalation_rules_overview.htm&type=5
Answer(s): C
Escalation rules are rules that automatically escalate cases if they have not been resolved within a certain time frame or meet certain criteria such as priority or status. Escalation rules can perform actions such as changing ownership of cases, sending email notifications, or creating tasks for users or queues. By using escalation rules, AW Computing can ensure that cases are properly prioritized and handled within their SLA time limit.Assignment rules are rules that automatically assign cases to users or queues based on criteria such as case origin, type, or product. Assignment rules can also send email notifications to users or customers when a case is assigned. By using assignment rules, AW Computing can ensure that cases are routed to the right agents or teams based on their skills and availability.
https://help.salesforce.com/s/articleView?id=sf.case_escalation_rules_overview.htm&type=5 https://help.salesforce.com/s/articleView?id=sf.customize_caseassign.htm&type=5
A user started to work remotely. They are having an Issue logging in.What could be the issue?
Answer(s): D
IP ranges are settings that restrict login access to Salesforce from specific IP addresses. Administrators can set IP ranges at the org level or at the profile level. If a user tries to log in from an IP address that is outside the allowed range for their profile or their org, they will not be able to access Salesforce. Therefore, if a user started to work remotely and is having an issue logging in, it could be because they are not in the IP range for their profile or their org.
https://help.salesforce.com/s/articleView?id=sf.security_networkaccess.htm&type=5
The administrator at Universal Containers does a soft launch of the Salesforce Authenticator app and allows users to optionally use it to log In. The administrator would now like to look at how many users have successfully used it since It was rolled out.What are two ways the administrator can get this Information? Choose 2 answers
Answer(s): A,D
Salesforce Authenticator is an app that adds an extra layer of security for logging into Salesforce by requiring users to verify their identity using their mobile device after entering their username and password on Salesforce login page. To see how many users have successfully used Salesforce Authenticator since it was rolled out, an administrator can use two methods:A) Create a new view In Identity Verification History, specifying Method. Identity Verification History is a tool that shows information about each identity verification event for users in your org, such as the date and time, the verification method used, the IP address, and the status of the verification. By creating a new view in Identity Verification History and specifying the method as Salesforce Authenticator, an administrator can see how many users have used the app to verify their identity when logging in.
https://help.salesforce.com/s/articleView?id=sf.identity_verification_history.htm&type=5 D) Export Login History and filter based off of Authentication Method Reference. Login History is a tool that shows information about each login attempt for users in your org, such as the date and time, the username, the source IP address, the login type, and the status of the login.By exporting Login History as a CSV file and filtering based on the Authentication Method Reference column, an administrator can see how many users have used Salesforce Authenticator as their authentication method when logging in.https://help.salesforce.com/s/articleView?id=sf.monitoring_login_history.htm&type=5
DreamHouse Realty manages Its accounts and contacts In Salesforce using a B2C account model. The business has requested that third-party loan advisors be tracked in Salesforce along with the customers they work with.Hour should the administrator track third-party financial advisors and the customers they work with?
Contacts to Multiple Accounts is a feature that allows administrators to relate a contact to multiple accounts without creating duplicate contacts for each account. This feature is useful for scenarios where a contact has business relationships with more than one account, such as consultants, brokers, or loan advisors. By setting up Contacts to Multiple Accounts for loan advisors at DreamHouse Realty, administrators can track which loan advisors work with which customers and which accounts without creating duplicate contacts for each account.
https://help.salesforce.com/s/articleView?id=sf.contacts_multiple_accounts_overview.htm&type=5
Post your Comments and Discuss Salesforce ADX-201E exam dumps with other Community members:
CREATE TABLE new_table CLONE old_table;
CREATE DATABASE new_db CLONE old_db;
CREATE SCHEMA new_schema CLONE old_schema;
CREATE FILE FORMAT new_format CLONE old_format;
SECURITYADMIN
SYSADMIN
ACCOUNTADMIN
PUBLIC
__name__
'__main__'
ClassB.__bases__
ClassB
"<class 'Object'>"
'Object'
__module__
ClassA
'ClassA'
DynamoDB
S3
Cognito
RDS
EFS
/sbin/init
/etc/inittab
/etc/rc.d
/etc/init.d
/lib/init.so
/etc/rc.d/rcinit
/proc/sys/kernel/init
/boot/init
/bin/init
Amazon S3 Intelligent-Tiering
S3 Lifecycle
S3 Glacier Flexible Retrieval
Amazon Athena
Amazon EFS
EC2 instance store
ElastiCache for Redis
S3 Glacier Deep Archive
AWS Lake Formation
Amazon EMR Spark jobs
Amazon Kinesis Data Streams
Amazon DynamoDB
Defender for Endpoint
Defender for Identity
Defender for Cloud Apps
Defender for Office 365
Our website is free, but we have to fight against AI bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the ADX-201E content, but please register or login to continue.