8 thoughts on “ Salesforce Security Part 2 – System Security ”

  1. TYPO

    Login IP Ranges are restrictive and prevents a user from logging in without verification (or at all). From a security perspective, users could be ****completed***** blocked from accessing Salesforce unless they are within a verified IP range.

    It should be completely

    Like

  2. Nice article Brent. I believe in Spring ’16, some security feature was strengthened – my users seem to get asked to enter a security code more often than normal. Do you have any details on that?

    Like

  3. 22. In a master-child relationship between a standard object and custom object
    which of the following statements is NOT true? Please select two (2) items.
    a. The standard object is always the master
    b. The custom object is always the master
    c. The custom object is always a child
    d. The standard or custom object can be a master
    e. The standard object is never a child

    I think it is a and b
    would appreciate some help on the same.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.