Buffer Overflow (38.5.3) Buffers are memory areas allocated to an application. A buffer overflow occurs when data is written beyond the limits of a buffer. By changing data beyond the boundaries of a buffer, the application can access memory allocated to other processes. This can lead to a system crash or data compromise, or provide…
Selecting the right charting option – Certified Advanced Salesforce Admin Exam Guide
Selecting the right charting option In the previous chapter, we saw some different ways to create a chart, and dashboard charts are no different. Indeed, we can create bar charts, stacked bar charts, line charts, donut charts, funnel charts, and scatter charts. Gauge and Metric charts are not available on the report charting options. The…
Filtering dashboards – Certified Advanced Salesforce Admin Exam Guide
Filtering dashboards Before talking about filtering a dashboard, let’s see the previous dashboard from the Save As action. Create a new Sales Amazing Dashboard, which will cover only opportunity-related stuff (I’ve added a simple metric component that shows the number of opportunities for the current year): Dashboard created by cloning another dashboard using the Save…
Application Attacks – 100-150 Exam Study Guide
Application Attacks (38.5) Applications are also vulnerable to attacks. This section explores some of the more common attacks and how they can best be mitigated. Cross-Site Scripting (38.5.1) Attacks carried out through web applications are becoming increasingly common. Threat actors exploit vulnerabilities in the coding of a web-based application to gain access to a database…
Subscribing to a dashboard – Certified Advanced Salesforce Admin Exam Guide
Subscribing to a dashboard Dashboards are not refreshed every time we open them; that’s the reason behind the refresh button. Like reports, we can enable users to subscribe to the dashboard to refresh them automatically and receive the results by mail. We can create a daily recap of the status of the call center (unclosed…
Radio Frequency Jamming – 100-150 Exam Study Guide
Radio Frequency Jamming (38.4.3) Wireless signals are susceptible to electromagnetic interference (EMI), radio frequency interference (RFI), and even lightning strikes or noise from fluorescent lights. Attackers can take advantage of this fact by deliberately jamming the transmission of a radio or satellite station to prevent a wireless signal from reaching the receiving station. To successfully…
Automation with Workflows – Certified Advanced Salesforce Admin Exam Guide
Automation with Workflows Before closing this book, we’ll dive into process automation and show the main features for providing a highly efficient process design. In this chapter, we’ll see what process automation is and which tools the Salesforce platform delivers for an administrator to enhance process automation; then we’ll focus on workflow rules, a platform…
Building workflow rules – Certified Advanced Salesforce Admin Exam Guide
Building workflow rules If you are on your path to become an advanced administrator, I assume you are already familiar workflows. As a quick reminder, workflows are the oldest tool available on the Salesforce platform to run automations in an organization. This feature is a so-called if/then statement tool, which means that if a condition…
Defending Against Attacks – 100-150 Exam Study Guide
Organizations can take several steps to defend against various attacks. These include the following: Check Your Understanding—Cyber Attacks (38.3.13)Refer to the online course to complete this activity. Wireless and Mobile Device Attacks (38.4)Protecting wireless and mobile devices present their own challenges. This section discusses many of these attacks and how to prevent them. Grayware and…
Layer 2 Attacks – 100-150 Exam Study Guide
Layer 2 Attacks (38.3.6)Layer 2 refers to the data link layer in the Open Systems Interconnection (OSI) data communication model.This layer is used to move data across a linked physical network. IP addresses are mapped to each physical device address (also known as media access control [MAC] address) on the network, using a procedure called…