Salesforce-Platform-Sharing-and-Visibility-Architect Exam Questions With Explanations

The best Salesforce-Platform-Sharing-and-Visibility-Architect practice exam questions with research based explanations of each question will help you Prepare & Pass the exam!

Over 15K Students have given a five star review to SalesforceKing

Why choose our Practice Test

By familiarizing yourself with the Salesforce-Platform-Sharing-and-Visibility-Architect exam format and question types, you can reduce test-day anxiety and improve your overall performance.

Up-to-date Content

Ensure you're studying with the latest exam objectives and content.

Unlimited Retakes

We offer unlimited retakes, ensuring you'll prepare each questions properly.

Realistic Exam Questions

Experience exam-like questions designed to mirror the actual Salesforce-Platform-Sharing-and-Visibility-Architect test.

Targeted Learning

Detailed explanations help you understand the reasoning behind correct and incorrect answers.

Increased Confidence

The more you practice, the more confident you will become in your knowledge to pass the exam.

Study whenever you want, from any place in the world.

Salesforce Salesforce-Platform-Sharing-and-Visibility-Architect Exam Sample Questions 2025

Start practicing today and take the fast track to becoming Salesforce Salesforce-Platform-Sharing-and-Visibility-Architect certified.

2774 already prepared
Salesforce Spring 25 Release
77 Questions
4.9/5.0

Universal Containers (UC) would like to store an encryption key within Salesforce for use in Apex code, but it does not want users to be able to see this confidential key. Users require the view setuppermission.
How can UC securely store the confidential key?

A. Create acustommetadata type that stores the encryption key. Make sure that only the admin profile has access to the custom metadata type so that end users cannot access the encryption key.

B. Create a protected custom metadata type that stores the encryption key. Package the protected custom metadata type with its associated records in an unlocked package. Install the package in the production org.

C. Create a protected custommetadata type that stores the encryption key. Package the protected custom metadata type with its associated records in a managed package. Install the package in the production org.

C.   Create a protected custommetadata type that stores the encryption key. Package the protected custom metadata type with its associated records in a managed package. Install the package in the production org.

Summary:
The requirement is to store a highly sensitive encryption key within Salesforce for use by Apex code while ensuring it is completely hidden from all users, including those with the "View Setup and Configuration" permission. Standard custom settings or metadata are visible to users with this permission. The solution must use a feature that enforces true secrecy, even from administrators viewing the setup interface.

Correct Option:

C. Create a protected custom metadata type that stores the encryption key.
Package the protected custom metadata type with its associated records in a managed package. Install the package in the production org. This is the only correct solution. A Protected Custom Metadata Type is a special type whose field values are encrypted and accessible only by Apex code that resides in the same managed package. Once installed, the key's value is hidden from the UI, the API, and all users, including system administrators. It is the most secure way to store secrets within Salesforce.

Incorrect Options:

A. Create a custom metadata type that stores the encryption key.
Make sure that only the admin profile has access to the custom metadata type so that end users cannot access the encryption key. This is incorrect because a standard (non-protected) Custom Metadata Type is not hidden. Any user with the "View Setup and Configuration" permission can see its records and field values through the Setup menu, regardless of profile or permission set assignments. It does not provide the required confidentiality.

B. Create a protected custom metadata type that stores the encryption key.
Package the protected custom metadata type with its associated records in an unlocked package. Install the package in the production org. This is incorrect because Protected Custom Metadata Types are only supported in Managed Packages. An Unlocked Package does not provide the container necessary to enforce the protection and secrecy of the metadata's values. The key would still be exposed.

Reference:
Salesforce Help: Protected Custom Metadata Types

Universal Containers would like to control access to records and objects according to the following business requirements: Sales users can view all accountrecords but only edit their own records. Sales managers can view all account records but only edit records of their team. Service users canview all account records thatare not marked with a RecordType of Prospect.
Which organization-wide default configuration should an architect recommend to fulfill these requirements?

A. Public Read Write

B. Public Read/Transfer

C. Private

C.   Private

Summary:
The business requirements specify complex, multi-layered access rules that differ by user role and record type. A permissive OWD like Public Read/Write would grant too much access by default, making it impossible to enforce the "edit their own" and "edit records of their team" restrictions. A Private OWD establishes the most restrictive baseline, allowing the architect to use sharing tools to carefully open up access according to the precise rules.

Correct Option:

C. Private.
This is the correct and only feasible starting point. A Private OWD ensures that, by default, users can only see and edit records they own. This strict baseline allows the architect to then use a combination of sharing tools to grant the specific, limited access required:

Sharing Rules: Can be used to grant "Read" access to all sales and service users for the appropriate accounts.

Role Hierarchy: Automatically grants sales managers "Read" access to their team's records.

Criteria-Based Sharing: Can grant service users "Read" access to accounts where RecordType != Prospect.

Incorrect Options:

A. Public Read/Write:
This is incorrect because it violates the core requirement. If the OWD is Public Read/Write, all sales users would be able to edit all account records, which directly contradicts the rule that they should "only edit their own records." It is impossible to restrict edit access to only owned records with this OWD.

B. Public Read/Transfer:
This is also incorrect for the same fundamental reason as option A. While less common, this setting still allows all users to edit all records (the "Transfer" part relates to ownership transfers). It does not provide the restrictive baseline needed to enforce the "only edit their own/their team's" records requirement.

Reference:
Salesforce Help: Organization-Wide Sharing Defaults

Universal Containers has selected a small and diverse group of users to review inactive accounts. Given the Private sharing model, a public group was created and made available to this group of users. A sharing rule was created to makeinactive accounts visible to the public group. However, some of these users are reporting they do not see any of the accounts that were shared with the public group.
What is the underlying issue for these users?

A. The users are in profiles that have no access to the Account object.

B. The page layout assigned to these users is different than the Account owner.

C. The accounts arc ownedby users higher in the Role Hierarchy.

A.   The users are in profiles that have no access to the Account object.

Summary:
This question highlights the foundational principle of the Salesforce sharing model: object-level permissions are checked before record-level permissions. A user must first have at least "Read" access to an object before any sharing rule, manual share, or team membership can grant them access to specific records. The sharing rule is correctly sharing records with the public group, but that is a record-level action that is being blocked at the object level for some users.

Correct Option:

A. The users are in profiles that have no access to the Account object.
This is the underlying issue. If a user's profile does not grant the "Read" permission for the Account object, they are blocked from seeing any Account records, regardless of how many sharing rules exist. The sharing rule successfully adds them to the AccountShare table, but the system denies access because they fail the initial object-level security check.

Incorrect Options:

B. The page layout assigned to these users is different than the Account owner.
Page layouts control which fields are visible and how they are arranged on a record detail page. They do not control whether a user can see the record itself. If a user could see the record but not a specific field, the layout might be the cause, but the problem described is that they "do not see any of the accounts," which is a record visibility issue.

C. The accounts are owned by users higher in the Role Hierarchy.
This is not the issue. In a Private sharing model, the role hierarchy grants access to records owned by users below in the hierarchy. However, a sharing rule that shares records with a public group overrides this. Once a record is shared with a user via a sharing rule, they can see it regardless of the owner's position relative to them in the role hierarchy.

Reference:
Salesforce Help: How Object Permissions and Record Sharing Work Together

Universal Containers implemented Sales Cloud and requested that only certain branch staff trained to sell high-risk products can create opportunities for high-risk products.
How should an architect allow only specific branch staff to sell high-risk products?

A. Set the price book OWD to View Only and share the (High Risk) price book with the trained staff via manual sharing.

B. Set the price book OWD to View Only and share the (High Risk) price book with the trained staff via a sharing rule.

C. Set the price book organization-wide default (OWD) to View Only and share the price book (High Risk) with the trained staff.

C.   Set the price book organization-wide default (OWD) to View Only and share the price book (High Risk) with the trained staff.

Summary:
This question focuses on controlling which users can add products from a specific price book to opportunities. The requirement is to restrict the "High Risk" price book to a select group of trained staff. The solution involves a two-step process: first, restrict access for everyone at the organizational level, and then grant access specifically to the authorized group. Price book sharing is a specific function with its own settings.

Correct Option:

C. Set the price book organization-wide default (OWD) to View Only and share the price book (High Risk) with the trained staff.
This is the correct and complete answer. Setting the Price Book OWD to "View Only" prevents all users from adding products from any price book to an opportunity. The second, critical step is to explicitly share the specific "High Risk" price book with the public group or role containing the trained staff and grant them "Read/Write" or "Use" access, which overrides the OWD and allows them to add its products.

Incorrect Options:

A. Set the price book OWD to View Only and share the (High Risk) price book with the trained staff via manual sharing.
This is incorrect because manual sharing is for individual records, not for price books. Price books are shared through their own dedicated sharing settings, not through the manual share button on a record. This method is not possible or practical for a group of users.

B. Set the price book OWD to View Only and share the (High Risk) price book with the trained staff via a sharing rule. This is incorrect because there are no sharing rules for price books. Standard sharing rules are available for core objects like Accounts and Opportunities, but price book access is managed through its own specific OWD and manual user/group assignment interface, not through criteria-based or owner-based sharing rules.

Reference:
Salesforce Help: Control Access to Price Books

Universal Containers has implemented Customer Community with Customer Community Plus licenses for its distributors. Retail distributors have part-time agentswho work for multiple distributors. Those agents should have access to other distributor accounts as well.
What should be configured to grant agents access to different distributor accounts?

A. Create a sharing set to share distributor accounts with agents using account contact relationship.

B. Use Apex sharing to share distributor accounts with agents using the Account__Share table.

C. Create sharing rules to share distributor accounts with agents.

A.   Create a sharing set to share distributor accounts with agents using account contact relationship.

Summary:
This scenario involves external Community users (agents) who need access to Account records for multiple distributors they work with. The key is that these agents are not employees of Universal Containers but are linked to Accounts via the standard Contact object (as a person account or, more typically, as a Contact related to a Business Account). The solution must leverage this Account-Contact relationship to grant record access in a scalable, declarative way.

Correct Option:

A. Create a sharing set to share distributor accounts with agents using account contact relationship.
This is the correct and native tool for this specific use case. Sharing Sets are designed for Experience Cloud and use the relationship between a user (who is associated with a Contact) and an Account. By configuring a Sharing Set for the Customer Community Plus profile, you can automatically grant access to an Account record to any user whose associated Contact is linked to that Account, perfectly enabling the multi-distributor access for the agents.

Incorrect Options:

B. Use Apex sharing to share distributor accounts with agents using the AccountShare table.
While technically possible, this is a complex, custom-coded solution that is unnecessary. Salesforce provides Sharing Sets as a declarative, out-of-the-box feature specifically for granting account access to community users based on their contact relationship. Apex sharing would require significant development and maintenance effort where a standard configuration exists.

C. Create sharing rules to share distributor accounts with agents.
Standard sharing rules are primarily used for sharing records between internal users based on criteria, roles, or public groups. They are not the recommended or most efficient mechanism for granting access to external community users based on their contact relationship to an account. Sharing Sets are the purpose-built tool for this exact scenario.

Reference:
Salesforce Help: Sharing Sets

Prep Smart, Pass Easy Your Success Starts Here!

Transform Your Test Prep with Realistic Salesforce-Platform-Sharing-and-Visibility-Architect Exam Questions That Build Confidence and Drive Success!