1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
4 years ago
11

An administrator has created a new custom object in a sandbox environment and now is ready to deploy in production. How can the

administrator ensure that the field-level security that was tested and approved in the sandbox environment is maintained as part of the deployment? a) Create a change set that includes the custom object and all custom fields b) Create a change set that includes the custom object and all profiles c) Create a change set that includes the custom object, check the retain field-level security option d) Create a change set for the custom object; use Data Loader to transfer field-level security
Computers and Technology
1 answer:
Vesnalui [34]4 years ago
5 0

Answer:

Option D

Explanation:

Option A is rejected because adding a custom object will cost both in memory and computation power. Consider that you have 1 million users, than there will be 1 million custom objects in the memory for checking the security which is not good.

Option B is not answer because again making a custom object will cost in memory and computation power.

Option C is not good because it also makes the custom object.

Option D is selected because change sets can be made which will not cost as much as the other options are costing. Also Data Loader can have come credentials defined in it which we can use to check if the user activities are according to the rules at each level.These days these data loader object technique is used because there will be static change sets for the class of users to check security.

You might be interested in
Which of these is an example of gathering secondary data?
Soloha48 [4]

Answer:

searching for a chart

Explanation:

:)

7 0
3 years ago
The Leal button is located in the
Fed [463]
The button is located on the left side of the gear shift right under the main shift button
7 0
3 years ago
GUYSSS!!!
otez555 [7]
Yea, I don’t think you can fix it unless you backed it up or something somehow...
8 0
3 years ago
Read 2 more answers
Which of the following statements about renting and owning
laila [671]
Renting means you sign a contract or a lease to live their owning means you bought the house and pay mortgage <span />
5 0
4 years ago
Que es la papirofobia​
PilotLPTM [1.2K]

Answer:

Aporofobia : temor obsesivo a la pobreza y de gente pobre.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Explain what the 35ppm specification means
    13·1 answer
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
    12·1 answer
  • Which technology forms the foundation for cloud computing? forms the foundation for cloud computing.
    12·2 answers
  • Free wifi is typically offered on an <br> a) unencrypted<br> b) encrypted<br> c) open<br> d) private
    14·2 answers
  • Consider a classful IPv4 address 200.200.200.200? What is its implied subnet mask? If we take the same address and append the CI
    12·1 answer
  • Which of the following would most likely be the target audience for a product
    7·2 answers
  • Which support function under Tech Mahindra is governing data privacy and protection related requirements
    15·1 answer
  • Computer science - algorithms - flowcharts
    11·1 answer
  • Thirty percent of a magazine's subscribers are female. A random sample of 50 subscribers Answer the following questions using Ex
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!