An administrator has created a flow that sends platform events whenever an opportunity is updated. An Apex developer has been tasked to write code that listens for these events. When reviewing the debug logs for a user, the developer can see that the flow ran, but the debug Information is missing.
What should the administrator recommend to assist with debugging?
When configuring a change set, which two practices should an administrator adhere to in order to ensure a successful deployment to production?
Choose 2 answers
The administrator at Cloud Kicks has been asked to delete a large number of quote line items. The/ receive a .csv fife with the record IDs to be deleted. The administrator uses Data Loader to delete them and selects Use Sulk APL When the job runs, every record shows an 'entity Is deleted' error In the error file that is created.
What is the reason for the error?
An administrator is Informed that an employee has Just resigned and needs all access removed Immediately. This user is the owner of 4,000 records and the sole recipient or 57 email alerts. Management will need at least a month to find a replacement. The email administrator has already revoked their email access.
What action should be taken to ensure the user's access is immediately revoked?
How should an administrator ensure the appropriate number of digits are entered Into the custom encrypted field created to capture credit card numbers on the Opportunity object?
The administrator at AW Computing has been asked to review whether any users are making configuration changes directly in production.
Which item should the administrator review to find these details?
Ursa Major Solar has a global customer base. Recent issues with customs have greatly delayed shipping to Canadian customers. While the Country field is already on the page layout, the sales team wants Canadian customers highlighted as a potential challenge for fulfillment until the shipping issue is resolved.
How should the administrator solve this issue?
Cloud Kicks needs to track government-issued identification numbers for its customers. The security team requires that the identification number cannot changed by users and must be masked when displayed, except the last two digits.
Which two recommended configurators should administrator create? Choose 2 answers