New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce DEX-450 Exam - Topic 3 Question 6 Discussion

Actual exam question for Salesforce's DEX-450 exam
Question #: 6
Topic #: 3
[All DEX-450 Questions]

Universal Containers implemented a private sharing model for the Account object. A custom Account search tool was developed with Apex to help sales representatives find accounts that match multiple criteria they specify. Since its release, users of the tool report they can see Accounts they do not own. What should the developer use to enforce sharing permission for the currently logged-in user while using the custom search tool?23wa

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Cory
4 months ago
Isn't it better to check access with UserInfo instead? Just a thought!
upvoted 0 times
...
Tonette
4 months ago
Using without sharing would just open up a can of worms.
upvoted 0 times
...
Hillary
4 months ago
Wait, can they really see accounts they don’t own? That seems off.
upvoted 0 times
...
Kayleigh
4 months ago
Totally agree, with sharing is essential here!
upvoted 0 times
...
Shayne
4 months ago
I think option D is the way to go.
upvoted 0 times
...
Elli
5 months ago
I believe the "with sharing" keyword is the right choice here, but I wonder if there are any other factors we need to take into account when implementing it in the search tool.
upvoted 0 times
...
Lindy
5 months ago
I’m a bit confused about the UserInfo class. I feel like it could help filter records, but I’m not sure if it’s the best approach for enforcing sharing permissions.
upvoted 0 times
...
Berry
5 months ago
I think we practiced a question similar to this, and I recall that using "without sharing" would actually expose more records than intended, which doesn't help in this case.
upvoted 0 times
...
Aja
5 months ago
I remember we discussed the importance of using the "with sharing" keyword to enforce sharing rules, but I'm not entirely sure if that's the only thing we need to consider here.
upvoted 0 times
...
Cruz
5 months ago
I'm leaning towards organizational budget as the biggest factor. Without sufficient funding, it's going to be really difficult to properly implement any kind of security governance model.
upvoted 0 times
...
Nidia
5 months ago
I believe moral framing isn't a good approach. We studied that confessions gained under duress might be unreliable, which makes option A a poor choice.
upvoted 0 times
...
Arlene
5 months ago
This looks like a tricky security question. I'll need to carefully read through the details and think through the different options.
upvoted 0 times
...
Kenneth
5 months ago
This seems pretty straightforward. The question is asking about the term that best describes the risk management capability implemented by the CISO, so I'll carefully consider each option.
upvoted 0 times
...
Delisa
5 months ago
I think decreasing scaling thresholds just makes it reactive, while we need to be proactive by preparing instances ahead of time, right?
upvoted 0 times
...

Save Cancel