The Einstein Analytics team at a company created a clataset based on the Opportunity__c custom object.
The VP of Sales reports seeing the message "No results found" when opening the dataset to explore it.
Other users below the VP in the role hierarchy can see rows on the same dataset.
Which two problems might be causing this issue?
A. The Salesforce profile for the VP does not have read permission on some fieldsof the Opportunity__c custom object
B. The Security Predicates set up at the dataset level are preventing the VP from seeing data
C. The dataset is inheriting sharing from Salesforce and the VP can see more than 3000 rows
D. The Salesforce profile for theVP does not have read permission on the Opportunity__c custom object
What kind of insight is "What Is The Difference"?
A. Descriptive
B. Diagnostic
C. Predictive
D. Prescriptive
E. Selective
What is a valid permission for a permission set?
A. Enable Parental Control
B. Always Sign Me Up for Dreamforce
C. Sales Analytics Apps
D. Access Sales Cloud Analytics Templates and Apps
A client has a dashboard for Sales Managers. They want to have a list filter that shows the name of the month. However, based on the "CloseDate_Month" field, the list filter showsnumbers instead of names.
How can an Einstein Consultant use the Dataflow nodes to generate the name of month as a new dimension in the dataset?
A. flatten
B. compute Relative
C. compute Expression
D. append
A company created a dataset called myExternalDataset. It contains a dimension, called UserRegion, that is populated by the standard User object's picklist: Region.
The company has security requirementsfor this dataset:
1.
Only a subset of users should be able to access the dataset.
2.
Users who can access the dataset should see only data that belongs to their region.
In which two ways can an Einstein Analytics consultant help them implement these requirements? Choose 2 answers
A. Save the dataset under "My Private App" so only a subset of selected users can access the dataset.
B. Use a security predicate in the dataset so users can see only rows belonging to their respective regions.
C. Create asharing rule in Salesforce based on the Region field in the user object and set the dataset to inherit sharing from Salesforce.
D. Save the dataset under a new application and give "viewer" access to a public group containing the list of users allowed to see the dataset.
An Einstein Discovery team created a model to maximize the margin of their sales opportunities. They want to deploy the model to the Opportunity object in order to predict the outcome of every newly created or updated Opportunity.
What are the steps to accomplish this?
A. Create a trigger on Opportunity and use the Salesforce External Connector to get predictions from Einstein Discovery.
B. Create an Apex batch on Opportunity and use the REST API to get predictions from Einstein Discovery.
C. Create a trigger on Opportunity and install the Einstein Discovery Writeback managed package from the AppExchange.
D. Create a trigger on Opportunity and use the REST API to get predictions from Einstein Discovery.
Which statement best describes how to ensure Einstein Analytics dashboards are easily used across both desktop and mobile devices?
A. Create multiple layouts, and reorder all the widgets so that they fit nicely within the new default width.
B. Create a single layout and allow Einstein Analytics to automatically organize dashboard contents to be optimal for the device type.
C. Create a single layout and reorder all the widgets so that they fit nicely when viewing on either device.
D. Create multiple layouts, ensure the layout selectors match the device, and resize/hide widgets as necessary to ensure the content is appropriate for the device screen size.
What is another name for the type of insight that examines how one variable explains variation of the outcome variable?
A. Third-order analysis
B. Object-oriented analysis
C. Second-order analysis
D. First-order analysis
E. Spectrum analysis
An Einstein Analytics team reports that when they start their dataflow it runs successfully with no errors or warnings, but one of the fields does not return values when it is queried.
What can be the origin of this issue7
A. Thefield does not contain any data in Salesforce.
B. The user who runs the dataflow does not have access to the field.
C. The "Integration User Profile" does not have access to the field.
D. The ""Security User Profile" does not have access to the field.
Which isn't an option for setting a security predicate for a dataset created from an external data file?
A. In the metadata file associated with the external data file using the rowLevelSecurityFilter key
B. In the Register transformation node of a dataflow that uses this dataset
C. In the dataset Security Predicate
D. On each row prior to upload