11.11 Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Salesforce > Identity and Access Management Designer > Identity-and-Access-Management-Architect

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Question and Answers

Question # 4

Universal containers(UC) wants to integrate a third-party reward calculation system with salesforce to calculate rewards. Rewards will be calculated on a schedule basis and update back into salesforce. The integration between Salesforce and the reward calculation system needs to be secure. Which are the recommended best practices for using Oauth flows in this scenario? Choose 2 answers

A.

Oauth refresh token flow

B.

Oauth SAML bearer assertion flow

C.

Oauthjwt bearer token flow

D.

Oauth Username-password flow

Full Access
Question # 5

A service provider (SP) supportsboth Security Assertion Markup Language (SAML) and OpenID Connect (OIDC).

When integrating this SP with Salesforce, which use case is the determining factor when choosing OIDC or SAML?

A.

OIDC is more secure than SAML and therefore is the obvious choice.

B.

B. The SP needs to perform API calls back to Salesforce on behalf of the user after the user logs in to the service provider.

C.

If the user has a session on Salesforce, you do not want them to be prompted for a username and password when they login to theSP.

D.

They are equivalent protocols and there is no real reason to choose one over the other.

Full Access
Question # 6

A global fitness equipment manufacturer is planning to sell fitness tracking devices and has the following requirements:

1) Customer purchases the device.

2) Customer registers the device using their mobile app.

3) A case should automatically be createdin Salesforce and associated with the customer’s account in cases where the device registers issues with tracking.

Which OAuth flow should be used to meet these requirements?

A.

OAuth 2.0 Asset Token Flow

B.

OAuth 2.0 Username-Password Flow

C.

OAuth 2.0User-Agent Flow

D.

OAuth 2.0 SAML Bearer Assertion Flow

Full Access
Question # 7

Universal containers (UC) uses a legacy Employee portal for their employeesto collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides topush ideas posted on the Employee portal to salesforce through API. UC decides to usean API user using Oauth Username - password flow for the connection. How can the connection to salesforce be restricted only to the employee portal server?

A.

Add the Employee portals IP address to the Trusted IP range for the connected App

B.

Use a digital certificate signed by the employee portal Server.

C.

Add the employee portals IP address to the login IP range on the user profile.

D.

Use a dedicated profile for the user the Employee portal uses.

Full Access
Question # 8

Universal Containers (UC) is both a Salesforce and Google Apps customer. The UC IT team would like to manage the users for both systems in a single place to reduce administrative burden. Which two optimal ways can the IT team provision users and allow Single Sign-on between Salesforce and Google Apps ? Choose 2 answers

A.

Build a custom app running on Heroku as the Identity Provider that can sync user information between Salesforce and Google Apps.

B.

Use a third-party product as the Identity Provider for both Salesforce and Google Apps and manage the provisioning from there.

C.

Use Identity Connect as the Identity Provider for both Salesforce and Google Apps and manage the provisioning from there.

D.

UseSalesforce as the Identity Provider and Google Apps as a Service Provider and configure User Provisioning for Connected Apps.

Full Access
Question # 9

Universal Containers (UC) is implementing Salesforce and would like to establish SAML SSO for its users to log in. UC stores its corporate user identities in a Custom Database. The UC IT Manager has heard good things about Salesforce Identity Connect as an Idp, and would like to understand what limitations they may face if they decided to use Identity Connect in their current environment. What limitation Should an Architect inform the IT Manager about?

A.

Identity Connect will not support user provisioning in UC's current environment.

B.

Identity Connect will only support Idp-initiated SAML flows in UC'scurrent environment.

C.

Identity Connect will only support SP-initiated SAML flows in UC's current environment.

D.

Identity connect is not compatible with UC's current identity environment.

Full Access
Question # 10

Northern Trail Outfitters manages application functional permissions centrally as ActiveDirectory groups. The CRM_Superllser and CRM_Reportmg_SuperUser groups should respectively give the user the SuperUser and Reportmg_SuperUser permission set in Salesforce. Salesforce is the service provider to a Security Assertion Markup Language (SAML) identity provider.

Mow should an identity architect ensure the Active Directory groups are reflected correctly when a user accesses Salesforce?

A.

Use the Apex Just-in-Time handler to query standard SAML attributes and set permission sets.

B.

Use the ApexJust-in-Time handler to query custom SAML attributes and set permission sets.

C.

Use a login flow to query custom SAML attributes and set permission sets.

D.

Use a login flow to query standard SAML attributes and set permission sets.

Full Access
Question # 11

Universal Containers (UC) wants to integrate a third-party Reward Calculation system with Salesforce to calculate Rewards. Rewards will be calculated on a schedule basis and update back into Salesforce. The integration between Salesforce and the Reward Calculation System needs to be secure. Which are two recommended practices for using OAuth flow in this scenario. choose 2 answers

A.

OAuth Refresh Token FLow

B.

OAuth Username-Password Flow

C.

OAuth SAML Bearer Assertion FLow

D.

OAuth JWT Bearer Token FLow

Full Access
Question # 12

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

A.

Query using OpenIDConnect discovery endpoint.

B.

A Leverage OpenID Connect Token Introspection.

C.

Create a custom OAuth scope.

D.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

Full Access
Question # 13

Universal containers (UC) wants to implement Delegated Authentication for a certainsubset of Salesforce users. Which three items should UC take into consideration while building the Web service to handle the Delegated Authentication request? Choose 3 answers

A.

The web service needs to include Source IP as a method parameter.

B.

UC should whitelist all salesforce ip ranges on their corporate firewall.

C.

The web service can be written using either the soap or rest protocol.

D.

Delegated Authentication is enabled for the system administrator profile.

E.

The return type of the Web service method should be a Boolean value

Full Access
Question # 14

Northern Trail Outfitters (NTO) is planning to roll out a partner portal for its distributors using Experience Cloud. NTO would like to use an externalidentity provider (idP) and for partners to register for access to the portal. Each partner should be allowed to register only once to avoid duplicate accounts with Salesforce.

What should a identity architect recommend to create partners?

A.

On successful creation of Partners using Self Registration page in Experience Cloud, create identity in Ping.

B.

Create a custom page m Experience Cloud to self register partner with Experience Cloud and Ping identity store.

C.

Create a custom web page in the Portal and create users in the IdP and Experience Cloud using published APIs.

D.

Allow partners to register through the IdP and create partner users in Salesforce through an API.

Full Access
Question # 15

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application. Both Salesforce andthe billing application are accessed several times a day to manage customers. UC would like to configure single sign-on and leverageSalesforce as the identity provider. Additionally, UC would like the billing application to be accessible from Salesforce.A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

A.

salesforce Canvas

B.

Identity Connect

C.

Connected Apps

D.

App Launcher

Full Access
Question # 16

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months.

Which two connected app options need to be configured to fulfill this use case?

Choose 2 answers

A.

Set Permitted Users to "Admin approved users are pre-authorized".

B.

Set Permitted Users to "All users may self-authorize".

C.

Setthe Session Timeout value to 3 months.

D.

Set the Refresh Token Policy to expire refresh token after 3 months.

Full Access
Question # 17

Universal containers (UC) has implemented a multi-org strategy and would like to centralize the management of their salesforce user profiles. What should the architect recommend to allow salesforce profiles to be managed from a central system of record?

A.

Implement jit provisioning on the SAML IDP that will pass the profile id in each assertion.

B.

Create an apex scheduled job in one org that will synchronize the other orgsprofile.

C.

Implement Delegated Authentication that will update the user profiles as necessary.

D.

Implement an Oauthjwt flow to pass the profile credentials between systems.

Full Access
Question # 18

Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?

A.

Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encryptthe payload.

B.

Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.

C.

Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate toencrypt the payload.

D.

Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.

Full Access
Question # 19

Universal containers (UC) has implemented SAML -based single Sign-on for their salesforce application. UC is using PingFederate as the Identity provider. To access salesforce, Users usually navigate to a bookmarked link to my domain URL. What type of single Sign-on is this?

A.

Sp-Initiated

B.

IDP-initiated with deep linking

C.

IDP-initiated

D.

Web server flow.

Full Access
Question # 20

The security team at Universal containers(UC) has identified exporting reports as a high-risk action and would like to require users to be logged into salesforce with their active directory (AD) credentialswhen doing so. For all other uses of Salesforce, Users should be allowed to use AD credentials or salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with salesforce credentials?

A.

Use SAML Federated Authentication and Custom SAML jit provisioning to dynamically add or remove a permission set that grants the Export Reports permission.

B.

Use SAML Federated Authentication, treat SAML sessions as high assurance, and raise the session level required for exporting reports.

C.

Use SAML Federated Authentication and block access to reports when accesses through a standard assurance session.

D.

Use SAML Federated Authentication with a login flow to dynamically add or remove a permission set that grants the export reports permission.

Full Access
Question # 21

Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third-party system. However, UC quickly notices that changes to user roles in Salesforce are not getting synched to the third-party system. What is the most likely reason for this behavior?

A.

User Provisioning for Connected Apps does not support role sync.

B.

B. Required operation(s) was not mapped in User Provisioning Settings.

C.

The Approval queue for User Provisioning Requests is unmonitored.

D.

Salesforce roles have more than three levels in the role hierarchy.

Full Access
Question # 22

Universal Containers (UC) has implemented SSO according to the diagram below. uses SAML while Salesforce Org1 uses OAuth 2.0. Users usually start their day by first attempting to log into Salesforce Org 2 and then later in the day, they will log into either the Financial System or CPQ system depending upon their job position. Which two systems are acting as Identity Providers?

A.

Financial System

B.

Pingfederate

C.

Salesforce Org 2

D.

Salesforce Org 1

Full Access
Question # 23

Universal Containers (UC) operates in Asia, Europe and North America regions. There is one Salesforce org for each region. UC is implementing Customer 360 in Salesforce and has procured External Identity and Customer Community licenses in all orgs.

Customers of UC use Community to track orders and create inquiries. Customers also tend to move across regions frequently.

What should an identity architect recommend to optimize license usage and reduce maintenance overhead?

A.

Merge three orgs into one instance of Salesforce. This will no longer require maintaining three separate copies of the same customer.

B.

Delete contact/account records and deactivate user if user moves from a specific region; Sync will no longer be required.

C.

Contacts are required since Community access needs to be enabled. Maintenance is a necessary overhead that must be handled via data integration.

D.

D. Enable Contactless User in all orgs and downgrade users from Experience Cloud license to External Identity license once users have moved out of that region.

Full Access
Question # 24

Universal Containers (UC) is looking to purchase a third-party applicationas an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose2 answers

A.

The Identity Provider can authenticate multiple applications.

B.

The Identity Provider can authenticate multiple social media accounts.

C.

The Identity provider can store credentials for multiple applications.

D.

The Identity Provider can centralize enterprise password policy.

Full Access
Question # 25

Universal Containers allows employees to use a mobile device to access Salesforce for daily operations using a hybrid mobile app. This app uses Mobile software development kits (SDK), leverages refresh token to regenerate access token when required and is distributed as a private app.

The chief security officer is rolling out an org wide compliance policy to enforcere-verification of devices if an employee has not logged in from that device in the last week.

Which connected app setting should be leveraged to comply with this policy change?

A.

Scope - Deny refresh_token scope for this connected app.

B.

Refresh Token Policy - Expire the refresh token if it has not been used for 7 days.

C.

Session Policy - Set timeout value of the connected app to 7 days.

D.

Permitted User - Ask admins to maintain a list of users who are permitted based on last login date.

Full Access
Question # 26

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet therequirements?

A.

OpenID Connect

B.

User Agent Flow

C.

JWT Bearer Token Flow

D.

Web Server Flow

Full Access
Question # 27

NorthernTrail Outfitters (NTO) leverages Microsoft Active Directory (AD) for management of employee usernames, passwords, permissions, and asset access. NTO also owns a third-party single sign-on (SSO) solution. The third-party party SSO solution is used for all corporate applications, including Salesforce.

NTO has asked an architect to explore Salesforce Identity Connect for automatic provisioning and deprovisioning of users in Salesforce.

What role does identity Connect play in the outlined requirements?

A.

Service Provider

B.

Single Sign-On

C.

Identity Provider

D.

User Management

Full Access
Question # 28

Which three are capabilities of SAML-based Federated authentication? Choose 3 answers

A.

Trust relationships between Identity Provider and Service Provider are required.

B.

SAML tokens can be in XML or JSON format and can be used interchangeably.

C.

Web applications with no passwords are more secure and stronger against attacks.

D.

Access tokens areused to access resources on the server once the user is authenticated.

E.

Centralized federation provides single point of access, control and auditing.

Full Access
Question # 29

An Identity architect works for a multinational, multi-brand organization. As they work with the organization to understand their Customer Identity and Access Management requirements, the identity architect learns that the brand experience is different for each of the customer's sub-brands and each of these branded experiences must be carried through the login experience depending on which sub-brand the user is logging into.

Which solution should the architect recommend to support scalability and reduce maintenance costs, if the organization has more than 150sub-brands?

A.

Assign each sub-brand a unique Experience ID and use the Experience ID to dynamically brand the login experience.

B.

Use Audiences to customize the login experience for each sub-brand and pass an audience ID to the community during the OAuthand Security Assertion Markup Language (SAML) flows.

C.

Create a community subdomain for each sub-brand and customize the look and feel of the Login page for each community subdomain to match the brand.

D.

Create a separate Salesforce org for each sub-brand so that each sub-brand has complete control over the user experience.

Full Access
Question # 30

Universal Containers (UC) has decided touse Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?

A.

Add each connected Appto the App Launcher with a Start URL.

B.

Set up an Auth Provider for each External Application.

C.

Set up Salesforce as a SAML Idp with My Domain.

D.

Set up Identity Connect to Synchronize user data.

E.

Create a Connected App for each external application.

Full Access
Question # 31

Universal Containers (UC) is building an integration between Salesforce and a legacy web application using the canvas framework. The security for UC has determined that asigned request from Salesforce is not an adequate authentication solution for the Third-Party app. Which two options should the Architect consider for authenticating the third-party app using the canvas framework? Choose 2 Answers

A.

Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC's IdP.

B.

Utilize Authorization Providers to allow the third-party application to authenticate itself against Salesforce as the Idp.

C.

Utilize Canvas OAuth flow to allow the third-party application to authenticate itself against Salesforce as the Idp.

D.

Create a registration handler Apex class to allow the third-party application to authenticate itself against Salesforce as the Idp.

Full Access
Question # 32

A group of userstry to access one of universal containers connected apps and receive the following error message: "Failed : Not approved for access". what is most likely to cause of the issue?

A.

The use of high assurance sections are required for the connected App.

B.

The users do not have the correct permission set assigned to them.

C.

The connected App setting "All users may self-authorize" is enabled.

D.

The salesforce administrators gave revoked the Oauth authorization.

Full Access
Question # 33

A multinational company is looking to rollout Salesforce globally. The company has a Microsoft Active Directory Federation Services (ADFS) implementation for the Americas, Europe and APAC. The company plans to have a single org and they would like to have all of its users access Salesforce using the ADFS . The company would like to limit its investments and prefer not to procure additional applications to satisfy the requirements.

What is recommended to ensure these requirements are met ?

A.

Use connected apps for each ADFS implementation and implement Salesforce site to authenticate users across the ADFS system applicable to their geo.

B.

Implement Identity Connect to provide single sign-on to Salesforce and federated across multiple ADFS systems.

C.

Add a central identity system that federates between the ADFS systems and integrate with Salesforce for single sign-on.

D.

Configure Each ADFSsystem under single sign-on settings and allow users to choose the system to authenticate during sign on to Salesforce-

Full Access
Question # 34

A company's external applicationis protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way.

What should be done to improve security?

A.

Select "Admin approved users arepre-authorized" and assign specific profiles.

B.

Create custom scopes and assign to the connected app.

C.

Define a permission set that grants access to the app and assign to authorized users.

D.

Leverage external objects and data classification policies.

Full Access
Question # 35

Northern Trail Outfitters mar ages functional group permissions in a custom security application supported by a relational database and a REST service layer. Group permissions are mapped as permission sets in Salesforce.

Which action should an identity architect use to ensure functional group permissionsare reflected as permission set assignments?

A.

Use a Login Flow to query SAML attributes and set permission sets.

B.

Use a Login Flow with invocable Apex to callout to the security application and set permission sets.

C.

Use the Apex Just-in-Time (JIT) handler to query the Security Assertion markup Language (SAML) attributes and set permission sets.

D.

Use the Apex JIT handler to callout to the security application and set permission sets

Full Access
Question # 36

An Identity and Access Management (IAM) Architect is recommending Identity Connect to integrate Microsoft Active Directory (AD) with Salesforce for user provisioning, deprovisioning and single sign-on (SSO).

Which feature of Identity Connect is applicable for this scenario?

A.

When Identity Connect is in place, if a user is deprovisioned in an on-premise AD, the user's Salesforce session Is revoked Immediately.

B.

If the number of provisioned users exceeds Salesforce license allowances, identity Connect will start disabling the existingSalesforce users in First-in, First-out (FIFO) fashion.

C.

Identity Connect can be deployed as amanaged package on salesforce org, leveraging High Availability of Salesforce Platform out-of-the-box.

D.

When configured, Identity Connect acts as an identity provider to both Active Directory and Salesforce, thus providing SSO as a default feature.

Full Access
Question # 37

A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.

What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

A.

Use a connected app with user provisioning flow.

B.

Create Canvas app in Salesforce for third-party app to provision users.

C.

Redirect users to the third-party app for registration.

D.

Use Salesforce identity with Security Assertion Markup Language (SAML)for provisioning users.

Full Access
Question # 38

Universal containers (UC) is building a mobile application that will make calls to the salesforce RESTAPI. Additionally, UC would like to provide the optimal experience for its mobile users. Which two OAuth scopes should UC configure in the connected App? Choose 2 answers

A.

Refresh token

B.

API

C.

full

D.

Web

Full Access
Question # 39

Universal containers (UC) has a customer Community that uses Facebook for authentication. UC would like to ensure that changes in the Facebook profile are reflected on the appropriate customer Community user. How can this requirement be met?

A.

Use the updateuser() method on the registration handler class.

B.

Use SAML just-in-timeprovisioning between Facebook and Salesforce

C.

Use information in the signed request that is received from Facebook.

D.

Develop a schedule job that calls out to Facebook on a nightly basis.

Full Access
Question # 40

Universal containers (UC) built a customer Community for customers to buy products, review orders, and manage their accounts. UC has provided three different options for customers to log in to the customer Community: salesforce, Google, and Facebook. Which two role combinations are represented by the systems in the scenario? Choose 2 answers

A.

Google is the service provider and Facebook is the identity provider

B.

Salesforceis the service provider and Google is the identity provider

C.

Facebook is the service provider and salesforce is the identity provider

D.

Salesforce is the service provider and Facebook is the identity provider

Full Access
Question # 41

Universal containers(UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users toprovide a fingerprint in addition to username/Password to authenticate to this application.How can an architect support fingerprint as a form of identification for salesforce Authentication?

A.

Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

B.

Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

C.

Use an AppExchange product that does fingerprint scanning with native salesforce identity confirmation.

D.

Use custom login flows with callouts to a third-party fingerprint scanning application.

Full Access
Question # 42

Universal Container's (UC) identity architect needs to recommend a license type for their new Experience Cloud site that will be used by external partners (delivery providers) for reviewing and updating their accounts, downloading files provided by UC and obtaining scheduled pickup dates from their calendar.

UC is using their Salesforce production org as the identity provider for these users and the expected number of individual users is 2.5 million with 13.5 million unique logins per month.

Which of the following license types should be used to meet the requirement?

A.

External Apps License

B.

Partner CommunityLicense

C.

Partner Community Login License

D.

Customer Community plus Login License

Full Access
Question # 43

Universal Containers (UC) wants its closed Won opportunities to be synced to a Data Warehouse in near real time. UC has implemented Outbound Message to enable near real-time data sync. UC wants to ensure that communication between Salesforce and Target System is Secure. What Certificate is sent along with the Outbound Message?

A.

The CA-SignedCertificate from the Certificate and Key Management menu.

B.

The default Client Certificate from the Develop--> API Menu.

C.

The default Client Certificate or a Certificate from Certificate and Key Management menu.

D.

The Self-Signed Certificates from theCertificate & Key Management menu.

Full Access
Question # 44

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants tounderstand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure mfa?

Choose 3 answers

A.

username and password + SMS passcode

B.

Username and password + secunty key

C.

Third-party single sign-on with Mobile Authenticator app

D.

Certificate-based Authentication

E.

Lightning Login

Full Access
Question # 45

Universal containers (UC) has implemented SAML SSO to enable seamless access across multiple applications. UC has regional salesforce orgs and wants it's usersto be able to access them from their main Salesforce org seamless. Which action should an architect recommend?

A.

Configure the main salesforce org as an authentication provider.

B.

Configure the main salesforce org as the Identity provider.

C.

Configurethe regional salesforce orgs as Identity Providers.

D.

Configure the main Salesforce org as a service provider.

Full Access
Question # 46

Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured asa connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers

A.

Disallow the use of Single Sign-on for anyusers of the mobile app.

B.

Require High Assurance sessions in order to use the Connected App.

C.

Set Login IP Ranges to the internal network for all of the app users Profiles.

D.

Use Google Authenticator as an additional part of the login process

Full Access
Question # 47

Universal containers want to build a custom mobile app connecting to salesforce using Oauth, and would like to restrict the types of resources mobile users can access. What Oauth feature of Salesforce should be used to achieve the goal?

A.

Access Tokens

B.

Mobile pins

C.

Refresh Tokens

D.

Scopes

Full Access
Question # 48

Universal Containers (UC) has aclassified information system that its call center team uses only when they are working on a case with a record type "Classified". They are only allowed to access the system when they own an open "Classified" case, and their access to the system is removedat all other times. They would like to implement SAML SSO with Salesforce as the Idp, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "Classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying access to the classified information system based on the open "classified" case record criteria?

A.

Use Salesforce reports to identify users that currently own open "Classified" cases and should be granted access to the Classified information system.

B.

Use Apex trigger on case to dynamically assign permission Sets that Grant access when a user is assigned with an open "Classified" case, and remove it when the case is closed.

C.

Use Custom SAML JIT Provisioning to dynamically query the user's open "Classified" cases when attempting to access the classified information system.

D.

Use a Common Connected App Handler using Apex to dynamically allow access tothe system based on whether the staff owns any open "Classified" Cases.

Full Access
Question # 49

Universal containers uses an Employee portal for their employees to collaborate. employees access the portal from their company's internal website via SSO. It is set up to work with Active Directory. What is the role of Active Directory in this scenario?

A.

Identity store

B.

Authentication store

C.

Identity provider

D.

Service provider

Full Access
Question # 50

Universal containers (UC) wants users to authenticate into their salesforceorg using credentials stored in a custom identity store. UC does not want to purchase or use a third-party Identity provider. Additionally, UC is extremely wary of social media and does not consider it to be trust worthy. Which two options should an architect recommend to UC? Choose 2 answers

A.

Use a professional social media such as LinkedIn as an Authentication provider

B.

Build a custom web page that uses the identity store and calls frontdoor.jsp

C.

Build a custom Web service that is supported byDelegated Authentication.

D.

Implement the Openid protocol and configure an authentication provider

Full Access
Question # 51

Universal Containers (UC) employees have Salesforce access from restricted IP ranges only, to protect against unauthorized access. UC wants to roll out the Salesforce1 mobile app and make it accessible from any location. Which two options should an Architect recommend? Choose 2 answers

A.

Relax the IP restriction with a second factor in the Connect App settings for Salesforce1 mobile app.

B.

Remove existing restrictions on IP ranges for all types of user access.

C.

Relax the IP restrictions in the Connect App settings for the Salesforce1 mobile app.

D.

Use Login Flow to bypass IP range restriction for the mobile app.

Full Access
Question # 52

Universal Containers is implementing a new Experience Cloud site and the identity architect wants to use dynamic branding features as of the login process.

Which two options should the identity architect recommend to support dynamic branding for the site?

Choose 2 answers

A.

To use dynamic branding, the community must be built with the Visuaiforce + Salesforce Tabs template.

B.

To use dynamic branding, the community must be built with the Customer Account Portal template.

C.

An experience ID (expid) or placeholder parametermust be used in the URL to represent the brand.

D.

An external content management system (CMS) must be used for dynamic branding on Experience Cloud sites.

Full Access
Question # 53

Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate andplace orders, view the status of orders, etc. UC allows guest checkout.

Mow can a guest register using data previously collected during order placement?

A.

Enable Security Assertion Markup Language Sign-On and use a login flow to collect only order detailsto retrieve customer data.

B.

Enable Facebook as an authentication provider and use a registration handler to collect only order details to retrieve customer data.

C.

Use a Connected App Handler Apex Plugin class to collect only order details to retrievecustomer data.

D.

Enable self-registration and customize a self-registration page to collect only order details to retrieve customer data.

Full Access
Question # 54

An organization has a central cloud-based Identity and Access Management (IAM) Service for authentication and user management, which must be utilized by all applications as follows:

1 - Change of a user status in the central IAM Service triggers provisioning or deprovisioning in the integrated cloud applications.

2 - Security Assertion Markup Language single sign-on (SSO) is used to facilitate access for users authenticated atidentity provider (Central IAM Service).

Which approach should an IAM architect implement on Salesforce Sales Cloud to meet the requirements?

A.

A Configure Salesforce as a SAML Service Provider, and enable SCIM (System for Cross-Domain Identity Management) for provisioning and deprovisioning of users.

B.

Configure Salesforce as a SAML service provider, and enable Just-in Time (JIT) provisioning and deprovisioning of users.

C.

Configure central IAM Service as an authentication provider and extend registration handler to manage provisioning and deprovisioning of users.

D.

Deploy Identity Connect component and set up automated provisioning and deprovisioning of users, as well as SAML-based SSO.

Full Access
Question # 55

Northern Trail Outfitters (NTO) is planning to build a new customer service portal and wants to use passwordlesslogin, allowing customers to login with a one-time passcode sent to them via email or SMS.

How should the quantity of required Identity Verification Credits be estimated?

A.

Each community comes with 10,000 Identity Verification Credits per month and onlycustomers with more than 10,000 logins a month should estimate additional SMS verifications needed.

B.

Identity Verification Credits are consumed with each SMS (text message) sent and should be estimated based on the number of login verification challengesfor SMS verification users.

C.

Identity Verification Credits are consumed with each verification sent and should be estimated based on the number of loginsthat will incur a verification challenge.

D.

Identity Verification Credits are a direct add-on license based on the number of existing member-based or login-based Community licenses.

Full Access
Question # 56

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

A.

Use a HTTP POST to request the refresh token for the current user.

B.

Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, including the current OAuth token.

C.

Use a HTTP POST to make a call to the revoke token endpoint.

D.

Enable Single Logout with a secure logout URL.

Full Access
Question # 57

Universal Containers (UC) uses Salesforce to allow customers to keep track of the order status. The customers can log in to Salesforce using external authentication providers, such as Facebook and Google. UC is also leveraging the App Launcher to let customers access an of platform application for generating shipping labels. The labelgenerator application uses OAuth to provide users access. What license type should an Architect recommend for the customers?

A.

Customer Community license

B.

Identity license

C.

Customer Community Plus license

D.

External Identity license

Full Access
Question # 58

How should an Architect force user to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?

A.

Use Custom Login Flows with Apex to detect the user's IP address and prompt for 2FA if needed.

B.

Add the list of company's network IP addresses to the Login Range list under 2FA Setup.

C.

Use an Apex Trigger on the UserLogin object to detect the user's IP address and prompt for 2FA if needed.

D.

Apply the "Two-factor Authentication for User Interface Logins" permission and Login IP Ranges for all Profiles.

Full Access
Question # 59

A multinational industrial products manufacturer is planning to implement Salesforce CRMto manage their business. They have the following requirements:

1. They plan to implement Partner communities to provide access to their partner network .

2. They have operations in multiple countries and are planning to implement multiple Salesforce orgs.

3. Some of their partners do business in multiple countries and will need information from multiple Salesforce communities.

4. They would like to provide a single login for their partners.

How should an Identity Architect solution this requirement with limited custom development?

A.

Create a partner login for the country of their operation and use SAML federation to provide access to other orgs.

B.

Consolidate Partner related information in a single org and provide access through Salesforce community.

C.

Allow partners to choose the Salesforce org they need information from and use login flows to authenticate access.

D.

Register partners in one org and access information from other orgs using APIs.

Full Access
Question # 60

ON NO: 126

Universal containers (UC) is successfully using Delegated Authentication for their salesforce users. The service supporting Delegated Authentication is written in Java. UC has a new CIO that is requiring all company Web services be RESR-ful andwritten in. NET. Which two considerations should the UC Architect provide to the new CIO? Choose 2 answers

A.

Delegated Authentication will not work with a.net service.

B.

Delegated Authentication will continue to work with rest services.

C.

Delegated Authentication will continue to work with a.net service.

D.

Delegated Authentication will not work with rest services.

Full Access
Question # 61

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?

A.

Use the Salesforce Authenticator mobile app with two-step verification

B.

Lock sessions to the IP address from which they originated.

C.

Increase Password complexity requirements in Salesforce.

D.

Implement Single Sign-on using a corporateIdentity store.

Full Access
Question # 62

Universal containers (UC) would like to enable SAML-BASED SSO for asalesforce partner community. UC has an existing ldap identity store and a third-party portal. They would like to use the existing portal as the primary site these users’ access, but also want to allow seamless access to the partner community. What SSO flow should an architect recommend?

A.

User-Agent

B.

IDP-initiated

C.

Sp-Initiated

D.

Web server

Full Access
Question # 63

Universal Containers (UC) uses middleware to integrate multiple systems with Salesforce. UC has a strict, new requirement that usernames and passwords cannot be stored in any UC system. How can UC’s middleware authenticate to Salesforce while adhering to this requirement?

A.

Create a Connected App that supports the JWT Bearer Token OAuth Flow.

B.

Create a Connected App that supportsthe Refresh Token OAuth Flow

C.

Create a Connected App that supports the Web Server OAuth Flow.

D.

Create a Connected App that supports the User-Agent OAuth Flow.

Full Access
Question # 64

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for to give its customers the ability to login with their Facebook and Twitter credentials.

Which two actions should an identity architect recommend to meet these requirements?

Choose 2 answers

A.

Create a custom external authentication provider for Facebook.

B.

Configure a predefined authentication provider for Facebook.

C.

Create a custom external authentication provider for Twitter.

D.

Configure a predefined authentication provider for Twitter.

Full Access
Question # 65

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

A.

Client ID

B.

Refresh Token

C.

Authorization Code

D.

Verification Code

E.

Scopes

Full Access
Question # 66

ON NO: 12

A group of users try to access one of Universal Containers' Connected Apps and receive the following error message: " Failed: Not approved for access." What is the most likely cause of this issue?

A.

The Connected App settings "All users mayself-authorize" is enabled.

B.

The Salesforce Administrators have revoked the OAuth authorization.

C.

The Users do not have the correct permission set assigned to them.

D.

The User of High Assurance sessions are required for the Connected App.

Full Access
Question # 67

An architect needsto set up a Facebook Authentication provider as login option for a salesforce customer Community. What portion of the authentication provider setup associates a Facebook user with a salesforce user?

A.

Consumer key and consumer secret

B.

Federation ID

C.

User info endpoint URL

D.

Apex registration handler

Full Access
Question # 68

Universal containers (UC) is setting up Delegated Authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the loginservice and salesforce. What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?

A.

Include client ID and client secret in the login header callout.

B.

Set up a proxy server for the login service in the DMZ.

C.

Require the use of Salesforce security Tokens on password.

D.

Enforce mutual Authentication between systems using SSL.

Full Access
Question # 69

A technology enterprise is planning to implement single sign-on login for users. When users log in to the Salesforce User object custom field, data should be populated fornew and existing users.

Which two steps should an identity architect recommend?

Choose 2 answers

A.

Implement Auth.SamlJitHandler Interface.

B.

Create and update methods.

C.

Implement RegistrationHandler Interface.

D.

Implement SesslonManagement Class.

Full Access
Question # 70

Universal Containers (UC) has a Desktop application to collect leads for marketing campaigns. UC wants to extend this application to integrate with Salesforce to create leads. Integration between thedesktop application and salesforce should be seamless. What Authorization flow should the Architect recommend?

A.

JWT Bearer Token flow

B.

Web Server Authentication Flow

C.

User Agent Flow

D.

Username and Password Flow

Full Access
Question # 71

Universal Containers (UC) wants to build a custom mobile app for their field reps to create orders in salesforce. After the first time the users log in, they must be able to access salesforce upon opening the mobile app without being prompted to log in again. What Oauth flows should be considered to support this requirement?

A.

Web Server flow with a Refresh Token.

B.

Mobile Agent flow with a Bearer Token.

C.

User Agent flow with a Refresh Token.

D.

SAML Assertion flow with a Bearer Token.

Full Access
Question # 72

Northern Trail Outfitters (NTO) has an existing custom business-to-consumer (B2C) website that does NOT support single sign-on standards, such as Security Assertion Markup Language (SAMi) or OAuth. NTO wants to use Salesforce Identity to register and authenticate new customers on the website.

Which two Salesforce features should an identity architect use in order to provide username/password authentication for the website?

Choose 2 answers

A.

Identity Connect

B.

Delegated Authentication

C.

Connected Apps

D.

Embedded Login

Full Access