ExamGecko

Salesforce Certified Identity and Access Management Architect Practice Test - Questions Answers, Page 11

List of questions

Question 101

Report
Export
Collapse

Universal containers (UC) is setting up their customer Community self-registration process. They are uncomfortable with the idea of assigning new users to a default account record. What will happen when customers self-register in the community?

The self-registration process will produce an error to the user.
The self-registration process will produce an error to the user.
The self-registration page will ask user to select an account.
The self-registration page will ask user to select an account.
The self-registration process will create a person Account record.
The self-registration process will create a person Account record.
The self-registration page will create a new account record.
The self-registration page will create a new account record.
Suggested answer: A
asked 23/09/2024
Thabo Sebola
38 questions

Question 102

Report
Export
Collapse

Universal containers (UC) uses a home-grown employee portal for their employees to collaborate.

UC decides to use salesforce ideas to allow the employees to post ideas from the employee portal.

When clicking some links in the employee portal, the users should be redirected to salesforce, authenticated, and presented with relevant pages. What scope should be requested when using the Oauth token to meet this requirement?

Web
Web
Full
Full
API
API
Visualforce
Visualforce
Suggested answer: A
asked 23/09/2024
Chris Houck
33 questions

Question 103

Report
Export
Collapse

Universal containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC decides to use an API user using Oauth Username - password flow for the connection. How can the connection to salesforce be restricted only to the employee portal server?

Add the Employee portals IP address to the Trusted IP range for the connected App
Add the Employee portals IP address to the Trusted IP range for the connected App
Use a digital certificate signed by the employee portal Server.
Use a digital certificate signed by the employee portal Server.
Add the employee portals IP address to the login IP range on the user profile.
Add the employee portals IP address to the login IP range on the user profile.
Use a dedicated profile for the user the Employee portal uses.
Use a dedicated profile for the user the Employee portal uses.
Suggested answer: A
asked 23/09/2024
Olga Trofimova
34 questions

Question 104

Report
Export
Collapse

Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?

Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.
Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.
Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.
Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.
Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.
Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.
Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.
Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.
Suggested answer: A, C
asked 23/09/2024
Johnny Oostdijk
24 questions

Question 105

Report
Export
Collapse

Universal Containers (UC) has Active Directory (AD) as their enterprise identity store and would like to use it for Salesforce user authentication. UC expects to synchronize user data between Salesforce and AD and Assign the appropriate Profile and Permission Sets based on AD group membership.

What would be the optimal way to implement SSO?

Use Active Directory with Reverse Proxy as the Identity Provider.
Use Active Directory with Reverse Proxy as the Identity Provider.
Use Microsoft Access control Service as the Authentication provider.
Use Microsoft Access control Service as the Authentication provider.
Use Active Directory Federation Service (ADFS) as the Identity Provider.
Use Active Directory Federation Service (ADFS) as the Identity Provider.
Use Salesforce Identity Connect as the Identity Provider.
Use Salesforce Identity Connect as the Identity Provider.
Suggested answer: D
asked 23/09/2024
Rafal Piasecki
40 questions

Question 106

Report
Export
Collapse

Universal Containers (UC) is building a custom Innovation platform on their Salesforce instance. The Innovation platform will be written completely in Apex and Visualforce and will use custom objects to store the Dat a. UC would like all users to be able to access the system without having to log in with Salesforce credentials. UC will utilize a third-party idp using SAML SSO. What is the optimal Salesforce licence type for all of the UC employees?

Identity Licence.
Identity Licence.
Salesforce Licence.
Salesforce Licence.
External Identity Licence.
External Identity Licence.
Salesforce Platform Licence.
Salesforce Platform Licence.
Suggested answer: D
asked 23/09/2024
Amin Dashti
50 questions

Question 107

Report
Export
Collapse

Universal Containers (UC) has a mobile application for its employees that uses data from Salesforce as well as uses Salesforce for Authentication purposes. UC wants its mobile users to only enter their credentials the first time they run the app. The application has been live for a little over 6 months, and all of the users who were part of the initial launch are complaining that they have to reauthenticate.

UC has also recently changed the URI Scheme associated with the mobile app. What should the Architect at UC first investigate?Universal Containers (UC) has a mobile application for its employees that uses data from Salesforce as well as uses Salesforce for Authentication purposes. UC wants its mobile users to only enter their credentials the first time they run the app. The application has been live for a little over 6 months, and all of the users who were part of the initial launch are complaining that they have to re-authenticate. UC has also recently changed the URI Scheme associated with the mobile app. What should the Architect at UC first investigate?

Check the Refresh Token policy defined in the Salesforce Connected App.
Check the Refresh Token policy defined in the Salesforce Connected App.
Validate that the users are checking the box to remember their passwords.
Validate that the users are checking the box to remember their passwords.
Verify that the Callback URL is correctly pointing to the new URI Scheme.
Verify that the Callback URL is correctly pointing to the new URI Scheme.
Confirm that the access Token's Time-To-Live policy has been set appropriately.
Confirm that the access Token's Time-To-Live policy has been set appropriately.
Suggested answer: A
asked 23/09/2024
PKE Holding AG Leitgeb
36 questions

Question 108

Report
Export
Collapse

Universal Containers (UC) wants to build a mobile application that twill be making calls to the Salesforce REST API. UC's Salesforce implementation relies heavily on custom objects and custom Apex code. UC does not want its users to have to enter credentials every time they use the app.

Which two scope values should an Architect recommend to UC? Choose 2 answers.

Custom_permissions
Custom_permissions
Api
Api
Refresh_token
Refresh_token
Full
Full
Suggested answer: B, C
asked 23/09/2024
Ray Hato
38 questions

Question 109

Report
Export
Collapse

Universal Containers (UC) is looking to purchase a third-party application as an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose 2 answers

The Identity Provider can authenticate multiple applications.
The Identity Provider can authenticate multiple applications.
The Identity Provider can authenticate multiple social media accounts.
The Identity Provider can authenticate multiple social media accounts.
The Identity provider can store credentials for multiple applications.
The Identity provider can store credentials for multiple applications.
The Identity Provider can centralize enterprise password policy.
The Identity Provider can centralize enterprise password policy.
Suggested answer: A, D
asked 23/09/2024
Sam Patel
34 questions

Question 110

Report
Export
Collapse

Universal Containers (UC) has implemented a multi-org architecture in their company. Many users have licences across multiple orgs, and they are complaining about remembering which org and credentials are tied to which business process. Which two recommendations should the Architect make to address the Complaints? Choose 2 answers

Activate My Domain to Brand each org to the specific business use case.
Activate My Domain to Brand each org to the specific business use case.
Implement SP-Initiated Single Sign-on flows to allow deep linking.
Implement SP-Initiated Single Sign-on flows to allow deep linking.
Implement IdP-Initiated Single Sign-on flows to allow deep linking.
Implement IdP-Initiated Single Sign-on flows to allow deep linking.
Implement Delegated Authentication from each org to the LDAP provider.
Implement Delegated Authentication from each org to the LDAP provider.
Suggested answer: A, B
asked 23/09/2024
Alpesh Panchal
20 questions
Total 248 questions
Go to page: of 25
Search

Related questions