ExamGecko
Home Home / Salesforce / Certified Identity and Access Management Architect

Salesforce Certified Identity and Access Management Architect Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











Universal containers (UC) is setting up their customer Community self-registration process. They are uncomfortable with the idea of assigning new users to a default account record. What will happen when customers self-register in the community?

A.
The self-registration process will produce an error to the user.
A.
The self-registration process will produce an error to the user.
Answers
B.
The self-registration page will ask user to select an account.
B.
The self-registration page will ask user to select an account.
Answers
C.
The self-registration process will create a person Account record.
C.
The self-registration process will create a person Account record.
Answers
D.
The self-registration page will create a new account record.
D.
The self-registration page will create a new account record.
Answers
Suggested answer: A

Universal containers (UC) uses a home-grown employee portal for their employees to collaborate.

UC decides to use salesforce ideas to allow the employees to post ideas from the employee portal.

When clicking some links in the employee portal, the users should be redirected to salesforce, authenticated, and presented with relevant pages. What scope should be requested when using the Oauth token to meet this requirement?

A.
Web
A.
Web
Answers
B.
Full
B.
Full
Answers
C.
API
C.
API
Answers
D.
Visualforce
D.
Visualforce
Answers
Suggested answer: A

Universal containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC decides to use an API user using Oauth Username - password flow for the connection. How can the connection to salesforce be restricted only to the employee portal server?

A.
Add the Employee portals IP address to the Trusted IP range for the connected App
A.
Add the Employee portals IP address to the Trusted IP range for the connected App
Answers
B.
Use a digital certificate signed by the employee portal Server.
B.
Use a digital certificate signed by the employee portal Server.
Answers
C.
Add the employee portals IP address to the login IP range on the user profile.
C.
Add the employee portals IP address to the login IP range on the user profile.
Answers
D.
Use a dedicated profile for the user the Employee portal uses.
D.
Use a dedicated profile for the user the Employee portal uses.
Answers
Suggested answer: A

Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?

A.
Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.
A.
Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.
Answers
B.
Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.
B.
Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.
Answers
C.
Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.
C.
Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.
Answers
D.
Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.
D.
Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.
Answers
Suggested answer: A, C

Universal Containers (UC) has Active Directory (AD) as their enterprise identity store and would like to use it for Salesforce user authentication. UC expects to synchronize user data between Salesforce and AD and Assign the appropriate Profile and Permission Sets based on AD group membership.

What would be the optimal way to implement SSO?

A.
Use Active Directory with Reverse Proxy as the Identity Provider.
A.
Use Active Directory with Reverse Proxy as the Identity Provider.
Answers
B.
Use Microsoft Access control Service as the Authentication provider.
B.
Use Microsoft Access control Service as the Authentication provider.
Answers
C.
Use Active Directory Federation Service (ADFS) as the Identity Provider.
C.
Use Active Directory Federation Service (ADFS) as the Identity Provider.
Answers
D.
Use Salesforce Identity Connect as the Identity Provider.
D.
Use Salesforce Identity Connect as the Identity Provider.
Answers
Suggested answer: D

Universal Containers (UC) is building a custom Innovation platform on their Salesforce instance. The Innovation platform will be written completely in Apex and Visualforce and will use custom objects to store the Dat a. UC would like all users to be able to access the system without having to log in with Salesforce credentials. UC will utilize a third-party idp using SAML SSO. What is the optimal Salesforce licence type for all of the UC employees?

A.
Identity Licence.
A.
Identity Licence.
Answers
B.
Salesforce Licence.
B.
Salesforce Licence.
Answers
C.
External Identity Licence.
C.
External Identity Licence.
Answers
D.
Salesforce Platform Licence.
D.
Salesforce Platform Licence.
Answers
Suggested answer: D

Universal Containers (UC) has a mobile application for its employees that uses data from Salesforce as well as uses Salesforce for Authentication purposes. UC wants its mobile users to only enter their credentials the first time they run the app. The application has been live for a little over 6 months, and all of the users who were part of the initial launch are complaining that they have to reauthenticate.

UC has also recently changed the URI Scheme associated with the mobile app. What should the Architect at UC first investigate?Universal Containers (UC) has a mobile application for its employees that uses data from Salesforce as well as uses Salesforce for Authentication purposes. UC wants its mobile users to only enter their credentials the first time they run the app. The application has been live for a little over 6 months, and all of the users who were part of the initial launch are complaining that they have to re-authenticate. UC has also recently changed the URI Scheme associated with the mobile app. What should the Architect at UC first investigate?

A.
Check the Refresh Token policy defined in the Salesforce Connected App.
A.
Check the Refresh Token policy defined in the Salesforce Connected App.
Answers
B.
Validate that the users are checking the box to remember their passwords.
B.
Validate that the users are checking the box to remember their passwords.
Answers
C.
Verify that the Callback URL is correctly pointing to the new URI Scheme.
C.
Verify that the Callback URL is correctly pointing to the new URI Scheme.
Answers
D.
Confirm that the access Token's Time-To-Live policy has been set appropriately.
D.
Confirm that the access Token's Time-To-Live policy has been set appropriately.
Answers
Suggested answer: A

Universal Containers (UC) wants to build a mobile application that twill be making calls to the Salesforce REST API. UC's Salesforce implementation relies heavily on custom objects and custom Apex code. UC does not want its users to have to enter credentials every time they use the app.

Which two scope values should an Architect recommend to UC? Choose 2 answers.

A.
Custom_permissions
A.
Custom_permissions
Answers
B.
Api
B.
Api
Answers
C.
Refresh_token
C.
Refresh_token
Answers
D.
Full
D.
Full
Answers
Suggested answer: B, C

Universal Containers (UC) is looking to purchase a third-party application as an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose 2 answers

A.
The Identity Provider can authenticate multiple applications.
A.
The Identity Provider can authenticate multiple applications.
Answers
B.
The Identity Provider can authenticate multiple social media accounts.
B.
The Identity Provider can authenticate multiple social media accounts.
Answers
C.
The Identity provider can store credentials for multiple applications.
C.
The Identity provider can store credentials for multiple applications.
Answers
D.
The Identity Provider can centralize enterprise password policy.
D.
The Identity Provider can centralize enterprise password policy.
Answers
Suggested answer: A, D

Universal Containers (UC) has implemented a multi-org architecture in their company. Many users have licences across multiple orgs, and they are complaining about remembering which org and credentials are tied to which business process. Which two recommendations should the Architect make to address the Complaints? Choose 2 answers

A.
Activate My Domain to Brand each org to the specific business use case.
A.
Activate My Domain to Brand each org to the specific business use case.
Answers
B.
Implement SP-Initiated Single Sign-on flows to allow deep linking.
B.
Implement SP-Initiated Single Sign-on flows to allow deep linking.
Answers
C.
Implement IdP-Initiated Single Sign-on flows to allow deep linking.
C.
Implement IdP-Initiated Single Sign-on flows to allow deep linking.
Answers
D.
Implement Delegated Authentication from each org to the LDAP provider.
D.
Implement Delegated Authentication from each org to the LDAP provider.
Answers
Suggested answer: A, B
Total 248 questions
Go to page: of 25