ExamGecko
Home Home / Salesforce / Certified Identity and Access Management Architect

Salesforce Certified Identity and Access Management Architect Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

A.
Configure a predefined authentication provider for Amazon.
A.
Configure a predefined authentication provider for Amazon.
Answers
B.
Create a custom external authentication provider for Amazon.
B.
Create a custom external authentication provider for Amazon.
Answers
C.
Configure an OpenID Connect Authentication Provider for Amazon.
C.
Configure an OpenID Connect Authentication Provider for Amazon.
Answers
D.
Configure Amazon as a connected app.
D.
Configure Amazon as a connected app.
Answers
Suggested answer: C

A global company's Salesforce Identity Architect is reviewing its Salesforce production org login history and is seeing some intermittent Security Assertion Markup Language (SAML SSO) 'Replay Detected and Assertion Invalid' login errors.

Which two issues would cause these errors?

Choose 2 answers

A.
The subject element is missing from the assertion sent to salesforce.
A.
The subject element is missing from the assertion sent to salesforce.
Answers
B.
The certificate loaded into SSO configuration does not match the certificate used by the IdP.
B.
The certificate loaded into SSO configuration does not match the certificate used by the IdP.
Answers
C.
The current time setting of the company's identity provider (IdP) and Salesforce platform is out of sync by more than eight minutes.
C.
The current time setting of the company's identity provider (IdP) and Salesforce platform is out of sync by more than eight minutes.
Answers
D.
The assertion sent to 5alesforce contains an assertion ID previously used.
D.
The assertion sent to 5alesforce contains an assertion ID previously used.
Answers
Suggested answer: A, D

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

A.
Use a HTTP POST to request the refresh token for the current user.
A.
Use a HTTP POST to request the refresh token for the current user.
Answers
B.
Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, includingthe current OAuth token.
B.
Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, includingthe current OAuth token.
Answers
C.
Use a HTTP POST to make a call to the revoke token endpoint.
C.
Use a HTTP POST to make a call to the revoke token endpoint.
Answers
D.
Enable Single Logout with a secure logout URL.
D.
Enable Single Logout with a secure logout URL.
Answers
Suggested answer: C

The executive sponsor for an organization has asked if Salesforce supports the ability to embed a login widget into its service providers in order to create a more seamless user experience.

What should be used and considered before recommending it as a solution on the Salesforce Platform?

A.
OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.
A.
OpenID Connect Web Server Flow. Determine if the service provider is secure enough to store the client secret on.
Answers
B.
Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.
B.
Embedded Login. Identify what level of UI customization will be required to make it match the service providers look and feel.
Answers
C.
Salesforce REST apis. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.
C.
Salesforce REST apis. Ensure that Secure Sockets Layer (SSL) connection for the integration is used.
Answers
D.
Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.
D.
Embedded Login. Consider whether or not it relies on third party cookies which can cause browser compatibility issues.
Answers
Suggested answer: D

An identity architect is implementing a mobile-first Consumer Identity Access Management (CIAM) for external users. User authentication is the only requirement. The users email or mobile phone number should be supported as a username.

Which two licenses are needed to meet this requirement?

Choose 2 answers

A.
External Identity Licenses
A.
External Identity Licenses
Answers
B.
Identity Connect Licenses
B.
Identity Connect Licenses
Answers
C.
Email Verification Credits
C.
Email Verification Credits
Answers
D.
SMS verification Credits
D.
SMS verification Credits
Answers
Suggested answer: A, D

Northern Trail Outfitters (NTO) leverages Microsoft Active Directory (AD) for management of employee usernames, passwords, permissions, and asset access. NTO also owns a third-party single sign-on (SSO) solution. The third-party party SSO solution is used for all corporate applications, including Salesforce.

NTO has asked an architect to explore Salesforce Identity Connect for automatic provisioning and deprovisiorung of users in Salesforce.

What role does identity Connect play in the outlined requirements?

A.
Service Provider
A.
Service Provider
Answers
B.
Single Sign-On
B.
Single Sign-On
Answers
C.
Identity Provider
C.
Identity Provider
Answers
D.
User Management
D.
User Management
Answers
Suggested answer: D

Universal Container's (UC) is using Salesforce Experience Cloud site for its container wholesale business. The identity architect wants to an authentication provider for the new site.

Which two options should be utilized in creating an authentication provider?

Choose 2 answers

A.
A custom registration handier can be set.
A.
A custom registration handier can be set.
Answers
B.
A custom error URL can be set.
B.
A custom error URL can be set.
Answers
C.
The default login user can be set.
C.
The default login user can be set.
Answers
D.
The default authentication provider certificate can be set.
D.
The default authentication provider certificate can be set.
Answers
Suggested answer: A, B

Universal Containers (UC) currently uses Salesforce Sales Cloud and an external billing application.

Both Salesforce and the billing application are accessed several times a day to manage customers. UC would like to configure single sign-on and leverage Salesforce as the identity provider. Additionally, UC would like the billing application to be accessible from Salesforce. A redirect is acceptable.

Which two Salesforce tools should an identity architect recommend to satisfy the requirements?

Choose 2 answers

A.
salesforce Canvas
A.
salesforce Canvas
Answers
B.
Identity Connect
B.
Identity Connect
Answers
C.
Connected Apps
C.
Connected Apps
Answers
D.
App Launcher
D.
App Launcher
Answers
Suggested answer: A, D

Northern Trail Outfitters (NTO) is setting up Salesforce to authenticate users with an external identity provider. The NTO Salesforce Administrator is having trouble getting things setup.

What should an identity architect use to show which part of the login assertion is fading?

A.
SAML Metadata file importer
A.
SAML Metadata file importer
Answers
B.
Identity Provider Metadata download
B.
Identity Provider Metadata download
Answers
C.
Connected App Manager
C.
Connected App Manager
Answers
D.
Security Assertion Markup Language Validator
D.
Security Assertion Markup Language Validator
Answers
Suggested answer: D

A leading fitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile.

Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

A.
Named Credentials
A.
Named Credentials
Answers
B.
Login Flows
B.
Login Flows
Answers
C.
OAuth Device Flow
C.
OAuth Device Flow
Answers
D.
Single Sign-On Settings
D.
Single Sign-On Settings
Answers
Suggested answer: C
Total 248 questions
Go to page: of 25