Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

N NO: 161

An identity architect has built a native mobile application and plans to integrate it with a Salesforce Identity solution. The following are the requirements for the solution:

1. Users should not have to login every time they use the app.

2. The app should be able to make calls to the Salesforce REST API.

3. End users should NOT see the OAuth approval page.

How should the identity architect configure the Salesforce connected app to meet the requirements?

A.

Enable the API Scope and Offline Access Scope, upload a certificate so JWT Bearer Flow can be used and then set the connected app access settings to "Admin Pre-Approved".

B.

Enable the API Scope and Offline Access Scope on the connected app, and then set the connected app to access settings to 'Admin Pre-Approved".

C.

Enable the Full Access Scope and then set the connected app access settings to "Admin Pre-Approved".

D.

Enable the API Scope and Offline Access Scope on the connected app, and then set the Connected App access settings to "User may self authorize".

Full Access
Question # 5

Universal Containers (UC) employees have Salesforce access from restricted IP ranges only, to protect against unauthorized access. UC wants to roll out the Salesforce1 mobile app and make it accessible from any location. Which two options should an Architect recommend? Choose 2 answers

A.

Relax the IP restriction with a second factor in the Connect App settings for Salesforce1 mobile app.

B.

Remove existing restrictions on IP ranges for all types of user access.

C.

Relax the IP restrictions in the Connect App settings for the Salesforce1 mobile app.

D.

Use Login Flow to bypass IP range restriction for the mobile app.

Full Access
Question # 6

Universal Containers (UC) uses Global Shipping (GS) as one of their shipping vendors. Regional leads of GS need access to UC's Salesforce instance for reporting damage of goods using Cases. The regional leads also need access to dashboards to keep track ofregional shipping KPIs. UC internally uses a third-party cloud analytics tool forcapacity planning and UC decided to provide access to this tool to a subset of GS employees. In addition to regional leads, the GS capacity planning team would benefit fromaccess to this tool. To access the analytics tool, UC IT has set up Salesforce as the Identity provider for Internal users and would like to follow the same approach for the GS users as well. What are the most appropriate license types for GS Tregional Leads and the GS Capacity Planners? Choose 2 Answers

A.

Customer Community Plus license for GS Regional Leads and External Identity for GS Capacity Planners.

B.

Customer Community Plus license for GS Regional Leads and Customer Community license for GS Capacity Planners.

C.

Identity License for GS Regional Leads and External Identity license for GS capacity Planners.

D.

Customer Community license for GS Regional Leads and Identity license for GS Capacity Planners.

Full Access
Question # 7

Universal Containers (UC) has aclassified information system that its call center team uses only when they are working on a case with a record type "Classified". They are only allowed to access the system when they own an open "Classified" case, and their access to the system is removedat all other times. They would like to implement SAML SSO with Salesforce as the Idp, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "Classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying access to the classified information system based on the open "classified" case record criteria?

A.

Use Salesforce reports to identify users that currently own open "Classified" cases and should be granted access to the Classified information system.

B.

Use Apex trigger on case to dynamically assign permission Sets that Grant access when a user is assigned with an open "Classified" case, and remove it when the case is closed.

C.

Use Custom SAML JIT Provisioning to dynamically query the user's open "Classified" cases when attempting to access the classified information system.

D.

Use a Common Connected App Handler using Apex to dynamically allow access tothe system based on whether the staff owns any open "Classified" Cases.

Full Access
Question # 8

Universal Containers would like its customers to register and log in to a portal built on Salesforce Experience Cloud. Customers should be able to use their Facebook or Linkedln credentials for ease of use.

Which three steps should an identity architect take to implement social sign-on?

Choose 3 answers

A.

Register both Facebook and Linkedln as connected apps.

B.

Create authentication providers for both Facebook and Linkedln.

C.

Check "Facebook" and "Linkedln" under Login Page Setup.

D.

Enable "Federated Single Sign-On Using SAML".

E.

Update the default registration handlers to create and update users.

Full Access
Question # 9

Universal Containers (UC) has an e-commerce website where customers can buy products, make payments, and manage their accounts. UC decides tobuild a Customer Community on Salesforce and wants to allow the customers to access the community from their accounts without logging in again. UC decides to implement an SP-initiated SSO using a SAML-compliant Idp. In this scenario where Salesforce is theService Provider, which two activities must be performed in Salesforce to make SP-initiated SSO work? Choose 2 answers

A.

Configure SAML SSO settings.

B.

Create a Connected App.

C.

Configure Delegated Authentication.

D.

Set up My Domain.

Full Access
Question # 10

Northern Trail Outfitters (NTO) is planning to roll out a partner portal for its distributors using Experience Cloud. NTO would like to use an externalidentity provider (idP) and for partners to register for access to the portal. Each partner should be allowed to register only once to avoid duplicate accounts with Salesforce.

What should a identity architect recommend to create partners?

A.

On successful creation of Partners using Self Registration page in Experience Cloud, create identity in Ping.

B.

Create a custom page m Experience Cloud to self register partner with Experience Cloud and Ping identity store.

C.

Create a custom web page in the Portal and create users in the IdP and Experience Cloud using published APIs.

D.

Allow partners to register through the IdP and create partner users in Salesforce through an API.

Full Access
Question # 11

UESTION NO: 154

Universal Containers (UC) wants to provide single sign-on (SSO) for a business-to-consumer (B2C) application using Salesforce Identity.

Which Salesforce license should UC utilize to implement this use case?

A.

Identity Only

B.

Salesforce Platform

C.

External Identity

D.

Partner Community

Full Access
Question # 12

How should an identity architect automate provisioning and deprovisioning of users into Salesforce from an external system?

A.

Call SOAP API upsertQ on user object.

B.

Use Security Assertion Markup Language Just-in-Time (SAML JIT) on incoming SAML assertions.

C.

Run registration handler on incoming OAuth responses.

D.

Call OpenID Connect (OIDC)-userinfo endpoint with a valid access token.

Full Access
Question # 13

An identity architect is implementing a mobile-first Consumer Identity Access Management (CIAM) for external users. User authentication is the only requirement. The users email or mobile phone number should be supported as a username.

Which two licenses are needed to meet this requirement?

Choose 2 answers

A.

External Identity Licenses

B.

Identity Connect Licenses

C.

Email Verification Credits

D.

SMS verification Credits

Full Access
Question # 14

A multinational industrial products manufacturer is planning to implement Salesforce CRMto manage their business. They have the following requirements:

1. They plan to implement Partner communities to provide access to their partner network .

2. They have operations in multiple countries and are planning to implement multiple Salesforce orgs.

3. Some of their partners do business in multiple countries and will need information from multiple Salesforce communities.

4. They would like to provide a single login for their partners.

How should an Identity Architect solution this requirement with limited custom development?

A.

Create a partner login for the country of their operation and use SAML federation to provide access to other orgs.

B.

Consolidate Partner related information in a single org and provide access through Salesforce community.

C.

Allow partners to choose the Salesforce org they need information from and use login flows to authenticate access.

D.

Register partners in one org and access information from other orgs using APIs.

Full Access
Question # 15

Universal Containers (UC) wants to implement SAML SSO for their internal of Salesforce users using a third-party IdP. After some evaluation, UC decides NOT to 65« set up My Domain fortheir Salesforce org. How does that decision impact their SSO implementation?

A.

IdP-initiated SSO will NOT work.

B.

Neither SP- nor IdP-initiated SSO will work.

C.

Either SP- or IdP-initiated SSO will work.

D.

SP-initiated SSO will NOT work

Full Access
Question # 16

Universal Containers (UC) is building an integration between Salesforce and a legacy web application using the canvas framework. The security for UC has determined that asigned request from Salesforce is not an adequate authentication solution for the Third-Party app. Which two options should the Architect consider for authenticating the third-party app using the canvas framework? Choose 2 Answers

A.

Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC's IdP.

B.

Utilize Authorization Providers to allow the third-party application to authenticate itself against Salesforce as the Idp.

C.

Utilize Canvas OAuth flow to allow the third-party application to authenticate itself against Salesforce as the Idp.

D.

Create a registration handler Apex class to allow the third-party application to authenticate itself against Salesforce as the Idp.

Full Access
Question # 17

Universal Containers (UC) is building a custom Innovation platform on their Salesforce instance. The Innovation platform willbe written completely in Apex and Visualforce and will use custom objects to store the Data. UC would like all users to be able to access the system without having to log in with Salesforce credentials. UC will utilize a third-party idp using SAML SSO. What is the optimal Salesforce licence type for all of the UC employees?

A.

Identity Licence.

B.

Salesforce Licence.

C.

External Identity Licence.

D.

Salesforce Platform Licence.

Full Access
Question # 18

Universal Containers (UC) has decided touse Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?

A.

Add each connected Appto the App Launcher with a Start URL.

B.

Set up an Auth Provider for each External Application.

C.

Set up Salesforce as a SAML Idp with My Domain.

D.

Set up Identity Connect to Synchronize user data.

E.

Create a Connected App for each external application.

Full Access
Question # 19

Universal Containers (UC) has implemented a multi-org architecture in their company. Many users have licences across multiple orgs, and they are complaining about remembering which org and credentials are tied to which business process. Which two recommendations should the Architect make to address the Complaints? Choose 2 answers

A.

Activate My Domain to Brand each org to the specific business use case.

B.

Implement SP-Initiated Single Sign-on flows to allow deep linking.

C.

ImplementIdP-Initiated Single Sign-on flows to allow deep linking.

D.

Implement Delegated Authentication from each org to the LDAP provider.

Full Access
Question # 20

ON NO: 126

Universal containers (UC) is successfully using Delegated Authentication for their salesforce users. The service supporting Delegated Authentication is written in Java. UC has a new CIO that is requiring all company Web services be RESR-ful andwritten in. NET. Which two considerations should the UC Architect provide to the new CIO? Choose 2 answers

A.

Delegated Authentication will not work with a.net service.

B.

Delegated Authentication will continue to work with rest services.

C.

Delegated Authentication will continue to work with a.net service.

D.

Delegated Authentication will not work with rest services.

Full Access
Question # 21

Universal containers (UC) has a customer Community that uses Facebook for authentication. UC would like to ensure that changes in the Facebook profile are reflected on the appropriate customer Community user. How can this requirement be met?

A.

Use the updateuser() method on the registration handler class.

B.

Use SAML just-in-timeprovisioning between Facebook and Salesforce

C.

Use information in the signed request that is received from Facebook.

D.

Develop a schedule job that calls out to Facebook on a nightly basis.

Full Access
Question # 22

Universal containers (UC) wants users to authenticate into their salesforceorg using credentials stored in a custom identity store. UC does not want to purchase or use a third-party Identity provider. Additionally, UC is extremely wary of social media and does not consider it to be trust worthy. Which two options should an architect recommend to UC? Choose 2 answers

A.

Use a professional social media such as LinkedIn as an Authentication provider

B.

Build a custom web page that uses the identity store and calls frontdoor.jsp

C.

Build a custom Web service that is supported byDelegated Authentication.

D.

Implement the Openid protocol and configure an authentication provider

Full Access
Question # 23

An Enterprise is using a Lightweight Directory Access Protocol (LDAP ) server as the only point for user authentication with a username/password. Salesforce delegated authentication is configured to integrate Salesforce under single sign-on (SSO).

Mow can end users change their password?

A.

Users once logged In, can go to the Change Password screen in Salesforce.

B.

Users can click on the "Forgot your Password" link on the Salesforce.com login page.

C.

Users can request the Salesforce Admin to reset their password.

D.

Users can change it on the enterprise LDAP authentication portal.

Full Access
Question # 24

The security team at Universal containers(UC) has identified exporting reports as a high-risk action and would like to require users to be logged into salesforce with their active directory (AD) credentialswhen doing so. For all other uses of Salesforce, Users should be allowed to use AD credentials or salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with salesforce credentials?

A.

Use SAML Federated Authentication and Custom SAML jit provisioning to dynamically add or remove a permission set that grants the Export Reports permission.

B.

Use SAML Federated Authentication, treat SAML sessions as high assurance, and raise the session level required for exporting reports.

C.

Use SAML Federated Authentication and block access to reports when accesses through a standard assurance session.

D.

Use SAML Federated Authentication with a login flow to dynamically add or remove a permission set that grants the export reports permission.

Full Access
Question # 25

Universal Containers is considering using Delegated Authentication as the sole means of Authenticating of Salesforce users. A Salesforce Architect has been brought in to assist with the implementation. What two risks Should the Architect point out? Choose 2 answers

A.

Delegated Authentication is enabled or disabled for the entire Salesforce org.

B.

UC will be required to develop and support a custom SOAP web service.

C.

Salesforce users will be locked out of Salesforce ifthe web service goes down.

D.

The web service must reside on a public cloud service, such as Heroku.

Full Access
Question # 26

Universal Containers (UC) would like its community users to be able to register and log in with Linkedin or Facebook Credentials. UC wants users to clearly see Facebook &Linkedin Icons when they register and login. What are the two recommended actions UC can take to achieve this Functionality? Choose 2 answers

A.

Enable Facebook and Linkedin as Login options in the login section of the Community configuration.

B.

Create custom Registration Handlers to link Linkedin and facebook accounts to user records.

C.

Store the Linkedin or Facebook user IDs in the Federation ID field on the Salesforce User record.

D.

Create custom buttons for Facebook and inkedin using JAVAscript/CSS on a custom Visualforce page.

Full Access
Question # 27

Universal Containers (UC) uses Salesforce for its customer service agents. UC has a proprietary system for order tracking which supports Security Assertion Markup Language (SAML) based single sign-on. The VP of customer service wants to ensure only active Salesforce users should be able to access the order tracking system which is only visible within Salesforce.

What should be done to fulfill the requirement?

Choose 2 answers

A.

Setup Salesforce as an identity provider (IdP) for order Tracking.

B.

Set up the Corporate Identity store as an identity provider (IdP) for Order Tracking,

C.

Customize Order Tracking to initiate a REST call to validate users in Salesforce after login.

D.

Setup Order Tracking as a Canvas app in Salesforce to POST IdPinitiated SAML assertion.

Full Access
Question # 28

Universal Containers (UC) is building a custom employee hut) application on Amazon Web Services (AWS) and would like to store their users' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating Afferent solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

A.

Configure the custom employee app as a connected app.

B.

Configure AWS as an OpenID Connect Provider.

C.

Create a custom external authentication provider.

D.

Develop a customAuth server in AWS.

Full Access
Question # 29

Universal containers (UC) wants to integrate a Web application with salesforce. The UC team hasimplemented the Oauth web-server Authentication flow for authentication process. Which two considerations should an architect point out to UC? Choose 2 answers

A.

The web application should be hosted on a secure server.

B.

The web server must be able to protect consumer privacy

C.

The flow involves passing the user credentials back and forth.

D.

The flow will not provide an Oauth refresh token back to the server.

Full Access
Question # 30

Universal Containers (UC) rollingout a new Customer Identity and Access Management Solution will be built on top of their existing Salesforce instance.

Several service providers have been setup and integrated with Salesforce using OpenlD Connect to allow for a seamless single sign-on experience. UC has a requirement to limit user access to only a subset of service providers per customer type.

Which two steps should be done on the platform to satisfy the requirement?

Choose 2 answers

A.

Manage which connected apps a user has access to byassigning authentication providers to the user’s profile.

B.

Assign the connected app to the customer community, and enable the users profile in the Community settings.

C.

Use Profiles and Permission Sets to assign user access to Admin Pre-Approved Connected Apps.

D.

Set each of the Connected App access settings to Admin Pre-Approved.

Full Access
Question # 31

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months.

Which two connected app options need to be configured to fulfill this use case?

Choose 2 answers

A.

Set Permitted Users to "Admin approved users are pre-authorized".

B.

Set Permitted Users to "All users may self-authorize".

C.

Setthe Session Timeout value to 3 months.

D.

Set the Refresh Token Policy to expire refresh token after 3 months.

Full Access
Question # 32

A global company is using the Salesforce Platform as an Identity Provider and needs to integrate a third-party application with its Experience Cloud customer portal.

Which two features should be utilized to provide users with loginand identity services for the third-party application?

Choose 2 answers

A.

Use the App Launcher with single sign-on (SSO).

B.

External a Data source with Named Principal identity type.

C.

Use a connected app.

D.

Use Delegated Authentication.

Full Access
Question # 33

A leadingfitness tracker company is getting ready to launch a customer community. The company wants its customers to login to the community and connect their fitness device to their profile. Customers should be able to obtain exercise details and fitness recommendation in the community.

Which should be used to satisfy this requirement?

A.

Named Credentials

B.

Login Flows

C.

OAuth Device Flow

D.

Single Sign-On Settings

Full Access
Question # 34

Northern Trail Outfitters (NTO) wants to improve its engagement with existing customers to boost customer loyalty. To get a better understanding of its customers, NTO establishes a single customer view including their buying behaviors, channel preferences and purchasing history. All of this information exists but is spread across different systems and formats.

NTO has decided to use Salesforce as the platform to build a 360 degree view. The company already uses Microsoft Active Directory (AD) to manage its users and company assets.

What should an Identity Architect do to provision, deprovision and authenticate users?

A.

Salesforce Identity is not needed since NTO uses Microsoft AD.

B.

Salesforce Identity can be included but NTO will be required to build a custom integration with Microsoft AD.

C.

Salesforce Identity is included in the Salesforce licenses so it does not need to be considered separately.

D.

A Salesforce Identity can be included but NTO will require Identity Connect.

Full Access
Question # 35

Universal containers (UC) has a mobile application that calls the salesforce REST API. In order to prevent users from having to enter their credentials everytime they use the app, UC has enabled the use of refresh Tokens as part of the salesforce connected App and updated their mobile app to take advantage of the refresh token. Even after enabling the refresh token, Users are still complaining that they have to enter their credentials once a day. What is the most likely cause of the issue?

A.

The Oauth authorizations are being revoked by a nightly batch job.

B.

The refresh token expiration policy is set incorrectly in salesforce

C.

The app is requesting too many access Tokens in a 24-hour period

D.

The users forget to check the box to remember their credentials.

Full Access
Question # 36

TION NO: 105

Universal Containers wants to allow its customers to log in to its Experience Cloud via a third-party authentication provider that supports only the OAuth protocol.

What should an identity architect do to fulfill this requirement?

A.

Contact Salesforce Support and enable delegate single sign-on.

B.

B. Create a custom external authentication provider.

C.

Use certificate-based authentication.

D.

Configure OpenID Connect authentication provider.

Full Access
Question # 37

Universal Containers (UC) has a Customer Community that uses Facebook for Authentication. UC would like to ensure that Changes in the Facebook profile are reflected on the appropriate Customer Community user: How can this requirement be met?

A.

Use the updateUser method on the registration Handler Class.

B.

Develop a scheduled job that calls out to Facebook on anightly basis.

C.

Use information in the signed Request that is received from facebook.

D.

Use SAML Just-In-Time Provisioning between Facebook and Salesforce.

Full Access
Question # 38

Universal Containers built a custom mobile app fortheir field reps to create orders in Salesforce. OAuth is used for authenticating mobile users. The app is built in such a way that when a user session expires after Initial login, a new access token is obtained automatically without forcing the user to log in again. While that improved the field reps' productivity, UC realized that they need a "logout" feature.

What should the logout function perform in this scenario, where user sessions are refreshed automatically?

A.

Invoke the revocation URL and pass the refresh token.

B.

Clear out the client Id to stop auto session refresh.

C.

Invoke the revocation URL and pass the access token.

D.

Clear out all the tokens to stop auto session refresh.

Full Access
Question # 39

Northern Trail Outfitters (NTO) is launching a new sportswear brand on its existing consumer portal built on Salesforce Experience Cloud. As part of the launch, emails with promotional links will be sent to existing customers to log in and claim a discount. The marketing manager would like the portal dynamically branded so that users will be directed to the brand link they clicked on; otherwise, users will view a recognizable NTO-branded page.

The campaign is launching quickly, so there is no time to procure any additional licenses. However, the development team is available to apply any required changes to the portal.

Which approach should the identity architect recommend?

A.

Create a full sandbox to replicate the portal site and update the branding accordingly.

B.

Implement Experience ID in the code and extend the URLs and endpoints, as required.

C.

Use Heroku to build the new brand site and embedded login to reuse identities.

D.

Configure an additional community site on the same org that is dedicated for the new brand.

Full Access
Question # 40

Which three types of attacks would a 2-Factor Authentication solution help garden against?

A.

Key logging attacks

B.

Network perimeter attacks

C.

Phishing attacks

D.

Dictionary attacks

E.

Man-in-the-middle attacks

Full Access
Question # 41

Sales users at Universal containers use salesforce for Opportunity management. Marketing uses a third-party application called Nestfor Lead nurturing that is accessed using username/password. The VP of sales wants to open up access to nest for all sales uses to provide them access to lead history and would like SSO for better adoption. Salesforce is already setup for SSO and uses Delegated Authentication. Nest can accept username/Password or SAML-based Authentication. IT teams have received multiple password-related issues for nest and have decided to set up SSO access for Nest for Marketing users as well. The CIO does not want to invest in a new IDP solution and is considering using Salesforce for this purpose. Which are appropriate license typechoices for sales and marketing users, giving salesforce is using Delegated Authentication? Choose 2 answers

A.

Salesforce license for sales users and Identity license for Marketing users

B.

Salesforce license for sales users and External Identity license for Marketing users

C.

Identity license for sales users and Identity connect license for Marketing users

D.

Salesforce license for sales usersand platform license for Marketing users.

Full Access
Question # 42

Universal containers(UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users toprovide a fingerprint in addition to username/Password to authenticate to this application.How can an architect support fingerprint as a form of identification for salesforce Authentication?

A.

Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

B.

Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

C.

Use an AppExchange product that does fingerprint scanning with native salesforce identity confirmation.

D.

Use custom login flows with callouts to a third-party fingerprint scanning application.

Full Access
Question # 43

After a recent audit, universal containers was advised to implement Two-factor Authentication for all of their critical systems, including salesforce. Which two actions should UC consider to meet this requirement? Choose 2 answers

A.

Require users to provide their RSA token along with their credentials.

B.

Require users to supply their email and phone number, which gets validated.

C.

Require users to enter a second password after the first Authentication

D.

Require users to use a biometric reader as well as their password

Full Access
Question # 44

A company wantsto provide its employees with a custom mobile app that accesses Salesforce. Users are required to download the internal native IOS mobile app from corporate intranet on their mobile device. The app allows flexibility to access other non-Salesforce internalapplications once users authenticate with Salesforce. The apps self-authorize, and users are permitted to use the apps once they have logged into Salesforce.

How should an identity architect meet the above requirements with the privately distributed mobile app?

A.

Use connected app with OAuth and Security Assertion Markup Language (SAML) to access other non-Salesforce internal apps.

B.

Configure Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps.

C.

Use Salesforce as an identity provider (IdP) to access the mobile app and use the external IdP for other non-Salesforce internal apps.

D.

Create a new hybrid mobile app and use the connected app with OAuth to authenticate users for Salesforce and non-Salesforce internal apps.

Full Access
Question # 45

Universal containers (UC) uses a home-grown employee portal for their employees to collaborate. UC decides to use salesforce ideas to allow the employees to post ideas from the employee portal. When clicking some links in the employee portal, the users should be redirected to salesforce, authenticated, and presented with relevant pages. What scope should be requested when using the Oauth token to meet this requirement?

A.

Web

B.

Full

C.

API

D.

Visualforce

Full Access
Question # 46

Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from withinsalesforce through App launcher and connected App set up? Choose 2 answers

A.

Google is the identity provider

B.

Salesforce is the identity provider

C.

Google is the service provider

D.

Salesforce is the service provider

Full Access
Question # 47

A security architect is rolling out a new multi-factor authentication (MFA) mandate, where all employees must go through a secure authentication process before accessing Salesforce. There are multiple Identity Providers (IdP) in place and the architect is considering how the "Authentication Method Reference" field (AMR) in the Login History can help.

Which two considerations should the architect keep in mind?

Choose 2 answers

A.

AMR field shows the authentication methods used at IdP.

B.

Both OIDC and Security Assertion Markup Language (SAML) are supported but AMR must be implemented at IdP.

C.

High-assurance sessions must be configured under Session Security Level Policies.

D.

Dependency on what is supported by OpenID Connect (OIDC) implementation at IdP.

Full Access
Question # 48

Under which scenario Web Server flow will be used?

A.

Used for web applications when server-side code needs to interact with APIS.

B.

Used for server-side components when page needs to be rendered.

C.

Used for mobile applications and testing legacy Integrations.

D.

Used for verifying Access protected resources.

Full Access
Question # 49

When designing a multi-branded Customer Identity and Access Management solution on the Salesforce Platform, how should an identity architect ensure a specific brand experience in Salesforce is presented?

A.

The Experience ID, which can be included in OAuth/Open ID flows and Security Assertion Markup Language (SAML) flows as a URL parameter.

B.

Provide a brand picker that the end user can use to select its sub-brand when they arrive on salesforce.

C.

Add a custom parameter to the service provider's OAuth/SAML call and implement logic on its login page to apply branding based on the parameters value.

D.

The Audience ID, which can be set in a shared cookie.

Full Access
Question # 50

architect is troubleshooting some SAML-based SSO errors during testing. The Architect confirmed that all of the Salesforce SSO settings are correct. Which two issues outside of the Salesforce SSO settings are most likely contributing to the SSO errors the Architect is encountering? Choose 2 Answers

A.

The Identity Provider is also used to SSO into five other applications.

B.

The clock on the Identity Provider server is twenty minutes behind Salesforce.

C.

The Issuer Certificate from the Identity Provider expired two weeks ago.

D.

The default language for the Identity Provider and Salesforce are Different.

Full Access
Question # 51

Universal containers (UC) has a classifiedinformation system that it's call centre team uses only when they are working on a case with a record type of "classified". They are only allowed to access the system when they own an open "classified" case, and their access to the system is removed at allother times. They would like to implement SAML SSO with salesforce as the IDP, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying access to the classified information system based on the open "classified" case record criteria?

A.

Use a custom connected App handler using apex to dynamically allow access to the system based on whether the staff owns any open "classified" cases.

B.

Use apex trigger on case to dynamically assign permission sets that grant access when a user is assigned with an open "classified" case, and remove it when the case is closed.

C.

Use custom SAML jit provisioning to dynamically query the user's open "classified" cases when attempting to access the classified information system

D.

Use salesforce reports to identify users that currently owns open "classified" cases and should be granted access to the classified information system.

Full Access
Question # 52

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

A.

Configure a predefined authentication provider for Amazon.

B.

Create a custom external authentication provider for Amazon.

C.

Configure an OpenID Connect Authentication Provider for Amazon.

D.

Configure Amazon as a connected app.

Full Access
Question # 53

A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for identity verification.

Which feature should an identity architect recommend to meet therequirements?

A.

Integrate with social websites (Facebook, Linkedin. Twitter)

B.

Use an external Identity Provider

C.

Create a custom Lightning Web Component

D.

Use Login Discovery

Full Access
Question # 54

What item should an Architect consider when designing a Delegated Authentication implementation?

A.

The Web service should be secured with TLS using Salesforce trusted certificates.

B.

The Web service should be able to accept one to four input method parameters.

C.

The web service should use the Salesforce Federation ID toidentify the user.

D.

The Web service should implement a custom password decryption method.

Full Access
Question # 55

An administrator created a connected app for a custom wet) application in Salesforce which needs to be visible as a tile in App Launcher The tile for the custom web application is missing in the app launcher for all users in Salesforce. The administrator requested assistance from an identity architect to resolve the issue.

Which two reasons are the source of the issue?

Choose 2 answers

A.

StartURL for the connected app is not set in Connected App settings.

B.

OAuth scope does not include "openid*.

C.

Session Policy is set as 'High Assurance Session required' for this connected app.

D.

The connected app is not set in the App menu as 'Visible in App Launcher".

Full Access
Question # 56

A financial services company uses Salesforce and has a compliance requirement to track information about devices from whichusers log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

A.

Use multi-factor authentication (MFA) to meet the compliance requirement totrack device information.

B.

Use the Activations feature to meet the compliance requirement to track device information.

C.

Use the Login History object to track information about devices from which users log in.

D.

Use Login Flows to capture device fromwhich users log in and store device and user information in a custom object.

Full Access
Question # 57

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.

Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

A.

Login Forensics

B.

Login Report

C.

Login Inspector

D.

Login History

Full Access
Question # 58

Containers (UC) uses a legacy Employee portal for their employees to collaborate. Employees access theportal from their company’s internal website via SSO. It is set up to work with SiteMinder and Active Directory. The Employee portal has features to support posing ideas. UC decides to use Salesforce Ideas for voting and better tracking purposes. To avoidprovisioning users on Salesforce, UC decides to integrate Employee portal ideas with Salesforce idea through the API. What is the role of Salesforce in the context of SSO, based on this scenario?

A.

Service Provider, because Salesforce is the applicationfor managing ideas.

B.

Connected App, because Salesforce is connected with Employee portal via API.

C.

Identity Provider, because the API calls are authenticated by Salesforce.

D.

An independent system, because Salesforce is not part of the SSO setup.

Full Access
Question # 59

The CIO of universal containers(UC) wants to start takingadvantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens canbe applied. Which two OAuth flows should the architect consider in their evaluation? Choose 2 answers

A.

Web server

B.

Jwt bearer token

C.

User-Agent

D.

Username-password

Full Access
Question # 60

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before their annual partner event.

Which approach will meet this requirement?

A.

Create tasks for users who need toupdate their data or accept the new community rules.

B.

Create a custom landing page and email campaign asking all community members to login and verify their data.

C.

Create a login flow that conditionally prompts users who have not accepted the newcommunity rules and who have missing or outdated information.

D.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

Full Access
Question # 61

Northern Trail Outfitters mar ages functional group permissions in a custom security application supported by a relational database and a REST service layer. Group permissions are mapped as permission sets in Salesforce.

Which action should an identity architect use to ensure functional group permissionsare reflected as permission set assignments?

A.

Use a Login Flow to query SAML attributes and set permission sets.

B.

Use a Login Flow with invocable Apex to callout to the security application and set permission sets.

C.

Use the Apex Just-in-Time (JIT) handler to query the Security Assertion markup Language (SAML) attributes and set permission sets.

D.

Use the Apex JIT handler to callout to the security application and set permission sets

Full Access
Question # 62

Universal Containers (UC) is using Active Directory as its corporate identity provider and Salesforce as its CRM for customer care agents, who use SAML based sign sign-on to login to Salesforce. The default agent profile does not include the Manage User permission. UC wants to dynamically update the agent role and permission sets.

Which two mechanisms are used to provision agents with the appropriate permissions?

Choose 2 answers

A.

Use Login Flow in User Context to update role and permission sets.

B.

Use Login Flow in System Context to updaterole and permission sets.

C.

Use SAML Just-m-Time (JIT) Handler class run as current user to update role and permission sets.

D.

Use SAML Just-in-Time (JIT) handler class run as an admin user to update role and permission sets.

Full Access
Question # 63

Universal Containers is creating a web application that will be secured by SalesforceIdentity using the OAuth 2.0 Web Server Flow uses the OAuth 2.0 authorization code grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

A.

Verification URL

B.

Client Secret

C.

Access Token

D.

Scopes

Full Access
Question # 64

Universal Containers (UC) plans to use a SAML-based third-party IdP serving both of the Salesforce Partner Community and the corporate portal. UC partners will log in 65* to the corporate portal to access protected resources, including links to Salesforce resources. What would be the recommended way to configure the IdP so that seamless access can be achieved in this scenario?

A.

Set up the corporate portal as a ConnectedApp in Salesforce and use the Web server OAuth flow.

B.

Configure SP-initiated SSO that passes the SAML token upon Salesforce resource access request.

C.

Set up the corporate portal as a Connected App in Salesforce and use the User Agent OAuth flow.

D.

Configure IdP-initiated SSO that passes the SAML token upon Salesforce resource access request.

Full Access
Question # 65

A Salesforce customer is implementing Sales Cloud and a custom pricing application for its call center agents. An Enterprise single sign-on solution is used to authenticate and sign-in users to all applications. The customer has the following requirements:

1. The development team has decided touse a Canvas app to expose the pricing application to agents.

2. Agents should be able to access the Canvas app without needing to log in to the pricing application.

Which two options should the identity architect consider to provide support for the Canvas app to initiate login for users?

Choose 2 answers

A.

Select "Enable as a Canvas Personal App" in the connected app settings.

B.

Enable OAuth settings in the connected app with required OAuth scopes for the pricing application.

C.

Configure the Canvas app as a connected app and set Admin-approved users as pre-authorized.

D.

Enable SAML in the connected app and Security Assertion Markup Language (SAML) Initiation Method as Service Provider Initiated.

Full Access
Question # 66

Universal Containers (UC) has an existing web application that itwould like to access from Salesforce without requiring users to re-authenticate. The web application is owned UC and the UC team that is responsible for it is willing to add new javascript code and/or libraries to the application. What implementation should an Architect recommend to UC?

A.

Create a Canvas app and use Signed Requests to authenticate the users.

B.

Rewrite the web application as a set of Visualforce pages and Apex code.

C.

Configure the web application as an item in the Salesforce App Launcher.

D.

Add the web application as a ConnectedApp using OAuth User-Agent flow.

Full Access
Question # 67

Universal containers (UC) is concerned that having a self-registration page will provide a means for "bots" or unintended audiences to create user records, thereby consuming licences and adding dirty data. Which two actions should UC take to prevent unauthorised form submissions during theself-registration process? Choose 2 answers

A.

Use open-ended security questions and complex password requirements

B.

Primarily use lookup and picklist fields on the self registration page.

C.

Require a captcha at the end of the self-registration process.

D.

Use hidden fields populated via java script events in the self-registration page.

Full Access
Question # 68

Northern Trail Outfitters (NTO) is planning to implement a community for its customersusing Salesforce Experience Cloud. Customers are not able to self-register. NTO would like to have customers set their own passwords when provided access to the community.

Which two recommendations should an identity architect make to fulfill this requirement?

Choose 2 answers

A.

Add customers as contacts and add them to Experience Cloud site.

B.

Enable Welcome emails while configuring the Experience Cloud site.

C.

Allow Password reset using the API to update Experience Cloud site membership.

D.

Use Login Flows to allow users to reset password in Experience Cloud site.

Full Access
Question # 69

Universal Containers (UC) is using its production org as the identity provider for a new Experience Cloud site and the identity architect is deciding which login experience to use for the site.

Which two page types are valid login page types for the site?

Choose 2 answers

A.

Experience Builder Page

B.

lightning Experience Page

C.

Login Discovery Page

D.

Embedded Login Page

Full Access
Question # 70

Universal Containers (UC) wants its closed Won opportunities to be synced to a Data Warehouse in near real time. UC has implemented Outbound Message to enable near real-time data sync. UC wants to ensure that communication between Salesforce and Target System is Secure. What Certificate is sent along with the Outbound Message?

A.

The CA-SignedCertificate from the Certificate and Key Management menu.

B.

The default Client Certificate from the Develop--> API Menu.

C.

The default Client Certificate or a Certificate from Certificate and Key Management menu.

D.

The Self-Signed Certificates from theCertificate & Key Management menu.

Full Access
Question # 71

Universal Containers (UC) uses Salesforce as a CRM and identity provider (IdP) for their Sales Team to seamlessly login to intemaJ portals. The IT team at UC is now evaluating Salesforce to act as an IdP for its remaining employees.

Which Salesforce license is required to fulfill this requirement?

A.

External Identity

B.

IdentityVerification

C.

Identity Connect

D.

Identity Only

Full Access
Question # 72

Universal Containers (UC) has decided to replace the homegrown customer portalwith Salesforce Experience Cloud. UC will continue to use its third-party single sign-on (SSO) solution that stores all of its customer and partner credentials.

The first time a customer logs in to the Experience Cloud site through SSO, a user record needsto be created automatically.

Which solution should an identity architect recommend in order to automatically provision users in Salesforce upon login?

A.

Just-in-Time (JIT) provisioning

B.

Custom middleware and web services

C.

Custom login flow and Apex handler

D.

Third-party AppExchange solution

Full Access