Big Cyber Monday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Identity-and-Access-Management-Architect Questions and Answers

Question # 6

which three are features of federated Single Sign-on solutions? Choose 3 answers

A.

It federates credentials control toauthorized applications.

B.

It establishes trust between Identity store and service provider.

C.

It solves all identity and access management problems.

D.

It improves affiliated applications adoption rates.

E.

It enables quick and easy provisioning and deactivating of users.

Full Access
Question # 7

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before their annual partner event.

Which approach will meet this requirement?

A.

Create tasks for users who need toupdate their data or accept the new community rules.

B.

Create a custom landing page and email campaign asking all community members to login and verify their data.

C.

Create a login flow that conditionally prompts users who have not accepted the newcommunity rules and who have missing or outdated information.

D.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

Full Access
Question # 8

Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion Markup Language (SAML) configuration supports the company's single sign-on process to Salesforce,

Which Salesforce OAuth authorization flow should be used?

A.

OAuth 2.0 SAML Bearer AssertionFlow

B.

A SAML Assertion Row

C.

OAuth 2.0 User-Agent Flow

D.

OAuth 2.0 JWT Bearer Flow

Full Access
Question # 9

In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?

A.

Use of self-signed certificate leads to lower maintenance for trusted party because multiple self-signed certs need to be maintained.

B.

Use of self-signed certificate leads to higher maintenance for trusted party because they have to act as the trusted CA

C.

Use of self-signed certificate leads to lowermaintenance for trusting party because there is no trusted CA cert to maintain.

D.

Use of self-signed certificate leads to higher maintenance for trusting party because the cert needs to be added to their truststore.

Full Access
Question # 10

Universal containers(UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users toprovide a fingerprint in addition to username/Password to authenticate to this application.How can an architect support fingerprint as a form of identification for salesforce Authentication?

A.

Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

B.

Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

C.

Use an AppExchange product that does fingerprint scanning with native salesforce identity confirmation.

D.

Use custom login flows with callouts to a third-party fingerprint scanning application.

Full Access
Question # 11

Northern Trail Outfitters (NTO) has an off-boarding process where a terminated employee is first disabled in the Lightweight Directory ActProtocol (LDAP) directory, then requests are sent to the various application support teams to finish user deactivations. A terminated employee recently was able to login to NTO's Salesforce instance 24 hours after termination, even though the user was disabled in the corporate LDAP directory.

What should an identity architect recommend to prevent this from happening in the future?

A.

Create a Just-in-Time provisioning registration handler to ensure users are deactivated in Salesforce as they are disabled inLDAP.

B.

Configure an authentication provider to delegate authentication to the LDAP directory.

C.

use a login flow to make a callout to the LDAP directory before authenticating the user to Salesforce.

D.

Setup an identity provider (IdP) to authenticate users using LDAP, set up single sign-on to Salesforce and disable Login Form authentication.

Full Access
Question # 12

Northern Trail Outfitters (NTO) has a requirement to ensure all user logins include a single multi-factor authentication (MFA) prompt. Currently,users are allowed the choice to login with a username and password or via single sign-on against NTO's corporate Identity Provider, which includes built-in MFA.

Which configuration will meet this requirement?

A.

Create and assign a permission set to all employees that includes "MFA for User Interface Logins."

B.

Create a custom login flow that enforces MFA and assign it to a permission set. Then assign the permission set to all employees.

C.

Enable "MFA for User Interface Logins" for your organization fromSetup -> Identity Verification.

D.

For all employee profiles, set the Session Level Required at Login to High Assurance and add the corporate identity provider to the High Assurance list for the org's Session Security Levels.

Full Access
Question # 13

Universal containers (UC) is building a mobile application that will make calls to the salesforce RESTAPI. Additionally, UC would like to provide the optimal experience for its mobile users. Which two OAuth scopes should UC configure in the connected App? Choose 2 answers

A.

Refresh token

B.

API

C.

full

D.

Web

Full Access
Question # 14

Which two considerations should be made whenimplementing Delegated Authentication?

Choose 2 answers

A.

The authentication web service can include custom attributes.

B.

It can be used to authenticate API clients and mobile apps.

C.

It requires trusted IP ranges at the User Profile level.

D.

Salesforce servers receive but do not validate a user’s credentials.

E.

Just-in-time Provisioning can be configured for new users.

Full Access
Question # 15

Universal Containers (UC) is building a customer community and will allow customers to authenticate using Facebook credentials. The First time the user authenticating using Facebook, UC would like acustomer account created automatically in their accounting system. The accounting system has a web service accessible to Salesforce for the creation of accounts. How can the Architect meet these requirements?

A.

Create a custom application on Heroku that manages the sign-on process from Facebook.

B.

Use JIT Provisioning to automatically create the account in the accounting system.

C.

Add an Apex callout in the registration handler of the authorization provider.

D.

Use OAuth JWT flow to pass the data fromSalesforce to the Accounting System.

Full Access
Question # 16

Northern Trail Outfitters would like to use a portal built on Salesforce Experience Cloud for customer self-service. Guests of the portal be able toself-register, but be unable to automatically be assigned to a contact record until verified. External Identity licenses have been purchased for the project.

After registered guests complete an onboarding process, a flow will create the appropriate accountand contact records for the user.

Which three steps should an identity architect follow to implement the outlined requirements?

Choose 3 answers

A.

Enable "Allow customers and partners to self-register".

B.

Select the "Configurable Self-Reg Page" optionunder Login & Registration.

C.

Set jp an external login page and call Salesforce APIs for user creation.

D.

Customize the self-registration Apex handler to temporarily associate the user to a shared single contact record.

E.

Customize me self-registrationApex handler to create only the user record.

Full Access
Question # 17

Universal containers (UC) wants users to authenticate into their salesforceorg using credentials stored in a custom identity store. UC does not want to purchase or use a third-party Identity provider. Additionally, UC is extremely wary of social media and does not consider it to be trust worthy. Which two options should an architect recommend to UC? Choose 2 answers

A.

Use a professional social media such as LinkedIn as an Authentication provider

B.

Build a custom web page that uses the identity store and calls frontdoor.jsp

C.

Build a custom Web service that is supported byDelegated Authentication.

D.

Implement the Openid protocol and configure an authentication provider

Full Access
Question # 18

architect is troubleshooting some SAML-based SSO errors during testing. The Architect confirmed that all of the Salesforce SSO settings are correct. Which two issues outside of the Salesforce SSO settings are most likely contributing to the SSO errors the Architect is encountering? Choose 2 Answers

A.

The Identity Provider is also used to SSO into five other applications.

B.

The clock on the Identity Provider server is twenty minutes behind Salesforce.

C.

The Issuer Certificate from the Identity Provider expired two weeks ago.

D.

The default language for the Identity Provider and Salesforce are Different.

Full Access
Question # 19

The CMO of an advertising company has invited an Identity and Access Management (IAM) specialist to discussSalesforce out-of-box capabilities for configuring the company*s login and registration experience on Salesforce Experience Cloud.

The CMO is looking to brand the login page with the company's logo, background color, login button color, and dynamic right-frame from an external URL.

Which two solutions should the IAM specialist recommend?

Choose 2 answers

A.

Use Experience Builder to build branded Reset and Forgot Password pages.

B.

Build custom pages for branding requirements in Experience Cloud.

C.

Build custom site pages for reset and forgot password features.

D.

Login & Registration pages can be branded in the Community Administration settings.

Full Access
Question # 20

Northern Trail Outfitters (NTO) recently purchased Salesforce Identity Connect to streamline user provisioning across Microsoft Active Directory (AD) and Salesforce Sales Cloud.

NTO has asked an identity architect to identify which salesforce security configurations can map to AD permissions.

Which three Salesforce permissions are available to map to AD permissions?

Choose 3 answers

A.

Public Groups

B.

Field-Level Security

C.

Roles

D.

Sharing Rules

E.

Profiles and Permission Sets

Full Access
Question # 21

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes ato successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2answers

A.

Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.

B.

Customer 360 Identity enables an organization to build a single login for each ofits customers, giving the organization an understanding of the user's login activity across all its digital properties and applications.

C.

Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation ofuser activity,even if it spans multiple corporate brands and user experiences.

D.

Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understanduser activity before and after the users identify themselves.

Full Access
Question # 22

Universal Containers (UC) has a strict requirement to authenticate users to Salesforce using their mainframe credentials. The mainframe user store cannot be accessed from aSAML provider. UC would also like to have users in Salesforce created on the fly if they provide accurate mainframecredentials.

How can the Architect meet these requirements?

A.

Use a Salesforce Login Flow to call out to a web service and create the user on the fly.

B.

Use the SOAP API to create the user when created on the mainframe; implement Delegated Authentication.

C.

Implement Just-In-Time Provisioning on the mainframe to create the user on the fly.

D.

Implement OAuth User-Agent Flow on the mainframe; use a Registration Handler to create the user on the fly.

Full Access
Question # 23

A multinational industrial products manufacturer is planning to implement Salesforce CRMto manage their business. They have the following requirements:

1. They plan to implement Partner communities to provide access to their partner network .

2. They have operations in multiple countries and are planning to implement multiple Salesforce orgs.

3. Some of their partners do business in multiple countries and will need information from multiple Salesforce communities.

4. They would like to provide a single login for their partners.

How should an Identity Architect solution this requirement with limited custom development?

A.

Create a partner login for the country of their operation and use SAML federation to provide access to other orgs.

B.

Consolidate Partner related information in a single org and provide access through Salesforce community.

C.

Allow partners to choose the Salesforce org they need information from and use login flows to authenticate access.

D.

Register partners in one org and access information from other orgs using APIs.

Full Access
Question # 24

Universal Containers is budding a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

A.

The Use Digital Signature option in the connected app.

B.

The "web" OAuth scope in theconnected app,

C.

The "api" OAuth scope in the connected app.

D.

The "edair_api" OAuth scope m the connected app.

Full Access
Question # 25

Universal containers (UC) employees havesalesforce access from restricted ip ranges only, to protect against unauthorized access. UC wants to rollout the salesforce1 mobile app and make it accessible from any location. Which two options should an architect recommend? Choose 2 answers

A.

Relax the ip restriction in the connect app settings for the salesforce1 mobile app

B.

Use login flow to bypass ip range restriction for the mobile app.

C.

Relax the ip restriction with a second factor in the connect app settings for salesforce1 mobile app

D.

Remove existing restrictions on ip ranges for all types of user access.

Full Access
Question # 26

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

A.

Client ID

B.

Refresh Token

C.

Authorization Code

D.

Verification Code

E.

Scopes

Full Access
Question # 27

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grantsan Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

A.

1, 4, 5, 2, 3

B.

4, 1, 5, 2, 3

C.

2, 1, 3, 4, 5

D.

4,5,2, 3, 1

Full Access
Question # 28

Northern Trail Outfitters (NTO) has a number of employees who do NOT need access Salesforce objects. Trie employees should sign in to a custom Benefits web app using their Salesforce credentials.

Which license should the identity architect recommend tofulfill this requirement?

A.

Identity Only License

B.

External Identity License

C.

Identity Verification Credits Add-on License

D.

Identity Connect License

Full Access
Question # 29

Universal Containers (UC) has a Customer Community that uses Facebook for of authentication. UC would like to ensure that changes in the Facebook profile are 65. reflected on the appropriate Customer Community user. How can this requirement be met?

A.

Use SAML Just-In-Time Provisioning between Facebook and Salesforce.

B.

Use information in the Signed Request that is received from Facebook.

C.

Develop a scheduled job that calls out to Facebook on a nightly basis.

D.

Use the update User () method on the Registration Handler class.

Full Access
Question # 30

How should an Architect force user to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?

A.

Use Custom Login Flows with Apex to detect the user's IP address and prompt for 2FA if needed.

B.

Add the list of company's network IP addresses to the Login Range list under 2FA Setup.

C.

Use an Apex Trigger on the UserLogin object to detect the user's IP address and prompt for 2FA if needed.

D.

Apply the "Two-factor Authentication for User Interface Logins" permission and Login IP Ranges for all Profiles.

Full Access
Question # 31

Universal containers (UC) would like to enable self - registration for their salesforce partner community users. UC wants to capture some custom data elements from the partner user,and based on these data elements, wants to assign the appropriate profile and account values. Which two actions should the architect recommend to UC? Choose 2 answers

A.

Modify the communitiesselfregcontroller to assign the profile and account.

B.

Modify the selfregistration trigger to assign profile and account.

C.

Configure registration for communities to use a custom visualforce page.

D.

Configure registration for communities to use a custom apex controller.

Full Access
Question # 32

Universal Containers (UC) is building a custom employee hut) application on Amazon Web Services (AWS) and would like to store their users' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating Afferent solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

A.

Configure the custom employee app as a connected app.

B.

Configure AWS as an OpenID Connect Provider.

C.

Create a custom external authentication provider.

D.

Develop a customAuth server in AWS.

Full Access
Question # 33

Universal Containers (UC) has aclassified information system that its call center team uses only when they are working on a case with a record type "Classified". They are only allowed to access the system when they own an open "Classified" case, and their access to the system is removedat all other times. They would like to implement SAML SSO with Salesforce as the Idp, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "Classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying access to the classified information system based on the open "classified" case record criteria?

A.

Use Salesforce reports to identify users that currently own open "Classified" cases and should be granted access to the Classified information system.

B.

Use Apex trigger on case to dynamically assign permission Sets that Grant access when a user is assigned with an open "Classified" case, and remove it when the case is closed.

C.

Use Custom SAML JIT Provisioning to dynamically query the user's open "Classified" cases when attempting to access the classified information system.

D.

Use a Common Connected App Handler using Apex to dynamically allow access tothe system based on whether the staff owns any open "Classified" Cases.

Full Access
Question # 34

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming ail social sign-on providers support OpenID Connect?

A.

Configure an authentication provider and a registration handler for each social sign-on provider.

B.

Configure a single sign-on settingand a registration handler for each social sign-on provider.

C.

Configure an authentication provider and a Just-In-Time (JIT) handler for each social sign-on provider.

D.

Configure a single sign-on setting and a JIT handler for each social sign-on provider.

Full Access
Question # 35

N NO: 161

An identity architect has built a native mobile application and plans to integrate it with a Salesforce Identity solution. The following are the requirements for the solution:

1. Users should not have to login every time they use the app.

2. The app should be able to make calls to the Salesforce REST API.

3. End users should NOT see the OAuth approval page.

How should the identity architect configure the Salesforce connected app to meet the requirements?

A.

Enable the API Scope and Offline Access Scope, upload a certificate so JWT Bearer Flow can be used and then set the connected app access settings to "Admin Pre-Approved".

B.

Enable the API Scope and Offline Access Scope on the connected app, and then set the connected app to access settings to 'Admin Pre-Approved".

C.

Enable the Full Access Scope and then set the connected app access settings to "Admin Pre-Approved".

D.

Enable the API Scope and Offline Access Scope on the connected app, and then set the Connected App access settings to "User may self authorize".

Full Access
Question # 36

Which twosecurity risks can be mitigated by enabling Two-Factor Authentication (2FA) in Salesforce? Choose 2 answers

A.

Users leaving laptops unattended and not logging out of Salesforce.

B.

Users accessing Salesforce from a public Wi-Fi access point.

C.

Users choosing passwords that are the same as their Facebook password.

D.

Users creating simple-to-guess password reset questions.

Full Access
Question # 37

Which three are capabilities of SAML-based Federated authentication? Choose 3 answers

A.

Trust relationships between Identity Provider and Service Provider are required.

B.

SAML tokens can be in XML or JSON format and can be used interchangeably.

C.

Web applications with no passwords are more secure and stronger against attacks.

D.

Access tokens areused to access resources on the server once the user is authenticated.

E.

Centralized federation provides single point of access, control and auditing.

Full Access
Question # 38

Universal Containers uses Salesforce as an identity provider and Concur as the Employee Expense management system. The HR director wants to ensure Concur accounts for employees are created only after the apocopate approval in the Salesforce org.

Which three steps should theidentity architect use to implement this requirement?

Choose 3 answers

A.

Create an approval process for a custom object associated with the provisioning flow.

B.

Create a connected app for Concur in Salesforce.

C.

Enable User Provisioning for theconnected app.

D.

Create an approval process for user object associated with the provisioning flow.

E.

Create an approval process for UserProvisionlngRequest object associated with the provisioning flow.

Full Access
Question # 39

Universal Containers (UC) uses Salesforce as a CRM and identity provider (IdP) for their Sales Team to seamlessly login to intemaJ portals. The IT team at UC is now evaluating Salesforce to act as an IdP for its remaining employees.

Which Salesforce license is required to fulfill this requirement?

A.

External Identity

B.

IdentityVerification

C.

Identity Connect

D.

Identity Only

Full Access
Question # 40

Universal Containers has multiple Salesforce instances where users receive emails from different instances. Users should be logged into the correct Salesforce instance authenticated by their IdP when clicking on an email link to a Salesforce record.

What should be enabled in Salesforce as a prerequisite?

A.

My Domain

B.

External Identity

C.

Identity Provider

D.

Multi-Factor Authentication

Full Access
Question # 41

A global company is using the Salesforce Platform as an Identity Provider and needs to integrate a third-party application with its Experience Cloud customer portal.

Which two features should be utilized to provide users with loginand identity services for the third-party application?

Choose 2 answers

A.

Use the App Launcher with single sign-on (SSO).

B.

External a Data source with Named Principal identity type.

C.

Use a connected app.

D.

Use Delegated Authentication.

Full Access
Question # 42

An architect has successfully configuredSAML-BASED SSO for universal containers. SSO has been working for 3 months when Universal containers manually adds a batch of new users to salesforce. The new users receive an error from salesforce when trying to use SSO. Existing users are still able to successfully use SSO to access salesforce. What is the probable cause of this behaviour?

A.

The administrator forgot to reset the new user's salesforce password.

B.

The Federation ID field on the new user records is not correctly set

C.

The my domaincapability is not enabled on the new user's profile.

D.

The new users do not have the SSO permission enabled on their profiles.

Full Access
Question # 43

A global fitness equipment manufacturer is planning to sell fitness tracking devices and has the following requirements:

1) Customer purchases the device.

2) Customer registers the device using their mobile app.

3) A case should automatically be createdin Salesforce and associated with the customer’s account in cases where the device registers issues with tracking.

Which OAuth flow should be used to meet these requirements?

A.

OAuth 2.0 Asset Token Flow

B.

OAuth 2.0 Username-Password Flow

C.

OAuth 2.0User-Agent Flow

D.

OAuth 2.0 SAML Bearer Assertion Flow

Full Access
Question # 44

Under which scenario Web Server flow will be used?

A.

Used for web applications when server-side code needs to interact with APIS.

B.

Used for server-side components when page needs to be rendered.

C.

Used for mobile applications and testing legacy Integrations.

D.

Used for verifying Access protected resources.

Full Access
Question # 45

A financial enterprise isplanning to set up a user authentication mechanism to login to the Salesforce system. Due to regulatory requirements, the CIO of the company wants user administration, including passwords and authentication requests, to be managed by an external system that is only accessible via a SOAP webservice.

Which authentication mechanism should an identity architect recommend to meet the requirements?

A.

OAuth Web-Server Flow

B.

Identity Connect

C.

Delegated Authentication

D.

Just-in-Time Provisioning

Full Access
Question # 46

Universal Containers (UC) is looking to build a Canvas app and wants to use the corresponding Connected App to control where the app is visible. Which two options are correct in regards to where theapp can be made visible under the Connected App setting for the Canvas app? Choose 2 answers

A.

As part of the body of a Salesforce Knowledge article.

B.

In the mobile navigation menu on Salesforce for Android.

C.

The sidebar of a Salesforce Console as a console component.

D.

Included in the Call Control Tool that's part of Open CTI.

Full Access
Question # 47

Universal containers (UC) would like to enable SAML-BASED SSO for asalesforce partner community. UC has an existing ldap identity store and a third-party portal. They would like to use the existing portal as the primary site these users’ access, but also want to allow seamless access to the partner community. What SSO flow should an architect recommend?

A.

User-Agent

B.

IDP-initiated

C.

Sp-Initiated

D.

Web server

Full Access
Question # 48

An organization has a central cloud-based Identity and Access Management (IAM) Service for authentication and user management, which must be utilized by all applications as follows:

1 - Change of a user status in the central IAM Service triggers provisioning or deprovisioning in the integrated cloud applications.

2 - Security Assertion Markup Language single sign-on (SSO) is used to facilitate access for users authenticated atidentity provider (Central IAM Service).

Which approach should an IAM architect implement on Salesforce Sales Cloud to meet the requirements?

A.

A Configure Salesforce as a SAML Service Provider, and enable SCIM (System for Cross-Domain Identity Management) for provisioning and deprovisioning of users.

B.

Configure Salesforce as a SAML service provider, and enable Just-in Time (JIT) provisioning and deprovisioning of users.

C.

Configure central IAM Service as an authentication provider and extend registration handler to manage provisioning and deprovisioning of users.

D.

Deploy Identity Connect component and set up automated provisioning and deprovisioning of users, as well as SAML-based SSO.

Full Access
Question # 49

Universal containers (UC) is concerned that having a self-registration page will provide a means for "bots" or unintended audiences to create user records, thereby consuming licences and adding dirty data. Which two actions should UC take to prevent unauthorised form submissions during theself-registration process? Choose 2 answers

A.

Use open-ended security questions and complex password requirements

B.

Primarily use lookup and picklist fields on the self registration page.

C.

Require a captcha at the end of the self-registration process.

D.

Use hidden fields populated via java script events in the self-registration page.

Full Access
Question # 50

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?

A.

Use the Salesforce Authenticator mobile app with two-step verification

B.

Lock sessions to the IP address from which they originated.

C.

Increase Password complexity requirements in Salesforce.

D.

Implement Single Sign-on using a corporateIdentity store.

Full Access
Question # 51

Northern Trail Outfitters recently acquired a company. Each company will retain its Identity Provider (IdP). Both companies rely extensively on Salesforce processes that send emails to users to take specific actions in Salesforce.

How should the combined companys' employees collaborate in a single Salesforce org, yet authenticate to the appropriate IdP?

A.

Configure unique MyDomains for each company and have generated links use the appropriate MyDomam in the URL.

B.

Have generated links append a querystnng parameter indicating the IdP. The login service will redirect to the appropriate IdP.

C.

Have generated links be prefixed with the appropriate IdP URL to invoke an IdP-initiated Security Assertion Markup Language flow when clicked.

D.

Enable each IdP as a login option in the MyDomain Authentication Service settings. Users will then click onthe appropriate IdP button.

Full Access
Question # 52

Universal containers (UC) would like to enable SSO between their existing Active Directory infrastructure and salesforce. The it team prefers to manage all users in Active Directory and would like to avoid doing any initial setup of users in salesforce directly,including the correct assignment of profiles, roles and groups. Which two optimal solutions should UC use to provision users in salesforce? Choose 2 answers

A.

Use the salesforce REST API to sync users from active directory to salesforce

B.

Use an app exchange product to sync users from Active Directory to salesforce.

C.

Use Active Directory Federation Services to sync users from active directory to salesforce.

D.

Use Identity connect to sync users from Active Directory to salesforce

Full Access
Question # 53

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

A.

Use a HTTP POST to request the refresh token for the current user.

B.

Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, including the current OAuth token.

C.

Use a HTTP POST to make a call to the revoke token endpoint.

D.

Enable Single Logout with a secure logout URL.

Full Access
Question # 54

Northern Trail Outfitters (NTO) is planning to build a new customer service portal and wants to use passwordlesslogin, allowing customers to login with a one-time passcode sent to them via email or SMS.

How should the quantity of required Identity Verification Credits be estimated?

A.

Each community comes with 10,000 Identity Verification Credits per month and onlycustomers with more than 10,000 logins a month should estimate additional SMS verifications needed.

B.

Identity Verification Credits are consumed with each SMS (text message) sent and should be estimated based on the number of login verification challengesfor SMS verification users.

C.

Identity Verification Credits are consumed with each verification sent and should be estimated based on the number of loginsthat will incur a verification challenge.

D.

Identity Verification Credits are a direct add-on license based on the number of existing member-based or login-based Community licenses.

Full Access
Question # 55

Universal Containers (UC) uses Global Shipping (GS) as one of their shipping vendors. Regional leads of GS need access to UC's Salesforce instance for reporting damage of goods using Cases. The regional leads also need access to dashboards to keep track ofregional shipping KPIs. UC internally uses a third-party cloud analytics tool forcapacity planning and UC decided to provide access to this tool to a subset of GS employees. In addition to regional leads, the GS capacity planning team would benefit fromaccess to this tool. To access the analytics tool, UC IT has set up Salesforce as the Identity provider for Internal users and would like to follow the same approach for the GS users as well. What are the most appropriate license types for GS Tregional Leads and the GS Capacity Planners? Choose 2 Answers

A.

Customer Community Plus license for GS Regional Leads and External Identity for GS Capacity Planners.

B.

Customer Community Plus license for GS Regional Leads and Customer Community license for GS Capacity Planners.

C.

Identity License for GS Regional Leads and External Identity license for GS capacity Planners.

D.

Customer Community license for GS Regional Leads and Identity license for GS Capacity Planners.

Full Access
Question # 56

Universal containers (UC) has decided to use identity connect as it's identity provider. UC uses active directory(AD) and has a team that is very familiar and comfortable with managing ad groups. UC would like to use AD groups to help configure salesforce users. Which three actions can AD groups control through identity connect? Choose 3 answers

A.

Public Group Assignment

B.

Granting report folder access

C.

Role Assignment

D.

Custom permission assignment

E.

Permission sets assignment

Full Access
Question # 57

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

A.

Query using OpenIDConnect discovery endpoint.

B.

A Leverage OpenID Connect Token Introspection.

C.

Create a custom OAuth scope.

D.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

Full Access
Question # 58

Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured asa connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers

A.

Disallow the use of Single Sign-on for anyusers of the mobile app.

B.

Require High Assurance sessions in order to use the Connected App.

C.

Set Login IP Ranges to the internal network for all of the app users Profiles.

D.

Use Google Authenticator as an additional part of the login process

Full Access
Question # 59

A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for identity verification.

Which feature should an identity architect recommend to meet therequirements?

A.

Integrate with social websites (Facebook, Linkedin. Twitter)

B.

Use an external Identity Provider

C.

Create a custom Lightning Web Component

D.

Use Login Discovery

Full Access
Question # 60

Which two capabilities does My Domain enable in the context of a SAML SSOconfiguration? Choose 2 answers

A.

App Launcher

B.

Resource deep linking

C.

SSO from Salesforce Mobile App

D.

Login Forensics

Full Access
Question # 61

An identity architect has been asked to recommend a solution that allows administrators to configure personalized alert messages to users before they land on the Experience Cloud site (formerly known as Community) homepage.

What is recommended to fulfill this requirement with the least amount of customization?

A.

Customize the registration handler Apex class to create a routing logic navigating to different home pages based on the user profile.

B.

Use Login Flows to add a screen that shows personalized alerts.

C.

Build aLightning web Component (LWC) for a homepage that shows custom alerts.

D.

Create custom metadata that stores user alerts and use a LWC to display alerts.

Full Access
Question # 62

Northern Trail Outfitters (NTO) wants to give customers the ability to submit and manage issues with their purchases. It is important for NTO to give its customers the ability to login with their Amazon credentials.

What should an identity architect recommend to meet these requirements?

A.

Configure a predefined authentication provider for Amazon.

B.

Create a custom external authentication provider for Amazon.

C.

Configure an OpenID Connect Authentication Provider for Amazon.

D.

Configure Amazon as a connected app.

Full Access
Question # 63

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet therequirements?

A.

OpenID Connect

B.

User Agent Flow

C.

JWT Bearer Token Flow

D.

Web Server Flow

Full Access
Question # 64

Universal Containers (UC) has built a custom time tracking app for its employee. UC wants to leverage Salesforce Identity to control access to the custom app.

At a minimum, which Salesforce license is required to support this requirement?

A.

Identity Verification

B.

Identity Connect

C.

Identity Only

D.

External Identity

Full Access
Question # 65

An identity architect's client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of ITis worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Ensure that on the SSO settings page, the "Request Signing Certificate" field has a self-signed certificate.

C.

Ensure that the Issuer and Assertion Consumer service (ACS) URL is propertyconfigured between SP and IDP.

D.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

Full Access
Question # 66

Universal Containers (UC) uses Salesforce for its customer service agents. UC has a proprietary system for order tracking which supports Security Assertion Markup Language (SAML) based single sign-on. The VP of customer service wants to ensure only active Salesforce users should be able to access the order tracking system which is only visible within Salesforce.

What should be done to fulfill the requirement?

Choose 2 answers

A.

Setup Salesforce as an identity provider (IdP) for order Tracking.

B.

Set up the Corporate Identity store as an identity provider (IdP) for Order Tracking,

C.

Customize Order Tracking to initiate a REST call to validate users in Salesforce after login.

D.

Setup Order Tracking as a Canvas app in Salesforce to POST IdPinitiated SAML assertion.

Full Access
Question # 67

An identity architect is implementing a mobile-first Consumer Identity Access Management (CIAM) for external users. User authentication is the only requirement. The users email or mobile phone number should be supported as a username.

Which two licenses are needed to meet this requirement?

Choose 2 answers

A.

External Identity Licenses

B.

Identity Connect Licenses

C.

Email Verification Credits

D.

SMS verification Credits

Full Access
Question # 68

Universal Containers (UC) is building a custom Innovation platform on their Salesforce instance. The Innovation platform willbe written completely in Apex and Visualforce and will use custom objects to store the Data. UC would like all users to be able to access the system without having to log in with Salesforce credentials. UC will utilize a third-party idp using SAML SSO. What is the optimal Salesforce licence type for all of the UC employees?

A.

Identity Licence.

B.

Salesforce Licence.

C.

External Identity Licence.

D.

Salesforce Platform Licence.

Full Access
Question # 69

Universal Containers (UC) has an existing web application that itwould like to access from Salesforce without requiring users to re-authenticate. The web application is owned UC and the UC team that is responsible for it is willing to add new javascript code and/or libraries to the application. What implementation should an Architect recommend to UC?

A.

Create a Canvas app and use Signed Requests to authenticate the users.

B.

Rewrite the web application as a set of Visualforce pages and Apex code.

C.

Configure the web application as an item in the Salesforce App Launcher.

D.

Add the web application as a ConnectedApp using OAuth User-Agent flow.

Full Access
Question # 70

Universal containers (UC) wants to implement a partner community. As part of their implementation, UC would like to modify both the Forgot password and change password experience with custom branding for their partner community users. Which 2 actions should an architect recommend to UC? Choose 2 answers

A.

Build a community builder page for the change password experience and Custom Visualforce page for the Forgot password experience.

B.

Build acustom visualforce page for both the change password and Forgot password experiences.

C.

Build a custom visualforce page for the change password experience and a community builder page for the Forgot password experience.

D.

Build a community builder page for both the change password and Forgot password experiences.

Full Access
Question # 71

A company's external applicationis protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way.

What should be done to improve security?

A.

Select "Admin approved users arepre-authorized" and assign specific profiles.

B.

Create custom scopes and assign to the connected app.

C.

Define a permission set that grants access to the app and assign to authorized users.

D.

Leverage external objects and data classification policies.

Full Access
Question # 72

An Enterprise is using a Lightweight Directory Access Protocol (LDAP ) server as the only point for user authentication with a username/password. Salesforce delegated authentication is configured to integrate Salesforce under single sign-on (SSO).

Mow can end users change their password?

A.

Users once logged In, can go to the Change Password screen in Salesforce.

B.

Users can click on the "Forgot your Password" link on the Salesforce.com login page.

C.

Users can request the Salesforce Admin to reset their password.

D.

Users can change it on the enterprise LDAP authentication portal.

Full Access