Pass the Salesforce Identity and Access Management Designer Identity-and-Access-Management-Architect Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which two considerations should be made whenimplementing Delegated Authentication?

Choose 2 answers

Options:

A.

The authentication web service can include custom attributes.


B.

It can be used to authenticate API clients and mobile apps.


C.

It requires trusted IP ranges at the User Profile level.


D.

Salesforce servers receive but do not validate a user’s credentials.


E.

Just-in-time Provisioning can be configured for new users.


Expert Solution
Questions # 62:

How should an Architect force user to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?

Options:

A.

Use Custom Login Flows with Apex to detect the user's IP address and prompt for 2FA if needed.


B.

Add the list of company's network IP addresses to the Login Range list under 2FA Setup.


C.

Use an Apex Trigger on the UserLogin object to detect the user's IP address and prompt for 2FA if needed.


D.

Apply the "Two-factor Authentication for User Interface Logins" permission and Login IP Ranges for all Profiles.


Expert Solution
Questions # 63:

Universal containers wants salesforce inbound Oauth-enabledintegration clients to use SAML-BASED single Sign-on for authentication. What Oauth flow would be recommended in this scenario?

Options:

A.

User-Agent Oauth flow


B.

SAML assertion Oauth flow


C.

User-Token Oauth flow


D.

Web server Oauth flow


Expert Solution
Questions # 64:

Universal Containers is budding a web application that will connect with the Salesforce API using JWT OAuth Flow.

Which two settings need to be configured in the connect app to support this requirement?

Choose 2 answers

Options:

A.

The Use Digital Signature option in the connected app.


B.

The "web" OAuth scope in theconnected app,


C.

The "api" OAuth scope in the connected app.


D.

The "edair_api" OAuth scope m the connected app.


Expert Solution
Questions # 65:

Universal Containers (UC) has an existing web application that itwould like to access from Salesforce without requiring users to re-authenticate. The web application is owned UC and the UC team that is responsible for it is willing to add new javascript code and/or libraries to the application. What implementation should an Architect recommend to UC?

Options:

A.

Create a Canvas app and use Signed Requests to authenticate the users.


B.

Rewrite the web application as a set of Visualforce pages and Apex code.


C.

Configure the web application as an item in the Salesforce App Launcher.


D.

Add the web application as a ConnectedApp using OAuth User-Agent flow.


Expert Solution
Questions # 66:

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months.

Which two connected app options need to be configured to fulfill this use case?

Choose 2 answers

Options:

A.

Set Permitted Users to "Admin approved users are pre-authorized".


B.

Set Permitted Users to "All users may self-authorize".


C.

Setthe Session Timeout value to 3 months.


D.

Set the Refresh Token Policy to expire refresh token after 3 months.


Expert Solution
Questions # 67:

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).

Which three OAuth concepts apply to this flow?

Choose 3 answers

Options:

A.

Client ID


B.

Refresh Token


C.

Authorization Code


D.

Verification Code


E.

Scopes


Expert Solution
Questions # 68:

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.

Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

Options:

A.

Login Forensics


B.

Login Report


C.

Login Inspector


D.

Login History


Expert Solution
Questions # 69:

Universal Containers (UC) is using its production org as the identity provider for a new Experience Cloud site and the identity architect is deciding which login experience to use for the site.

Which two page types are valid login page types for the site?

Choose 2 answers

Options:

A.

Experience Builder Page


B.

lightning Experience Page


C.

Login Discovery Page


D.

Embedded Login Page


Expert Solution
Questions # 70:

An Identity and Access Management (IAM) architect is tasked with unifying multiple B2C Commerce sites and an Experience Cloud community with a single identity. The solution needs to support more than 1,000 logins per minute.

What should the IAM do to fulfill this requirement?

Options:

A.

Configure both the community and the commerce sites as OAuth2 RPs (relying party) withan external identity provider.


B.

Configure community as a Security Assertion Markup Language (SAML) identity provider and enable Just-in-Time Provisioning to B2C Commerce.


C.

Create a default account for capturing all ecommerce contacts registered on thecommunity because person Account is not supported for this case.


D.

Confirm performance considerations with Salesforce Customer Support due to high peaks.


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions