An integration architect has received a request to prevent employees that leave the company from accessing data in Salesforce after they are deactivated in the company's HR system.
What should the integration architect determine before recommending a solution?
A customer is migrating from an old legacy system to Salesforce. As part of the modernization effort, the customer would like to integrate all existing systems that currently work with its legacy application with Salesforce.
Which constraint/pain-point should an integration architect consider when choosing the integration pattern/mechanism?
An Integration Architect has designed a mobile application for Salesforce users to get data while on the road using a custom UI. The application is securedwith oAuth and is currently functioning well. There is a new requirement where the mobile application needs to obtain the GPS coordinates and storeit on a custom geolocation field.
The geolocation field is secured with Field Level Security, so users can view the value without changing it.
What should be done to meet the requirement?
A company's cloud-based single page application consolidates data local to the application with data from on premise and 3rd party systems. The diagram below typifies the application's combined use of synchronous and asynchronous calls.
The company wants to use the average response time of its application's user interface as a basis for certain alerts. For this purpose, thefollowing occurs:
1. Log every call's start and finish date and time to a central analytics data store.
2. Compute response time uniformly as the difference between the start and finish date and time — A to H in the diagram.
Which computation represents the end-to-end response time from the user's perspective?
A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, suchas usernames, passwords, and OAuth tokens used in callouts from Salesforce.
Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure?
Choose 2 answers
A large enterprise customer with the following system landscape is planning to implement Salesforce Sales Cloud.
The following business processes need to be supported in Salesforce:
1.Sales Consultants should be able to have access to current inventory.
2. Enterprise Resource Planning System(ERP) is the system of record for pricing information.
3. Quotes should be generated in Salesforce with pricing from ERP.
4. Sales Management usesa Enterprise Business Intelligence (BI) toolto view Sales dashboards.
5. Master Data Management (MDM) is the system of record for customers and prospects.
6. Invoices should be accessible in Salesforce.
Which systems in the landscape should the IntegrationConsultant consider to be integrated with Salesforce to support the business requirements?
A company is planning on sending orders from Salesforce to a fulfillment system. The integration architect has been asked to plan for the integration.
Which two questions should the integration architect consider?
Choose 2 answers
An Enterprise Customer is planning to implement Salesforce to support case management. Below, is their current system landscape diagram.
Considering Salesforce capabilities, what should the Integration Architect evaluate when integrating Salesforce with the current system landscape?
What should an Integration architect consider when recommending Platform Events as an Integration solution?
Northern Trail Outfitters has a registration system that is used for workshopsoffered at its conferences. Attendees use a Salesforce community to register for workshops, but the scheduling systemmanages workshop availability based on room capacity. It is expected that there will be a big surge of requests for workshop reservationswhen the conference schedule goes live.
Which integration pattern should be used to manage the influx in registrations?