An architect decided to use Platform Events for integratingSalesforce with an external system for a company.
Which three things should an architect consider when proposing this type of integration
mechanism?
Choose 3 answers
Salesforce users need to read data from an external system via HTTPS request.
Which two security methods should an integration architect leverage within Salesforce to secure
the integration?
Choose 2 answers
Northern Trail Outfitters (NTO) has recently changed its Corporate Security Guidelines. The guidelines require that all cloud applications pass through a secure firewall before accessing on-premise resources. NTO is evaluating middleware solutions to integrate cloud applications with on-premise resources and services.
Which consideration should an integration architect evaluate before choosing a middleware solution?
Northern Trail Outfitters (NTO) has hired an Integration Architect to design the integrations between existing systems and a new instance of Salesforce. NTO has the following requirements:
1. Initial load of 2M Accounts, 5.5M Contacts, 4.3M Opportunities, and 45k Products into the new org.
2. Notification of new and updated Accounts andContacts needs to be sent to 3 external systems.
3. Expose custom business logic to 5 external applications in a highly secure manner.
4. Schedule nightly automated dataflows, recipes and data syncs.
Which set of APIs are recommended in order to meet the requirements?
UESTION NO: 56
Northern Trail Outfitters (NTO) uses different shipping services for each of the 34 countries it serves. Services are added and removed frequently to optimize shipping times and costs. Sales Representatives serve all NTO customers globally and need to select between valid service(s) for the customer's country and request shipping estimates from that service.
Which two solutions should an architect propose?
Choose 2 answers
Universal Containers (UC) owns a variety of cloud-based applications, including Salesforce, alongside several on premise applications. The on-premise applications are protected behind a corporate network with limited outside access to external systems.
UC would like to expose data from the on-premise applications to Salesforce for a more unified user experience. The data should be accessible from Salesforce in real-time.
Which two actions should be recommended to fulfill this system requirement?
Choose 2 answers