Salesforce Certified Identity And Access Management Designer

130 Pertanyaan | Total Attempts: 293

SettingsSettingsSettings
Please wait...
Salesforce Quizzes & Trivia

PS: Answers are highlighted as bold


Questions and Answers
  • 1. 
    Universal Containers (UC) wants to build a few applications that leverage the Salesforce REST API. UC has asked its Architect to describe how the API calls will be authenticated to a specific user. Which two mechanisms can the Architect provide? Choose 2 Answers
    • A. 

      A) Authentication Token

    • B. 

      B) Session ID

    • C. 

      C) Refresh Token

    • D. 

      D) Access Token

  • 2. 
    Universal Containers (UC) has implemented SSO Pingfederate uses SAML while Salesforce Org 1 uses OAuth 2.0. Users usually start their day by first attempting to log into Salesforce Org 2 and then later in the day, they will log into either the Financial System or CPQ system depending upon their job position. Which two systems are acting as Identity Providers?
    • A. 

      A) Financial System

    • B. 

      B) Pingfederate

    • C. 

      C) Salesforce Org 2

    • D. 

      D) Salesforce Org 1

  • 3. 
    Universal Containers (UC) built an integration for their employees to post, view, and vote for ideas in Salesforce from an internal Company portal. When ideas are posted in Salesforce, links to the ideas are created in the company portal pages as part of the integration process. The Company portal connects to Salesforce using OAuth. Everything is working fine, except when users click on links to existing ideas, they are always taken to the Ideas home page rather than the specific idea, after authorization. Which OAuth URL parameter can be used to retain the original requested page so that a user can be redirected correctly after OAuth authorization?
    • A. 

      A) redirect_uri

    • B. 

      B) state

    • C. 

      C) scope

    • D. 

      D) callback_uri

  • 4. 
    Universal Containers (UC) is building an integration between Salesforce and a legacy web applications using the canvas framework. The security for UC has determined that a signed request from Salesforce is not an adequate authentication solution for the Third-Party app. Which two options should the Architect consider for authenticating the third-party app using the canvas framework? Choose 2 Answers
    • A. 

      A) Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC's IdP.

    • B. 

      B) Utilize Authorization Providers to allow the third-party appliction to authenticate itself against Salesforce as the Idp.

    • C. 

      C) Utilize Canvas OAuth flow to allow the third-party appliction to authenticate itself against Salesforce as the Idp.

    • D. 

      D) Create a registration handler Apex class to allow the third-party appliction to authenticate itself against Salesforce as the Idp.

  • 5. 
    Universal Containers (UC) has decided to build a new, highly sensitive application on the Force.com platform. The security team at UC has decided that they want users to provide a fingerprint in addition to username/password to authenticate to this application. How can an Architect support fingerprints as a form of identification for Salesforce authentication?
    • A. 

      A) Use Salesforce Two-factor authentication with callouts to a third-party fingerprint scanning application.

    • B. 

      B) Use an AppExchange product that does fingerprint scanning with native Salesforce Identity Confirmation.

    • C. 

      C) Use delegated Authentication with callouts to a third-party fingerprint scanning application.

    • D. 

      D) Use custom login flows with callouts to a third-party fingerprint scanning application.

  • 6. 
    Universal Containers (UC) wants to build a custom mobile app for their field reps to create orders in salesforce. After the first time the users log in, they must be able to access salesforce upon opening the mobile app without being prompted to log in again. What Oauth flows should be considered to support this requirement?
    • A. 

      A) Web Server flow with a Refresh Token.

    • B. 

      B) Mobile Agent flow with a Bearer Token.

    • C. 

      C) User Agent flow with a Refresh Token.

    • D. 

      D) SAML Assertion flow with a Bearer Token.

  • 7. 
    What item should an Architect consider when designing a Delegated Authentication implementation?
    • A. 

      A) The Web service should be secured with TLS using Salesforce trusted certificates.

    • B. 

      B) The Web service should be able to accept one to four input method parameters.

    • C. 

      C) The web service should use the Salesforce Federation ID to identify the user.

    • D. 

      D) The Web service should implement a custom password decryption method.

  • 8. 
    Universal Containers (UC) has decided to use Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?
    • A. 

      A) Add each connected App to the App Launcher with a Start URL.

    • B. 

      B) Set up an Auth Provider for each External Application.

    • C. 

      C) Set up Salesforce as a SAML Idp with My Domain.

    • D. 

      D) Set up Identity Connect to synchronize user data.

    • E. 

      E) Create a Connected App for each external application.

  • 9. 
    An Architect has configured a SAML-based SSO integration between Salesforce and an external Identity provider and is ready to test it. When the Architect attempts to log in to Salesforce using SSO, the Architect receives a SAML error. Which two optimal actions should the Architect take to troubleshoot the issue?
    • A. 

      A) Ensure the Callback URL is correctly set in the Connected Apps settings.

    • B. 

      B) Use a browser that has an add-on/extension that can inspect SAML.

    • C. 

      C) Paste the SAML Assertion Validator in Salesforce.

    • D. 

      D) Use the browser's Development tools to view the Salesforce page's markup.

  • 10. 
    Universal Containers (UC) has a classified information system that its call center team uses only when they are working on a case with a record type "Classified". They are only allowed to access the system when they own an open "Classified" case, and their access to the system is removed at all other times. They would like to implement SAML SSO eith Salesforce as the Idp, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "Classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying the access to the classified information system based on the open "classified" case record criteria?
    • A. 

      A) Use Salesforce reports to identify users that currently owns open "Classified" cases and should be granted access to the classified information system.

    • B. 

      B) Use Apex trigger on case to dynamically assign permission Sets that Grant access when an user is assigned with an open "Classified" case, and remove it when the case is closed.

    • C. 

      C) Use Custom SAML JIT Provisioning to dynamically query the user's open "Classified" cases when attempting to access the classified information system

    • D. 

      D) Use a Common Connected App Handler using Apex to dynamically allow access to the system based on whether the staff owns any open "Classified" Cases.

  • 11. 
    Universal Containers (UC) is implementing Salesforce and would like to establish SAML SSO for its users to log in. UC stores its corporate user identities in a Custom Database. The UC IT Manager has heard good things about Salesforce Identity Connect as an Idp, and would like to understand what limitations they may face if they decided to use Identity Connect in their current environment. What limitation should an Architect inform the IT Manager about?
    • A. 

      A) Identity Connect will not support user provisioning in UC's current environment.

    • B. 

      B) Identity Connect will only support Idp-initiated SAML flows in UC's current environment.

    • C. 

      C) Identity Connect will only support SP-initiated SAML flows in UC's current environment.

    • D. 

      D) Identity connect is not compatible with UC's current identity environment.

  • 12. 
    A group of users try to access one of Universal Containers' Connected Apps and receive the following error message: "Failed: Not approved for access." What is the most likely cause of this issue?
    • A. 

      A) The Connected App settings "All users may self-authorize" is enabled.

    • B. 

      B) The Salesforce Administrators have revoked the OAuth authorization.

    • C. 

      C) The Users do not have the correct permission set assigned to them.

    • D. 

      D) The User of High Assurance sessions are required for the Connected App.

  • 13. 
    Universal Containers (UC) has decided to implement a federated single Sign-on solution using a third-party Idp. In reviewing the third-party products, they would like to ensure the product supports the automated provisioning and deprovisioning of users. What are the underlining mechanisms that the UC Architect must ensure are part of the product?
    • A. 

      A) SOAP API for provisioning; Just-in-Time (JIT) for Deprovisioning.

    • B. 

      B) Just-In-time (JIT) for Provisioning; SOAP API for Deprovisioning.

    • C. 

      C) Provisioning API for both Provisioning and Deprovisioning.

    • D. 

      D) Just-in-Time (JIT) for both Provisioning and Deprovisioning.

  • 14. 
    Universal Containers (UC) would like to enable SAML based SSO for a Salesforce Partner Community. UC has an existing LDAP identity store and a third-party portal. They would like to use the existing portal as the primary site these users access, but also want to allow seamless access to the partner community. What SSO flow should an Architect recommend?
    • A. 

      A) Idp-Initiated.

    • B. 

      B) Web Server.

    • C. 

      C) SP-Initiated.

    • D. 

      D) User- Agent.

  • 15. 
    Universal Containers (UC) has an existing Salesforce org configured for SP-Initiated SAML SSO with their Idp. A second Salesforce org is being introduced into the environment and the IT team would like to ensure they can use the same Idp for new org. What action should the IT team take while implementing the second org?
    • A. 

      A) Use the same SAML Identity location as the first org.

    • B. 

      B) Use a different Entity ID than the first org.

    • C. 

      C) Use the same request bindings as the first org.

    • D. 

      D) Use the Salesforce Username as the SAML Identity Type.

  • 16. 
    An architect is troubleshooting some SAML-based SSO errors during testing. The Architect confirmed that all of the Salesforce SSO settings are correct. Which two issues outside of the Salesforce SSO settings are most likely contributing to the SSO errors the Architect is encountering? Choose 2 Answers
    • A. 

      A) The Identity Provider is also used to SSO into five other applications.

    • B. 

      B) The clock on the Identity Provider server is twenty minutes behind Salesforce.

    • C. 

      C) The Issuer Certificate from the Identity Provider expired two weeks ago.

    • D. 

      D) The default language for the Identity Provider and Salesforce are Different.

  • 17. 
    Universal Containers (UC) has a Desktop application to collect leads for marketing campaigns. UC wants to extend this application to integrate with Salesforce to create leads. Integration between the desktop application and salesforce should be seamless. What Authorization flow should the Architect recommend?
    • A. 

      A) JWT Bearer Token flow

    • B. 

      B) Web Server Authentication Flow

    • C. 

      C) User Agent Flow

    • D. 

      D) Username and Password Flow

  • 18. 
    An Architect needs to advise the team that manages the Identity Provider how to differentiate Salesforce from other Service Providers. What SAML SSO setting in Salesforce provides this capability?
    • A. 

      A) Identity Provider Login URL.

    • B. 

      B) Issuer

    • C. 

      C) Entity Id

    • D. 

      D) SAML Identity Location.

  • 19. 
    Universal Containers (UC) wants its closed Won opportunities to be synced to a Data Warehouse in near real time. UC has implemented Outbound Message to enable near real-time data sync. UC wants to ensure that communication between Salesforce and Target System is Secure. What Certificate is sent along with the Outbound Message?
    • A. 

      A) The CA-Signed Certificate from the Certificate and Key Management menu.

    • B. 

      B) The default Client Certificate from the Develop--> API Menu.

    • C. 

      C) The default Client Certificate or a Certificate from Certificate and Key Management menu.

    • D. 

      D) The Self-Signed Certificates from the Certificate & Key Management menu.

  • 20. 
    Which three are features of federated Single sign-on solutions? Choose 3 Answers
    • A. 

      A) It establishes trust between Identity Store and Service Provider.

    • B. 

      B) It federates credentials control to authorized applications.

    • C. 

      C) It solves all identity and access management problems.

    • D. 

      D) It improves affiliated applications adoption rates.

    • E. 

      E) It enables quick and easy provisioning and deactivating of users.

  • 21. 
    Universal Containers (UC) has an existing e-commerce platform and is implementing a new customer community. They do not want to force customers to register on both applications due to concern over the customer’s experience. It is expected that 25% of the e-commerce customers will utilize the customer community. The e-commerce platform is capable of generating SAML responses and has an existing REST-ful API capable of managing users. How should UC create the identities of its e-commerce users with the customer community?
    • A. 

      A) Use SAML JIT in the Customer Community to create users when a user tries to login to the community from the e-commerce site.

    • B. 

      B) Use the e-commerce REST API to create users when a user self-register on the customer community and use SAML to allow SSO.

    • C. 

      C) Use a nightly batch ETL job to sync users between the Customer Community and the e-commerce platform and use SAML to allow SSO.

    • D. 

      D) Use the standard Salesforce API to create users in the Community When a User is Created in the e-Commerce platform and use SAML to allow SSO.

  • 22. 
    How should an Architect automatically redirect users to the login page of the external Identity provider when using an SP-Initiated SAML flow with Salesforce as a Service Provider?
    • A. 

      A) Use visualforce as the landing page for My Domain to redirect users to the Identity Provider login Page.

    • B. 

      B) Enable the Redirect to the Identity Provider setting under Authentication Services on the My domain Configuration.

    • C. 

      C) Remove the Login page from the list of Authentication Services on the My Domain configuration.

    • D. 

      D) Set the Identity Provider as default and enable the Redirect to the Identity Provider setting on the SAML Configuration.

  • 23. 
    Universal Containers (UC) has an existing Customer Community. UC wants to expand the self-registration capabilities such that customers receive a different community experience based on the data they provide during the registration process. What is the recommended approach an Architect Should recommend to UC?
    • A. 

      A) Create an After Insert Apex trigger on the user object to assign specific custom permissions.

    • B. 

      B) Create separate login flows corresponding to the different community user personas.

    • C. 

      C) Modify the Community pages to utilize specific fields on the User and Contact records.

    • D. 

      D) Modify the existing Communities registration controller to assign different profiles.

  • 24. 
    Universal Containers (UC) has a Customer Community that uses Facebook for Authentication. UC would like to ensure that Changes in the Facebook profile are reflected on the appropriate Customer Community user. How can this requirement be met?
    • A. 

      A) Use the updateUser method on the registration Handler Class.

    • B. 

      B) Develop a scheduled job that calls out to Facebook on a nightly basis.

    • C. 

      C) Use information in the signed Request that is received from facebook.

    • D. 

      D) Use SAML Just-In-Time Provisioning between Facebook and Salesforce.

  • 25. 
    What are three capabilities of Delegated Authentication? Choose 3 answers
    • A. 

      A) It can be assigned by Custom Permissions.

    • B. 

      B) It can connect to SOAP services.

    • C. 

      C) It can be assigned by Permission Sets.

    • D. 

      D) It can be assigned by Profiles.

    • E. 

      E) It can connect to REST services.

  • 26. 
    Universal Containers (UC) has an e-commerce website where customers can buy products, make payments and manage their accounts. UC decides to build a Customer Community on Salesforce and wants to allow the customers to access the community from their accounts without logging in again. UC decides to implement an SP-initiated SSO using a SAML-compliant Idp. In this scenario where Salesforce is the Service Provider, which two activities must be performed in Salesforce to make SP-initiated SSO work? Choose 2 answers
    • A. 

      A) Configure SAML SSO settings.

    • B. 

      B) Create a Connected App.

    • C. 

      C) Configure Delegated Authentication.

    • D. 

      D) Set up My Domain.

  • 27. 
    In an SP-Initiated SAML SSO setup where the user tries to access a resource on the Service Provider, What HTTP param should be used when submitting a SAML Request to the Idp to ensure the user is returned to the intended resource after authentication?
    • A. 

      A) RedirectURL

    • B. 

      B) RelayState

    • C. 

      C) DisplayState

    • D. 

      D) StartURL

  • 28. 
    Universal Containers (UC) is building a customer community and will allow customers to authenticate using Facebook credentials. The First time the user authenticating using facebook, UC would like a customer account created automatically in their Accounting system. The accounting system has a web service accessible to Salesforce for the creation of accounts. How can the Architect meet these requirements?
    • A. 

      A) Create a custom application on Heroku that manages the sign-on process from Facebook.

    • B. 

      B) Use JIT Provisioning to automatically create the account in the accounting system.

    • C. 

      C) Add an Apex callout in the registration handler of the authorization provider.

    • D. 

      D) Use OAuth JWT flow to pass the data from Salesforce to the Accounting System.

  • 29. 
    Universal Containers (UC) has multiple Salesforce Orgs and would like to use a single Identity Provider to access all of their orgs. How should UC's Architect enable this behavior?
    • A. 

      A) Ensure that users have the same Alias value in their user records in all of UC's Salesforce orgs.

    • B. 

      B) Ensure the same username is allowed in multiple orgs by contacting Salesforce Support.

    • C. 

      C) Ensure that users have the same Federation ID value in their User records in all of UC's Salesforce orgs

    • D. 

      D) Ensure that users have the same Email Value in their user records in all of UC's Salesforce orgs.

  • 30. 
    Universal Containers (UC) would like its community users to be able to register and log in with Linkedin or Facebook Credentials. UC wants users to clearly see Facebook & Linkedin Icons when they register and login. What are the two recommended actions UC can take to achieve this Functionality? Choose 2 answers
    • A. 

      A) Enable Facebook and Linkedin as Login options in the login section of the Community configuration.

    • B. 

      B) Create custom Registration Handlers to link Linkedin and facebook accounts to user records.

    • C. 

      C) Store the Linkedin or Facebook user IDs in the Federation ID field on the Salesforce User record.

    • D. 

      D) Create custom buttons for Facebook and inkedin using JAVAscript/CSS on a custom Visualforce page.

  • 31. 
    Universal Containers (UC) has built a custom token-based Two-factor authentication (2FA) system for their existing on-premise applications. They are now implementing Salesforce and would like to enable a Two-factor login process for it, as well. What is the recommended solution as Architect should consider?
    • A. 

      A) Use the custom 2FA system for on-premise applications and native 2FA for Salesforce.

    • B. 

      B) Replace the custom 2FA system with an AppExchange App that supports on premise application and salesforce.

    • C. 

      C) Use Custom Login Flows to connect to the existing custom 2FA system for use in Salesforce.

    • D. 

      D) Replace the custom 2FA system with Salesforce 2FA for on-premise applications and Salesforce.

  • 32. 
    Which two statements are capable of Identity Connect? Choose 2 answers
    • A. 

      A) Synchronization of Salesforce Permission Set license assignments.

    • B. 

      B) Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.

    • C. 

      C) Support multiple orgs connecting to multiple Active Directory servers.

    • D. 

      D) Automated user synchronization and de-activation.

  • 33. 
    Universal Containers (UC) employees have Salesforce access from restricted IP ranges only, to protect against unauthorized access. UC wants to roll out the Salesforce1 mobile app and make it accessible from any location. Which two options should an Architect recommend? Choose 2 answers
    • A. 

      A) Relax the IP restriction with a second factor in the Connect App settings for Salesforce1 mobile app.

    • B. 

      B) Remove existing restrictions on IP ranges for all types of user access.

    • C. 

      C) Relax the IP restrictions in the Connect App settings for the Salesforce1 mobile app.

    • D. 

      D) Use Login Flow to bypass IP range restriction for the mobile app.

  • 34. 
    Universal Containers (UC) uses Global Shipping (GS) as one of their shipping vendors. Regional leads of GS need access to UC's Salesforce instance for reporting damage of goods using Cases. The regional leads also need access to dashboards to keep track of regional shipping KPIs. UC internally uses a third-party cloud analytics tool for capacity planning and UC decided to provide access to this tool to a subset of GS employees. In addition to regional leads, the GS capacity planning team would benefit from access to this tool. To access the analytics tool, UC IT has set up Salesforce as the Identity provider for internal users and would like to follow the same approach for the GS users as well. What are the most appropriate license types for GS regional Leads and the GS Capacity Planners?
    • A. 

      A) Customer Community Plus license for GS Regional Leads and External Identity for GS Capacity Planners.

    • B. 

      B) Customer Community Plus license for GS Regional Leads and Customer Community license for GS Capacity Planners.

    • C. 

      C) Identity License for GS Regional Leads and External Identity license for GS capacity Planners.

    • D. 

      D) Customer Community license for GS Regional Leads and Identity license for GS Capacity Planners.

  • 35. 
    Universal Containers is considering using Delegated Authentication as the sole means of Authenticating of Salesforce users. A Salesforce Architect has been brought in to assist with the implementation. What two risks should the Architect point out? Choose 2 answers
    • A. 

      A) Delegated Authentication is enabled or disabled for the entire Salesforce org.

    • B. 

      B) UC will be required to develop and support a custom SOAP web service.

    • C. 

      C) Salesforce users will be locked out of Salesforce if the web service goes down.

    • D. 

      D) The web service must reside on a public cloud service, such as Heroku.

  • 36. 
    Universal Containers (UC) has implemented SAML-based single Sign-on for their Salesforce application and is planning to provide access to Salesforce on mobile devices using the Salesforce1 mobile app. UC wants to ensure that Single Sign-on is used for accessing the Salesforce1 mobile App. Which two recommendations should the Architect make? Choose 2 Answers
    • A. 

      A) Configure the Embedded Web Browser to use My Domain URL.

    • B. 

      B) Configure the Salesforce1 App to use the MY Domain URL.

    • C. 

      C) Use the existing SAML-SSO flow along with User Agent Flow.

    • D. 

      D) Use the existing SAML SSO flow along with Web Server Flow.

  • 37. 
    37) Universal Containers (UC) has implemented SAML-based SSO solution for use with their multi-org Salesforce implementation, utilizing one of the the orgs as the Identity Provider. One user is reporting that they can log in to the Identity Provider org but get a generic SAML error message when accessing the other orgs. Which two considerations should the architect review to troubleshoot the issue? Choose 2 answers
    • A. 

      A) The Federation ID must be a valid Salesforce Username

    • B. 

      B) The Federation ID must is case sensitive

    • C. 

      C) The Federation ID must be in the form of an email address.

    • D. 

      D) The Federation ID must be populated on the user record.

  • 38. 
    Universal Containers (UC) wants to integrate a third-party Reward Calculation system with Salesforce to calculate Rewards. Rewards will be calculated on a schedule basis and update back into Salesforce. The integration between Salesforce and the Reward Calculation System needs to be secure. Which are two recommended practices for using OAuth flow in this scenario. Choose 2 answers
    • A. 

      A) OAuth Refresh Token FLow

    • B. 

      B) OAuth Username-Password Flow

    • C. 

      C) OAuth SAML Bearer Assertion FLow

    • D. 

      D) OAuth JWT Bearer Token Flow

  • 39. 
    Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers
    • A. 

      A) Disallow the use of Single Sign-on for any users of the mobile app.

    • B. 

      B) Require High Assurance sessions in order to use the Connected App.

    • C. 

      C) Set Login IP Ranges to the internal network for all of the app users Profiles.

    • D. 

      D) Use Google Authenticator as an additional part of the login process

  • 40. 
    Which two are valid choices for digital certificates when setting up two-way SSL between Salesforce and an external system? Choose 2 answers
    • A. 

      A) Use a trusted CA-signed certificate for salesforce and a trusted CA-signed cert for the external system

    • B. 

      B) Use a trusted CA-signed certificate for salesforce and a self-signed cert for the external system

    • C. 

      C) Use a self-signed certificate for salesforce and a self-signed cert for the external system

    • D. 

      D) Use a self-signed certificate for salesforce and a trusted CA-signed cert for the external system

  • 41. 
    Sales users at Universal containers use salesforce for Opportunity management. Marketing uses a third-party application called Nest for Lead nurturing that is accessed using username/password. The VP of sales wants to open up access to nest for all sales uses to provide them access to lead history and would like SSO for better adoption. Salesforce is already setup for SSO and uses Delegated Authentication. Nest can accept username/Password or SAML-based Authentication. IT teams have received multiple password-related issues for nest and have decided to set up SSO access for Nest for Marketing users as well. The CIO does not want to invest in a new IDP solution and is considering using Salesforce for this purpose. Which are appropriate license type choices for sales and marketing users, giving salesforce is using Delegated Authentication? Choose 2 answers
    • A. 

      A) Salesforce license for sales users and Identity license for Marketing users

    • B. 

      B) Salesforce license for sales users and External Identity license for Marketing users

    • C. 

      C) Identity license for sales users and Identity connect license for Marketing users

    • D. 

      D) Salesforce license for sales users and platform license for Marketing users.

  • 42. 
    Universal containers wants to build a custom mobile app connecting to salesforce using Oauth, and would like to restrict the types of resources mobile users can access. What Oauth feature of Salesforce should be used to achieve the goal?
    • A. 

      A) Access Tokens

    • B. 

      B) Refresh Tokens

    • C. 

      C) Mobile PINS

    • D. 

      D) Scopes

  • 43. 
    Universal containers (UC) is building a mobile application that will make calls to the salesforce REST API. Additionally, UC would like to provide the optimal experience for its mobile users. Which two OAuth scopes should UC configure in the connected App? Choose 2 answers
    • A. 

      A) Refresh Tokens

    • B. 

      B) full

    • C. 

      C) Web

    • D. 

      D) API

  • 44. 
    Universal container plans to develop a custom mobile app for the sales team that will use salesforce for authentication and access management. The mobile app access needs to be restricted to only the sales team. What would be the recommended solution to grant mobile app access to sales users?
    • A. 

      A) Use a custom attribute on the user object to control access to the mobile app

    • B. 

      B) Use connected apps Oauth policies to restrict mobile app access to authorized users.

    • C. 

      C) Use the permission set license to assign the mobile app permission to sales users

    • D. 

      D) Add a new identity provider to authenticate and authorize mobile users.

  • 45. 
    Universal containers (UC) has a mobile application that it wants to deploy to all of its salesforce users, including customer Community users. UC would like to minimize the administration overhead, which two items should an architect recommend? Choose 2 answers
    • A. 

      A) Enable the "Refresh Tokens is valid until revoked” setting in the Connected App.

    • B. 

      B) Enable the "Enforce Ip restrictions" settings in the connected App.

    • C. 

      C) Enable the "All users may self-authorize" setting in the Connected App.

    • D. 

      D) Enable the "High Assurance session required" setting in the Connected App.

  • 46. 
    The security team at Universal Containers (UC) has identified exporting reports as a high-risk action and would like to require users to be logged into Salesforce with their Active Directory (AD) credentials when doing so. For all other users of Salesforce, users should be allowed to use AD Credentials or Salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with Salesforce credentials?
    • A. 

      A) Use SAML Federated Authentication and block access to reports when accessed through a Standard Assurance session.

    • B. 

      B) Use SAML Federated Authentication and Custom SAML JIT Provisioning to dynamically and or remove a permission set that grants the Export Reports Permission.

    • C. 

      C) Use SAML federated Authentication, treat SAML Sessions as High Assurance, and raise the session level required for exporting reports.

    • D. 

      D) Use SAML federated Authentication with a Login Flow to dynamically add or remove a Permission Set that grants the Export Reports Permission.

  • 47. 
    How should an Architect force users to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?
    • A. 

      A) Add the company's list of network IP addresses to the Login Range list under 2FA Setup.

    • B. 

      B) Use Custom Login Flows with Apex to detect the user's IP address and prompt for 2FA in needed.

    • C. 

      C) Apply the "Two-factor Authentication for User Interfae Logins" permission and Login IP Ranges for all Profiles.

    • D. 

      D) Use an Apex Trigger on the UserLogin object to detect the user's IP address and prompt for 2FA if needed.

  • 48. 
    Universal Containers (UC) wants its users to access Salesforce and other SSO-enabled applications from a custom web page that UC magnets. UC wants its users to use the same set of credentials to access each of the applications. What SAML SSO flow should an Architect recommend for UC?
    • A. 

      A) SP-Initiated with Deep Linking

    • B. 

      B) SP-Initiated

    • C. 

      C) IdP-Initiated

    • D. 

      D) User-Agent

  • 49. 
    Universal Containers (UC) uses a home-grown Employee portal for their employees to collaborate. UC decides to use Salesforce Ideas to allow employees to post Ideas from the Employee portal. When users click on some of the links in the Employee portal, the users should be redirected to Salesforce, authenticated, and presented with the relevant pages. What OAuth flow is best suited for this scenario?
    • A. 

      A) Web Application flow

    • B. 

      B) SAML Bearer Assertion flow

    • C. 

      C) User-Agent flow

    • D. 

      D) Web Server flow

  • 50. 
    Universal Containers (UC) is planning to deploy a custom mobile app that will allow users to get e-signatures from its customers on their mobile devices. The mobile app connects to Salesforce to upload the e-signature as a file attachment and uses OAuth protocol for both authentication and authorization. What is the most recommended and secure OAuth scope setting that an Architect should recommend?
    • A. 

      A) id

    • B. 

      B) web

    • C. 

      C) api

    • D. 

      D) custom_permissions

  • 51. 
    IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?
    • A. 

      A) Use the Salesforce Authenticator mobile app with two-step verification

    • B. 

      B) Lock sessions to the IP address from which they originated.

    • C. 

      C) Increase Password complexity requirements in Salesforce.

    • D. 

      D) Implement Single Sign-on using a corporate Identity store.

  • 52. 
    Universal Containers (UC) has an existing web application that it would like to access from Salesforce without requiring users to re-authenticate. The web application is owned UC and the UC team that is responsible for it is willing to add new javascript code and/or libraries to the application. What implementation should an Architect recommend to UC?
    • A. 

      A) Create a Canvas app and use Signed Requests to authenticate the users.

    • B. 

      B) Rewrite the web application as a set of Visualforce pages and Apex code.

    • C. 

      C) Configure the web application as an item in the Salesforce App Launcher.

    • D. 

      D) Add the web application as a ConnectedApp using OAuth User-Agent flow.

  • 53. 
    Universal containers wants to implement SAML SSO for their internal salesforce users using a third-party IDP. After some evaluation, UC decides not to set up my domain for their salesforce.org. How does that decision impact their SSO implementation?
    • A. 

      A) Neither sp - nor IDP - initiated SSO will work

    • B. 

      B) Either sp - or IDP - initiated SSO will work

    • C. 

      C) IDP - initiated SSO will not work

    • D. 

      D) Sp-Initiated SSO will not work

  • 54. 
    Universal containers wants salesforce inbound Oauth-enabled integration clients to use SAML-BASED single Sign-on for authentication. What Oauth flow would be recommended in this scenario?
    • A. 

      A) User-Agent Oauth flow

    • B. 

      B) SAML assertion Oauth flow

    • C. 

      C) User-Token Oauth flow

    • D. 

      D) Web server Oauth flow

  • 55. 
    Universal containers (UC) would like to enable SSO between their existing Active Directory infrastructure and salesforce. The IT team prefers to manage all users in Active Directory and would like to avoid doing any initial setup of users in salesforce directly, including the correct assignment of profiles, roles and groups. Which two optimal solutions should UC use to provision users in salesforce? Choose 2 answers
    • A. 

      A) Use the salesforce REST API to sync users from active directory to salesforce

    • B. 

      B) Use an app exchange product to sync users from Active Directory to salesforce.

    • C. 

      C) Use Active Directory Federation Services to sync users from active directory to salesforce.

    • D. 

      D) Use Identity connect to sync users from Active Directory to salesforce

  • 56. 
    Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers
    • A. 

      A) Google is the identity provider

    • B. 

      B) Salesforce is the identity provider

    • C. 

      C) Google is the service provider

    • D. 

      D) Salesforce is the service provider

  • 57. 
    Universal containers (UC) is setting up Delegated Authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the login service and salesforce. What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?
    • A. 

      A) Include client ID and client secret in the login header callout.

    • B. 

      B) Set up a proxy server for the login service in the DMZ.

    • C. 

      C) Require the use of Salesforce security Tokens on password.

    • D. 

      D) Enforce mutual Authentication between systems using SSL.

  • 58. 
    Universal containers (UC) has a mobile application that calls the salesforce REST API. In order to prevent users from having to enter their credentials everytime they use the app, UC has enabled the use of refresh Tokens as part of the salesforce connected App and updated their mobile app to take advantage of the refresh token. Even after enabling the refresh token, Users are still complaining that they have to enter their credentials once a day. What is the most likely cause of the issue?
    • A. 

      A) The Oauth authorizations are being revoked by a nightly batch job.

    • B. 

      B) The refresh token expiration policy is set incorrectly in salesforce

    • C. 

      C) The app is requesting too many access Tokens in a 24-hour period

    • D. 

      D) The users forget to check the box to remember their credentials.

  • 59. 
    What information does the 'Relaystate' parameter contain in sp-Initiated Single Sign-on?
    • A. 

      A) Reference to a URL redirect parameter at the identity provider.

    • B. 

      B) Reference to a URL redirect parameter at the service provider.

    • C. 

      C) Reference to the login address URL of the service provider.

    • D. 

      D) Reference to the login address URL of the identity Provider.

  • 60. 
    Universal containers (UC) wants users to authenticate into their salesforce org using credentials stored in a custom identity store. UC does not want to purchase or use a third-party Identity provider. Additionally, UC is extremely wary of social media and does not consider it to be trust worthy. Which two options should an architect recommend to UC? Choose 2 answers
    • A. 

      A) Use a professional social media such as LinkedIn as an Authentication provider

    • B. 

      B) Build a custom web page that uses the identity store and calls frontdoor.jsp

    • C. 

      C) Build a custom Web service that is supported by Delegated Authentication.

    • D. 

      D) Implement the Openid protocol and configure an Authentication provider

  • 61. 
    Universal containers uses an Employee portal for their employees to collaborate. Employees access the portal from their company's internal website via SSO. It is set up to work with Active Directory. What is the role of Active Directory in this scenario?
    • A. 

      A) Identity store

    • B. 

      B) Authentication store

    • C. 

      C) Identity provider

    • D. 

      D) Service provider

  • 62. 
    Universal containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC decides to use an API user using Oauth Username - password flow for the connection. How can the connection to salesforce be restricted only to the employee portal server?
    • A. 

      A) Add the Employee portals IP address to the Trusted IP range for the connected App

    • B. 

      B) Use a digital certificate signed by the employee portal Server.

    • C. 

      C) Add the employee portals IP address to the login IP range on the user profile.

    • D. 

      D) Use a dedicated profile for the user the Employee portal uses.

  • 63. 
    Universal containers (UC) wants to implement a partner community. As part of their implementation, UC would like to modify both the Forgot password and change password experience with custom branding for their partner community users. Which 2 actions should an architect recommend to UC? Choose 2 answers
    • A. 

      A) Build a community builder page for the change password experience and Custom Visualforce page for the Forgot password experience.

    • B. 

      B) Build a custom visualforce page for both the change password and Forgot password experiences.

    • C. 

      C) Build a custom visualforce page for the change password experience and a community builder page for the Forgot password experience.

    • D. 

      D) Build a community builder page for both the change password and Forgot password experiences.

  • 64. 
    Universal containers (UC) has implemented SAML SSO to enable seamless access across multiple applications. UC has regional salesforce orgs and wants its users to be able to access them from their main Salesforce org seamless. Which action should an architect recommend?
    • A. 

      A) Configure the main salesforce org as an Authentication provider.

    • B. 

      B) Configure the main salesforce org as the Identity provider.

    • C. 

      C) Configure the regional salesforce orgs as Identity Providers.

    • D. 

      D) Configure the main Salesforce org as a service provider.

  • 65. 
    Which three types of attacks would a 2-Factor Authentication solution help garden against?
    • A. 

      A) Key logging attacks

    • B. 

      B) Network perimeter attacks

    • C. 

      C) Phishing attacks

    • D. 

      D) Dictionary attacks

    • E. 

      E) Man-in-the-middle attacks

  • 66. 
    Universal Containers (UC) is both a Salesforce and Google Apps customer. The UC IT team would like to manage the users for both systems in a single place to reduce administrative burden. Which two optimal ways can the IT team provision users and allow Single Sign-on between Salesforce and Google Apps? Choose 2 answers
    • A. 

      A) Build a custom app running on Heroku as the Identity Provider that can sync user information between Salesforce and Google Apps.

    • B. 

      B) Use a third-party product as the Identity Provider for both Salesforce and Google Apps and manage the provisioning from there.

    • C. 

      C) Use Identity Connect as the Identity Provider for both Salesforce and Google Apps and manage the provisioning from there.

    • D. 

      D) Use Salesforce as the Identity Provider and Google Apps as a Service Provider and configure User Provisioning for Connected Apps.

  • 67. 
    Which three are capabilities of SAML-based Federated authentication? Choose 3 answers
    • A. 

      A) Trust relationships between Identity Provider and Service Provider are required.

    • B. 

      B) SAML tokens can be in XML or JSON format and can be used interchangeably.

    • C. 

      C) Web applications with no passwords are more secure and stronger against attacks.

    • D. 

      D) Access tokens are used to access resources on the server once the user is authenticated.

    • E. 

      E) Centralized federation provides single point of access, control and auditing.

  • 68. 
    Universal Containers (UC) uses Salesforce to allow customers to keep track of the order status. The customers can log in to Salesforce using external authentication providers, such as Facebook and Google. UC is also leveraging the App Launcher to let customers access an of platform application for generating shipping labels. The label generator application uses OAuth to provide users access. What license type should an Architect recommend for the customers?
    • A. 

      A) Customer Community license

    • B. 

      B) Identity license

    • C. 

      C) Customer Community Plus license

    • D. 

      D) External Identity license

  • 69. 
    Universal Containers (UC) uses a legacy Employee portal for their employees to collaborate. Employees access the portal from their company’s internal website via SSO. It is set up to work with SiteMinder and Active Directory. The Employee portal has features to support posing ideas. UC decides to use Salesforce Ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to integrate Employee portal ideas with Salesforce idea through the API. What is the role of Salesforce in the context of SSO, based on this scenario?
    • A. 

      A) Service Provider, because Salesforce is the application for managing ideas.

    • B. 

      B) Connected App, because Salesforce is connected with Employee portal via API.

    • C. 

      C) Identity Provider, because the API calls are authenticated by Salesforce.

    • D. 

      D) An independent system, because Salesforce is not part of the SSO setup.

  • 70. 
    Universal Containers wants to implement SAML SSO for their internal Salesforce users using a third-party IdP. After some evaluation, UC decides not to set up My Domain for their Salesforce org. How does that decision impact their SSO implementation?
    • A. 

      A) SP-initiated SSO will not work.

    • B. 

      B) Neither SP- nor IdP-initiated SSO will work.

    • C. 

      C) Either SP- or IdP-initiated SSO will work.

    • D. 

      D) IdP-initiated SSO will not work.

  • 71. 
    Universal Containers (UC) uses middleware to integrate multiple systems with Salesforce. UC has a strict, new requirement that usernames and passwords cannot be stored in any UC system. How can UC’s middleware authenticate to Salesforce while adhering to this requirement?
    • A. 

      A) Create a Connected App that supports the JWT Bearer Token OAuth Flow.

    • B. 

      B) Create a Connected App that supports the Refresh Token OAuth Flow

    • C. 

      C) Create a Connected App that supports the Web Server OAuth Flow.

    • D. 

      D) Create a Connected App that supports the User-Agent OAuth Flow.

  • 72. 
    Universal Containers (UC) is building an integration between Salesforce and a legacy web application using the Canvas framework. The security team for UC has determined that a signed request from Salesforce is not an adequate authentication solution for the third-party app. Which two options should the Architect consider for authenticating the third-party app using the Canvas framework? Choose 2 answers
    • A. 

      A) Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC’s IdP.

    • B. 

      B) Utilize Authorization Providers to allow the third-party application to authenticate itself against Salesforce as the IdP.

    • C. 

      C) Utilize the Canvas OAuth flow to allow the third-party application to authenticate itself against Salesfore as the IdP

    • D. 

      D) Create a registration handler Apex class to allow the third-party application to authenticate itself against Salesforce as the IdP.

  • 73. 
    In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?
    • A. 

      A) Use of self-signed certificate leads to lower maintenance for trusted party because multiple self-signed certs need to be maintained.

    • B. 

      B) Use of self-signed certificate leads to higher maintenance for trusted party because they have to act as the trusted CA

    • C. 

      C) Use of self-signed certificate leads to lower maintenance for trusting party because there is no trusted CA cert to maintain.

    • D. 

      D) Use of self-signed certificate leads to higher maintenance for trusting party because the cert needs to be added to their truststore.

  • 74. 
    Universal Containers (UC) has a desktop application to collect leads for marketing campaigns. UC wants to extend this application to integrate with Salesforce to create leads. Integration between the desktop application and Salesforce should be seamless. What Authorization flow should the Architect recommend?
    • A. 

      A) JWT Bearer Token Flow

    • B. 

      B) Web Server Authentication Flow

    • C. 

      C) User Agent Flow

    • D. 

      D) Username and Password Flow

  • 75. 
    Which three are features of federated Single Sign-on solutions? Choose 3 answers
    • A. 

      A) It federates credentials control to authorized applications.

    • B. 

      B) It establishes trust between Identity store and service provider.

    • C. 

      C) It solves all identity and access management problems.

    • D. 

      D) It improves affiliated applications adoption rates.

    • E. 

      E) It enables quick and easy provisioning and deactivating of users.

  • 76. 
    What item should an architect consider when designing a Delegated Authentication implementation?
    • A. 

      A) The web service should be able to accept one to four input method parameters.

    • B. 

      B) The web service should use the salesforce Federation ID to identify the user.

    • C. 

      C) The web service should be secured with TLS using Salesforce trusted certificates.

    • D. 

      D) The web service should implement a custom password decryption method.

  • 77. 
    After a recent audit, universal containers was advised to implement Two-factor Authentication for all of their critical systems, including salesforce. Which two actions should UC consider to meet this requirement? Choose 2 answers
    • A. 

      A) Require users to provide their RSA token along with their credentials.

    • B. 

      B) Require users to supply their email and phone number, which gets validated.

    • C. 

      C) Require users to enter a second password after the first Authentication

    • D. 

      D) Require users to use a biometric reader as well as their password

  • 78. 
    Universal containers (UC) uses an internal company portal for their employees to collaborate. UC decides to use salesforce ideas and provide the ability for employees to post ideas from the company portal. They use SAML-BASED SSO to get into the company portal and would like to leverage it to access salesforce. Most of the users don't exist in salesforce and they would like the user records created in salesforce communities the first time they try to access salesforce. What recommendation should an architect make to meet this requirement?
    • A. 

      A) Use on-the-fly provisioning

    • B. 

      B) Use just-in-time provisioning

    • C. 

      C) Use salesforce APIs to create users on the fly

    • D. 

      D) Use Identity connect to sync users

  • 79. 
    Universal containers (UC) has built a custom based Two-factor Authentication (2fa) system for their existing on-premise applications. Thru are now implementing salesforce and would like to enable a Two-factor login process for it, as well. What is the recommended solution an architect should consider?
    • A. 

      A) Replace the custom 2fa system with salesforce 2fa for on-premise application and salesforce.

    • B. 

      B) Use the custom 2fa system for on-premise applications and native 2fa for salesforce.

    • C. 

      C) Replace the custom 2fa system with an app exchange app that supports on-premise applications and salesforce.

    • D. 

      D) Use custom login flows to connect to the existing custom 2fa system for use in salesforce.

  • 80. 
    Universal containers (UC) has an e-commerce website while customers can buy products, make payments, and manage their accounts. UC decides to build a customer Community on Salesforce and wants to allow the customers to access the community for their accounts without logging in again. UC decides to implement an sp-Initiated SSO using a SAML-BASED complaint IDP. In this scenario where salesforce is the service provider, which two activities must be performed in salesforce to make sp-Initiated SSO work? Choose 2 answers
    • A. 

      A) Configure SAML SSO settings.

    • B. 

      B) Configure Delegated Authentication

    • C. 

      C) Create a connected App

    • D. 

      D) Set up my domain

  • 81. 
    Universal containers (UC) wants to implement Delegated Authentication for a certain subset of Salesforce users. Which three items should UC take into consideration while building the Web service to handle the Delegated Authentication request? Choose 3 answers
    • A. 

      A) The web service needs to include Source IP as a method parameter.

    • B. 

      B) UC should whitelist all salesforce ip ranges on their corporate firewall.

    • C. 

      C) The web service can be written using either the soap or rest protocol.

    • D. 

      D) Delegated Authentication is enabled for the system administrator profile.

    • E. 

      E) The return type of the Web service method should be a Boolean value

  • 82. 
    Universal containers wants to implement single Sign-on for a salesforce org using an external identity provider and corporate identity store. What type of Authentication flow is required to support deep linking?
    • A. 

      A) Web server Oauth SSO flow.

    • B. 

      B) Identity-provider-initiated SSO

    • C. 

      C) Service-provider-initiated SSO

    • D. 

      D) Start URL on identity provider

  • 83. 
    Universal containers (UC) has multiple salesforce orgs and would like to use a single identity provider to access all of their orgs. How should UC'S architect enable this behavior?
    • A. 

      A) Ensure that users have the same email value in their user records in all of UC's salesforce orgs.

    • B. 

      B) Ensure the same username is allowed in multiple orgs by contacting salesforce support.

    • C. 

      C) Ensure that users have the same Federation ID value in their user records in all of UC's salesforce orgs.

    • D. 

      D) Ensure that users have the same alias value in their user records in all of UC's salesforce orgs.

  • 84. 
    An architect has successfully configured SAML-BASED SSO for universal containers. SSO has been working for 3 months when Universal containers manually adds a batch of new users to salesforce. The new users receive an error from salesforce when trying to use SSO. Existing users are still able to successfully use SSO to access salesforce. What is the probable cause of this behavior?
    • A. 

      A) The administrator forgot to reset the new user's salesforce password.

    • B. 

      B) The Federation ID field on the new user records is not correctly set

    • C. 

      C) The my domain capability is not enabled on the new user's profile.

    • D. 

      D) The new users do not have the SSO permission enabled on their profiles.

  • 85. 
    Universal containers (UC) has a classified information system that it's call centre team uses only when they are working on a case with a record type of "classified". They are only allowed to access the system when they own an open "classified" case, and their access to the system is removed at all other times. They would like to implement SAML SSO with salesforce as the IDP, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying access to the classified information system based on the open "classified" case record criteria?
    • A. 

      A) Use a custom connected App handler using apex to dynamically allow access to the system based on whether the staff owns any open "classified" cases.

    • B. 

      B) Use apex trigger on case to dynamically assign permission sets that grant access when a user is assigned with an open "classified" case, and remove it when the case is closed.

    • C. 

      C) Use custom SAML jit provisioning to dynamically query the user's open "classified" cases when attempting to access the classified information system

    • D. 

      D) Use salesforce reports to identify users that currently owns open "classified" cases and should be granted access to the classified information system.

  • 86. 
    A group of users try to access one of universal containers connected apps and receive the following error message: "Failed: Not approved for access". What is most likely to cause of the issue?
    • A. 

      A) The use of high assurance sections are required for the connected App.

    • B. 

      B) The users do not have the correct permission set assigned to them.

    • C. 

      C) The connected App setting "All users may self-authorize" is enabled.

    • D. 

      D) The salesforce administrators gave revoked the Oauth authorization.

  • 87. 
    Universal containers (UC) wants to integrate a Web application with salesforce. The UC team has implemented the Oauth web-server Authentication flow for authentication process. Which two considerations should an architect point out to UC? Choose 2 answers
    • A. 

      A) The web application should be hosted on a secure server.

    • B. 

      B) The web server must be able to protect consumer privacy

    • C. 

      C) The flow involves passing the user credentials back and forth.

    • D. 

      D) The flow will not provide an Oauth refresh token back to the server.

  • 88. 
    Universal containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers
    • A. 

      A) Disallow the use of single Sign-on for any users of the mobile app.

    • B. 

      B) Require high assurance sessions in order to use the connected App

    • C. 

      C) Use Google Authenticator as an additional part of the logical processes.

    • D. 

      D) Set login IP ranges to the internal network for all of the app users profiles.

  • 89. 
    Universal containers (UC) has decided to use identity connect as its identity provider. UC uses active directory (AD) and has a team that is very familiar and comfortable with managing ad groups. UC would like to use AD groups to help configure salesforce users. Which three actions can AD groups control through identity connect? Choose 3 answers
    • A. 

      A) Public Group Assignment

    • B. 

      B) Granting report folder access

    • C. 

      C) Role Assignment

    • D. 

      D) Custom permission assignment

    • E. 

      E) Permission sets assignment

  • 90. 
    Universal containers wants to set up SSO for a selected group of users to access external applications from salesforce through App launcher. Which three steps must be completed in salesforce to accomplish the goal?
    • A. 

      A) Associate user profiles with the connected Apps.

    • B. 

      B) Complete my domain and Identity provider setup.

    • C. 

      C) Create connected apps for the external applications.

    • D. 

      D) Complete single Sign-on settings in security controls.

    • E. 

      E) Create named credentials for each external system.

  • 91. 
    Universal containers (UC) has decided to use salesforce as an identity provider for multiple external applications. UC wants to use the salesforce app launcher to control the apps that are available to individual users. Which three steps are required to make this happen?
    • A. 

      A) Set up an Auth provider for each external application.

    • B. 

      B) Create a connected App for each external application.

    • C. 

      C) Set up salesforce as a SAML IDP with my domain.

    • D. 

      D) Set up identity connect to synchronize user data.

    • E. 

      E) Add each connected App to the app launcher with a start URL

  • 92. 
    Universal containers (UC) is concerned that having a self-registration page will provide a means for "bots" or unintended audiences to create user records, thereby consuming licenses and adding dirty data. Which two actions should UC take to prevent unauthorized form submissions during the self-registration process? Choose 2 answers
    • A. 

      A) Use open-ended security questions and complex password requirements

    • B. 

      B) Primarily use lookup and picklist fields on the self-registration page.

    • C. 

      C) Require a CAPTCHA at the end of the self-registration process.

    • D. 

      D) Use hidden fields populated via java script events in the self-registration page.

  • 93. 
    Universal containers (UC) has implemented a multi-org strategy and would like to centralize the management of their salesforce user profiles. What should the architect recommend to allow salesforce profiles to be managed from a central system of record?
    • A. 

      A) Implement jit provisioning on the SAML IDP that will pass the profile id in each assertion.

    • B. 

      B) Create an apex scheduled job in one org that will synchronize the other orgs profile.

    • C. 

      C) Implement Delegated Authentication that will update the user profiles as necessary.

    • D. 

      D) Implement an Oauth jwt flow to pass the profile credentials between systems.

  • 94. 
    Universal containers wants to build a custom mobile app connecting to salesforce using Oauth, and would like to restrict the types of resources mobile users can access. What Oauth feature of Salesforce should be used to achieve the goal?
    • A. 

      A) Access Tokens

    • B. 

      B) mobile pins

    • C. 

      C) Refresh Tokens

    • D. 

      D) scopes

  • 95. 
    Universal containers (UC) is setting up their customer Community self-registration process. They are uncomfortable with the idea of assigning new users to a default account record. What will happen when customers self-register in the community?
    • A. 

      A) The self-registration process will produce an error to the user.

    • B. 

      B) The self-registration page will ask user to select an account.

    • C. 

      C) The self-registration process will create a person Account record.

    • D. 

      D) The self-registration page will create a new account record.

  • 96. 
    Universal containers (UC) uses a home-grown employee portal for their employees to collaborate. UC decides to use salesforce ideas to allow the employees to post ideas from the employee portal. When clicking some links in the employee portal, the users should be redirected to salesforce, authenticated, and presented with relevant pages. What scope should be requested when using the Oauth token to meet this requirement?
    • A. 

      A) Web

    • B. 

      B) full

    • C. 

      C) API

    • D. 

      D) visualforce

  • 97. 
    Universal containers (UC) would like to enable SAML-BASED SSO for a salesforce partner community. UC has an existing LDAP identity store and a third-party portal. They would like to use the existing portal as the primary site these users access, but also want to allow seamless access to the partner community. What SSO flow should an architect recommend?
    • A. 

      A) User-Agent

    • B. 

      B) IDP-initiated

    • C. 

      C) SP-Initiated

    • D. 

      D) Web server

  • 98. 
    Universal Containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use Salesforce Ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to Salesforce through API. UC decides to use an API user using OAuth Username-Password flow for the connection. How can the connection to Salesforce be restricted only to the Employee portal server?
    • A. 

      A) Use a dedicated profile for the user the Employee portal user.

    • B. 

      B) Add the Employee portal's IP Address to the trusted IP range for the Connected App

    • C. 

      C) Use a digital certificate signed by the Employee portal server.

    • D. 

      D) Add the Employee portal's IP address to the Login IP range on the user profile

  • 99. 
    Universal Containers (UC) wants its closed Won opportunities to be synced to a Data warehouse in near real time. UC has implemented Outbound Message to enable near real-time data sync. UC wants to ensure that communication between Salesforce and Target System is secure. What certificate is sent along with the Outbound Message?
    • A. 

      A) The Self-signed Certificates from the Certificate & Key Management menu.

    • B. 

      B) The default client Certificate from the Develop--> API menu.

    • C. 

      C) The default client Certificate or the Certificate and Key Management menu.

    • D. 

      D) The CA-signed Certificate from the Certificate and Key Management Menu.

  • 100. 
    Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?
    • A. 

      A) Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.

    • B. 

      B) Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.

    • C. 

      C) Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.

    • D. 

      D) Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.

  • 101. 
    Universal Containers (UC) has Active Directory (AD) as their enterprise identity store and would like to use it for Salesforce user authentication. UC expects to synchronize user data between Salesforce and AD and Assign the appropriate Profile and Permission Sets based on AD group membership. What would be the optimal way to implement SSO?
    • A. 

      A) Use Active Directory with Reverse Proxy as the Identity Provider.

    • B. 

      B) Use Microsoft Access control Service as the Authentication provider.

    • C. 

      C) Use Active Directory Federation Service (ADFS) as the Identity Provider.

    • D. 

      D) Use Salesforce Identity Connect as the Identity Provider.

  • 102. 
    Universal Containers (UC) is building a custom Innovation platform on their Salesforce instance. The Innovation platform will be written completely in Apex and Visualforce and will use custom objects to store the Data. UC would like all users to be able to access the system without having to log in with Salesforce credentials. UC will utilize a third-party idp using SAML SSO. What is the optimal Salesforce licence type for all of the UC employees?
    • A. 

      A) Identity license.

    • B. 

      B) Salesforce license.

    • C. 

      C) External Identity license.

    • D. 

      D) Salesforce Platform license.

  • 103. 
    Universal Containers (UC) has a mobile application for its employees that uses data from Salesforce as well as uses Salesforce for Authentication purposes. UC wants its mobile users to only enter their credentials the first time they run the app. The application has been live for a little over 6 months, and all of the users who were part of the initial launch are complaining that they have to re-authenticate. UC has also recently changed the URI Scheme associated with the mobile app. What should the Architect at UC first investigate?
    • A. 

      A) Check the Refresh Token policy defined in the Salesforce Connected App.

    • B. 

      B) Validate that the users are checking the box to remember their passwords.

    • C. 

      C) Verify that the Callback URL is correctly pointing to the new URI Scheme.

    • D. 

      D) Confirm that the access Token's Time-To-Live policy has been set appropriately.

  • 104. 
    Universal Containers (UC) wants to build a mobile application that twill be making calls to the Salesforce REST API. UC's Salesforce implementation relies heavily on custom objects and custom Apex code. UC does not want its users to have to enter credentials every time they use the app. Which two scope values should an Architect recommend to UC? Choose 2 answers.
    • A. 

      A) custom_permissions

    • B. 

      B) api

    • C. 

      C) refresh_token

    • D. 

      D) full

  • 105. 
    Universal Containers (UC) is looking to purchase a third-party application as an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose 2 answers
    • A. 

      A) The Identity Provider can authenticate multiple applications.

    • B. 

      B) The Identity Provider can authenticate multiple social media accounts.

    • C. 

      C) The Identity provider can store credentials for multiple applications.

    • D. 

      D) The Identity Provider can centralize enterprise password policy.

  • 106. 
    Universal Containers (UC) has implemented a multi-org architecture in their company. Many users have licenses across multiple orgs, and they are complaining about remembering which org and credentials are tied to which business process. Which two recommendations should the Architect make to address the Complaints? Choose 2 answers
    • A. 

      A) Activate My Domain to Brand each org to the specific business use case.

    • B. 

      B) Implement SP-Initiated Single Sign-on flows to allow deep linking.

    • C. 

      C) Implement IdP-Initiated Single Sign-on flows to allow deep linking.

    • D. 

      D) Implement Delegated Authentication from each org to the LDAP provider.

  • 107. 
    Universal Containers (UC) uses an internal system for recruiting and would like to have the candidates' info available in the Salesforce automatically when they are selected. UC decides to use OAuth to connect to Salesforce from the recruiting system and would like to do the authentication using digital certificates. Which two OAuth flows should be considered to meet the requirement? Choose 2 answers
    • A. 

      A) JWT Bearer Token flow

    • B. 

      B) Refresh Token flow

    • C. 

      C) SAML Bearer Assertion flow

    • D. 

      D) Web Service flow

  • 108. 
    Universal Containers (UC) is building an authenticated Customer Community for its customers. UC does not want customer credentials stored in Salesforce and is confident its customers would be willing to use their social media credentials to authenticate to the community. Which two actions should an Architect recommend UC to take?
    • A. 

      A) Use Delegated Authentication to call the Twitter login API to authenticate users.

    • B. 

      B) Configure an Authentication Provider for LinkedIn Social Media Accounts.

    • C. 

      C) Create a Custom Apex Registration Handler to handle new and existing users.

    • D. 

      D) Configure SSO Settings for Facebook to serve as a SAML Identity Provider.

  • 109. 
    How should an Architect force users to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?
    • A. 

      A) Use Custom Login Flows with Apex to detect the user's IP address and prompt for 2FA if needed.

    • B. 

      B) Add the list of company's network IP addresses to the Login Range list under 2FA Setup.

    • C. 

      C) Use an Apex Trigger on the UserLogin object to detect the user's IP address and prompt for 2FA if needed.

    • D. 

      D) Apply the "Two-factor Authentication for User Interface Logins" permission and Login IP Ranges for all Profiles.

  • 110. 
    What is one of the roles of an Identity Provider in a Single Sign-on setup using SAML?
    • A. 

      A) Validate token

    • B. 

      B) Create token

    • C. 

      C) Consume token

    • D. 

      D) Revoke token

  • 111. 
    Which two security risks can be mitigated by enabling Two-Factor Authentication (2FA) in Salesforce? Choose 2 answers
    • A. 

      A) Users leaving laptops unattended and not logging out of Salesforce.

    • B. 

      B) Users accessing Salesforce from a public Wi-Fi access point.

    • C. 

      C) Users choosing passwords that are the same as their Facebook password.

    • D. 

      D) Users creating simple-to-guess password reset questions.

  • 112. 
    Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third party system. However, UC quickly notices that changes to user roles in Salesforce are not getting synched to the third-party system. What is the most likely reason for this behavior?
    • A. 

      A) User Provisioning for Connected Apps does not support role sync.

    • B. 

      B) Required operation(s) was not mapped in User Provisioning Settings.

    • C. 

      C) The Approval queue for User Provisioning Requests is unmonitored.

    • D. 

      D) Salesforce roles have more than three levels in the role hierarchy.

  • 113. 
    Universal containers (UC) is planning to deploy a custom mobile app that will allow users to get e-signatures from its customers on their mobile devices. The mobile app connects to salesforce to upload the e-signatures as a file attachment and uses Oauth protocol for both Authentication and authorization. What is the most recommended and secure Oauth scope setting that an architect should recommend?
    • A. 

      A) Id

    • B. 

      B) Web

    • C. 

      C) custom_permissions

    • D. 

      D) API

  • 114. 
    An architect needs to advise the team that manages the identity provider how to differentiate salesforce from other service providers. What SAML SSO setting in salesforce provides this capability?
    • A. 

      A) Entity Id

    • B. 

      B) Issuer

    • C. 

      C) Identity provider login URL

    • D. 

      D) SAML identity location

  • 115. 
    The CIO of universal containers (UC) wants to start taking advantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens can be applied. Which two OAuth flows should the architect consider in their evaluation? Choose 2 answers
    • A. 

      A) Web server

    • B. 

      B) JWT Bearer Token

    • C. 

      C) User-Agent

    • D. 

      D) Username-password

  • 116. 
    The security team at Universal containers (UC) has identified exporting reports as a high-risk action and would like to require users to be logged into salesforce with their active directory (AD) credentials when doing so. For all other uses of Salesforce, Users should be allowed to use AD credentials or salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with salesforce credentials?
    • A. 

      A) Use SAML Federated Authentication and Custom SAML jit provisioning to dynamically add or remove a permission set that grants the Export Reports permission.

    • B. 

      B) Use SAML Federated Authentication, treat SAML sessions as high assurance, and raise the session level required for exporting reports.

    • C. 

      C) Use SAML Federated Authentication and block access to reports when accesses through a standard assurance session.

    • D. 

      D) Use SAML Federated Authentication with a login flow to dynamically add or remove a permission set that grants the export reports permission.

  • 117. 
    Customer service representatives at Universal containers (UC) are complaining that whenever they click on links to case records and are asked to login with SAML SSO, they are being redirected to the salesforce home tab and not the specific case record. What item should an architect advise the identity team at UC to investigate first?
    • A. 

      A) My domain is configured and active within salesforce

    • B. 

      B) The salesforce SSO settings are using http post

    • C. 

      C) The identity provider is correctly preserving the Relay state

    • D. 

      D) The users have the correct Federation ID within salesforce.

  • 118. 
    Universal containers (UC) is successfully using Delegated Authentication for their salesforce users. The service supporting Delegated Authentication is written in Java. UC has a new CIO that is requiring all company Web services be RESR-ful and written in . NET. Which two considerations should the UC Architect provide to the new CIO? Choose 2 answers
    • A. 

      A) Delegated Authentication will not work with a.net service.

    • B. 

      B) Delegated Authentication will continue to work with rest services.

    • C. 

      C) Delegated Authentication will continue to work with a.Net service.

    • D. 

      D) Delegated Authentication will not work with REST services.

  • 119. 
    Universal containers(UC) has implemented SAML-BASED single Sign-on for their salesforce application and is planning to provide access to salesforce on mobile devices using the salesforce1 mobile app. UC wants to ensure that single Sign-on is used for accessing the salesforce1 mobile app. Which two recommendations should the architect make? Choose 2 answers
    • A. 

      A) Use the existing SAML SSO flow along with user agent flow.

    • B. 

      B) Configure the embedded Web browser to use my domain URL.

    • C. 

      C) Use the existing SAML SSO flow along with Web server flow

    • D. 

      D) Configure the salesforce1 app to use the my domain URL

  • 120. 
    Universal containers (UC) does my domain enable in the context of a SAML SSO configuration? Choose 2 answers
    • A. 

      A) Resource deep linking

    • B. 

      B) App launcher

    • C. 

      C) SSO from salesforce1 mobile app.

    • D. 

      D) Login forensics

  • 121. 
    Universal containers (UC) would like to enable self - registration for their salesforce partner community users. UC wants to capture some custom data elements from the partner user, and based on these data elements, wants to assign the appropriate profile and account values. Which two actions should the architect recommend to UC? Choose 2 answers
    • A. 

      A) Modify the communitiesselfregcontroller to assign the profile and account.

    • B. 

      B) Modify the selfregistration trigger to assign profile and account.

    • C. 

      C) Configure registration for communities to use a custom visualforce page.

    • D. 

      D) Configure registration for communities to use a custom apex controller.

  • 122. 
    Universal containers (UC) has implemented SAML -based single Sign-on for their salesforce application. UC is using pingfederate as the Identity provider. To access salesforce, Users usually navigate to a bookmarked link to my domain URL. What type of single Sign-on is this?
    • A. 

      A) Sp-Initiated

    • B. 

      B) IDP-initiated with deep linking

    • C. 

      C) IDP-initiated

    • D. 

      D) Web server flow.

  • 123. 
    Universal containers (UC) is building a mobile application that will make calls to the salesforce REST API. Additionally UC would like to provide the optimal experience for its mobile users. Which two OAuth scopes should UC configure in the connected App? Choose 2 answers
    • A. 

      A) Refresh token

    • B. 

      B) API

    • C. 

      C) full

    • D. 

      D) web

  • 124. 
    Universal containers (UC) built a customer Community for customers to buy products, review orders, and manage their accounts. UC has provided three different options for customers to log in to the customer Community: salesforce, Google, and Facebook. Which two role combinations are represented by the systems in the scenario? Choose 2 answers
    • A. 

      A) Google is the Service Provider and Facebook is the Identity Provider

    • B. 

      B) Salesforce is the Service Provider and Google is the Identity Provider

    • C. 

      C) Facebook is the Service Provider and salesforce is the Identity Provider

    • D. 

      D) Salesforce is the Service Provider and Facebook is the Identity Provider

  • 125. 
    Universal containers (UC) employees have salesforce access from restricted ip ranges only, to protect against unauthorized access. UC wants to rollout the salesforce1 mobile app and make it accessible from any location. Which two options should an architect recommend? Choose 2 answers
    • A. 

      A) Relax the ip restriction in the connect app settings for the salesforce1 mobile app

    • B. 

      B) Use login flow to bypass ip range restriction for the mobile app.

    • C. 

      C) Relax the ip restriction with a second factor in the connect app settings for salesforce1 mobile app

    • D. 

      D) Remove existing restrictions on ip ranges for all types of user access.

  • 126. 
    Universal containers (UC) has a customer Community that uses Facebook for authentication. UC would like to ensure that changes in the Facebook profile are reflected on the appropriate customer Community user. How can this requirement be met?
    • A. 

      A) Use the updateuser() method on the registration handler class.

    • B. 

      B) Use SAML just-in-time provisioning between Facebook and Salesforce

    • C. 

      C) Use information in the signed request that is received from Facebook.

    • D. 

      D) Develop a schedule job that calls out to Facebook on a nightly basis.

  • 127. 
    Universal containers (UC) wants to integrate a third-party reward calculation system with salesforce to calculate rewards. Rewards will be calculated on a schedule basis and update back into salesforce. The integration between Salesforce and the reward calculation system needs to be secure. Which are the recommended best practices for using Oauth flows in this scenario? Choose 2 answers
    • A. 

      A) Oauth refresh token flow

    • B. 

      B) Oauth SAML bearer assertion flow

    • C. 

      C) Oauth JWT bearer token flow

    • D. 

      D) Oauth Username-password flow

  • 128. 
    Universal containers (UC) has implemented a sp-Initiated SAML flow between an external IDP and salesforce. A user at UC is attempting to login to salesforce1 for the first time and is being prompted for salesforce credentials instead of being shown the IDP login page. What is the likely cause of the issue?
    • A. 

      A) The "Redirect to Identity Provider" option has been selected in my domain configuration.

    • B. 

      B) The user has not configured the salesforce1 mobile app to use my domain for login

    • C. 

      C) The "Redirect to identity provider" option has not been selected the SAML configuration.

    • D. 

      D) The user has not been granted the "Enable single Sign-on" permission

  • 129. 
    Universal containers (UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users to provide a fingerprint in addition to username/Password to authenticate to this application. How can an architect support fingerprints as a form of identification for salesforce Authentication?
    • A. 

      A) Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

    • B. 

      B) Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

    • C. 

      C) Use an appexchange product that does fingerprint scanning with native salesforce identity confirmation.

    • D. 

      D) Use custom login flows with callouts to a third-party fingerprint scanning application.

  • 130. 
    An architect needs to set up a Facebook Authentication provider as login option for a salesforce customer Community. What portion of the authentication provider setup associates a Facebook user with a salesforce user?
    • A. 

      A) Consumer key and consumer secret

    • B. 

      B) Federation ID

    • C. 

      C) User info endpoint URL

    • D. 

      D) Apex registration handler