Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Questions 4

Which twosecurity risks can be mitigated by enabling Two-Factor Authentication (2FA) in Salesforce? Choose 2 answers

Options:

A.

Users leaving laptops unattended and not logging out of Salesforce.

B.

Users accessing Salesforce from a public Wi-Fi access point.

C.

Users choosing passwords that are the same as their Facebook password.

D.

Users creating simple-to-guess password reset questions.

Buy Now
Questions 5

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token.

Which authentication mechanism should an identity architect recommend to meet therequirements?

Options:

A.

OpenID Connect

B.

User Agent Flow

C.

JWT Bearer Token Flow

D.

Web Server Flow

Buy Now
Questions 6

Universal containers (UC) has multiple salesforce orgs and would like to use a single identity provider to access all of their orgs. How should UC'S architect enable this behavior?

Options:

A.

Ensure that users have the same email value in their user records in all of UC's salesforce orgs.

B.

Ensure the same username is allowed in multiple orgs by contacting salesforce support.

C.

Ensure that users have the same Federation ID value in their user recordsin all of UC's salesforce orgs.

D.

Ensure that users have the same alias value in their user records in all of UC's salesforce orgs.

Buy Now
Questions 7

Which tool should be used to track login data, such as the average number of logins, who logged in more thanthe average number of times and who logged in during non-business hours?

Options:

A.

Login Inspector

B.

Login History

C.

Login Report

D.

Login Forensics

Buy Now
Questions 8

Universal Containers is implementing a new Experience Cloud site and the identity architect wants to use dynamic branding features as of the login process.

Which two options should the identity architect recommend to support dynamic branding for the site?

Choose 2 answers

Options:

A.

To use dynamic branding, the community must be built with the Visuaiforce + Salesforce Tabs template.

B.

To use dynamic branding, the community must be built with the Customer Account Portal template.

C.

An experience ID (expid) or placeholder parametermust be used in the URL to represent the brand.

D.

An external content management system (CMS) must be used for dynamic branding on Experience Cloud sites.

Buy Now
Questions 9

Universal Containers (UC) wants to build a custom mobile app for their field reps to create orders in salesforce. After the first time the users log in, they must be able to access salesforce upon opening the mobile app without being prompted to log in again. What Oauth flows should be considered to support this requirement?

Options:

A.

Web Server flow with a Refresh Token.

B.

Mobile Agent flow with a Bearer Token.

C.

User Agent flow with a Refresh Token.

D.

SAML Assertion flow with a Bearer Token.

Buy Now
Questions 10

Northern Trail Outfitters (NTO) wants to improve its engagement with existing customers to boost customer loyalty. To get a better understanding of its customers, NTO establishes a single customer view including their buying behaviors, channel preferences and purchasing history. All of this information exists but is spread across different systems and formats.

NTO has decided to use Salesforce as the platform to build a 360 degree view. The company already uses Microsoft Active Directory (AD) to manage its users and company assets.

What should an Identity Architect do to provision, deprovision and authenticate users?

Options:

A.

Salesforce Identity is not needed since NTO uses Microsoft AD.

B.

Salesforce Identity can be included but NTO will be required to build a custom integration with Microsoft AD.

C.

Salesforce Identity is included in the Salesforce licenses so it does not need to be considered separately.

D.

A Salesforce Identity can be included but NTO will require Identity Connect.

Buy Now
Questions 11

Which three are features of federated Single sign-on solutions? Choose 3 Answers

Options:

A.

It establishes trust between Identity Store and Service Provider.

B.

It federates credentials control to authorized applications.

C.

It solves all identity and access management problems.

D.

It improves affiliated applications adoption rates.

E.

It enables quick and easy provisioning and deactivating of users.

Buy Now
Questions 12

Universal Containers (UC) built an integration for their employees to post, view, and vote for ideas in Salesforce from an internal Company portal. When ideas are posted in Salesforce, links to the ideas are created in the company portal pages as part of the integration process. The Company portal connects to Salesforce using OAuth. Everything is working fine, except when users click on links to existing ideas, they are always taken to the Ideas home page rather than the specific idea, after authorization.Which OAuth URL parameter can be used to retain the original requested page so that a user can be redirected correctly after OAuth authorization?

Options:

A.

Redirect_uri

B.

State

C.

Scope

D.

Callback_uri

Buy Now
Questions 13

How should an Architect automatically redirect users to the login page of the external Identity provider when using an SP-Initiated SAML flow with Salesforce as a Service Provider?

Options:

A.

Use visualforce as the landing page for My Domain to redirect users to the Identity Provider login Page.

B.

Enable the Redirect to the Identity Provider setting under Authentication Services on the My domain Configuration.

C.

Remove the Login page from the list of Authentication Services on the My Domain configuration.

D.

Set the Identity Provider as default and enable the Redirect to the Identity Provider setting on the SAML Configuration.

Buy Now
Questions 14

Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion Markup Language (SAML) configuration supports the company's single sign-on process to Salesforce,

Which Salesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2.0 SAML Bearer AssertionFlow

B.

A SAML Assertion Row

C.

OAuth 2.0 User-Agent Flow

D.

OAuth 2.0 JWT Bearer Flow

Buy Now
Questions 15

Universal containers (UC) built a customer Community for customers to buy products, review orders, and manage their accounts. UC has provided three different options for customers to log in to the customer Community: salesforce, Google, and Facebook. Which two role combinations are represented by the systems in the scenario? Choose 2 answers

Options:

A.

Google is the service provider and Facebook is the identity provider

B.

Salesforceis the service provider and Google is the identity provider

C.

Facebook is the service provider and salesforce is the identity provider

D.

Salesforce is the service provider and Facebook is the identity provider

Buy Now
Questions 16

A university is planningto set up an identity solution for its alumni. A third-party identity provider will be used for single sign-on Salesforce will be the system of records. Users are getting error messages when logging in.

Which Salesforce feature should be used to debug theissue?

Options:

A.

Apex Exception Email

B.

View Setup Audit Trail

C.

Debug Logs

D.

Login History

Buy Now
Questions 17

Universal Containers (UC) rollingout a new Customer Identity and Access Management Solution will be built on top of their existing Salesforce instance.

Several service providers have been setup and integrated with Salesforce using OpenlD Connect to allow for a seamless single sign-on experience. UC has a requirement to limit user access to only a subset of service providers per customer type.

Which two steps should be done on the platform to satisfy the requirement?

Choose 2 answers

Options:

A.

Manage which connected apps a user has access to byassigning authentication providers to the user’s profile.

B.

Assign the connected app to the customer community, and enable the users profile in the Community settings.

C.

Use Profiles and Permission Sets to assign user access to Admin Pre-Approved Connected Apps.

D.

Set each of the Connected App access settings to Admin Pre-Approved.

Buy Now
Questions 18

A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities.

WhichSalesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2.0 JWT Bearer How

B.

OAuth 2.0 Device Flow

C.

OAuth 2.0 User-Agent Flow

D.

OAuth 2.0 Asset Token Flow

Buy Now
Questions 19

Universal containers (UC) wants to implement Delegated Authentication for a certainsubset of Salesforce users. Which three items should UC take into consideration while building the Web service to handle the Delegated Authentication request? Choose 3 answers

Options:

A.

The web service needs to include Source IP as a method parameter.

B.

UC should whitelist all salesforce ip ranges on their corporate firewall.

C.

The web service can be written using either the soap or rest protocol.

D.

Delegated Authentication is enabled for the system administrator profile.

E.

The return type of the Web service method should be a Boolean value

Buy Now
Questions 20

Universal Containers (UC) has implemented SAML-based Single Sign-On to provide seamless access to its Salesforce Orgs, financial system, and CPQ system. Below is the SSO implementationlandscape.

What role combination is represented by the systems in this scenario''

Options:

A.

Financial System and CPQ System are the only Service Providers.

B.

Salesforce Org1 and Salesforce Org2 are the only Service Providers.

C.

Salesforce Org1 and Salesforce Org2 are acting as Identity Providers.

D.

Salesforce Org1 and PingFederate are acting as Identity Providers.

Buy Now
Questions 21

A company wantsto provide its employees with a custom mobile app that accesses Salesforce. Users are required to download the internal native IOS mobile app from corporate intranet on their mobile device. The app allows flexibility to access other non-Salesforce internalapplications once users authenticate with Salesforce. The apps self-authorize, and users are permitted to use the apps once they have logged into Salesforce.

How should an identity architect meet the above requirements with the privately distributed mobile app?

Options:

A.

Use connected app with OAuth and Security Assertion Markup Language (SAML) to access other non-Salesforce internal apps.

B.

Configure Mobile App settings in connected app and Salesforce as identity provider for non-Salesforce internal apps.

C.

Use Salesforce as an identity provider (IdP) to access the mobile app and use the external IdP for other non-Salesforce internal apps.

D.

Create a new hybrid mobile app and use the connected app with OAuth to authenticate users for Salesforce and non-Salesforce internal apps.

Buy Now
Questions 22

Universal containers (UC) has implemented SAML SSO to enable seamless access across multiple applications. UC has regional salesforce orgs and wants it's usersto be able to access them from their main Salesforce org seamless. Which action should an architect recommend?

Options:

A.

Configure the main salesforce org as an authentication provider.

B.

Configure the main salesforce org as the Identity provider.

C.

Configurethe regional salesforce orgs as Identity Providers.

D.

Configure the main Salesforce org as a service provider.

Buy Now
Questions 23

Which three different attributes can be used to identify the user in a SAML 65> assertion when Salesforce is acting as a Service Provider? Choose 3 answers

Options:

A.

Federation ID

B.

Salesforce User ID

C.

User Full Name

D.

User Email Address

E.

Salesforce Username

Buy Now
Questions 24

Universal Container's (UC) is using Salesforce Experience Cloud site for its containerwholesale business. The identity architect wants to an authentication provider for the new site.

Which two options should be utilized in creating an authentication provider?

Choose 2 answers

Options:

A.

A custom registration handier can be set.

B.

A custom error URL can be set.

C.

The default login user can be set.

D.

The default authentication provider certificate can be set.

Buy Now
Questions 25

Universal containers (UC) has implemented SAML -based single Sign-on for their salesforce application. UC is using PingFederate as the Identity provider. To access salesforce, Users usually navigate to a bookmarked link to my domain URL. What type of single Sign-on is this?

Options:

A.

Sp-Initiated

B.

IDP-initiated with deep linking

C.

IDP-initiated

D.

Web server flow.

Buy Now
Questions 26

UniversalContainers (UC) wants to build a few applications that leverage the Salesforce REST API. UC has asked its Architect to describe how the API calls will be authenticated to a specific user. Which two mechanisms can the Architect provide? Choose 2 Answers

Options:

A.

Authentication Token

B.

Session ID

C.

Refresh Token

D.

Access Token

Buy Now
Questions 27

Northern Trail Outfitters (NTO) is setting up Salesforce to authenticate users with an external identity provider. The NTO Salesforce Administrator is having trouble getting things setup.

What should an identity architect use to show which part of the login assertion is fading?

Options:

A.

SAML Metadata file importer

B.

Identity Provider Metadata download

C.

Connected App Manager

D.

Security Assertion Markup Language Validator

Buy Now
Questions 28

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants tounderstand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure mfa?

Choose 3 answers

Options:

A.

username and password + SMS passcode

B.

Username and password + secunty key

C.

Third-party single sign-on with Mobile Authenticator app

D.

Certificate-based Authentication

E.

Lightning Login

Buy Now
Questions 29

Northern Trail Outfitters would like to use a portal built on Salesforce Experience Cloud for customer self-service. Guests of the portal be able toself-register, but be unable to automatically be assigned to a contact record until verified. External Identity licenses have been purchased for the project.

After registered guests complete an onboarding process, a flow will create the appropriate accountand contact records for the user.

Which three steps should an identity architect follow to implement the outlined requirements?

Choose 3 answers

Options:

A.

Enable "Allow customers and partners to self-register".

B.

Select the "Configurable Self-Reg Page" optionunder Login & Registration.

C.

Set jp an external login page and call Salesforce APIs for user creation.

D.

Customize the self-registration Apex handler to temporarily associate the user to a shared single contact record.

E.

Customize me self-registrationApex handler to create only the user record.

Buy Now
Questions 30

After a recent audit, universal containers was advised to implement Two-factor Authentication for all of their critical systems, including salesforce. Which two actions should UC consider to meet this requirement? Choose 2 answers

Options:

A.

Require users to provide their RSA token along with their credentials.

B.

Require users to supply their email and phone number, which gets validated.

C.

Require users to enter a second password after the first Authentication

D.

Require users to use a biometric reader as well as their password

Buy Now
Questions 31

Universal Containers (UC) is building a custom employee hut) application on Amazon Web Services (AWS) and would like to store their users' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating Afferent solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

Options:

A.

Configure the custom employee app as a connected app.

B.

Configure AWS as an OpenID Connect Provider.

C.

Create a custom external authentication provider.

D.

Develop a customAuth server in AWS.

Buy Now
Questions 32

Universal Containers (UC) wants to integrate a third-party Reward Calculation system with Salesforce to calculate Rewards. Rewards will be calculated on a schedule basis and update back into Salesforce. The integration between Salesforce and the Reward Calculation System needs to be secure. Which are two recommended practices for using OAuth flow in this scenario. choose 2 answers

Options:

A.

OAuth Refresh Token FLow

B.

OAuth Username-Password Flow

C.

OAuth SAML Bearer Assertion FLow

D.

OAuth JWT Bearer Token FLow

Buy Now
Questions 33

Universal containers (UC) wants to integrate a Web application with salesforce. The UC team hasimplemented the Oauth web-server Authentication flow for authentication process. Which two considerations should an architect point out to UC? Choose 2 answers

Options:

A.

The web application should be hosted on a secure server.

B.

The web server must be able to protect consumer privacy

C.

The flow involves passing the user credentials back and forth.

D.

The flow will not provide an Oauth refresh token back to the server.

Buy Now
Questions 34

Universal Containerswants to implement Single Sign-on for a Salesforce org using an external Identity Provider and corporate identity store.

What type of authentication flow is required to support deep linking'

Options:

A.

Web Server OAuth SSO flow

B.

Service-Provider-Initiated SSO

C.

C. Identity-Provider-initiated SSO

D.

StartURL on Identity Provider

Buy Now
Questions 35

Which two are valid choices for digital certificates when setting up two-way SSL between Salesforce and an external system. Choose2 answers

Options:

A.

Use a trusted CA-signed certificate for salesforce and a trusted CA-signed cert for the external system

B.

Use a trusted CA-signed certificate for salesforce and a self-signed cert for the external system

C.

Use a self-signed certificate for salesforce and a self-signed cert for the external system

D.

Use a self-signed certificate for salesforce and a trusted CA-signed cert for the external system

Buy Now
Questions 36

Universal Containers (UC) uses Salesforce to allow customers to keep track of the order status. The customers can log in to Salesforce using external authentication providers, such as Facebook and Google. UC is also leveraging the App Launcher to let customers access an of platform application for generating shipping labels. The labelgenerator application uses OAuth to provide users access. What license type should an Architect recommend for the customers?

Options:

A.

Customer Community license

B.

Identity license

C.

Customer Community Plus license

D.

External Identity license

Buy Now
Questions 37

Universal containers (UC) would like to enable self - registration for their salesforce partner community users. UC wants to capture some custom data elements from the partner user,and based on these data elements, wants to assign the appropriate profile and account values. Which two actions should the architect recommend to UC? Choose 2 answers

Options:

A.

Modify the communitiesselfregcontroller to assign the profile and account.

B.

Modify the selfregistration trigger to assign profile and account.

C.

Configure registration for communities to use a custom visualforce page.

D.

Configure registration for communities to use a custom apex controller.

Buy Now
Questions 38

Northern Trail Outfitters recently acquired a company. Each company will retain its Identity Provider (IdP). Both companies rely extensively on Salesforce processes that send emails to users to take specific actions in Salesforce.

How should the combined companys' employees collaborate in a single Salesforce org, yet authenticate to the appropriate IdP?

Options:

A.

Configure unique MyDomains for each company and have generated links use the appropriate MyDomam in the URL.

B.

Have generated links append a querystnng parameter indicating the IdP. The login service will redirect to the appropriate IdP.

C.

Have generated links be prefixed with the appropriate IdP URL to invoke an IdP-initiated Security Assertion Markup Language flow when clicked.

D.

Enable each IdP as a login option in the MyDomain Authentication Service settings. Users will then click onthe appropriate IdP button.

Buy Now
Questions 39

A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.

What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

Options:

A.

Use a connected app with user provisioning flow.

B.

Create Canvas app in Salesforce for third-party app to provision users.

C.

Redirect users to the third-party app for registration.

D.

Use Salesforce identity with Security Assertion Markup Language (SAML)for provisioning users.

Buy Now
Questions 40

Which three types of attacks would a 2-Factor Authentication solution help garden against?

Options:

A.

Key logging attacks

B.

Network perimeter attacks

C.

Phishing attacks

D.

Dictionary attacks

E.

Man-in-the-middle attacks

Buy Now
Questions 41

ON NO: 12

A group of users try to access one of Universal Containers' Connected Apps and receive the following error message: " Failed: Not approved for access." What is the most likely cause of this issue?

Options:

A.

The Connected App settings "All users mayself-authorize" is enabled.

B.

The Salesforce Administrators have revoked the OAuth authorization.

C.

The Users do not have the correct permission set assigned to them.

D.

The User of High Assurance sessions are required for the Connected App.

Buy Now
Questions 42

Universal containers (UC) uses an internal company portal for their employees to collaborate. UC decides to use salesforce ideas and provide the ability for employees to post ideas from the company portal. They use SAML-BASED SSO to get into the company portal and would like to leverage it to access salesforce. Most of the users don't exist in salesforce and they would like the user records created in salesforce communities the first time they try to access salesforce. What recommendation should an architect make to meet this requirement?

Options:

A.

Use on-the-fly provisioning

B.

Use just-in-time provisioning

C.

Use salesforce APIs to create users on the fly

D.

Use Identity connect to sync users

Buy Now
Questions 43

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grantsan Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

Options:

A.

1, 4, 5, 2, 3

B.

4, 1, 5, 2, 3

C.

2, 1, 3, 4, 5

D.

4,5,2, 3, 1

Buy Now
Questions 44

Universal Containers (UC) has decided touse Salesforce as an Identity Provider for multiple external applications. UC wants to use the salesforce App Launcher to control the Apps that are available to individual users. Which three steps are required to make this happen?

Options:

A.

Add each connected Appto the App Launcher with a Start URL.

B.

Set up an Auth Provider for each External Application.

C.

Set up Salesforce as a SAML Idp with My Domain.

D.

Set up Identity Connect to Synchronize user data.

E.

Create a Connected App for each external application.

Buy Now
Questions 45

Northern Trail Outfitters wants to implement a partner community. Active community users will need to review and accept the community rules, and update key contact information for each community member before their annual partner event.

Which approach will meet this requirement?

Options:

A.

Create tasks for users who need toupdate their data or accept the new community rules.

B.

Create a custom landing page and email campaign asking all community members to login and verify their data.

C.

Create a login flow that conditionally prompts users who have not accepted the newcommunity rules and who have missing or outdated information.

D.

Add a banner to the community Home page asking users to update their profile and accept the new community rules.

Buy Now
Questions 46

What are three capabilities of Delegated Authentication? Choose 3 answers

Options:

A.

It can be assigned by Custom Permissions.

B.

It can connect to SOAP services.

C.

It can be assigned by Permission Sets.

D.

It can be assigned by Profiles.

E.

It can connect to REST services.

Buy Now
Questions 47

Universal Containers (UC) uses a home-grown Employee portal for their employees to collaborate. UC decides to use Salesforce Ideas to allow employees to post Ideas from the Employee portal. When users click on some of the links in the Employee portal, the users should be redirected to Salesforce, authenticated, and presented with the relevant pages. What OAuth flow is best suited for this scenario?

Options:

A.

Web Application flow

B.

SAML Bearer Assertion flow

C.

User-Agent flow

D.

Web Server flow

Buy Now
Questions 48

An Identity and Access Management (IAM) Architect is recommending Identity Connect to integrate Microsoft Active Directory (AD) with Salesforce for user provisioning, deprovisioning and single sign-on (SSO).

Which feature of Identity Connect is applicable for this scenario?

Options:

A.

When Identity Connect is in place, if a user is deprovisioned in an on-premise AD, the user's Salesforce session Is revoked Immediately.

B.

If the number of provisioned users exceeds Salesforce license allowances, identity Connect will start disabling the existingSalesforce users in First-in, First-out (FIFO) fashion.

C.

Identity Connect can be deployed as amanaged package on salesforce org, leveraging High Availability of Salesforce Platform out-of-the-box.

D.

When configured, Identity Connect acts as an identity provider to both Active Directory and Salesforce, thus providing SSO as a default feature.

Buy Now
Questions 49

Universal Containers (UC) wants to use Salesforce for sales orders and a legacy of system for order fulfillment. The legacy system must update the status of orders in 65* Salesforce in real time as they are fulfilled. UC decides to use OAuth for connecting the legacy system to Salesforce. What OAuth flow should be considered that doesn't require storing credentials, client secret or refresh tokens?

Options:

A.

Web Server flow

B.

JWT Bearer Token flow

C.

Username-Password flow

D.

User Agent flow

Buy Now
Questions 50

A security architect is rolling out a new multi-factor authentication (MFA) mandate, where all employees must go through a secure authentication process before accessing Salesforce. There are multiple Identity Providers (IdP) in place and the architect is considering how the "Authentication Method Reference" field (AMR) in the Login History can help.

Which two considerations should the architect keep in mind?

Choose 2 answers

Options:

A.

AMR field shows the authentication methods used at IdP.

B.

Both OIDC and Security Assertion Markup Language (SAML) are supported but AMR must be implemented at IdP.

C.

High-assurance sessions must be configured under Session Security Level Policies.

D.

Dependency on what is supported by OpenID Connect (OIDC) implementation at IdP.

Buy Now
Questions 51

Which two statements are capable of Identity Connect? Choose 2 answers

Options:

A.

Synchronization of Salesforce Permission Set Licence Assignments.

B.

Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.

C.

Support multiple orgs connecting to multiple Active Directory servers.

D.

Automated user synchronization and de-activation.

Buy Now
Questions 52

Universal containers (UC) has a mobile application that it wants to deploy toall of its salesforce users, including customer Community users. UC would like to minimize the administration overhead, which two items should an architect recommend? Choose 2 answers

Options:

A.

Enable the "Refresh Tokens is valid until revoked " setting in the Connected App.

B.

Enable the "Enforce Ip restrictions" settings in the connected App.

C.

Enable the "All users may self-authorize" setting in the Connected App.

D.

Enable the "High Assurance session required" setting in the Connected App.

Buy Now
Questions 53

Universal containers (UC) has a mobile application that calls the salesforce REST API. In order to prevent users from having to enter their credentials everytime they use the app, UC has enabled the use of refresh Tokens as part of the salesforce connected App and updated their mobile app to take advantage of the refresh token. Even after enabling the refresh token, Users are still complaining that they have to enter their credentials once a day. What is the most likely cause of the issue?

Options:

A.

The Oauth authorizations are being revoked by a nightly batch job.

B.

The refresh token expiration policy is set incorrectly in salesforce

C.

The app is requesting too many access Tokens in a 24-hour period

D.

The users forget to check the box to remember their credentials.

Buy Now
Questions 54

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.

Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

Options:

A.

Login Forensics

B.

Login Report

C.

Login Inspector

D.

Login History

Buy Now
Questions 55

A technology enterprise is planning to implement single sign-on login for users. When users log in to the Salesforce User object custom field, data should be populated fornew and existing users.

Which two steps should an identity architect recommend?

Choose 2 answers

Options:

A.

Implement Auth.SamlJitHandler Interface.

B.

Create and update methods.

C.

Implement RegistrationHandler Interface.

D.

Implement SesslonManagement Class.

Buy Now
Questions 56

Universal Containers (UC) wants its closed Won opportunities to be synced to a Data Warehouse in near real time. UC has implemented Outbound Message to enable near real-time data sync. UC wants to ensure that communication between Salesforce and Target System is Secure. What Certificate is sent along with the Outbound Message?

Options:

A.

The CA-SignedCertificate from the Certificate and Key Management menu.

B.

The default Client Certificate from the Develop--> API Menu.

C.

The default Client Certificate or a Certificate from Certificate and Key Management menu.

D.

The Self-Signed Certificates from theCertificate & Key Management menu.

Buy Now
Questions 57

Universal containers(UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users toprovide a fingerprint in addition to username/Password to authenticate to this application.How can an architect support fingerprint as a form of identification for salesforce Authentication?

Options:

A.

Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

B.

Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

C.

Use an AppExchange product that does fingerprint scanning with native salesforce identity confirmation.

D.

Use custom login flows with callouts to a third-party fingerprint scanning application.

Buy Now
Questions 58

Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use Oktato authorize a Forecasting web application to access Salesforce records on their behalf.

Which two roles are being performed by Salesforce?

Choose 2 answers

Options:

A.

SAML Identity Provider

B.

OAuth Client

C.

OAuth Resource Server

D.

SAML Service Provider

Buy Now
Questions 59

A large consumer company is planning to create a community and will requ.re login through the customers social identity. The following requirements must be met:

1. The customer should be able to login with any of their social identities, however salesforce should only haveone user per customer.

2. Once the customer has been identified with a social identity, they should not be required to authonze Salesforce.

3. The customers personal details from the social sign on need to be captured when the customer logs intoSalesforce using their social Identity.

3. If the customer modifies their personal details in the social site, the changes should be updated in Salesforce .

Which two options allow the Identity Architect to fulfill the requirements?

Choose 2 answers

Options:

A.

UseLogin Flows to call an authentication registration handler to provision the user before logging the user into the community.

B.

Use authentication providers for social sign-on and use the custom registration handler to insert or update personal details.

C.

C. Redirect the user to a custom page that allows the user to select an existing social identity for login.

D.

Use the custom registration handler to link social identities to Salesforce identities.

Buy Now
Questions 60

The security team at Universal Containers (UC) has identified exporting reports as a high-riskaction and would like to require users to be logged into Salesforce with their Active Directory (AD) credentials when doing so. For all other users of Salesforce, users should be allowed to use AD Credentials or Salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with Salesforce credentials?

Options:

A.

Use SAML Federated Authentication and block access to reports when accessed through a Standard Assurance session.

B.

Use SAML Federated Authentication and Custom SAML JIT Provisioning to dynamically and or remove a permission set that grants the Export Reports Permission.

C.

Use SAML federated Authentication, treat SAML Sessionsas High Assurance, and raise the session level required for exporting reports.

D.

Use SAML federated Authentication with a Login Flow to dynamically add or remove a Permission Set that grants the Export Reports Permission.

Buy Now
Questions 61

Universal Containers allows employees to use a mobile device to access Salesforce for daily operations using a hybrid mobile app. This app uses Mobile software development kits (SDK), leverages refresh token to regenerate access token when required and is distributed as a private app.

The chief security officer is rolling out an org wide compliance policy to enforcere-verification of devices if an employee has not logged in from that device in the last week.

Which connected app setting should be leveraged to comply with this policy change?

Options:

A.

Scope - Deny refresh_token scope for this connected app.

B.

Refresh Token Policy - Expire the refresh token if it has not been used for 7 days.

C.

Session Policy - Set timeout value of the connected app to 7 days.

D.

Permitted User - Ask admins to maintain a list of users who are permitted based on last login date.

Buy Now
Questions 62

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?

Options:

A.

Use the Salesforce Authenticator mobile app with two-step verification

B.

Lock sessions to the IP address from which they originated.

C.

Increase Password complexity requirements in Salesforce.

D.

Implement Single Sign-on using a corporateIdentity store.

Buy Now
Questions 63

Northern Trail Outfitters (NTO) has a requirement to ensure all user logins include a single multi-factor authentication (MFA) prompt. Currently,users are allowed the choice to login with a username and password or via single sign-on against NTO's corporate Identity Provider, which includes built-in MFA.

Which configuration will meet this requirement?

Options:

A.

Create and assign a permission set to all employees that includes "MFA for User Interface Logins."

B.

Create a custom login flow that enforces MFA and assign it to a permission set. Then assign the permission set to all employees.

C.

Enable "MFA for User Interface Logins" for your organization fromSetup -> Identity Verification.

D.

For all employee profiles, set the Session Level Required at Login to High Assurance and add the corporate identity provider to the High Assurance list for the org's Session Security Levels.

Buy Now
Questions 64

In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?

Options:

A.

Use of self-signed certificate leads to lower maintenance for trusted party because multiple self-signed certs need to be maintained.

B.

Use of self-signed certificate leads to higher maintenance for trusted party because they have to act as the trusted CA

C.

Use of self-signed certificate leads to lowermaintenance for trusting party because there is no trusted CA cert to maintain.

D.

Use of self-signed certificate leads to higher maintenance for trusting party because the cert needs to be added to their truststore.

Buy Now
Questions 65

An Architect needs to advise the team that manages the Identity Provider how to differentiate Salesforce from other Service Providers. What SAML SSO setting in Salesforce provides this capability?

Options:

A.

IdentityProvider Login URL.

B.

Issuer.

C.

Entity Id

D.

SAML Identity Location.

Buy Now
Questions 66

Northern Trail Outfitters (NTO) uses a Security Assertion Markup Language (SAML)-based Identity Provider (idP) to authenticate employees to all systems. The IdPauthenticates users against a Lightweight Directory Access Protocol (LDAP) directory and has access to user information. NTO wants to minimize Salesforce license usage since only a small percentage of users need Salesforce.

What is recommended to ensure new employees have immediate access to Salesforce using their current IdP?

Options:

A.

Install Salesforce Identity Connect to automatically provision new users in Salesforce the first time they attempt to login.

B.

Build an integration that queries LDAP periodically and creates new active users in Salesforce.

C.

Configure Just-in-Time provisioning using SAML attributes to create new Salesforce users as necessary when a new user attempts to login to Salesforce.

D.

Build an integration that queries LDAP and creates new inactive users in Salesforce and use a login flow to activate the user atfirst login.

Buy Now
Questions 67

An identity architect's client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of ITis worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

Options:

A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Ensure that on the SSO settings page, the "Request Signing Certificate" field has a self-signed certificate.

C.

Ensure that the Issuer and Assertion Consumer service (ACS) URL is propertyconfigured between SP and IDP.

D.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

Buy Now
Questions 68

Universal Containers (UC) is looking to purchase a third-party applicationas an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose2 answers

Options:

A.

The Identity Provider can authenticate multiple applications.

B.

The Identity Provider can authenticate multiple social media accounts.

C.

The Identity provider can store credentials for multiple applications.

D.

The Identity Provider can centralize enterprise password policy.

Buy Now
Questions 69

An identity architect wants to secure Salesforce APIs using Security Assertion Markup Language (SAML). For security purposes, administrators will need to authorize the applications that will be consuming the APIs.

Which Salesforce OAuth authorization flow should be used?

Options:

A.

OAuth 2-0 SAML Bearer Assertion Flow

B.

OAuth 2.0 JWT Bearer Flow

C.

SAML Assertion Flow

D.

OAuth 2.0 User-Agent Flow

Buy Now
Questions 70

Universal containers (UC) is setting up Delegated Authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the loginservice and salesforce. What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?

Options:

A.

Include client ID and client secret in the login header callout.

B.

Set up a proxy server for the login service in the DMZ.

C.

Require the use of Salesforce security Tokens on password.

D.

Enforce mutual Authentication between systems using SSL.

Buy Now
Questions 71

An Enterprise is using a Lightweight Directory Access Protocol (LDAP ) server as the only point for user authentication with a username/password. Salesforce delegated authentication is configured to integrate Salesforce under single sign-on (SSO).

Mow can end users change their password?

Options:

A.

Users once logged In, can go to the Change Password screen in Salesforce.

B.

Users can click on the "Forgot your Password" link on the Salesforce.com login page.

C.

Users can request the Salesforce Admin to reset their password.

D.

Users can change it on the enterprise LDAP authentication portal.

Buy Now
Questions 72

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming ail social sign-on providers support OpenID Connect?

Options:

A.

Configure an authentication provider and a registration handler for each social sign-on provider.

B.

Configure a single sign-on settingand a registration handler for each social sign-on provider.

C.

Configure an authentication provider and a Just-In-Time (JIT) handler for each social sign-on provider.

D.

Configure a single sign-on setting and a JIT handler for each social sign-on provider.

Buy Now
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
Last Update: Dec 5, 2025
Questions: 243

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90