New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Salesforce Identity and Access Management Designer Identity-and-Access-Management-Architect Questions and answers with Dumpstech

Exam Identity-and-Access-Management-Architect Premium Access

View all detail and faqs for the Identity-and-Access-Management-Architect exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

Northern Trail Outfitters would like to automatically create new employee users in Salesforce with an appropriate profile that maps to its Active Directory Department.

Howshould an identity architect implement this requirement?

Options:

A.

Use the createUser method in the Just-in-Time (JIT) provisioning registration handler to assign the appropriate profile.

B.

Use the updateUser method in the Just-in-Time (JIT) provisioning registration handler to assign the appropriate profile.

C.

Use a login flow to collect Security Assertion Markup Language attributes and assign the appropriate profile during Just-In-Time(JIT) provisioning.

D.

Make a callout during the login flow to query department from Active Directory to assign the appropriate profile.

Questions # 2:

UESTION NO: 154

Universal Containers (UC) wants to provide single sign-on (SSO) for a business-to-consumer (B2C) application using Salesforce Identity.

Which Salesforce license should UC utilize to implement this use case?

Options:

A.

Identity Only

B.

Salesforce Platform

C.

External Identity

D.

Partner Community

Questions # 3:

Universal containers uses an Employee portal for their employees to collaborate. employees access the portal from their company's internal website via SSO. It is set up to work with Active Directory. What is the role of Active Directory in this scenario?

Options:

A.

Identity store

B.

Authentication store

C.

Identity provider

D.

Service provider

Questions # 4:

Northern Trail Outfitters want to allow its consumer to self-register on it business-to-consumer (B2C) portal that is built on Experience Cloud. The identity architect has recommended to use Person Accounts.

Which three steps need to be configured to enable self-registration using person accounts?

Choose 3 answers

Options:

A.

Enable access to person and business account record types under Public Access Settings.

B.

Contact Salesforce Support to enable business accounts.

C.

Under Login and Registration settings, ensure that the default account field isempty.

D.

Contact Salesforce Support to enable person accounts.

E.

Set organization-wide default sharing for Contact to Public Read Only.

Questions # 5:

What item should an Architect consider when designing a Delegated Authentication implementation?

Options:

A.

The Web service should be secured with TLS using Salesforce trusted certificates.

B.

The Web service should be able to accept one to four input method parameters.

C.

The web service should use the Salesforce Federation ID toidentify the user.

D.

The Web service should implement a custom password decryption method.

Questions # 6:

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

Options:

A.

Use a HTTP POST to request the refresh token for the current user.

B.

Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, including the current OAuth token.

C.

Use a HTTP POST to make a call to the revoke token endpoint.

D.

Enable Single Logout with a secure logout URL.

Questions # 7:

Universal Containers (UC) wants to integrate a third-party Reward Calculation system with Salesforce to calculate Rewards. Rewards will be calculated on a schedule basis and update back into Salesforce. The integration between Salesforce and the Reward Calculation System needs to be secure. Which are two recommended practices for using OAuth flow in this scenario. choose 2 answers

Options:

A.

OAuth Refresh Token FLow

B.

OAuth Username-Password Flow

C.

OAuth SAML Bearer Assertion FLow

D.

OAuth JWT Bearer Token FLow

Questions # 8:

Universal containers(UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users toprovide a fingerprint in addition to username/Password to authenticate to this application.How can an architect support fingerprint as a form of identification for salesforce Authentication?

Options:

A.

Use salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.

B.

Use Delegated Authentication with callouts to a third-party fingerprint scanning application.

C.

Use an AppExchange product that does fingerprint scanning with native salesforce identity confirmation.

D.

Use custom login flows with callouts to a third-party fingerprint scanning application.

Questions # 9:

Universal containers (UC) built a customer Community for customers to buy products, review orders, and manage their accounts. UC has provided three different options for customers to log in to the customer Community: salesforce, Google, and Facebook. Which two role combinations are represented by the systems in the scenario? Choose 2 answers

Options:

A.

Google is the service provider and Facebook is the identity provider

B.

Salesforceis the service provider and Google is the identity provider

C.

Facebook is the service provider and salesforce is the identity provider

D.

Salesforce is the service provider and Facebook is the identity provider

Questions # 10:

Universal containers (UC) wants to implement Delegated Authentication for a certainsubset of Salesforce users. Which three items should UC take into consideration while building the Web service to handle the Delegated Authentication request? Choose 3 answers

Options:

A.

The web service needs to include Source IP as a method parameter.

B.

UC should whitelist all salesforce ip ranges on their corporate firewall.

C.

The web service can be written using either the soap or rest protocol.

D.

Delegated Authentication is enabled for the system administrator profile.

E.

The return type of the Web service method should be a Boolean value

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions