How should the quantity of required Identity Verification Credits be estimated?

Northern Trail Outfitters (NTO) is planning to build a new customer service portal and wants to use password less login, allowing customers to login with a one-time passcode sent to them via email or SMS. How should the quantity of required Identity Verification Credits be estimated?A . Each community comes...

November 10, 2021 No Comments READ MORE +

Which two OAuth flows should the architect consider in their evaluation?

The CIO of universal containers(UC) wants to start taking advantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens can be applied . Which two OAuth...

November 10, 2021 No Comments READ MORE +

What is the role of Active Directory in this scenario?

Universal containers uses an Employee portal for their employees to collaborate. employees access the portal from their company's internal website via SSO. It is set up to work with Active Directory . What is the role of Active Directory in this scenario?A . Identity storeB . Authentication storeC . Identity...

November 10, 2021 No Comments READ MORE +

Which three actions can AD groups control through identity connect?

Universal containers (UC) has decided to use identity connect as it's identity provider. UC uses active directory (AD) and has a team that is very familiar and comfortable with managing ad groups. UC would like to use AD groups to help configure salesforce users . Which three actions can AD...

November 10, 2021 No Comments READ MORE +

What is the probable cause of this behaviour?

An architect has successfully configured SAML-BASED SSO for universal containers. SSO has been working for 3 months when Universal containers manually adds a batch of new users to salesforce. The new users receive an error from salesforce when trying to use SSO. Existing users are still able to successfully use...

November 10, 2021 No Comments READ MORE +

What SAML SSO setting in Salesforce provides this capability?

An Architect needs to advise the team that manages the Identity Provider how to differentiate Salesforce from other Service Providers . What SAML SSO setting in Salesforce provides this capability?A . Identity Provider Login URC . Issuer.D . Entity IdE . SAML Identity Location.View AnswerAnswer: C

November 9, 2021 No Comments READ MORE +

What implementation should an Architect recommend to UC?

Universal Containers (UC) has an existing web application that it would like to access from Salesforce without requiring users to re-authenticate. The web application is owned UC and the UC team that is responsible for it is willing to add new javascript code and/or libraries to the application . What...

November 9, 2021 No Comments READ MORE +

In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?

In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?A . Use of self-signed certificate leads to lower maintenance for trusted party because multiple self-signed certs need to be maintained.B . Use of self-signed certificate leads...

November 9, 2021 No Comments READ MORE +

What is the recommended solution for automatically allowing or denying the access to the classified information system based on the open "classified" case record criteria?

Universal Containers (UC) has a classified information system that its call center team uses only when they are working on a case with a record type "Classified". They are only allowed to access the system when they own an open "Classified" case, and their access to the system is removed...

November 8, 2021 No Comments READ MORE +

What should be used to fulfill this requirement?

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in. What should be used to fulfill this requirement?A . Use...

November 8, 2021 No Comments READ MORE +