Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers

Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answersA . Google is the identity providerB . Salesforce is the identity providerC . Google is the...

October 30, 2021 No Comments READ MORE +

Which three types of attacks would a 2-Factor Authentication solution help garden against?

Which three types of attacks would a 2-Factor Authentication solution help garden against?A . Key logging attacksB . Network perimeter attacksC . Phishing attacksD . Dictionary attacksE . Man-in-the-middle attacksView AnswerAnswer: A,B,D

October 30, 2021 No Comments READ MORE +

Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers

Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answersA . Google is the identity providerB . Salesforce is the identity providerC . Google is the...

October 29, 2021 No Comments READ MORE +

What is the most likely reason for this behaviour?

Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third party system. However, UC quickly notices that changes to user...

October 29, 2021 No Comments READ MORE +

What portion of the authentication provider setup associates a Facebook user with a salesforce user?

An architect needs to set up a Facebook Authentication provider as login option for a salesforce customer Community . What portion of the authentication provider setup associates a Facebook user with a salesforce user?A . Consumer key and consumer secretB . Federation IDC . User info endpoint URLD . Apex...

October 29, 2021 No Comments READ MORE +

What type of authentication flow is required to support deep linking?

Universal Containers wants to implement Single Sign-on for a Salesforce org using an external Identity Provider and corporate identity store. What type of authentication flow is required to support deep linking?A . Web Server OAuth SSO flowB . Service-Provider-Initiated SSOC . Identity-Provider-initiated SSOD . StartURL on Identity ProviderView AnswerAnswer: B

October 29, 2021 No Comments READ MORE +

Which action should an architect recommend?

Universal containers (UC) has implemented SAML SSO to enable seamless access across multiple applications. UC has regional salesforce orgs and wants it's users to be able to access them from their main Salesforce org seamless . Which action should an architect recommend?A . Configure the main salesforce org as an...

October 29, 2021 No Comments READ MORE +

What mechanism should an Architect put in place to enable a trusted connection between the login service and Salesforce?

Universal Containers (UC) is setting up delegated authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risks of exposing the corporate login service on the internet and has asked that a reliable trust mechanism be put in place between the login...

October 29, 2021 No Comments READ MORE +

How can the connection to salesforce be restricted only to the employee portal server?

Universal containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC...

October 29, 2021 No Comments READ MORE +

Which two security risks can be mitigated by enabling Two-Factor Authentication (2FA) in Salesforce? Choose 2 answers

Which two security risks can be mitigated by enabling Two-Factor Authentication (2FA) in Salesforce? Choose 2 answersA . Users leaving laptops unattended and not logging out of Salesforce.B . Users accessing Salesforce from a public Wi-Fi access point.C . Users choosing passwords that are the same as their Facebook password.D...

October 29, 2021 No Comments READ MORE +