Identity-and-Access-Management-Architect Practice Test Questions

255 Questions


Universal containers (UC) uses a home-grown employee portal for their employees to collaborate. UC decides to use salesforce ideas to allow the employees to post ideas from the employee portal. When clicking some links in the employee portal, the users should be redirected to salesforce, authenticated, and presented with relevant pages. What scope should be requested when using the Oauth token to meet this requirement?


A. Web


B. Full


C. API


D. Visualforce





A.
  Web

Explanation

The web scope should be requested when using the OAuth token to meet this requirement. The web scope allows the user to log in to Salesforce and access the web UI. This is suitable for scenarios where the user is redirected from an external portal to Salesforce and needs to see the relevant pages. Option B is not a good choice because the full scope allows access to all data accessible by the user, including the web UI and the API.

This may be unnecessary or insecure for this requirement. Option C is not a good choice because the API scope allows access to the Salesforce API only, not the web UI. This may not meet the requirement of presenting the user with relevant pages. Option D is not a good choice because the visual force scope allows access to Visualforce pages only, not the entire web UI. This may limit the user’s experience and functionality.

References: OAuth 2.0 Web Server Authentication Flow, Digging Deeper into OAuth 2.0 on Force.com

A service provider (SP) supports both Security Assertion Markup Language (SAML) and OpenID Connect (OIDC). When integrating this SP with Salesforce, which use case is the determining factor when choosing OIDC or SAML?


A. OIDC is more secure than SAML and therefore is the obvious choice.


B. B. The SP needs to perform API calls back to Salesforce on behalf of the user after the user logs in to the service provider.


C. If the user has a session on Salesforce, you do not want them to be prompted for a username and password when they login to theSP.


D. They are equivalent protocols and there is no real reason to choose one over the other.





B.
  B. The SP needs to perform API calls back to Salesforce on behalf of the user after the user logs in to the service provider.

Explanation

When integrating a SP that supports both SAML and OIDC with Salesforce, the use case that is the determining factor when choosing OIDC or SAML is whether the SP needs to perform API calls back to Salesforce on behalf of the user after the user logs in to the service provider. OIDC is a protocol that allows users to authorize an external application to access Salesforce resources on their behalf.

OIDC provides an access token that can be used to call Salesforce APIs. SAML is a protocol that allows users to authenticate and authorize with an external identity provider and access Salesforce resources. SAML does not provide an access token, but only a session ID that can be used for web-based access. Therefore, if the SP needs to perform API calls back to Salesforce, OIDC is the preferred choice over SAML. References: OpenID Connect, SAML, Authorize Apps with OAuth

After a recent audit, universal containers was advised to implement Two-factor Authentication for all of their critical systems, including salesforce. Which two actions should UC consider to meet this requirement? Choose 2 answers


A. Require users to provide their RSA token along with their credentials.


B. Require users to supply their email and phone number, which gets validated.


C. Require users to enter a second password after the first Authentication


D. Require users to use a biometric reader as well as their password





A.
  Require users to provide their RSA token along with their credentials.

D.
  Require users to use a biometric reader as well as their password

Explanation

A is correct because requiring users to provide their RSA token along with their credentials is a form of two￾factor authentication. An RSA token is a hardware device that generates a one-time password (OTP) that changes every few seconds. The user needs to enter both their password and the OTP to log in to Salesforce.

D is correct because requiring users to use a biometric reader as well as their password is another form oftwo￾factor authentication. A biometric reader is a device that scans a user’s fingerprint, face, iris, or other physical characteristics to verify their identity. The user needs to provide both their password and their biometric data to log in to Salesforce.

B is incorrect because requiring users to supply their email and phone number, which gets validated, is not a form of two-factor authentication. This is a form of identity verification, which is used to confirm that the user owns the email and phone number they provided. However, this does not add an extra layer of protection beyond their password when they log in to Salesforce.

C is incorrect because requiring users to enter a second password after the first authentication is not a form of two-factor authentication. This is a form of single-factor authentication, which only relies on something the user knows (their passwords). This does not increase security against unauthorized account access.

References: 4: Multi-Factor Authentication - Salesforce 5: Salesforce Multi-Factor Authentication 6: Two Factor Authentication - Salesforce India 7: Customer 360 | Increase Productivity - Salesforce UK 8: Secure Salesforce Login Using Two-Factor Authentication and Salesforce …

Universal Containers (UC) uses Active Directory (AD) as their identity store for employees and must continue to do so for network access. UC is undergoing a major transformation program and moving all of their enterprise applications to cloud platforms including Salesforce, Workday, and SAP HANA. UC needs to implement an SSO solution for accessing all of the third-party cloud applications and the CIO is inclined to use Salesforce for all of their identity and access management needs. Which two Salesforce license types does UC need for its employees' Choose 2 answers


A. Company Community and Identity licenses


B. Identity and Identity Connect licenses


C. Chatter Only and Identity licenses


D. Salesforce and Identity Connect licenses





B.
  Identity and Identity Connect licenses

D.
  Salesforce and Identity Connect licenses

The two Salesforce license types that UC needs for its employees are Identity and Identity Connect licenses. According to the Salesforce documentation, “Identity licenses let your employees access any app that supports standards-based single sign-on (SSO). Identity Connect licenses let you integrate your Active Directory with Salesforce.” Therefore, option B and D are the correct answers. References: [Identity Licenses]

Northern Trail Outfitters (NTO) is launching a new sportswear brand on its existing consumer portal built on Salesforce Experience Cloud. As part of the launch, emails with promotional links will be sent to existing customers to log in and claim a discount. The marketing manager would like the portal dynamically branded so that users will be directed to the brand link they clicked on; otherwise, users will view a recognizable NTO￾branded page. The campaign is launching quickly, so there is no time to procure any additional licenses. However, the development team is available to apply any required changes to the portal.

Which approach should the identity architect recommend?


A. Create a full sandbox to replicate the portal site and update the branding accordingly.


B. Implement Experience ID in the code and extend the URLs and endpoints, as required.


C. Use Heroku to build the new brand site and embedded login to reuse identities.


D. Configure an additional community site on the same org that is dedicated for the new brand





B.
  Implement Experience ID in the code and extend the URLs and endpoints, as required.

Explanation

To dynamically brand the portal so that users will be directed to the brand link they clicked on, the identity architect should recommend implementing Experience ID in the code and extending the URLs and endpoints, as required. Experience ID is a parameter that can be used to identify different brands or experiences within a single Experience Cloud site (formerly known as Community).

Dynamic branding is a feature that allows Experience Cloud sites to display different branding elements, such as logos, colors,or images, based on the Experience ID or other criteria. By implementing Experience ID in the code, the identity architect can provide a consistent and personalized brand experience for each user without creating multiple sites or sandboxes.

References: Experience ID, Dynamic Branding for Experience Cloud Sites

Northern Trail Outfitters manages application functional permissions centrally as Active Directory groups. The CRM_Superllser and CRM_Reportmg_SuperUser groups should respectively give the user the SuperUser and Reportmg_SuperUser permission set in Salesforce. Salesforce is the service provider to a Security Assertion Markup Language (SAML) identity provider.
Mow should an identity architect ensure the Active Directory groups are reflected correctly when a user accesses Salesforce?


A. Use the Apex Just-in-Time handler to query standard SAML attributes and set permission sets.


B. Use the Apex Just-in-Time handler to query custom SAML attributes and set permission sets.


C. Use a login flow to query custom SAML attributes and set permission sets.


D. Use a login flow to query standard SAML attributes and set permission sets.





B.
  Use the Apex Just-in-Time handler to query custom SAML attributes and set permission sets.

Universal Containers is implementing Salesforce Identity to broker authentication from its enterprise single sign-on (SSO) solution through Salesforce to third party applications using SAML.
What rote does Salesforce Identity play in its relationship with the enterprise SSO system?


A. Identity Provider (IdP)


B. Resource Server


C. Service Provider (SP)


D. Client Application





C.
  Service Provider (SP)

Explanation: To broker authentication from its enterprise SSO solution through Salesforce to third party applications using SAML, Salesforce Identity plays the role of a Service Provider (SP). A SP is an entity that relies on an Identity Provider (IdP) to authenticate and authorize users. In this scenario, the enterprise SSO solution is the IdP, Salesforce is the SP, and the third party applications are the Resource Servers or Client Applications. The SP receives a SAML assertion from the IdP and uses it to obtain an access token from the Resource Server or Client Application. References: SAML Single Sign-On Settings, Authorize Apps with OAuth

Universal Containers is considering using Delegated Authentication as the sole means of Authenticating of Salesforce users. A Salesforce Architect has been brought in to assist with the implementation. What two risks Should the Architect point out? Choose 2 answers


A. Delegated Authentication is enabled or disabled for the entire Salesforce org.


B. UC will be required to develop and support a custom SOAP web service.


C. Salesforce users will be locked out of Salesforce if the web service goes down.


D. The web service must reside on a public cloud service, such as Heroku.





B.
  UC will be required to develop and support a custom SOAP web service.

C.
  Salesforce users will be locked out of Salesforce if the web service goes down.

Universal Containers (UC) wants to use Salesforce for sales orders and a legacy of system for order fulfillment. The legacy system must update the status of orders in 65* Salesforce in real time as they are fulfilled. UC decides to use OAuth for connecting the legacy system to Salesforce. What OAuth flow should be considered that doesn't require storing credentials, client secret or refresh tokens?


A. Web Server flow


B. JWT Bearer Token flow


C. Username-Password flow


D. User Agent flow





B.
  JWT Bearer Token flow

Universal containers want to build a custom mobile app connecting to salesforce using Oauth, and would like to restrict the types of resources mobile users can access. What Oauth feature of Salesforce should be used to achieve the goal?


A. Access Tokens


B. Mobile pins


C. Refresh Tokens


D. Scopes





D.
  Scopes

Explanation: The OAuth feature of Salesforce that should be used to restrict the types of resources mobile users can access is scopes. Scopes are parameters that specify the level of access that the mobile app requests from Salesforce when it obtains an OAuth token. Scopes can be used to limit the access to certain resources or actions, such as API calls, full access, web access, or refresh token. By configuring scopes in the connected app settings, Universal Containers can control what the mobile app can do with the OAuth token and protect against unauthorized or excessive access.

In a typical SSL setup involving a trusted party and trusting party, what consideration should an Architect take into account when using digital certificates?


A. Use of self-signed certificate leads to lower maintenance for trusted party because multiple self-signed certs need to be maintained.


B. Use of self-signed certificate leads to higher maintenance for trusted party because they have to act as the trusted CA


C. Use of self-signed certificate leads to lower maintenance for trusting party because there is no trusted CA cert to maintain.


D. Use of self-signed certificate leads to higher maintenance for trusting party because the cert needs to be added to their truststore.





D.
  Use of self-signed certificate leads to higher maintenance for trusting party because the cert needs to be added to their truststore.

Explanation: D is correct because using a self-signed certificate leads to higher maintenance for the trusting party, which is the client or browser that connects to the server. The trusting party needs to add the self-signed certificate to their truststore, which is a repository of trusted certificates, in order to establish a secure connection with the server. Otherwise, the trusting party will see a warning message or an error when accessing the server.
A is incorrect because using a self-signed certificate leads to higher maintenance for the trusted party, not lower. The trusted party needs to maintain multiple self-signed certificates from different servers in their truststore.
B is incorrect because using a self-signed certificate does not make the trusted party act as the trusted CA (Certificate Authority). The trusted CA is the entity that issues and validates certificates for servers. The trusted party only needs to trust the CA’s root certificate, which is usually pre-installed in their truststore.
C is incorrect because using a self-signed certificate leads to higher maintenance for the trusting party, not lower. The trusting party still needs to maintain a trusted CA cert in their truststore, which is the self-signed certificate itself.

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?


A. Use the Salesforce Authenticator mobile app with two-step verification


B. Lock sessions to the IP address from which they originated.


C. Increase Password complexity requirements in Salesforce.


D. Implement Single Sign-on using a corporate Identity store.





A.
  Use the Salesforce Authenticator mobile app with two-step verification

Explanation: The Salesforce Authenticator mobile app adds an extra layer of security for online accounts with two-factor authentication. It allows users to respond to push notifications or use location services to verify their logins and other account activity1. This can help prevent phishing scams and unauthorized access. References: Salesforce Authenticator, Salesforce Authenticator: Mobile App Security Features, Salesforce Authenticator


Page 4 out of 22 Pages
Previous