Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! Identity-and-Access-Management-Designer has been withdrawn. The new exam code is Identity-and-Access-Management-Architect

Identity-and-Access-Management-Designer Practice Exam Questions with Answers Salesforce Certified Identity and Access Management Architect (WI23) Certification

Question # 6

Universal Containers (UC) uses a home-grown Employee portal for their employees to collaborate. UC decides to use Salesforce Ideas to allow employees to post Ideas from the Employee portal. When users click on some of the links in the Employee portal, the users should be redirected to Salesforce, authenticated, and presented with the relevant pages. What OAuth flow is best suited for this scenario?

A.

Web Application flow

B.

SAML Bearer Assertion flow

C.

User-Agent flow

D.

Web Server flow

Full Access
Question # 7

which three are features of federated Single Sign-on solutions? Choose 3 answers

A.

It federates credentials control to authorized applications.

B.

It establishes trust between Identity store and service provider.

C.

It solves all identity and access management problems.

D.

It improves affiliated applications adoption rates.

E.

It enables quick and easy provisioning and deactivating of users.

Full Access
Question # 8

A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities.

Which Salesforce OAuth authorization flow should be used?

A.

OAuth 2.0 JWT Bearer How

B.

OAuth 2.0 Device Flow

C.

OAuth 2.0 User-Agent Flow

D.

OAuth 2.0 Asset Token Flow

Full Access
Question # 9

Universal Containers (UC) is using its production org as the identity provider for a new Experience Cloud site and the identity architect is deciding which login experience to use for the site.

Which two page types are valid login page types for the site?

Choose 2 answers

A.

Experience Builder Page

B.

lightning Experience Page

C.

Login Discovery Page

D.

Embedded Login Page

Full Access
Question # 10

Universal Containers (UC) has built a custom token-based Two-factor authentication (2FA) system for their existing on-premise applications. They are now implementing Salesforce and would like to enable a Two-factor login process for it, as well. What is the recommended solution as Architect should consider?

A.

Use the custom 2FA system for on-premise applications and native 2FA for Salesforce.

B.

Replace the custom 2FA system with an AppExchange App that supports on premise application and salesforce.

C.

Use Custom Login Flows to connect to the existing custom 2FA system for use in Salesforce.

D.

Replace the custom 2FA system with Salesforce 2FA for on-premise applications and Salesforce.

Full Access
Question # 11

A global company is using the Salesforce Platform as an Identity Provider and needs to integrate a third-party application with its Experience Cloud customer portal.

Which two features should be utilized to provide users with login and identity services for the third-party application?

Choose 2 answers

A.

Use the App Launcher with single sign-on (SSO).

B.

External a Data source with Named Principal identity type.

C.

Use a connected app.

D.

Use Delegated Authentication.

Full Access
Question # 12

Universal containers (UC) would like to enable SSO between their existing Active Directory infrastructure and salesforce. The it team prefers to manage all users in Active Directory and would like to avoid doing any initial setup of users in salesforce directly, including the correct assignment of profiles, roles and groups. Which two optimal solutions should UC use to provision users in salesforce? Choose 2 answers

A.

Use the salesforce REST API to sync users from active directory to salesforce

B.

Use an app exchange product to sync users from Active Directory to salesforce.

C.

Use Active Directory Federation Services to sync users from active directory to salesforce.

D.

Use Identity connect to sync users from Active Directory to salesforce

Full Access
Question # 13

An architect needs to set up a Facebook Authentication provider as login option for a salesforce customer Community. What portion of the authentication provider setup associates a Facebook user with a salesforce user?

A.

Consumer key and consumer secret

B.

Federation ID

C.

User info endpoint URL

D.

Apex registration handler

Full Access
Question # 14

Universal containers (UC) is successfully using Delegated Authentication for their salesforce users. The service supporting Delegated Authentication is written in Java. UC has a new CIO that is requiring all company Web services be RESR-ful and written in . NET. Which two considerations should the UC Architect provide to the new CIO? Choose 2 answers

A.

Delegated Authentication will not work with a.net service.

B.

Delegated Authentication will continue to work with rest services.

C.

Delegated Authentication will continue to work with a.net service.

D.

Delegated Authentication will not work with rest services.

Full Access
Question # 15

Identity-and-Access-Management-Designer question answer

A pharmaceutical company has an on-premise application (see illustration) that it wants to integrate with Salesforce.

The IT director wants to ensure that requests must include a certificate with a trusted certificate chain to access the company's on-premise application endpoint.

What should an Identity architect do to meet this requirement?

A.

Use open SSL to generate a Self-signed Certificate and upload it to the on-premise app.

B.

Configure the company firewall to allow traffic from Salesforce IP ranges.

C.

Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.

D.

Upload a third-party certificate from Salesforce into the on-premise server.

Full Access
Question # 16

Universal Containers is implementing Salesforce Identity to broker authentication from its enterprise single sign-on (SSO) solution through Salesforce to third party applications using SAML.

What rote does Salesforce Identity play in its relationship with the enterprise SSO system?

A.

Identity Provider (IdP)

B.

Resource Server

C.

Service Provider (SP)

D.

Client Application

Full Access
Question # 17

Universal Containers (UC) is planning to deploy a custom mobile app that will allow users to get e-signatures from its customers on their mobile devices. The mobile app connects to Salesforce to upload the e-signature as a file attachment and uses OAuth protocol for both authentication and authorization. What is the most recommended and secure OAuth scope setting that an Architect should recommend?

A.

Id

B.

Web

C.

Api

D.

Custom_permissions

Full Access
Question # 18

Universal Containers (UC) built an integration for their employees to post, view, and vote for ideas in Salesforce from an internal Company portal. When ideas are posted in Salesforce, links to the ideas are created in the company portal pages as part of the integration process. The Company portal connects to Salesforce using OAuth. Everything is working fine, except when users click on links to existing ideas, they are always taken to the Ideas home page rather than the specific idea, after authorization. Which OAuth URL parameter can be used to retain the original requested page so that a user can be redirected correctly after OAuth authorization?

A.

Redirect_uri

B.

State

C.

Scope

D.

Callback_uri

Full Access
Question # 19

Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers

A.

Disallow the use of Single Sign-on for any users of the mobile app.

B.

Require High Assurance sessions in order to use the Connected App.

C.

Set Login IP Ranges to the internal network for all of the app users Profiles.

D.

Use Google Authenticator as an additional part of the login process

Full Access
Question # 20

Which three are features of federated Single sign-on solutions? Choose 3 Answers

A.

It establishes trust between Identity Store and Service Provider.

B.

It federates credentials control to authorized applications.

C.

It solves all identity and access management problems.

D.

It improves affiliated applications adoption rates.

E.

It enables quick and easy provisioning and deactivating of users.

Full Access
Question # 21

Which three different attributes can be used to identify the user in a SAML 65> assertion when Salesforce is acting as a Service Provider? Choose 3 answers

A.

Federation ID

B.

Salesforce User ID

C.

User Full Name

D.

User Email Address

E.

Salesforce Username

Full Access
Question # 22

A global fitness equipment manufacturer uses Salesforce to manage its sales cycle. The manufacturer has a custom order fulfillment app that needs to request order data from Salesforce. The order fulfillment app needs to integrate with the Salesforce API using OAuth 2.0 protocol.

What should an identity architect use to fulfill this requirement?

A.

Canvas App Integration

B.

OAuth Tokens

C.

Authentication Providers

D.

Connected App and OAuth scopes

Full Access
Question # 23

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

A.

Query using OpenID Connect discovery endpoint.

B.

A Leverage OpenID Connect Token Introspection.

C.

Create a custom OAuth scope.

D.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

Full Access
Question # 24

Universal Containers (UC) uses Active Directory (AD) as their identity store for employees and must continue to do so for network access. UC is undergoing a major transformation program and moving all of their enterprise applications to cloud platforms including Salesforct, Workday, and SAP HANA. UC needs to implement an SSO solution for accessing all of the third-party cloud applications and the CIO is inclined to use Salesforce for all of their identity and access management needs.

Which two Salesforce license types does UC need for its employees'

Choose 2 answers

A.

Company Community and Identity licenses

B.

Identity and Identity Connect licenses

C.

Chatter Only and Identity licenses

D.

Salesforce and Identity Connect licenses

Full Access
Question # 25

Containers (UC) has an existing Customer Community. UC wants to expand the self-registration capabilities such that customers receive a different community experience based on the data they provide during the registration process. What is the recommended approach an Architect Should recommend to UC?

A.

Create an After Insert Apex trigger on the user object to assign specific custom permissions.

B.

Create separate login flows corresponding to the different community user personas.

C.

Modify the Community pages to utilize specific fields on the User and Contact records.

D.

Modify the existing Communities registration controller to assign different profiles.

Full Access
Question # 26

Universal Containers (UC) is looking to purchase a third-party application as an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose 2 answers

A.

The Identity Provider can authenticate multiple applications.

B.

The Identity Provider can authenticate multiple social media accounts.

C.

The Identity provider can store credentials for multiple applications.

D.

The Identity Provider can centralize enterprise password policy.

Full Access
Question # 27

Northern Trail Outfitters would like to use a portal built on Salesforce Experience Cloud for customer self-service. Guests of the portal be able to self-register, but be unable to automatically be assigned to a contact record until verified. External Identity licenses have bee purchased for the project.

After registered guests complete an onboarding process, a flow will create the appropriate account and contact records for the user.

Which three steps should an identity architect follow to implement the outlined requirements?

Choose 3 answers

A.

Enable "Allow customers and partners to self-register".

B.

Select the "Configurable Self-Reg Page" option under Login & Registration.

C.

Set jp an external login page and call Salesforce APIs for user creation.

D.

Customize the self-registration Apex handler to temporarily associate the user to a shared single contact record.

E.

Customize me self-registration Apex handler to create only the user record.

Full Access
Question # 28

A multinational industrial products manufacturer is planning to implement Salesforce CRM to manage their business. They have the following requirements:

1. They plan to implement Partner communities to provide access to their partner network .

2. They have operations in multiple countries and are planning to implement multiple Salesforce orgs.

3. Some of their partners do business in multiple countries and will need information from multiple Salesforce communities.

4. They would like to provide a single login for their partners.

How should an Identity Architect solution this requirement with limited custom development?

A.

Create a partner login for the country of their operation and use SAML federation to provide access to other orgs.

B.

Consolidate Partner related information in a single org and provide access through Salesforce community.

C.

Allow partners to choose the Salesforce org they need information from and use login flows to authenticate access.

D.

Register partners in one org and access information from other orgs using APIs.

Full Access
Question # 29

Universal Containers (UC) has a classified information system that its call center team uses only when they are working on a case with a record type "Classified". They are only allowed to access the system when they own an open "Classified" case, and their access to the system is removed at all other times. They would like to implement SAML SSO eith Salesforce as the Idp, and automatically allow or deny the staff's access to the classified information system based on whether they currently own an open "Classified" case record when they try to access the system using SSO. What is the recommended solution for automatically allowing or denying the access to the classified information system based on the open "classified" case record criteria?

A.

Use Salesforce reports to identify users that currently owns open "Classified" cases and should be granted access to the Classified information system.

B.

Use Apex trigger on case to dynamically assign permission Sets that Grant access when an user is assigned with an open "Classified" case, and remove it when the case is closed.

C.

Use Custom SAML JIT Provisioning to dynamically query the user's open "Classified" cases when attempting to access the classified information system.

D.

Use a Common Connected App Handler using Apex to dynamically allow access to the system based on whether the staff owns any open "Classified" Cases.

Full Access
Question # 30

A technology enterprise is planning to implement single sign-on login for users. When users log in to the Salesforce User object custom field, data should be populated for new and existing users.

Which two steps should an identity architect recommend?

Choose 2 answers

A.

Implement Auth.SamlJitHandler Interface.

B.

Create and update methods.

C.

Implement RegistrationHandler Interface.

D.

Implement SesslonManagement Class.

Full Access
Question # 31

Northern Trail Outfitters (NTO) has an existing custom business-to-consumer (B2C) website that does NOT support single sign-on standards, such as Security Assertion Markup Language (SAMi) or OAuth. NTO wants to use Salesforce Identity to register and authenticate new customers on the website.

Which two Salesforce features should an identity architect use in order to provide username/password authentication for the website?

Choose 2 answers

A.

Identity Connect

B.

Delegated Authentication

C.

Connected Apps

D.

Embedded Login

Full Access
Question # 32

Northern Trail Outfitters (NTO) leverages Microsoft Active Directory (AD) for management of employee usernames, passwords, permissions, and asset access. NTO also owns a third-party single sign-on (SSO) solution. The third-party party SSO solution is used for all corporate applications, including Salesforce.

NTO has asked an architect to explore Salesforce Identity Connect for automatic provisioning and deprovisiorung of users in Salesforce.

What role does identity Connect play in the outlined requirements?

A.

Service Provider

B.

Single Sign-On

C.

Identity Provider

D.

User Management

Full Access
Question # 33

An Identity and Access Management (IAM) Architect is recommending Identity Connect to integrate Microsoft Active Directory (AD) with Salesforce for user provisioning, deprovisioning and single sign-on (SSO).

Which feature of Identity Connect is applicable for this scenano?

A.

When Identity Connect is in place, if a user is deprovisioned in an on-premise AD, the user's Salesforce session Is revoked Immediately.

B.

If the number of provisioned users exceeds Salesforce licence allowances, identity Connect will start disabling the existing

Salesforce users in First-in, First-out (FIFO) fashion.

C.

Identity Connect can be deployed as a managed package on salesforce org, leveraging High Availability of Salesforce Platform out-of-the-box.

D.

When configured, Identity Connect acts as an identity provider to both Active Directory and Salesforce, thus providing SSO as a default feature.

Full Access
Question # 34

What information does the 'Relaystate' parameter contain in sp-Initiated Single Sign-on?

A.

Reference to a URL redirect parameter at the identity provider.

B.

Reference to a URL redirect parameter at the service provider.

C.

Reference to the login address URL of the service provider.

D.

Reference to the login address URL of the identity Provider.

Full Access
Question # 35

Universal Containers (UC) has decided to replace the homegrown customer portal with Salesforce Experience Cloud. UC will continue to use its third-party single sign-on (SSO) solution that stores all of its customer and partner credentials.

The first time a customer logs in to the Experience Cloud site through SSO, a user record needs to be created automatically.

Which solution should an identity architect recommend in order to automatically provision users in Salesforce upon login?

A.

Just-in-Time (JIT) provisioning

B.

Custom middleware and web services

C.

Custom login flow and Apex handler

D.

Third-party AppExchange solution

Full Access
Question # 36

Universal Containers wants to secure its Salesforce APIs by using an existing Security Assertion Markup Language (SAML) configuration supports the company's single sign-on process to Salesforce,

Which Salesforce OAuth authorization flow should be used?

A.

OAuth 2.0 SAML Bearer Assertion Flow

B.

A SAML Assertion Row

C.

OAuth 2.0 User-Agent Flow

D.

OAuth 2.0 JWT Bearer Flow

Full Access
Question # 37

Universal Containers (UC) has an Experience Cloud site (Customer Community) where customers can authenticate and place orders, view the status of orders, etc. UC allows guest checkout.

Mow can a guest register using data previously collected during order placement?

A.

Enable Security Assertion Markup Language Sign-On and use a login flow to collect only order details to retrieve customer data.

B.

Enable Facebook as an authentication provider and use a registration handler to collect only order details to retrieve customer data.

C.

Use a Connected App Handler Apex Plugin class to collect only order details to retrieve customer data.

D.

Enable self-registration and customize a self-registration page to collect only order details to retrieve customer data.

Full Access