Certified Platform Identity and Access Management Architect v1.0

Page:    1 / 4   
Exam contains 58 questions

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in.
What should be used to fulfill this requirement?

  • A. Use the Login History object to track information about devices from which users log in.
  • B. Use multi-factor authentication (MFA) to meet the compliance requirement to track device information.
  • C. Use the Activations feature to meet the compliance requirement to track device information.
  • D. Use Login Flows to capture device from which users log in and store device and user information in a custom object.


Answer : C

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.
Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

  • A. Login Inspector
  • B. Login Forensics
  • C. Login Report
  • D. Login History


Answer : C

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).
Which three OAuth concepts apply to this flow? (Choose three.)

  • A. Scopes
  • B. Verification Code
  • C. Refresh Token
  • D. Authorization Code
  • E. Client ID


Answer : ACE

A global fitness equipment manufacturer is planning to sell fitness tracking devices and has the following requirements:
1) Customer purchases the device.
2) Customer registers the device using their mobile app.
3) A case should automatically be created in Salesforce and associated with the customers account in cases where the device registers issues with tracking.
Which OAuth flow should be used to meet these requirements?

  • A. OAuth 2.0 User-Agent Flow
  • B. OAuth 2.0 Asset Token Flow
  • C. OAuth 2.0 SAML Bearer Assertion Flow
  • D. OAuth 2.0 Device Flow


Answer : D

A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities.
Which Salesforce OAuth authorization flow should be used?

  • A. OAuth 2.0 User-Agent Flow
  • B. OAuth 2.0 Asset Token Flow
  • C. OAuth 2.0 JWT Bearer Flow
  • D. OAuth 2.0 Device Flow


Answer : D

A company’s external application is protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way.
What should be done to improve security?

  • A. Create custom scopes and assign to the connected app.
  • B. Define a permission set that grants access to the app and assign to authorized users.
  • C. Leverage external objects and data classification policies.
  • D. Select “Admin approved users are pre-authorized” and assign specific profiles.


Answer : A

A global fitness equipment manufacturer uses Salesforce to manage its sales cycle. The manufacturer has a custom order fulfillment app that needs to request order data from Salesforce. The order fulfillment app needs to integrate with the Salesforce API using OAuth 2.0 protocol.
What should an identity architect use to fulfill this requirement?

  • A. Canvas App Integration
  • B. Connected App and OAuth Scopes
  • C. OAuth Tokens
  • D. Authentication Providers


Answer : B

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.
Which action will accomplish this?

  • A. Use a HTTP POST to make a call to the revoke token endpoint.
  • B. Enable Single Logout with a secure logout URL.
  • C. Use a HTTP POST to the System for Cross-domain Identity Management (SCIM) endpoint, including the current OAuth token.
  • D. Use a HTTP POST to request the refresh token for the current user.


Answer : A

A farming enterprise offers smart farming technology to its farmer customers, which includes a variety of sensors for livestock tracking, pest monitoring, climate monitoring etc. They plan to store all the data in Salesforce. They would also like to ensure timely maintenance of the installed sensors. They have engaged a Salesforce Architect to propose an appropriate way to send an alert when something goes wrong.
Which OAuth flow should the architect recommend?

  • A. OAuth 2.0 Asset Token Flow
  • B. OAuth 2.0 Device Authentication Flow
  • C. OAuth 2.0 SAML Bearer Assertion Flow
  • D. OAuth 2.0 JWT Bearer Token Flow


Answer : A

An identity architect is implementing a mobile-first Consumer Identity Access Management (CIAM) for external users.
User authentication is the only requirement. The users email or mobile phone number should be supported as a username.
Which two licenses are needed to meet this requirement? (Choose two.)

  • A. Identity Connect Licenses
  • B. Email Verification Credits
  • C. External Identity Licenses
  • D. SMS Verification Credits


Answer : CD

Universal Containers (UC) has built a custom time tracking app for its employees on a third party system. UC wants to leverage Salesforce Identity to control access to the custom app.
At a minimum, which Salesforce license is required to support this requirement?

  • A. External Identity
  • B. Identity Connect
  • C. Identity Verification
  • D. Identity Only


Answer : D

Universal Containers is creating a web application that will be secured by Salesforce Identity using the OAuth 2.0 Web Server Flow (this flow uses the OAuth 2.0 authorization code grant type).
Which three OAuth concepts apply to this flow? (Choose three.)

  • A. Verification URL
  • B. Scopes
  • C. Client Secret
  • D. Access Token
  • E. Authentication Token


Answer : BCD

An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to be able to authenticate to Salesforce and then make API calls against the REST API.
One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce minimizes the need for end user interaction and maximizes security.
Which OAuth flow should be used to fulfill the requirement?

  • A. Web Server Flow
  • B. User Agent Flow
  • C. JWT Bearer Flow
  • D. Username-Password Flow


Answer : C

Universal Containers (UC) wants to provide single sign-on (SSO) for a business-to-consumer (B2C) application using Salesforce Identity.
Which Salesforce license should UC utilize to implement this use case?

  • A. Salesforce Platform
  • B. Partner Community
  • C. External Identity
  • D. Identity Only


Answer : C

An administrator created a connected app for a custom web application in Salesforce which needs to be visible as a tile in App Launcher. The tile for the custom web application is missing in the app launcher for all users in Salesforce. The administrator requested assistance from an identity architect to resolve the issue.
Which two reasons are the source of the issue? (Choose two.)

  • A. StartURL for the connected app is not set in Connected App settings.
  • B. The connected app is not set in the App menu as “Visible in App Launcher”.
  • C. Session Policy is set as “High Assurance Session required” for this connected app.
  • D. OAuth scope does not include “openid”.


Answer : AB

Page:    1 / 4   
Exam contains 58 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy | Amazon Exams | Cisco Exams | CompTIA Exams | Databricks Exams | Fortinet Exams | Google Exams | Microsoft Exams | VMware Exams