Free Certified Identity and Access Management Architect Exam Braindumps (page: 26)

Page 26 of 62

Universal containers (UC) is setting up their customer Community self-registration process. They are uncomfortable with the idea of assigning new users to a default account record. What will happen when customers self-register in the community?

  1. The self-registration process will produce an error to the user.
  2. The self-registration page will ask user to select an account.
  3. The self-registration process will create a person Account record.
  4. The self-registration page will create a new account record.

Answer(s): A



Universal containers (UC) uses a home-grown employee portal for their employees to collaborate. UC decides to use salesforce ideas to allow the employees to post ideas from the employee portal. When clicking some links in the employee portal, the users should be redirected to salesforce, authenticated, and presented with relevant pages. What scope should be requested when using the Oauth token to meet this requirement?

  1. Web
  2. Full
  3. API
  4. Visualforce

Answer(s): A



Universal containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC decides to use an API user using Oauth Username - password flow for the connection. How can the connection to salesforce be restricted only to the employee portal server?

  1. Add the Employee portals IP address to the Trusted IP range for the connected App
  2. Use a digital certificate signed by the employee portal Server.
  3. Add the employee portals IP address to the login IP range on the user profile.
  4. Use a dedicated profile for the user the Employee portal uses.

Answer(s): A



Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?

  1. Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.
  2. Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.
  3. Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.
  4. Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.

Answer(s): A,C



Page 26 of 62



Post your Comments and Discuss Salesforce Certified Identity and Access Management Architect exam with other Community members:

Chris commented on September 30, 2024
This is a very good resource. Reliable and cheap.
UNITED STATES
upvote

DeMalio commented on September 30, 2024
Very helpful and very accurate. Could not have passed this exam without this exam dump. Very grateful.
UNITED STATES
upvote

Pragati commented on September 30, 2024
Useful Resources
Anonymous
upvote

Dan commented on September 30, 2024
hi Thanks could you provide scenario based questions ?
FRANCE
upvote

Ashitosh commented on September 30, 2024
I m Ashitosh
JAPAN
upvote