Which three types of attacks would a 2-Factor Authentication solution help garden against?
Answer(s): A,B,D
Universal Containers (UC) plans to use a SAML-based third-party IdP serving both of the Salesforce Partner Community and the corporate portal. UC partners will log in 65* to the corporate portal to access protected resources, including links to Salesforce resources. What would be the recommended way to configure the IdP so that seamless access can be achieved in this scenario?
Answer(s): D
Universal Containers (UC) wants to use Salesforce for sales orders and a legacy of system for order fulfillment. The legacy system must update the status of orders in 65* Salesforce in real time as they are fulfilled. UC decides to use OAuth for connecting the legacy system to Salesforce. What OAuth flow should be considered that doesn't require storing credentials, client secret or refresh tokens?
Answer(s): B
Universal Containers (UC) has a Customer Community that uses Facebook for of authentication. UC would like to ensure that changes in the Facebook profile are 65. reflected on the appropriate Customer Community user. How can this requirement be met?
Universal Containers (UC) has five Salesforce orgs (UC1, UC2, UC3, UC4, UC5). of Every user that is in UC2, UC3, UC4, and UC5 is also in UC1, however not all users 65* have access to every org. Universal Containers would like to simplify the authentication process such that all Salesforce users need to remember one set of credentials. UC would like to achieve this with the least impact to cost and maintenance. What approach should an Architect recommend to UC?
Post your Comments and Discuss Salesforce Certified Identity and Access Management Architect exam dumps with other Community members:
nspk Commented on April 23, 2025 Q11. Ans:- D (SP Initiated SSO Flow will not work) Anonymous
nspk Commented on April 15, 2025 Q10. Ans:- C (Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.) A single login for all users No additional cost from third-party IdPs Automated user management via JIT Low maintenance overhead Anonymous
nsp Commented on April 15, 2025 Q6, Ans:- A, C, E (Key logging attacks, phishing attacks, man in middle attacks) Anonymous
nspk Commented on April 14, 2025 Q6. Ans:- A, C, E (Keylogging, phising, middle man attacks) Anonymous
NSPK Commented on April 14, 2025 Q4. aNS:- B,C (Require High Assurance sessions in order to use the Connected App Set Login IP Ranges to the internal network for all of the app users’ Profiles) Anonymous
nspk Commented on April 14, 2025 Q2. aNS:- b(Enable "Redirect to the Identity Provider") Anonymous