Salesforce Salesforce-Certified-Identity-and-Access-Management-Designer Questions & Answers

Full Version: 135 Q&A

Salesforce-Certified-Identity-and-Access-Management-Designer Dumps Salesforce-Certified-Identity-and-Access-Management-Designer Braindumps Salesforce-Certified-Identity-and-Access-Management-Designer Real Questions Salesforce-Certified-Identity-and-Access-Management-Designer Practice Test Salesforce-Certified-Identity-and-Access-Management-Designer Actual Questions
Salesforce
Salesforce-Certified-Identity-and-Access-Management-Designer
Certified Identity and Access Management Designer
https://killexams.com/pass4sure/exam-detail/Salesforce-Certified-Identity-and-Access-Management-Designer
Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third party system. However, UC quickly notices that changes to user roles in Salesforce are not getting synched to the third-party system .
What is the most likely reason for this behaviour?
1. User Provisioning for Connected Apps does not support role sync.
2. Required operation(s) was not mapped in User Provisioning Settings.
3. The Approval queue for User Provisioning Requests is unmonitored.
4. Salesforce roles have more than three levels in the role hierarchy.
Answer: A
Question: 63
An architect needs to set up a Facebook Authentication provider as login option for a salesforce customer Community . What portion of the authentication provider setup associates a Facebook user with a salesforce user?
1. Consumer key and consumer secret
2. Federation ID
3. User info endpoint URL
4. Apex registration handler
Answer: D
Question: 64
Universal Containers wants to implement Single Sign-on for a Salesforce org using an external Identity Provider and corporate identity store.
What type of authentication flow is required to support deep linking?
1. Web Server OAuth SSO flow
2. Service-Provider-Initiated SSO
3. Identity-Provider-initiated SSO
4. StartURL on Identity Provider
Answer: B
Question: 65
Universal containers (UC) has implemented SAML SSO to enable seamless access across multiple applications. UC has regional salesforce orgs and wants it’s users to be able to access them from their main Salesforce org seamless .
Which action should an architect recommend?
1. Configure the main salesforce org as an Authentication provider.
2. Configure the main salesforce org as the Identity provider.
3. Configure the regional salesforce orgs as Identity Providers.
4. Configure the main Salesforce org as a service provider.
Answer: B
Question: 66
Universal Containers (UC) is setting up delegated authentication to allow employees to log in using their corporate credentials. UC’s security team is concerned about the risks of exposing the corporate login service on the internet and has asked that a reliable trust mechanism be put in place between the login service and Salesforce.
What mechanism should an Architect put in place to enable a trusted connection between the login service and Salesforce?
1. Require the use of Salesforce security tokens on passwords.
2. Enforce mutual authentication between systems using SS
1. Include Client Id and Client Secret in the login header callout.
2. Set up a proxy service for the login service in the DM
Answer: A
Question: 67
Universal containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC decides to use an API user using Oauth Username – password flow for the connection .
How can the connection to salesforce be restricted only to the employee portal server?
1. Add the Employee portals IP address to the Trusted IP range for the connected App
2. Use a digital certificate signed by the employee portal Server.
3. Add the employee portals IP address to the login IP range on the user profile.
4. Use a dedicated profile for the user the Employee portal uses.
Answer: A
Question: 68
Which two security risks can be mitigated by enabling Two-Factor Authentication (2FA) in Salesforce? Choose 2 answers
1. Users leaving laptops unattended and not logging out of Salesforce.
2. Users accessing Salesforce from a public Wi-Fi access point.
3. Users choosing passwords that are the same as their Facebook password.
4. Users creating simple-to-guess password reset questions.
Answer: B,C
Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app .
Which two are recommendations to make the UC? Choose 2 answers
1. Disallow the use of Single Sign-on for any users of the mobile app.
2. Require High Assurance sessions in order to use the Connected App.
3. Set Login IP Ranges to the internal network for all of the app users Profiles.
4. Use Google Authenticator as an additional part of the login process
Answer: B,D
Question: 70
Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).
Which three OAuth concepts apply to this flow? Choose 3 answers
1. Client ID
2. Refresh Token
3. Authorization Code
4. Verification Code
5. Scopes
Answer: A,B,E
Question: 71
Universal containers (UC) is setting up Delegated Authentication to allow employees to log in using their corporate credentials. UC’s security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the login service and salesforce .
What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?
1. Include client ID and client secret in the login header callout.
2. Set up a proxy server for the login service in the DM
1. Require the use of Salesforce security Tokens on password.
2. Enforce mutual Authentication between systems using SS
Answer: C
Question: 72
Universal Containers (UC) is building an integration between Salesforce and a legacy web applications using the canvas framework. The security for UC has determined that a signed request from Salesforce is not an adequate authentication solution for the Third-Party app .
Which two options should the Architect consider for authenticating the third-party app using the canvas framework? Choose 2 Answers
A. Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC’s Id
1. Utilize Authorization Providers to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
2. Utilize Canvas OAuth flow to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
3. Create a registration handler Apex class to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
Answer: A,C
Question: 73
Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers
1. Google is the identity provider
2. Salesforce is the identity provider
3. Google is the service provider
4. Salesforce is the service provider
Answer: D
Question: 74
Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers
1. Google is the identity provider
2. Salesforce is the identity provider
3. Google is the service provider
4. Salesforce is the service provider
Answer: D
Question: 75
How should an Architect force users to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?
1. Use Custom Login Flows with Apex to detect the user’s IP address and prompt for 2FA if needed.
2. Add the list of company’s network IP addresses to the Login Range list under 2FA Setup.
3. Use an Apex Trigger on the User Login object to detect the user’s IP address and prompt for 2FA if needed.
4. Apply the "Two-factor Authentication for User Interface Logins" permission and Login IP Ranges for all Profiles.
Answer: A

User: Tomás*****

After consecutive failures in the salesforce-certified-identity-and-access-management-designer exam, I was devastated and considered changing my subject, thinking that it was not my cup of tea. However, someone suggested I try one last time with Killexams.com, and I am glad I did. The last attempt was a success, and I passed the paper with Killexams.com help, which put in all the effort to make things work for me, allowing me to pursue my discipline.
User: Luciana*****

Thanks to the tremendous products provided by Killexams.com, I was able to score an impressive 92% on my SALESFORCE-CERTIFIED-IDENTITY-AND-ACCESS-MANAGEMENT-DESIGNER certification exam. I was searching for a reliable test practice test to boost my knowledge, especially since the technical concepts and language in my certification were difficult to understand. Killexams.com offered easy solutions for me, and I am pleased with my success. This platform is an excellent training source for professional certification exams.
User: Anna*****

The bundle of Killexams.com questions and answers provided me with an awesome result. The questions were correct, and I was able to answer most of them during the exam. After passing, I recommended Killexams.com to my colleagues, and they also passed their exams with ease. I have not heard a single negative review of Killexams, which makes it the best IT training you can find online.
User: Vivian*****

The exam preparation package from killexams.com was worth every penny, as I scored 94% on the salesforce-certified-identity-and-access-management-designer exam. Every question was valid and appeared on the actual exam, which is remarkable. I am impressed by killexams.com ability to maintain this level of excellence over the years. My cousin had a similar positive experience using their materials for an IT exam.
User: Albert*****

A friend suggested that I subscribe to Killexams.com to get more resources for my SALESFORCE-CERTIFIED-IDENTITY-AND-ACCESS-MANAGEMENT-DESIGNER exams, and I am glad I did. As soon as I logged in, I felt comfortable and relieved, knowing that this resource would help me get through my SALESFORCE-CERTIFIED-IDENTITY-AND-ACCESS-MANAGEMENT-DESIGNER exam - and it did.

Features of iPass4sure Salesforce-Certified-Identity-and-Access-Management-Designer Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 135 Q&A

Get Full Version

All Salesforce Exams

Salesforce Exams

Certification and Entry Test Exams

Complete exam list