What is the recommended solution for automatically allowing or denying the access to the classified information system based on the open "classified" case record criteria?
Universal Containers (UC) has a classified information system that its call center team uses only when they are working on a case with a record type "Classified". They are only allowed to access the system when they own an open "Classified" case, and their access to the system is removed...
What should be used to fulfill this requirement?
A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator needs to have the ability to revoke the device from which users log in. What should be used to fulfill this requirement?A . Use...
What action should the IT team take while implementing the second org?
Universal Containers (UC) has an existing Salesforce org configured for SP-Initiated SAML SSO with their Idp. A second Salesforce org is being introduced into the environment and the IT team would like to ensure they can use the same Idp for new org . What action should the IT team...
How can an architect support fingerprints as a form of identification for salesforce Authentication?
Universal containers (UC) has decided to build a new, highly sensitive application on Force.com platform. The security team at UC has decided that they want users to provide a fingerprint in addition to username/Password to authenticate to this application . How can an architect support fingerprints as a form of...
Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers
Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answersA . Google is the identity providerB . Salesforce is the identity providerC . Google is the...
What is the correct sequence for the authorization flow?
Salesforce Grants Authorization Code What is the correct sequence for the authorization flow?A . 1, 4, 5, 2, 3B . 4, 1, 5, 2, 3C . 2, 1, 3, 4, 5D . 4,5,2, 3, 1View AnswerAnswer: D
Which Salesforce OAuth authorization flow should be used?
A manufacturer wants to provide registration for an Internet of Things (IoT) device with limited display input or capabilities. Which Salesforce OAuth authorization flow should be used?A . OAuth 2.0 JWT Bearer HowB . OAuth 2.0 Device FlowC . OAuth 2.0 User-Agent FlowD . OAuth 2.0 Asset Token FlowView AnswerAnswer:...
Which two optimal ways can the IT team provision users and allow Single Sign-on between Salesforce and Google Apps?
Universal Containers (UC) is both a Salesforce and Google Apps customer. The UC IT team would like to manage the users for both systems in a single place to reduce administrative burden . Which two optimal ways can the IT team provision users and allow Single Sign-on between Salesforce and...
Which two issues would cause these errors?
A global company's Salesforce Identity Architect is reviewing its Salesforce production org login history and is seeing some intermittent Security Assertion Markup Language (SAML SSO) 'Replay Detected and Assertion Invalid' login errors. Which two issues would cause these errors? Choose 2 answersA . The subject element is missing from the...
Which license should the identity architect recommend to fulfill this requirement?
Northern Trail Outfitters (NTO) has a number of employees who do NOT need access Salesforce objects. Trie employees should sign in to a custom Benefits web app using their Salesforce credentials. Which license should the identity architect recommend to fulfill this requirement?A . Identity Only LicenseB . External Identity LicenseC...