An Architect is asked to build a solution that allows a service to access Salesforce through the API. What is the first thing the Architect should do?
A.
Create a new user with System Administrator profile.
B.
Authenticate the integration using existing Single Sign-On.
C.
Authenticate the integration using existing Network-BasedSecurity.
D.
Create a special user solely for the integration purposes.
Create a special user solely for the integration purposes.
A company's cloud-based single page application consolidates data local to the application with data from on premise and 3rd party systems. The diagram below typifies the application's combined use of synchronous and asynchronous calls. The company wants to use the average response time of its application's user interface as a basis for certain alerts. For this purpose, the following occurs:
1. Log every call's start and finish date and time to a central analytics data store.
2. Compute response time uniformly as the difference between the start and finish date and time — A to H in the diagram.
Which computation represents the end-to-end response time from the user's perspective?
A.
Sum of A to H
B.
Sum of A to F
C.
Sum of A, G, and H
D.
Sum of A and H
Sum of A and H
Northern Trail Outfitters (NTO) use Salesforce to track leads, opportunities, and to capture order details. However, Salesforce isn't the system that holds or processes orders. After the order details are captured in Salesforce, an order must be created in the remote system, which manages the orders lifecylce. The Integration Architect for the project is recommending a remote system that will subscribe to the platform event defined in Salesforce. Which integration pattern should be used for this business use case?
A.
Remote Call In
B.
Request and Reply
C.
Fire and Forget
D.
Batch Data Synchronization
Fire and Forget
Northern Trail Outfitters (NTO) uses different shipping services for each of the 34 countries it serves. Services are added and removed frequently to optimize shipping times and costs. Sales Representatives serve all NTO customers globally and need to select between valid service(s) for the customer's country and request shipping estimates from that service. Which two solutions should an architect propose?
Choose 2 answers
A.
Use Platform Events to construct and publish shipper-specific events.
B.
Invoke middleware service to retrieve valid shipping methods.
C.
Use middleware to abstract the call to the specific shipping services.
D.
Store shipping services in a picklist that is dependent on a country picklist.
Invoke middleware service to retrieve valid shipping methods.
Use middleware to abstract the call to the specific shipping services.
A company is planning on sending orders from Salesforce to a fulfillment system. The integration architect has been asked to plan for the integration. Which two questions should the integration architect consider?
Choose 2 answers
A.
Can the fulfillment system create new addresses within the Order Create service?
B.
Can the fulfillment system make a callback into Salesforce?
C.
Can the fulfillment system implement a contract-first Outbound Messaging interface?
D.
Is the product catalog data identical at all times in both systems?
Can the fulfillment system make a callback into Salesforce?
Can the fulfillment system implement a contract-first Outbound Messaging interface?
A developer has been tasked by the integration architect to build a solution based on the Streaming API. The developer has done some research and has found there are different implementations of the events in Salesforce (Push Topic Events, Change Data Capture, Generic Streaming, Platform Events), but is unsure of to proceed with the implementation.The developer asks the system architect for some guidance. What should the architect consider when making the recommendation?
A.
Push Topic Event can define a custom payload.
B.
Change Data Capture does not have record access support.
C.
Change Data Capture can be published from Apex.
D.
Apex triggers can subscribe to Generic Events.
Change Data Capture does not have record access support.
A customer imports data from an external system into Salesforce using Bulk API. These jobs have batch sizes of 2000 and are run in parallel mode. The batc fails frequently with the error "Max CPU time exceeded". A smaller batch size will fix this error. Which two options should be considered when using a smaller batch size? Choose 2 answers
A.
Smaller batch size may cause record-locking errors.
B.
Smaller batch size may increase time required to execute bulk jobs.
C.
Smaller batch size may exceed the concurrent API request limits.
D.
Smaller batch size can trigger "Too many concurrent batches" error.
Smaller batch size may cause record-locking errors.
Smaller batch size may increase time required to execute bulk jobs.
Northern Trail Outfitters (NTO) has recently changed their Corporate Security Guidelines. The guidelines require that all cloud applications pass through a secure firewall before accessing on-premise resources. NTO is evaluating middleware solutions to integrate cloud applications with on-premise resources and services. What are two considerations an Integration Architect should evaluate before choosing a middleware solution?
Choose 2 answers
A.
The middleware solution is capable of establishing a secure API gateway between cloud applications and on-premise resources.
B.
An API gateway component is deployable behind a Demilitarized Zone (DMZ) or perimeter network.
C.
The middleware solution enforces the OAuth security protocol.
D.
The middleware solution is able to interface directly with databases via an ODBC connection string.
The middleware solution is capable of establishing a secure API gateway between cloud applications and on-premise resources.
An API gateway component is deployable behind a Demilitarized Zone (DMZ) or perimeter network.
Which WSDL should an architect consider when creating an integration that might be used for more than one salesforce organization and different met
A.
Corporate WSDL
B.
Partner WSDL
C.
SOAP API WSDL
D.
Enterprise WSDL
Partner WSDL
A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce. Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure?
Choose 2 answers
A.
Encrypted Custom Fields
B.
Named Credentials
C.
Protected Custom Metadata Types
D.
Protected Custom Settings
Encrypted Custom Fields
Named Credentials
Page 3 out of 11 Pages |
Previous |