An organization needs to integrate Salesforce with an external system and is considering authentication options. The organization already has implemented SAML, using a thirdparty Identity Provider for integrations between other systems. Which use case can leverage the existing SAML integration to connect Salesforce with other internal systems?
A.
Make formula fields with HYPERLINK() to external web servers more secure.
B.
Make Apex SOAP outbound integrations to external web services more secure.
C.
A Make Apex REST outbound integrations to external web services more secure.
D.
Make an API inbound integration from an external Java client more secure.
Make formula fields with HYPERLINK() to external web servers more secure.
Universal Containers (UC) owns a variety of cloud-based applications, including Salesforce, alongside several on premise applications. The on-premise applications are protected behind a corporate network with limited outside access to external systems. UC would like to expose data from the on-premise applications to Salesforce for a more unified user experience. The data should be accessible from Salesforce in real-time. Which two actions should be recommended to fulfill this system requirement?
Choose 2 answers
A.
Develop an application in Heroku that connects to the on-premise database via an ODBC string and VPC connection.
B.
Develop custom APIs on the company's network that are invokable by Salesforce.
C.
Deploy MuleSoft to the on-premise network and design externally facing APIs to expose the data.
D.
Run a batch job with an ETL tool from an on-premise server to move data to Salesforce.
Develop custom APIs on the company's network that are invokable by Salesforce.
Deploy MuleSoft to the on-premise network and design externally facing APIs to expose the data.
Only authorized users are allowed access to the EBS and the Enterprise DMS. Customers call Customer Support when they need clarification on their bills. Customer Support needs seamless access to customer billing information from the E and view generated bills from the DMS. Which three authorization and authentication needs should an integration consultant consider while integrating the DMS and ESB with Salesforce? should an integration consultant consider while integrating the DMS and ESB with Salesforce?
Choose 3 answers
A.
Users should be authorized to view information specific to the customer they are servicing without a need to search for customer.
B.
Identify options to maintain DMS and EBS authentication and authorization details in Salesforce.
C.
Consider Enterprise security needs for access to DMS and EBS.
D.
Consider options to migrate DMS and EBS into Salesforce.
E.
Users should be authenticated into DMS and EBS without having to enter username and password.
Identify options to maintain DMS and EBS authentication and authorization details in Salesforce.
Consider options to migrate DMS and EBS into Salesforce.
Users should be authenticated into DMS and EBS without having to enter username and password.
A healthcare services company maintains a Patient Prescriptions System that has 50+ million records in a secure database. Their customer base and data set growing rapidly.
They want to make sure that the following policies are enforced:
1. Identifiable patient prescriptions must exist only in their secure system's databaseand encrypted at rest.
2. Identifiable patient prescriptions must be made available only to people explicit authorized in the Patient Prescriptions System assigned nurses anddoctors, patient, and people explicitly the patient may authorize.
3. Must be available only to verified and pre-approved people or legal entities.
To enable this, the company provides the following capabilities:
1. One-time use identity tokens for patients, nurses, doctors, and other people that expire within a few minutes.
2. Certificates for legal entities.
. RESTful services.
The company has a Salesforce Community Cloud portal for patients, nurses, doctors, and other authorized people. A limited number of employees analyze de identified data in Einstein Analytics.
Which two capabilities should the integration architect require for the Community Cloud portal and Einstein Analytics?
Choose 2 answers
A.
Identity token data storage
B.
Bulk load for Einstein Analytics
C.
Callouts to RESTful services
D.
Encryption in transit and at rest
Bulk load for Einstein Analytics
Callouts to RESTful services
Northern Trail Outfitters' (NTO) Salesforce org usually goes through 8k-10k batches a day to synch data from external sources. NTO's Integration Architec has received requirements for a new custom object, FooBarc, for which 90M records will need to be loaded into the org. Once complete, 20GB (about 30M records) needs to be extracted to an external auditing system. What should the architect recommend using to meet these requirements in a day?
A.
Insert using Bulk API 2.0 and query using REST API.
B.
Insert and query using Bulk API 1.0.
C.
Insert using Bulk API 1.0 and query using REST API.
D.
Insert and query using Bulk API 2.0.
Insert and query using Bulk API 2.0.
Customer is evaluating Platform Events solution and would like help in comparing/contrasting it with Outbound Message for a real-time / near-real time needs. They expect 3,000 consumers of messages from Salesforce. Which three considerations should be evaluated and highlighted when deciding between the solutions?
Choose 3 answers
A.
Both Platform Events and Outbound Message offer declarative means for asynchronous near-real time needs. They aren't best suited for realtime integrations.
B.
In both Platform Events and Outbound Messages, the event messages are retried by and delivered in sequence, and only once. Salesforce ensures there is no duplicate message delivery.
C.
Message sequence is possible in Outbound Message but not guaranteed with Platform Events. Both offer very high reliability. Fault handling and recovery are fully handled by Salesforce.
D.
Number of concurrent subscribers to Platform Events is capped at 2,000. An Outbound Message configuration can pass only 100 notifications in a single messages to a SOAP end point.
E.
Both Platform Events and Outbound Message are highly scalable. However, unlike Outbound Message, only Platform Events have Event Delivery and Event Publishing limits to be considered.
In both Platform Events and Outbound Messages, the event messages are retried by and delivered in sequence, and only once. Salesforce ensures there is no duplicate message delivery.
Number of concurrent subscribers to Platform Events is capped at 2,000. An Outbound Message configuration can pass only 100 notifications in a single messages to a SOAP end point.
Both Platform Events and Outbound Message are highly scalable. However, unlike Outbound Message, only Platform Events have Event Delivery and Event Publishing limits to be considered.
Explanation: https://developer.salesforce.com/docs/atlas.enus.platform_events.meta/platform_events/platform_event_limits.htm
https://help.salesforce.com/articleViewid=workflow_om_considerations.htm&type=5
Northern Trail Outfitters is planning to create a native employee facing mobile app with the look and feel of Salesforce's Lighting Experience. The mobile ap needs to integrate with their Salesforce org. Which Salesforce API should be used to implement this integration?
A.
Streaming API
B.
REST API
C.
Connect REST API
D.
User Interface API
User Interface API
Northern Trail Outfitters requires an integration to be set up between one of their Salesforce orgs and an external data source us Salesforce Connect. The external data source supports Open Data Protocol. Which three configurations should an Integration Architect recommend be implemented in order to secure requests coming from Salesforce?
Choose 3 answers
A.
Configure Identity Type for OData connection.
B.
Configure a Certificate for OData connection.
C.
Configure Special Compatibility for OData connection,
D.
Configure CSRF Protection for OData connection.
E.
Configure CSRF Protection on External Data Source.
Configure Identity Type for OData connection.
Configure a Certificate for OData connection.
Configure CSRF Protection for OData connection.
Explanation:
https://help.salesforce.com/articleView?id=apex_add_external_data_source.htm&type=5
A company has an external system that processes and tracks orders. Sales reps manage their leads and opportunity pipeline in Salesforce. In the current state, the two systems are disconnected and processing orders requires a lot of manual entry on sales rep part. This creates delays in processing orders and incomplete data due to manual entry.
As a part of modernization efforts the company decided to integrate Salesforce and the order management system. The following technical requirements were identified:
1. Orders need to be created in real time from salesforce
2. Minimal customization*, and code should be written due to a tight timeline and lack of developer resources
3. Sales reps need to be able to see order history and be able to see most up to date information on current order status.
4. Managers need to be able to run reports in Salesforce to see daily and monthly order volumes and fulfillment timelines.
5. The legacy system is hosted on premise and is currently connected to the Enterprise Service Bus (ESB). The ESB is flexible enough to provide any methods and connection types needed by salesforce team.
6. There are 1000 sales reps. Each user processes/creates on average 15 orders per shift. Most of the orders contain 20-30 line items.
How should an integration architect integrate the two systems based on the technical requirements and system constraints?
A.
Use Salesforce external object and OData connector.
B.
Use Salesforce custom object, custom REST API and ETL.
C.
Use Salesforce standard object, REST API and ETL.
D.
Use Salesforce big object, SOAP API and Dataloader.
Use Salesforce standard object, REST API and ETL.
Northern Trail Outfitters is seeking to improve the performance and security of outbound integrations from Salesforce to on-premise servers. What should the Architect consider before recommending a solution?
A.
External gateway products in use
B.
A Default gateway restrictions
C.
Considerations for using Deterministic Encryption
D.
Shield Platform Encryption Limitations
External gateway products in use
Page 4 out of 11 Pages |
Previous |