Exam Code : Salesforce-Certified-Identity-and-Access-Management-Designer
Exam Name : Certified Identity and Access Management Designer
Vendor Name :
"Salesforce"
Salesforce-Certified-Identity-and-Access-Management-Designer Dumps Salesforce-Certified-Identity-and-Access-Management-Designer Braindumps Salesforce-Certified-Identity-and-Access-Management-Designer Real Questions Salesforce-Certified-Identity-and-Access-Management-Designer Practice Test Salesforce-Certified-Identity-and-Access-Management-Designer Actual Questions
Salesforce-Certified-Identity-and-Access-Management-Designer
Certified Identity and Access Management Designer
https://killexams.com/pass4sure/exam-detail/Salesforce-Certified-Identity-and-Access-Management-Designer
Universal Containers (UC) implemented SSO to a third-party system for their Salesforce users to access the App Launcher. UC enabled “User Provisioning” on the Connected App so that changes to user accounts can be synched between Salesforce and the third party system. However, UC quickly notices that changes to user roles in Salesforce are not getting synched to the third-party system .
What is the most likely reason for this behaviour?
User Provisioning for Connected Apps does not support role sync.
Required operation(s) was not mapped in User Provisioning Settings.
The Approval queue for User Provisioning Requests is unmonitored.
Salesforce roles have more than three levels in the role hierarchy.
Question: 63
An architect needs to set up a Facebook Authentication provider as login option for a salesforce customer Community . What portion of the authentication provider setup associates a Facebook user with a salesforce user?
Consumer key and consumer secret
Federation ID
User info endpoint URL
Apex registration handler
Question: 64
Universal Containers wants to implement Single Sign-on for a Salesforce org using an external Identity Provider and corporate identity store.
What type of authentication flow is required to support deep linking?
Web Server OAuth SSO flow
Service-Provider-Initiated SSO
Identity-Provider-initiated SSO
StartURL on Identity Provider
Question: 65
Universal containers (UC) has implemented SAML SSO to enable seamless access across multiple applications. UC has regional salesforce orgs and wants it’s users to be able to access them from their main Salesforce org seamless .
Which action should an architect recommend?
Configure the main salesforce org as an Authentication provider.
Configure the main salesforce org as the Identity provider.
Configure the regional salesforce orgs as Identity Providers.
Configure the main Salesforce org as a service provider.
Question: 66
Universal Containers (UC) is setting up delegated authentication to allow employees to log in using their corporate credentials. UC’s security team is concerned about the risks of exposing the corporate login service on the internet and has asked that a reliable trust mechanism be put in place between the login service and Salesforce.
What mechanism should an Architect put in place to enable a trusted connection between the login service and Salesforce?
Require the use of Salesforce security tokens on passwords.
Enforce mutual authentication between systems using SS
Include Client Id and Client Secret in the login header callout.
Set up a proxy service for the login service in the DM
Question: 67
Universal containers (UC) uses a legacy Employee portal for their employees to collaborate and post their ideas. UC decides to use salesforce ideas for voting and better tracking purposes. To avoid provisioning users on Salesforce, UC decides to push ideas posted on the Employee portal to salesforce through API. UC decides to use an API user using Oauth Username – password flow for the connection .
How can the connection to salesforce be restricted only to the employee portal server?
Add the Employee portals IP address to the Trusted IP range for the connected App
Use a digital certificate signed by the employee portal Server.
Add the employee portals IP address to the login IP range on the user profile.
Use a dedicated profile for the user the Employee portal uses.
Question: 68
Which two security risks can be mitigated by enabling Two-Factor Authentication (2FA) in Salesforce? Choose 2 answers
Users leaving laptops unattended and not logging out of Salesforce.
Users accessing Salesforce from a public Wi-Fi access point.
Users choosing passwords that are the same as their Facebook password.
Users creating simple-to-guess password reset questions.
Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured as a connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app .
Which two are recommendations to make the UC? Choose 2 answers
Disallow the use of Single Sign-on for any users of the mobile app.
Require High Assurance sessions in order to use the Connected App.
Set Login IP Ranges to the internal network for all of the app users Profiles.
Use Google Authenticator as an additional part of the login process
Question: 70
Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow (this flow uses the OAuth 2.0 implicit grant type).
Which three OAuth concepts apply to this flow? Choose 3 answers
Client ID
Refresh Token
Authorization Code
Verification Code
Scopes
Question: 71
Universal containers (UC) is setting up Delegated Authentication to allow employees to log in using their corporate credentials. UC’s security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the login service and salesforce .
What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?
Include client ID and client secret in the login header callout.
Set up a proxy server for the login service in the DM
Require the use of Salesforce security Tokens on password.
Enforce mutual Authentication between systems using SS
Question: 72
Universal Containers (UC) is building an integration between Salesforce and a legacy web applications using the canvas framework. The security for UC has determined that a signed request from Salesforce is not an adequate authentication solution for the Third-Party app .
Which two options should the Architect consider for authenticating the third-party app using the canvas framework? Choose 2 Answers
A. Utilize the SAML Single Sign-on flow to allow the third-party to authenticate itself against UC’s Id
Utilize Authorization Providers to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
Utilize Canvas OAuth flow to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
Create a registration handler Apex class to allow the third-party appliction to authenticate itself against Salesforce as the Idp.
Question: 73
Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers
Google is the identity provider
Salesforce is the identity provider
Google is the service provider
Salesforce is the service provider
Question: 74
Which two roles of the systems are involved in an environment where salesforce users are enabled to access Google Apps from within salesforce through App launcher and connected App set up? Choose 2 answers
Google is the identity provider
Salesforce is the identity provider
Google is the service provider
Salesforce is the service provider
Question: 75
How should an Architect force users to authenticate with Two-factor Authentication (2FA) for Salesforce only when not connected to an internal company network?
Use Custom Login Flows with Apex to detect the user’s IP address and prompt for 2FA if needed.
Add the list of company’s network IP addresses to the Login Range list under 2FA Setup.
Use an Apex Trigger on the User Login object to detect the user’s IP address and prompt for 2FA if needed.
Apply the "Two-factor Authentication for User Interface Logins" permission and Login IP Ranges for all Profiles.