Identity-and-Access-Management-Designer Premium Bundle

Identity-and-Access-Management-Designer Premium Bundle

Salesforce Certified Identity and Access Management Designer (SP19) Certification Exam

4.5 
(54825 ratings)
196 QuestionsPractice Tests
196 PDFPrint version
November 23, 2024Last update

Salesforce Identity-and-Access-Management-Designer Free Practice Questions

Want to know Testking Identity-and-Access-Management-Designer Exam practice test features? Want to lear more about Salesforce Salesforce Certified Identity and Access Management Designer (SP19) certification experience? Study Approved Salesforce Identity-and-Access-Management-Designer answers to Most up-to-date Identity-and-Access-Management-Designer questions at Testking. Gat a success with an absolute guarantee to pass Salesforce Identity-and-Access-Management-Designer (Salesforce Certified Identity and Access Management Designer (SP19)) test on your first attempt.

Free Identity-and-Access-Management-Designer Demo Online For Salesforce Certifitcation:

NEW QUESTION 1
Universal Containers wants to implement SAML SSO for their internal Salesforce users using a third-party IdP. After some evaluation, UC decides not to set up My Domain for their Salesforce org. How does that decision impact their SSO implementation?

  • A. SP-initiated SSO will not work.
  • B. Neither SP- nor IdP-initiated SSO will work.
  • C. Either SP- or IdP-initiated SSO will work.
  • D. IdP-initiated SSO will not work.

Answer: B

NEW QUESTION 2
Universal Containers (UC) has five Salesforce orgs (UC1, UC2, UC3, UC4, UC5). of Every user that is in UC2, UC3, UC4, and UC5 is also in UC1, however not all users 65* have access to every org. Universal Containers would like to simplify the authentication process such that all Salesforce users need to remember one set of credentials. UC would like to achieve this with the least impact to cost and maintenance. What approach should an Architect recommend to UC?

  • A. Purchase a third-party Identity Provider for all five Salesforce orgs to use and set up JIT user provisioning on all other orgs.
  • B. Purchase a third-party Identity Provider for all five Salesforce orgs to use, but don't set up JIT user provisioning for other orgs.
  • C. Configure UC1 as the Identity Provider to the other four Salesforce orgs and set up JIT user provisioning on all other orgs.
  • D. Configure UC1 as the Identity Provider to the other four Salesforce orgs, but don't set up JIT user provisioning for other orgs.

Answer: B

NEW QUESTION 3
Universal containers wants to implement single Sign-on for a salesforce org using an external identity provider and corporate identity store. What type of Authentication flow is required to support deep linking?

  • A. Web server Oauth SSO flow.
  • B. Identity-provider-initiated SSO
  • C. Service-provider-initiated SSO
  • D. Start URL on identity provider

Answer: C

NEW QUESTION 4
Which two statements are capable of Identity Connect? Choose 2 answers

  • A. Synchronization of Salesforce Permission Set Licence Assignments.
  • B. Supports both Identity-Provider-Initiated and Service-Provider-Initiated SSO.
  • C. Support multiple orgs connecting to multiple Active Directory servers.
  • D. Automated user synchronization and de-activation.

Answer: BD

NEW QUESTION 5
Universal Containers (UC) is using a custom application that will act as the Identity Provider and will generate SAML assertions used to log in to Salesforce. UC is considering including custom parameters in the SAML assertion. These attributes contain sensitive data and are needed to authenticate the users. The assertions are submitted to salesforce via a browser form post. The majority of the users will only be able to access Salesforce via UC's corporate network, but a subset of admins and executives would be allowed access from outside the corporate network on their mobile devices. Which two methods should an Architect consider to ensure that the sensitive data cannot be tampered with, nor accessible to anyone while in transit?

  • A. Use the Identity Provider's certificate to digitally sign and Salesforce's Certificate to encrypt the payload.
  • B. Use Salesforce's Certificate to digitally sign the SAML Assertion and a Mobile Device Management client on the users' mobile devices.
  • C. Use the Identity provider's certificate to digitally Sign and the Identity provider's certificate to encrypt the payload.
  • D. Use a custom login flow to retrieve sensitive data using an Apex callout without including the attributes in the assertion.

Answer: AC

NEW QUESTION 6
Universal Containers (UC) built an integration for their employees to post, view, and vote for ideas in Salesforce from an internal Company portal. When ideas are posted in Salesforce, links to the ideas are created in the company portal pages as part of the integration process. The Company portal connects to Salesforce using OAuth. Everything is working fine, except when users click on links to existing ideas, they are always taken to the Ideas home page rather than the specific idea, after authorization. Which OAuth URL parameter can be used to retain the original requested page so that a user can be redirected correctly after OAuth authorization?

  • A. Redirect_uri
  • B. State
  • C. Scope
  • D. Callback_uri

Answer: A

NEW QUESTION 7
Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes ato successful Customer 360 Truth project.
What are two are key benefits of Customer 360 Identity as it relates to Customer 360? Choose 2 answers

  • A. Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.
  • B. Customer 360 Identity enables an organization to build a single login for each of its customers, giving the organization anunderstanding of the user's login activity across all its digital properties and applications.
  • C. Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation of user activity,even if it spans multiple corporate brands and user experiences.
  • D. Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understand user activity before and after the users identify themselves.

Answer: BC

NEW QUESTION 8
Universal Containers (UC) has implemented SSO according to the diagram below. uses SAML while Salesforce Org 1 uses OAuth 2.0. Users usually start their day by first attempting to log into Salesforce Org 2 and then later in the day, they will log into either the Financial System or CPQ system depending upon their job position. Which two systems are acting as Identity Providers?

  • A. Financial System
  • B. Pingfederate
  • C. Salesforce Org 2
  • D. Salesforce Org 1

Answer: BD

NEW QUESTION 9
A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.
Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

  • A. Login Forensics
  • B. Login Report
  • C. Login Inspector
  • D. Login History

Answer: A

NEW QUESTION 10
A third-party app provider would like to have users provisioned via a service endpoint before users access their app from Salesforce.
What should an identity architect recommend to configure the requirement with limited changes to the third-party app?

  • A. Use a connected app with user provisioning flow.
  • B. Create Canvas app in Salesforce for third-party app to provision users.
  • C. Redirect users to the third-party app for registration.
  • D. Use Salesforce identity with Security Assertion Markup Language (SAML) for provisioning users.

Answer: A

NEW QUESTION 11
Universal Containers (UC) is setting up delegated authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risks of exposing the corporate login service on the internet and has asked that a reliable trust mechanism be put in place between the login service and Salesforce.
What mechanism should an Architect put in place to enable a trusted connection between the login service and Salesforce?

  • A. Require the use of Salesforce security tokens on passwords.
  • B. Enforce mutual authentication between systems using SSL.
  • C. Include Client Id and Client Secret in the login header callout.
  • D. Set up a proxy service for the login service in the DMZ.

Answer: A

NEW QUESTION 12
Universal Containers (UC) wants to integrate a third-party Reward Calculation system with Salesforce to calculate Rewards. Rewards will be calculated on a schedule basis and update back into Salesforce. The integration between Salesforce and the Reward Calculation System needs to be secure. Which are two recommended practices for using OAuth flow in this scenario. choose 2 answers

  • A. OAuth Refresh Token FLow
  • B. OAuth Username-Password Flow
  • C. OAuth SAML Bearer Assertion FLow
  • D. OAuth JWT Bearer Token FLow

Answer: CD

NEW QUESTION 13
Universal containers (UC) has decided to use identity connect as it's identity provider. UC uses active directory(AD) and has a team that is very familiar and comfortable with managing ad groups. UC would like to use AD groups to help configure salesforce users. Which three actions can AD groups control through identity connect? Choose 3 answers

  • A. Public Group Assignment
  • B. Granting report folder access
  • C. Role Assignment
  • D. Custom permission assignment
  • E. Permission sets assignment

Answer: ACE

NEW QUESTION 14
Universal Containers (UC) has a Desktop application to collect leads for marketing campaigns. UC wants to extend this application to integrate with Salesforce to create leads. Integration between the desktop application and salesforce should be seamless. What Authorization flow should the Architect recommend?

  • A. JWT Bearer Token flow
  • B. Web Server Authentication Flow
  • C. User Agent Flow
  • D. Username and Password Flow

Answer: C

NEW QUESTION 15
The CIO of universal containers(UC) wants to start taking advantage of the refresh token capability for the UC applications that utilize Oauth 2.0. UC has listed an architect to analyze all of the applications that use Oauth flows to. See where refresh Tokens can be applied. Which two OAuth flows should the architect consider in their evaluation? Choose 2 answers

  • A. Web server
  • B. Jwt bearer token
  • C. User-Agent
  • D. Username-password

Answer: AC

NEW QUESTION 16
Northern Trail Outfitters (NTO) uses Salesforce Experience Cloud sites (previously known as Customer Community) to provide a digital portal where customers can login using their Google account.
NTO would like to automatically create a case record for first time users logging into Salesforce Experience Cloud.
What should an Identity architect do to fulfill the requirement?

  • A. Configure an authentication provider for Social Login using Google and a custom registration handler.
  • B. Implement a Just-in-Time handler class that has logic to create cases upon first login.
  • C. Create an authentication provider for Social Login using Google and leverage standard registration handler.
  • D. Implement a login flow with a record create component for Case.

Answer: D

NEW QUESTION 17
After a recent audit, universal containers was advised to implement Two-factor Authentication for all of their critical systems, including salesforce. Which two actions should UC consider to meet this requirement? Choose 2 answers

  • A. Require users to provide their RSA token along with their credentials.
  • B. Require users to supply their email and phone number, which gets validated.
  • C. Require users to enter a second password after the first Authentication
  • D. Require users to use a biometric reader as well as their password

Answer: AD

NEW QUESTION 18
Universal Containers (UC) has built a custom token-based Two-factor authentication (2FA) system for their existing on-premise applications. They are now implementing Salesforce and would like to enable a
Two-factor login process for it, as well. What is the recommended solution as Architect should consider?

  • A. Use the custom 2FA system for on-premise applications and native 2FA for Salesforce.
  • B. Replace the custom 2FA system with an AppExchange App that supports on premise application and salesforce.
  • C. Use Custom Login Flows to connect to the existing custom 2FA system for use in Salesforce.
  • D. Replace the custom 2FA system with Salesforce 2FA for on-premise applications and Salesforce.

Answer: D

NEW QUESTION 19
Northern Trail Outfitters is implementing a busmess-to-business (B2B) collaboration site using Salesforce Experience Cloud. The partners will authenticate with an existing identity provider and the solution will utilize Security Assertion Markup Language (SAML) to provide single sign-on to Salesforce. Delegated administration will be used in the Expenence Cloud site to allow the partners to administer their users' access.
How should a partner identity be provisioned in Salesforce for this solution?

  • A. Create only a contact.
  • B. Create a contactless user.
  • C. Create a user and a related contact.
  • D. Create a person account.

Answer: C

NEW QUESTION 20
......

P.S. Surepassexam now are offering 100% pass ensure Identity-and-Access-Management-Designer dumps! All Identity-and-Access-Management-Designer exam questions have been updated with correct answers: https://www.surepassexam.com/Identity-and-Access-Management-Designer-exam-dumps.html (196 New Questions)


START Identity-and-Access-Management-Designer EXAM