Cyber Monday Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

Identity-and-Access-Management-Architect Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) is now Stable and With Pass Result | Test Your Knowledge for Free

Identity-and-Access-Management-Architect Practice Questions

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)

Last Update 14 hours ago
Total Questions : 243

Dive into our fully updated and stable Identity-and-Access-Management-Architect practice test platform, featuring all the latest Identity and Access Management Designer exam questions added this week. Our preparation tool is more than just a Salesforce study aid; it's a strategic advantage.

Our Identity and Access Management Designer practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about Identity-and-Access-Management-Architect. Use this test to pinpoint which areas you need to focus your study on.

Identity-and-Access-Management-Architect PDF

Identity-and-Access-Management-Architect PDF (Printable)
$43.75
$124.99

Identity-and-Access-Management-Architect Testing Engine

Identity-and-Access-Management-Architect PDF (Printable)
$50.75
$144.99

Identity-and-Access-Management-Architect PDF + Testing Engine

Identity-and-Access-Management-Architect PDF (Printable)
$63.7
$181.99
Question # 1

A service provider (SP) supportsboth Security Assertion Markup Language (SAML) and OpenID Connect (OIDC).

When integrating this SP with Salesforce, which use case is the determining factor when choosing OIDC or SAML?

Options:

A.  

OIDC is more secure than SAML and therefore is the obvious choice.

B.  

B.  

The SP needs to perform API calls back to Salesforce on behalf of the user after the user logs in to the service provider.

C.  

If the user has a session on Salesforce, you do not want them to be prompted for a username and password when they login to theSP.

D.  

They are equivalent protocols and there is no real reason to choose one over the other.

Discussion 0
Question # 2

Universal Containers (UC) is building a custom employee hut) application on Amazon Web Services (AWS) and would like to store their users' credentials there. Users will also need access to Salesforce for internal operations. UC has tasked an identity architect with evaluating Afferent solutions for authentication and authorization between AWS and Salesforce.

How should an identity architect configure AWS to authenticate and authorize Salesforce users?

Options:

A.  

Configure the custom employee app as a connected app.

B.  

Configure AWS as an OpenID Connect Provider.

C.  

Create a custom external authentication provider.

D.  

Develop a customAuth server in AWS.

Discussion 0
Question # 3

Universal Containers has multiple Salesforce instances where users receive emails from different instances. Users should be logged into the correct Salesforce instance authenticated by their IdP when clicking on an email link to a Salesforce record.

What should be enabled in Salesforce as a prerequisite?

Options:

A.  

My Domain

B.  

External Identity

C.  

Identity Provider

D.  

Multi-Factor Authentication

Discussion 0
Question # 4

A client is planning to rollout multi-factor authentication (MFA) to its internal employees and wants tounderstand which authentication and verification methods meet the Salesforce criteria for secure authentication.

Which three functions meet the Salesforce criteria for secure mfa?

Choose 3 answers

Options:

A.  

username and password + SMS passcode

B.  

Username and password + secunty key

C.  

Third-party single sign-on with Mobile Authenticator app

D.  

Certificate-based Authentication

E.  

Lightning Login

Discussion 0
Question # 5

Universal Containers would like its customers to register and log in to a portal built on Salesforce Experience Cloud. Customers should be able to use their Facebook or Linkedln credentials for ease of use.

Which three steps should an identity architect take to implement social sign-on?

Choose 3 answers

Options:

A.  

Register both Facebook and Linkedln as connected apps.

B.  

Create authentication providers for both Facebook and Linkedln.

C.  

Check "Facebook" and "Linkedln" under Login Page Setup.

D.  

Enable "Federated Single Sign-On Using SAML".

E.  

Update the default registration handlers to create and update users.

Discussion 0
Question # 6

Universal Containers (UC) is planning to add Wi-Fi enabled GPS tracking devices to its shipping containers so that the GPS coordinates data can be sent from the tracking device to its Salesforce production org via a custom API. The GPS devices have no direct user input or output capabilities.

Which OAuth flow should the identity architect recommend to meet the requirement?

Options:

A.  

OAuth 2.0 Asset Token Flow for Securing Connected Devices

B.  

OAuth 2.0 Username-Password Flow for Special Scenarios

C.  

OAuth 2.0 WebServer Flow for Web App Integration

D.  

OAuth 2.0 JWT Bearer Flow for Server-to-Server Integration

Discussion 0
Question # 7

Universal Containers is implementing a new Experience Cloud site and the identity architect wants to use dynamic branding features as of the login process.

Which two options should the identity architect recommend to support dynamic branding for the site?

Choose 2 answers

Options:

A.  

To use dynamic branding, the community must be built with the Visuaiforce + Salesforce Tabs template.

B.  

To use dynamic branding, the community must be built with the Customer Account Portal template.

C.  

An experience ID (expid) or placeholder parametermust be used in the URL to represent the brand.

D.  

An external content management system (CMS) must be used for dynamic branding on Experience Cloud sites.

Discussion 0
Question # 8

Northern Trail Outfitters would like to automatically create new employee users in Salesforce with an appropriate profile that maps to its Active Directory Department.

Howshould an identity architect implement this requirement?

Options:

A.  

Use the createUser method in the Just-in-Time (JIT) provisioning registration handler to assign the appropriate profile.

B.  

Use the updateUser method in the Just-in-Time (JIT) provisioning registration handler to assign the appropriate profile.

C.  

Use a login flow to collect Security Assertion Markup Language attributes and assign the appropriate profile during Just-In-Time(JIT) provisioning.

D.  

Make a callout during the login flow to query department from Active Directory to assign the appropriate profile.

Discussion 0
Question # 9

A company with 15,000 employees is using Salesforce and would like to take the necessary steps to highlight or curb fraudulent activity.

Which tool should be used to track login data, such as the average number of logins, who logged in more than the average number of times and who logged in during non-business hours?

Options:

A.  

Login Forensics

B.  

Login Report

C.  

Login Inspector

D.  

Login History

Discussion 0
Question # 10

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?

Options:

A.  

Use the Salesforce Authenticator mobile app with two-step verification

B.  

Lock sessions to the IP address from which they originated.

C.  

Increase Password complexity requirements in Salesforce.

D.  

Implement Single Sign-on using a corporateIdentity store.

Discussion 0
Get Identity-and-Access-Management-Architect dumps and pass your exam in 24 hours!

Free Exams Sample Questions