Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which technology do SalesforceREST APIs use for authentication?

A.

Basic usernames and passwords

B.

OAuth

C.

SAML

D.

Pre-shared keys

Universal Containers has a Heroku app that uses several third-party add-ons. They now need to enforce data privacy and be compliant with General Data Protection Regulation (GDPR).

What should an Architect advise UC regarding data residency inthis scenario?

A.

Heroku does not control where add-on providers store data.

B.

Heroku support can configure add-ons for specific data residency needs.

C.

Heroku guarantees the physical location of its control surface APIs.

D.

Data residency for add-ons is covered under Salesforce's GDPR compliance.

Universal Containers wants their Field Technicians to indicate if any of their Service Appointments are at risk of not being completed on time. They would like forthis to be achieved on a mobile device using a Quick Action

What should a Consultant recommend to achieve this requirement?

A.

Update the Service Appointment Status field.

B.

Update the Service Appointment Chatter feed.

C.

Reschedule the Service Appointment for later

D.

Update the Service Appointment field "In Jeopardy"

A client wants to perform complex processing on large data sets in Salesforce. The data is confidential, but it does not have advanced compliance requirements.

What Heroku Enterprise features should an Architect recommend in this scenario?

A.

Shield Private Spaces and Heroku External Objects

B.

Private Spaces and Heroku Connect

C.

Private Spaces and Heroku External Objects

D.

Shield Private Spaces and Heroku Shield Connect

The primary benefit of a workflow outbound message over an Apex trigger is:

A.

The message supports different authentication mechanisms

B.

The message can deliver the payload only as SOAP

C.

Messages are completely declarative.

D.

The message can handle every database event.

When designing a Heroku application, which two approaches observe the Twelve-Factor methodology? Choose 2 answers.

A.

On deployment, Heroku fetches and installs any dependencies that are missing according to the application's list of dependencies

B.

On startup, the application's source code fetches and installs any dependencies that are missing according to the application's list of dependencies.

C.

The application's database configuration is stored in the application's Profile

D.

The application's database configuration is stored in the application's config vars.

Universal Containers wants to help their dispatches determine the length of time a Work Order should last. What should the Consultant implement to help achieve this goal?

A.

Operating Hours for Customer Accounts.

B.

Work Types with an Estimated Duration.

C.

Work Orders with Operating Hours

D.

Work Types with Service Level Agreement.

Q. 30 A client has a Heroku Redis instance that can be accessed over the public internet. To meet compliance requirements, the IT Security team requires thatall databases must be isolated from the public internet. Which solution should be suggested by an Architect?

A.

Enclose the existing Heroku Redis instance inside a Pnvate Space. Enable Private Space VPN.

B.

Use a Heroku Redis instance with a Private Tier plan. Enable Trusted IP ranges on the Redis instance.

C.

Use a Heroku Private Space and a Heroku Redis instance with a Private Tier plan. Redeploy the app into the Space

D.

Enclose the existing Heroku Redis instance inside a Shield Private Space. Configurethe firewall to allow Redis traffic through

Which two conventions of the Heroku platform reflect the Twelve-Factor methodology's recommendation to "execute the app as one or more stateless processes?" (Choose two.)

A.

Log messages from each of an app's dynos are kept separate from each other.

B.

Heroku apps define process types in a Procfile.

C.

A Heroku app's config vars are deleted on deploys and app restarts.

D.

Dynos have an ephemeral filesystem.

Universal Containers (UC) wants to allow itsdevelopers to only use certain add-ons. UC enables Add-on Controls for Enterprise Teams and adds the add-ons they wish to allow to the list. There is an existing set of add-ons attached to applications, which are NOT on the list.

What happens to these add-ons?

A.

They are deleted, and all data is backed up and saved.

B.

They are added to the allowed add-ons list.

C.

They are added to the exception list and not affected.

D.

They are flagged for removal, and the developers are notified.