Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Northern Trail Outfitters (NTO) recently purchased Salesforce Identity Connect to streamline user provisioning across Microsoft Active Directory (AD) and Salesforce Sales Cloud.

NTO has asked an identity architect to identify which salesforce security configurations can map to AD permissions.

Which three Salesforce permissions are available to map to AD permissions?

Choose 3 answers

A.

Public Groups

B.

Field-Level Security

C.

Roles

D.

Sharing Rules

E.

Profiles and Permission Sets

An identity architect's client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of ITis worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Ensure that on the SSO settings page, the "Request Signing Certificate" field has a self-signed certificate.

C.

Ensure that the Issuer and Assertion Consumer service (ACS) URL is propertyconfigured between SP and IDP.

D.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

The security team at Universal containers(UC) has identified exporting reports as a high-risk action and would like to require users to be logged into salesforce with their active directory (AD) credentialswhen doing so. For all other uses of Salesforce, Users should be allowed to use AD credentials or salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with salesforce credentials?

A.

Use SAML Federated Authentication and Custom SAML jit provisioning to dynamically add or remove a permission set that grants the Export Reports permission.

B.

Use SAML Federated Authentication, treat SAML sessions as high assurance, and raise the session level required for exporting reports.

C.

Use SAML Federated Authentication and block access to reports when accesses through a standard assurance session.

D.

Use SAML Federated Authentication with a login flow to dynamically add or remove a permission set that grants the export reports permission.

Universal Containers (UC) has implemented SAML-based Single Sign-On to provide seamless access to its Salesforce Orgs, financial system, and CPQ system. Below is the SSO implementationlandscape.

What role combination is represented by the systems in this scenario''

A.

Financial System and CPQ System are the only Service Providers.

B.

Salesforce Org1 and Salesforce Org2 are the only Service Providers.

C.

Salesforce Org1 and Salesforce Org2 are acting as Identity Providers.

D.

Salesforce Org1 and PingFederate are acting as Identity Providers.

Universal Containers (UC) is building an authenticated Customer Community for its customers. UC does not want customer credentialsstored in Salesforce and is confident its customers would be willing to use their social media credentials to authenticate to the community. Which two actions should an Architect recommend UC to take?

A.

Use Delegated Authentication to call the Twitter login API to authenticate users.

B.

Configure an Authentication Provider for LinkedIn Social Media Accounts.

C.

Create a Custom Apex Registration Handler to handle new and existing users.

D.

Configure SSO Settings For Facebook to serve as a SAML Identity Provider.

Universal Containers (UC) has a custom, internal-only, mobile billing application for users who are commonly out of the office. The app is configured asa connected App in Salesforce. Due to the nature of this app, UC would like to take the appropriate measures to properly secure access to the app. Which two are recommendations to make the UC? Choose 2 answers

A.

Disallow the use of Single Sign-on for anyusers of the mobile app.

B.

Require High Assurance sessions in order to use the Connected App.

C.

Set Login IP Ranges to the internal network for all of the app users Profiles.

D.

Use Google Authenticator as an additional part of the login process

Universal Containers (UC) is considering a Customer 360 initiative to gain a single source of the truth for its customer data across disparate systems and services. UC wants to understand the primary benefits of Customer 360 Identity and how it contributes ato successful Customer 360 Truth project.

What are two are key benefits of Customer 360 Identity as it relates to Customer 360?

Choose 2answers

A.

Customer 360 Identity automatically integrates with Customer 360 Data Manager and Customer 360 Audiences to seamlessly populate all user data.

B.

Customer 360 Identity enables an organization to build a single login for each ofits customers, giving the organization an understanding of the user's login activity across all its digital properties and applications.

C.

Customer 360 Identity supports multiple brands so you can deliver centralized identity services and correlation ofuser activity,even if it spans multiple corporate brands and user experiences.

D.

Customer 360 Identity not only provides a unified sign up and sign in experience, but also tracks anonymous user activity prior to signing up so organizations can understanduser activity before and after the users identify themselves.

The security team at Universal Containers (UC) has identified exporting reports as a high-riskaction and would like to require users to be logged into Salesforce with their Active Directory (AD) credentials when doing so. For all other users of Salesforce, users should be allowed to use AD Credentials or Salesforce credentials. What solution should be recommended to prevent exporting reports except when logged in using AD credentials while maintaining the ability to view reports when logged in with Salesforce credentials?

A.

Use SAML Federated Authentication and block access to reports when accessed through a Standard Assurance session.

B.

Use SAML Federated Authentication and Custom SAML JIT Provisioning to dynamically and or remove a permission set that grants the Export Reports Permission.

C.

Use SAML federated Authentication, treat SAML Sessionsas High Assurance, and raise the session level required for exporting reports.

D.

Use SAML federated Authentication with a Login Flow to dynamically add or remove a Permission Set that grants the Export Reports Permission.

Northern Trail Outfitters (NTO) wants to improve its engagement with existing customers to boost customer loyalty. To get a better understanding of its customers, NTO establishes a single customer view including their buying behaviors, channel preferences and purchasing history. All of this information exists but is spread across different systems and formats.

NTO has decided to use Salesforce as the platform to build a 360 degree view. The company already uses Microsoft Active Directory (AD) to manage its users and company assets.

What should an Identity Architect do to provision, deprovision and authenticate users?

A.

Salesforce Identity is not needed since NTO uses Microsoft AD.

B.

Salesforce Identity can be included but NTO will be required to build a custom integration with Microsoft AD.

C.

Salesforce Identity is included in the Salesforce licenses so it does not need to be considered separately.

D.

A Salesforce Identity can be included but NTO will require Identity Connect.

A pharmaceutical company has an on-premise application (see illustration) that it wants to integrate with Salesforce.

The IT director wants to ensure that requests must include a certificate with a trusted certificate chain to access the company's on-premise application endpoint.

What should an Identity architect do to meet this requirement?

A.

Use open SSL to generate a Self-signed Certificate and upload it to the on-premise app.

B.

Configure the company firewall to allow traffic from Salesforce IP ranges.

C.

Generate a certificate authority-signed certificate in Salesforce and uploading it to the on-premise application Truststore.

D.

Upload a third-party certificate from Salesforce into the on-premise server.