Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What should an Architect recommend to ensure all integrations to the Northern Trail Outfitters company portal useSSL mutual authentication?

A.

Enable My Domain and SSL/TLS.

B.

Enforce SSL/TLS MutualAuthentication.

C.

Generate a Self-signed Certificate.

D.

Generate a CA-signed Certificate.

Northern Trail Outfitters wants to use Salesforce as a front end for creating accounts using the lead-to-opportunity process.

1. An order is created in Salesforce when the opportunity is closed and won, but the back-end ERP system is the data master for order,

2. Customer wants to be able to see within Salesforce all the stages of order processing like Order Created, OrderShipped, Order Paid that are within the retention window.

Which two message durability considerations should an Integration Architect make when designing a solution to meet these business requirements?

Choose 2 answers

A.

When subscribing to Salesforce Event bus, ReplaylD is used with a value of -2 to be able to see old and new events.

B.

High-volume event messages are stored for 24 hours (one day).

C.

When subscribing to Salesforce Event bus, ReplaylD is used with a value of -1 to be able to see new events.

D.

High-volume event messages are stored for 72 hours (three days).

A Salesforce customer is planning to roll out Salesforce for all their Sales and Service staff.

Senior Management has requested that monitoring is to be in pla for Operations to notify any

degradation in Salesforce performance.

How should an integration consultant implement monitoring?

A.

Use Salesforce limits API to capture current API usage and configure alerts for monitoring.

B.

Use APIEVENT to track all user-initiated API calls through SOAP, REST or BULK APIs.

C.

Identify critical business processes and establish automation to monitor performance against established benchmarks.

D.

Request Salesforce to monitor the Salesforce instance and notify when there is degradation in performance.

Only authorized users are allowed access to the EBS and the Enterprise DMS.

Customers call Customer Support when they need clarification on their bills. Customer Support needs seamless access to customer billing information from theE and view generated bills from the DMS.

Which three authorization and authentication needs should an integration consultant consider while integrating the DMS and ESB with Salesforce?

should an integration consultant consider while integrating the DMS andESB with Salesforce?

Choose 3 answers

A.

Users should be authorized to view information specific to the customer they are servicing without a need to search for customer.

B.

Identify options to maintain DMS and EBS authentication and authorization detailsin Salesforce.

C.

Consider Enterprise security needs for access toDMS and EBS.

D.

Consider options to migrate DMS and EBS into Salesforce.

E.

Users should be authenticated into DMS and EBS without having to enter username and password.

Universal Containers is a global financial company that sells financialproducts and services including, bank accounts, loans, and insurance. UC uses Salesforce Service cloud to service their customer via calls, live chat. The support agents would open bank accounts on the spot for customers who are inquiring about UC bank accounts.

UC Core banking system is the system of record for bank accounts and all accounts opened in salesforce have to be synced in real-time to the core banking system. Support agents need to inform the customers with the newly created bank account ID which has to be generated from the core banking system.

Which integration pattern is recommended for this use case?

A.

Use streaming API to generate push topic.

B.

Use outbound message.

C.

Use salesforce platform event.

D.

Use request and reply.

A customer's enterprise architect has identified requirements around caching, queuing, error handling, alerts, retries, event handling, etc. The company has asked the Salesforce integration architect to help fulfill such aspects with their Salesforce program.

Which three recommendations should the Salesforce integration architect make?

Choose 3 answers

A.

Transform a fire-and-forget mechanism to request-reply should be handled by middleware tools (like ETL/ESB) to improve performance.

B.

Provide true message queueing for integration scenarios (including orchestration, process choreography, quality of service, etc.) given that a middleware solution is required.

C.

Message transformation and protocol translation should be done within Salesforce.Recommend leveraging Salesforce native protocol conversion capabilities as middleware tools are NOT suited for such tasks

D.

Event handling processes such as writing to a log, sending an error or recovery process, or sending an extra message, can be assumed to be handled by middleware.

E.

Event handling in a publish/subscribe scenario, the middleware can be used to route requests or messages to active data-event subscribers from active data-event publishers.

The sales Operations team at Northern Trail Outfitters imports new leads each day. An integrated legacy territory management system assigns territories toleads before Sales team members can work on them. The current integration often experiences latency issues.

Which two recommendations should an Architect make to improve the integration performance?

Choose 2 answers

A.

Reduce batch size of asynchronous BULK API.

B.

Reduce batch size of synchronous BULK API.

C.

Legacy system should submit in serial mode.

D.

Legacy system should submit in parallel mode.

Universal Containers (UC) currentlyowns a middleware tool and they have developed an API-led integration architecture with three API tiers. The first-tier interfaces directly with the systems of engagement, the second tier implements business logic and aggregates data, while the third-tierinterfaces directly with systems of record. Some of the systems of engagement will be a mobile application, a web application, and Salesforce.

UC has a business requirement to return data to the systems of engagement in different formats while also enforcing different security protocols.

What should an Integration Architect recommend to meet these requirements?

A.

Enforce separate security protocols and return formats at the first tier of the API-led

architecture.

B.

Implement an API gateway that allsystems of engagement must interface with first.

C.

Enforce separate security protocols and return formats at the second tier of the API-led architecture.

D.

Leverage an Identity Provider solution that communicates with the API tiers via SAML

A new Salesforce program has the following high-level abstract requirement: Business processes executed on Salesforce require data updates between their Internal systems and Salesforce.

Which relevant detail should an integration architect seek to specifically solve for integration architecture needs of the program?

A.

Core functional and non-functionalrequirements for User Experience design, Encryption needs, Community and license choices

B.

Integration skills, SME availability, and Program Governance details

C.

Timing aspects, real-time/near real-time (synchronous or asynchronous), batch and update frequency

Northern Trail Outfittersis creating a distributable Salesforce package for other Salesforce orgs within the company. The package needs to call into a custor ApexREST endpoint in the central org. The security team wants to ensure a specific integration account is used in the central org that they will authorize after installation of the package.

Which three items should an architect recommend to secure the integration in the package?

Choose 3 answers

A.

Create an Auth provider in the package and set the consumer key and consumer secret of the

connected app in the central org.

B.

Contact Salesforce support and create a case to temporarily enable API access for managed

packages.

C.

Create a connected app in the central org and add the callback URL of each org the package is

installedin to redirect to after successful authentication.

D.

Use an encrypted field to store the password that the security team enters and use password

management for external orgs and set the encryption method to TLS 1.2.

E.

Use the Auth Provider configured and select the identity type as Named Principal with OAuth 2.0 as the protocol and Select Start Authentication Flow on Save.