Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Application Architect Data-Architect Dumps PDF

Salesforce Certified Data Architect (SP25) Questions and Answers

Question 73

To avoid creating duplicate Contacts, a customer frequently uses Data Loader to upsert Contact records into Salesforce. What common error should the data architect be aware of when using upsert?

Options:

A.

Errors with duplicate external Id values within the same CSV file.

B.

Errors with records being updated and inserted in the same CSV file.

C.

Errors when a duplicate Contact name is found cause upsert to fail.

D.

Errors with using the wrong external Id will cause the load to fail.

Question 74

An architect is planning on having different batches to load one million Opportunities into Salesforce using the Bulk API in parallel mode. What should be considered when loading the Opportunity records?

Options:

A.

Create indexes on Opportunity object text fields.

B.

Group batches by the AccountId field.

C.

Sort batches by Name field values.

D.

Order batches by Auto -number field.

Question 75

Northern Trail Outfitters needs to implement an archive solution for Salesforce data. This archive solution needs to help NTO do the following:

1. Remove outdated Information not required on a day-to-day basis.

2. Improve Salesforce performance.

Which solution should be used to meet these requirements?

Options:

A.

Identify a location to store archived data and use scheduled batch jobs to migrate and purge the aged data on a nightly basis,

B.

Identify a location to store archived data, and move data to the location using a time-based workflow.

C.

Use a formula field that shows true when a record reaches a defined age and use that field to run a report and export a report into SharePoint.

D.

Create a full copy sandbox, and use it as a source for retaining archived data.

Question 76

Northern Trail Outfitters is concerned because some of its data is sensitive and needs to be identified for access.

What should be used to provide ways to filter and identify the sensitive data?

Options:

A.

Define data grouping metadata.

B.

Implement field-level security.

C.

Custom checkbox denoting sensitive data.

D.

Define data classification metadata.