Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Salesforce Identity and Access Management Designer Identity-and-Access-Management-Architect New Questions

Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203) Questions and Answers

Question 17

Northern Trail Outfitters (NTO) believes a specific user account may have been compromised. NTO inactivated the user account and needs to perform a forensic analysis and identify signals that could indicate a breach has occurred.

What should NTO’s first step be in gathering signals that could indicate account compromise?

Options:

A.

download the identity provider Event log and contact the details of activities performed by the user.

B.

download the Login history and evaluate the details of topics performed by the user.

C.

download the Setup Audit Trail and review all recent activities performed by the user.

D.

Review the User record and evaluate the login and transaction history.

Question 18

Universal Containers (UC) is planning to add Wi-Fi enabled GPS tracking devices to its shipping containers so that the GPS coordinates data can be sent from the tracking device to its Salesforce production org via a custom API. The GPS devices have no direct user input or output capabilities.

Which OAuth flow should the identity architect recommend to meet the requirement?

Options:

A.

OAuth 2.0 Asset Token Flow for Securing Connected Devices

B.

OAuth 2.0 Web Server Flow for Web App Integration

C.

OAuth 2.0 JWT Bearer Flow for Server-to-Server Integration

D.

OAuth 2.0 Username-Password Flow for Special Scenarios

Question 19

An identity professional working on a project to integrate a third-party application with Salesforce, is tasked with evaluating OAuth options. The project requires fine-grained access

control and the ability to obtain long-lived access tokens.

Which OAuth flow would best full fill the project requirements?

Options:

A.

Client Credentials flow

B.

Authorization Code flow

C.

Implicit flow

D.

Username-password grant

Question 20

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:

A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.

B.

Embedding the identity provider’s authentication code directly into Salesforce source code.

C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.

D.

Creating a custom login page within the Salesforce platform for user authentication.