Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

Identity-and-Access-Management-Architect Exam Dumps - Salesforce Identity-and-Access-Management-Architect Questions and Answers

Question # 14

A farming enterprise offers smart farming technology to its farmer customers, which includes a variety of sensors for livestock tracking, pest monitoring, climate monitoring etc. They plan to store all thedata in Salesforce. They would also like to ensure timely maintenance of the Installed sensors. They have engaged a salesforce Architect to propose an appropriate way to generate sensor Information In Salesforce.

Which OAuth flow should the architect recommend?

Options:

A.

OAuth 2.0 Asset Token Flow

B.

OAuth 2.0 Device Authentication Row

C.

OAuth 2.0 JWT Bearer Token Flow

D.

OAuth 2.0 SAML Bearer Assertion Flow

Buy Now
Question # 15

Universal Containers (UC) wants to build a mobile application that twill be making calls to the Salesforce REST API. UC's Salesforce implementation relies heavily on custom objects and custom Apex code. UC does not want its users to have to enter credentials every time they use the app. Which two scope values should an Architect recommend to UC? Choose 2 answers.

Options:

A.

Custom_permissions

B.

Api

C.

Refresh_token

D.

Full

Buy Now
Question # 16

Northern Trail Outfitters want to allow its consumer to self-register on it business-to-consumer (B2C) portal that is built on Experience Cloud. The identity architect has recommended to use Person Accounts.

Which three steps need to be configured to enable self-registration using person accounts?

Choose 3 answers

Options:

A.

Enable access to person and business account record types under Public Access Settings.

B.

Contact Salesforce Support to enable business accounts.

C.

Under Login and Registration settings, ensure that the default account field isempty.

D.

Contact Salesforce Support to enable person accounts.

E.

Set organization-wide default sharing for Contact to Public Read Only.

Buy Now
Question # 17

A division of a Northern Trail Outfitters (NTO) purchased Salesforce. NTO uses a third party identity provider (IdP) to validate user credentials against Its corporate Lightweight Directory Access Protocol (LDAP) directory. NTO wants to help employees remember as passwords as possible.

What should an identity architect recommend?

Options:

A.

Setup Salesforce as a Service Provider to the existing IdP.

B.

SetupSalesforce as an IdP to authenticate against the LDAP directory.

C.

Use Salesforce connect to synchronize LDAP passwords to Salesforce.

D.

Setup Salesforce as an Authentication Provider to the existing IdP.

Buy Now
Question # 18

Which three are capabilities of SAML-based Federated authentication? Choose 3 answers

Options:

A.

Trust relationships between Identity Provider and Service Provider are required.

B.

SAML tokens can be in XML or JSON format and can be used interchangeably.

C.

Web applications with no passwords are more secure and stronger against attacks.

D.

Access tokens areused to access resources on the server once the user is authenticated.

E.

Centralized federation provides single point of access, control and auditing.

Buy Now
Question # 19

Universal containers (UC) is setting up Delegated Authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risk of exposing the corporate login service on the Internet and has asked that a reliable trust mechanism be put in place between the loginservice and salesforce. What mechanism should an architect put in place to enable a trusted connection between the login services and salesforce?

Options:

A.

Include client ID and client secret in the login header callout.

B.

Set up a proxy server for the login service in the DMZ.

C.

Require the use of Salesforce security Tokens on password.

D.

Enforce mutual Authentication between systems using SSL.

Buy Now
Question # 20

Northern Trail Outfitters recently acquired a company. Each company will retain its Identity Provider (IdP). Both companies rely extensively on Salesforce processes that send emails to users to take specific actions in Salesforce.

How should the combined companys' employees collaborate in a single Salesforce org, yet authenticate to the appropriate IdP?

Options:

A.

Configure unique MyDomains for each company and have generated links use the appropriate MyDomam in the URL.

B.

Have generated links append a querystnng parameter indicating the IdP. The login service will redirect to the appropriate IdP.

C.

Have generated links be prefixed with the appropriate IdP URL to invoke an IdP-initiated Security Assertion Markup Language flow when clicked.

D.

Enable each IdP as a login option in the MyDomain Authentication Service settings. Users will then click onthe appropriate IdP button.

Buy Now
Question # 21

IT security at Unversal Containers (UC) us concerned about recent phishing scams targeting its users and wants to add additional layers of login protection. What should an Architect recommend to address the issue?

Options:

A.

Use the Salesforce Authenticator mobile app with two-step verification

B.

Lock sessions to the IP address from which they originated.

C.

Increase Password complexity requirements in Salesforce.

D.

Implement Single Sign-on using a corporateIdentity store.

Buy Now
Question # 22

Universal Containers is using OpenID Connect to enable a connection from their new mobile app to its production Salesforce org.

What should be done to enable the retrieval of the access token status for the OpenID Connect connection?

Options:

A.

Query using OpenIDConnect discovery endpoint.

B.

A Leverage OpenID Connect Token Introspection.

C.

Create a custom OAuth scope.

D.

Enable cross-origin resource sharing (CORS) for the /services/oauth2/token endpoint.

Buy Now
Question # 23

Universal Containers (UC) is looking to purchase a third-party applicationas an Identity Provider. UC is looking to develop a business case for the purchase in general and has enlisted an Architect for advice. Which two capabilities of an Identity Provider should the Architect detail to help strengthen the business case? Choose2 answers

Options:

A.

The Identity Provider can authenticate multiple applications.

B.

The Identity Provider can authenticate multiple social media accounts.

C.

The Identity provider can store credentials for multiple applications.

D.

The Identity Provider can centralize enterprise password policy.

Buy Now
Exam Name: Salesforce Certified Identity andAccess Management Architect (SP25)
Last Update: Jul 2, 2025
Questions: 243
Identity-and-Access-Management-Architect pdf

Identity-and-Access-Management-Architect PDF

$34  $84.99
Identity-and-Access-Management-Architect Engine

Identity-and-Access-Management-Architect Testing Engine

$38  $94.99
Identity-and-Access-Management-Architect PDF + Engine

Identity-and-Access-Management-Architect PDF + Testing Engine

$54  $134.99