
Indentity & Access Managment Set 1
Authored by Joaquín Carmona
Other
1st Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Northern Trail Outfitters (NTO) has an existing business-to-consumer (B2C) website that that does NOT support single sign-on standards, such as Security Assertion Markup Language (SAML) or OAuth. NTO wants to use Salesforce Identity to register and authenticate new customers on the website. Which three Salesforce features should an Identity architect use in order to provide social sign-in capabilities for the website? Choose 3 answers
Delegated Authentication
Connected Apps
Authentication Providers
Embedded Login
Identity Connect
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token. Which authentication mechanism should an identity architect recommend to meet the requirements?
Web Server Flow
OpenID Connect
User Agent Flow
JWT Bearer Token Flow
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months. Which two connected app options need to be configured to fulfill this use case? Choose 2 answers
Set Permitted Users to “Admin approved users are pre-authorized”
Set the Refresh Token Policy to expire refresh token after 3 months
Set the Session Timeout value to 3 months
Set Permitted Users to “All users may self-authorize”
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company’s external application is protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way. What should be done to improve security?
Create custom scopes and assign to the connected app.
Define a permission set that grants access to the app and assign to authorized users.
Select “Admin approved users are pre-authorized” and assign specific profiles.
Leverage external objects and data classification policies.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use OKta to authorize a Forecasting web application to access Salesforce records on their behalf. Which two roles are being performed by Salesforce? Choose 2 answers
OAuth Resource Server
OAuth Client
SAML Service Provider
SAML Identity Provider
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to be able to authenticate to Salesforce and then make API calls against the REST API. One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce minimizes the need for end user interaction and maximizes security. Which OAuth flow should be used to fulfill the requirement?
JWT Bearer Flow
Username-Password Flow
Web Server Flow
User Agent Flow
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for identity verification. Which feature should an identity architect recommend to meet the requirements?
Use an external Identity Provider
Create a custom Lightning Web Component
Integrate with social websites (Facebook, LinkedIn, Twitter)
Use Login Discovery
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
30 questions
National 5 Business Management
Quiz
•
KG - 11th Grade
27 questions
Quo vadis
Quiz
•
1st - 3rd Grade
25 questions
BAHASA MADURA KELAS 7 SEM GANJIL 20/21
Quiz
•
1st Grade
25 questions
Identifying kitchen tools and equipment
Quiz
•
KG - Professional Dev...
25 questions
1st Quarterly Exam in Computer
Quiz
•
1st Grade
31 questions
SJFC Euro 2020 Quiz
Quiz
•
KG - Professional Dev...
25 questions
FBS
Quiz
•
1st Grade
25 questions
Political Parties, Interest Groups, and the Media
Quiz
•
KG - University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Other
20 questions
Telling Time to the Hour and Half hour
Quiz
•
1st Grade
7 questions
Understanding Parallel, Intersecting, and Perpendicular Lines
Interactive video
•
1st - 6th Grade
16 questions
Counting Coins counting money
Quiz
•
1st - 2nd Grade
20 questions
Place Value
Quiz
•
KG - 3rd Grade
10 questions
Counting Coins
Quiz
•
1st Grade
10 questions
Telling time to the hour and half hour
Quiz
•
1st - 2nd Grade
15 questions
Grammar
Quiz
•
KG - 7th Grade
10 questions
First Grade Balancing Equations
Quiz
•
1st - 2nd Grade