Indentity & Access Managment Set 1

Indentity & Access Managment Set 1

1st Grade

30 Qs

quiz-placeholder

Similar activities

Lore quiz: Mondstadt

Lore quiz: Mondstadt

1st Grade

30 Qs

Mixed Subjects I Cycle 2 Classical Conversations

Mixed Subjects I Cycle 2 Classical Conversations

KG - 6th Grade

30 Qs

EASE

EASE

1st - 5th Grade

25 Qs

International Security

International Security

1st - 2nd Grade

30 Qs

March Quiz

March Quiz

KG - 5th Grade

25 Qs

Theorist of child development

Theorist of child development

1st - 3rd Grade

25 Qs

KSawI

KSawI

1st - 3rd Grade

25 Qs

Let's See Your PowerPoint Knowledge

Let's See Your PowerPoint Knowledge

1st - 6th Grade

25 Qs

Indentity & Access Managment Set 1

Indentity & Access Managment Set 1

Assessment

Quiz

Other

1st Grade

Easy

Created by

Joaquín Carmona

Used 7+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Northern Trail Outfitters (NTO) has an existing business-to-consumer (B2C) website that that does NOT support single sign-on standards, such as Security Assertion Markup Language (SAML) or OAuth. NTO wants to use Salesforce Identity to register and authenticate new customers on the website. Which three Salesforce features should an Identity architect use in order to provide social sign-in capabilities for the website? Choose 3 answers

Delegated Authentication

Connected Apps

Authentication Providers

Embedded Login

Identity Connect

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token. Which authentication mechanism should an identity architect recommend to meet the requirements?

Web Server Flow

OpenID Connect

User Agent Flow

JWT Bearer Token Flow

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months. Which two connected app options need to be configured to fulfill this use case? Choose 2 answers

Set Permitted Users to “Admin approved users are pre-authorized”

Set the Refresh Token Policy to expire refresh token after 3 months

Set the Session Timeout value to 3 months

Set Permitted Users to “All users may self-authorize”

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company’s external application is protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way. What should be done to improve security?

Create custom scopes and assign to the connected app.

Define a permission set that grants access to the app and assign to authorized users.

Select “Admin approved users are pre-authorized” and assign specific profiles.

Leverage external objects and data classification policies.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use OKta to authorize a Forecasting web application to access Salesforce records on their behalf. Which two roles are being performed by Salesforce? Choose 2 answers

OAuth Resource Server

OAuth Client

SAML Service Provider

SAML Identity Provider

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to be able to authenticate to Salesforce and then make API calls against the REST API. One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce minimizes the need for end user interaction and maximizes security. Which OAuth flow should be used to fulfill the requirement?

JWT Bearer Flow

Username-Password Flow

Web Server Flow

User Agent Flow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for identity verification. Which feature should an identity architect recommend to meet the requirements?

Use an external Identity Provider

Create a custom Lightning Web Component

Integrate with social websites (Facebook, LinkedIn, Twitter)

Use Login Discovery

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?