DEMO QUESTIONS

Q1: Northern Trail Outfitters has had an increase in requests from other business units to integrate opportunity information with other systems from Salesforce. The developers have started writing asynchronous @future callouts directly into the target systems. The CIO is concerned about the viability of this approach scaling for future growth and has requested a solution recommendation. What should be done to mitigate the concerns that the CIO has?

A: Implement an ETL tool and perform nightly batch data loads to reduce network traffic using last modified dates on the opportunity object to extract the right records.

B: Develop a comprehensive catalog of Apex classes to eliminate the need for redundant code and use custom metadata to hold the endpoint information for each integration.

C: Refactor the existing future methods to use Enhanced External Services, import Open API 2.0 schemas and update flows to use services instead of Apex.

D: Implement an Enterprise Service Bus for service orchestration, mediation, routing and decouple dependencies across systems.

Correct Answer: C

Q2: A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce. Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure? Choose 2 answers

A: Encrypted Custom Fields

B: Named Credentials

C: Protected Custom Metadata Types

D: Protected Custom Settings

Correct Answer: A, B

Q3: A large consumer goods manufacturer operating in multiple countries is planning to implement Salesforce for their Sales and Support operations globally. They have the following security requirements: 1. Internal users from each country have to be authenticated with their local active directory. 2. Customers can create their own login or use Google login. 3. Partners have to be authenticated through a central system which is to be determined. 4. Internal users will have access to the central ERP with their credentials maintained in the ERP. 5. Additional internal systems will be integrated with Salesforce for Sales and Support business processes. Which three requirements should the integration architect evaluate while designing the integration needs of this project? Choose 3 answers

A: Evaluate Salesforce solution for customers and for partners, using third party solution for internal users.

B: Assess security requirements for internal systems and decide Integration methods that support the requirements.

C: Evaluate the build of a custom authentication mechanism for users in each country and support for customers and partners.

D: Consider Third party Single Sign On solution supporting all user authentication including customer and partner.

E: Evaluate Salesforce native authentication mechanism for all users including customers and partners.

Correct Answer: B, C, E

Q4: Universal Containers (UC) is currently managing a custom monolithic web service that runs on an on-premise server. This monolithic web service is responsible for Point-to-Point (P2P) integrations between: 1. Salesforce and a legacy billing application 2. Salesforce and a cloud-based Enterprise Resource Planning application 3. Salesforce and a data lake. UC has found that the tight interdependencies between systems is causing integrations to fail. What should an architect recommend to decouple the systems and improve performance of the integrations?

A: Re-write and optimize the current web service to be more efficient.

B: Leverage modular design by breaking up the web service into smaller pieces for a microservice architecture.

C: Use the Salesforce Bulk API when integrating back into Salesforce.

D: Move the custom monolithic web service from on-premise to a cloud provider.

Correct Answer: B

Q5: An Architect is required to integrate with an External Data Source via a Named Credential with an Apex callout due to technical constraints. How is authentication achieved?

A: Handle authentication with login flows.

B: Handle authentication in the code.

C: Connect via Salesforce Connect.

D: Connect via Communities.

Correct Answer: A
[acf_quiz]

Testimonials – Real Results From Real Students

Your success is our priority. We’re proud to share authentic reviews from students who trusted us, passed their exams, and reached their goals with confidence.
John Doe
John Doe
This site has been a game-changer for my certification journey. The materials are current, reliable, and best of all—free! It's clear they're committed to supporting the IT community.
Emma
Emma
I passed my CompTIA Security+ exam on the first try thanks to this site. Their practice exams and study guides are top-notch. Highly recommend it to anyone serious about IT certifications.
Liam
Liam
I’ve passed three certifications using this site. Their materials are detailed and well-structured, and the fact that it’s free makes it even better.
Isabella
Isabella
If you're studying for any IT certification, this should be your first stop. It’s comprehensive, organized, and constantly updated.
Benjamin
Benjamin
This website helped me prepare for multiple certifications, and today I’m working in cybersecurity. Without their free resources, I wouldn’t be here.

Frequently Asked Question (FAQ's)

Have questions? You’re not alone. We’ve answered the most frequently asked questions to help you feel confident and informed every step of the way.
What is Prep2Certs?

Prep2Certsis a premium service offering a comprehensive collection of exam questions and answers for over 1400 certification exams. It is regularly updated and designed to help users pass their certification exams confidently.

Please contact info@Prep2Certs.com and we will provide you with alternative payment options.

You can by Contacting our sales team.

Free updates are available for the duration of your subscription, after the subscription is expired, your access will no longer be available.