
Indentity & Access Managment Set 1
Authored by Joaquín Carmona
Other
1st Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Northern Trail Outfitters (NTO) has an existing business-to-consumer (B2C) website that that does NOT support single sign-on standards, such as Security Assertion Markup Language (SAML) or OAuth. NTO wants to use Salesforce Identity to register and authenticate new customers on the website. Which three Salesforce features should an Identity architect use in order to provide social sign-in capabilities for the website? Choose 3 answers
Delegated Authentication
Connected Apps
Authentication Providers
Embedded Login
Identity Connect
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technology enterprise is setting up an identity solution with an external vendors wellness application for its employees. The user attributes need to be returned to the wellness application in an ID token. Which authentication mechanism should an identity architect recommend to meet the requirements?
Web Server Flow
OpenID Connect
User Agent Flow
JWT Bearer Token Flow
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the OAuth 2.0 user-agent flow. Application users will authenticate using username and password. They should not be forced to approve API access in the mobile app or reauthenticate for 3 months. Which two connected app options need to be configured to fulfill this use case? Choose 2 answers
Set Permitted Users to “Admin approved users are pre-authorized”
Set the Refresh Token Policy to expire refresh token after 3 months
Set the Session Timeout value to 3 months
Set Permitted Users to “All users may self-authorize”
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company’s external application is protected by Salesforce through OAuth. The identity architect for the project needs to limit the level of access to the data of the protected resource in a flexible way. What should be done to improve security?
Create custom scopes and assign to the connected app.
Define a permission set that grants access to the app and assign to authorized users.
Select “Admin approved users are pre-authorized” and assign specific profiles.
Leverage external objects and data classification policies.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use OKta to authorize a Forecasting web application to access Salesforce records on their behalf. Which two roles are being performed by Salesforce? Choose 2 answers
OAuth Resource Server
OAuth Client
SAML Service Provider
SAML Identity Provider
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An identity architect is setting up an integration between Salesforce and a third-party system. The third-party system needs to be able to authenticate to Salesforce and then make API calls against the REST API. One of the requirements is that the solution needs to ensure the third party service providers connected app in Salesforce minimizes the need for end user interaction and maximizes security. Which OAuth flow should be used to fulfill the requirement?
JWT Bearer Flow
Username-Password Flow
Web Server Flow
User Agent Flow
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A public sector agency is setting up an identity solution for its citizens using a Community built on Experience Cloud and requires the new user registration functionality to capture first name, last name, and phone number. The phone number will be used for identity verification. Which feature should an identity architect recommend to meet the requirements?
Use an external Identity Provider
Create a custom Lightning Web Component
Integrate with social websites (Facebook, LinkedIn, Twitter)
Use Login Discovery
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
Yle starter Animals
Quiz
•
1st Grade
25 questions
FFA
Quiz
•
KG - University
25 questions
Religia-Chrzescijanstwo
Quiz
•
KG - University
25 questions
Ice Cream!
Quiz
•
KG - 12th Grade
27 questions
Spoken Sanskrit Quiz
Quiz
•
KG - Professional Dev...
30 questions
Disney Pixar Trivia Game
Quiz
•
KG - 5th Grade
33 questions
Roblox piggy
Quiz
•
KG - Professional Dev...
27 questions
christmas movies
Quiz
•
KG - University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Other
12 questions
Presidents' Day
Quiz
•
KG - 5th Grade
20 questions
Telling Time to the Hour and Half hour
Quiz
•
1st Grade
10 questions
Exploring Rosa Parks and Black History Month
Interactive video
•
1st - 5th Grade
6 questions
President's Day
Lesson
•
1st Grade
10 questions
Identifying Physical and Chemical Changes
Interactive video
•
1st - 5th Grade
7 questions
Lunar and Chinese New Year for Kids | Bedtime History
Interactive video
•
1st - 12th Grade
10 questions
Presidents Day
Interactive video
•
1st - 5th Grade
15 questions
Making Inferences
Quiz
•
1st - 3rd Grade