Salesforce Certified Identity and Access Management Designer Exam

Page:    1 / 12   
Total 60 questions

Universal Containers (UC) has decided to build a new, highly sensitive application on the Lightning platform. The security team at UC has decided that they want users to provide a fingerprint in addition to username/password to authenticate to this application.
How can an Architect support fingerprints as a form of identification for Salesforce authentication?

  • A. Use Custom Login Flows with callouts to a third-party fingerprint scanning application.
  • B. Use Salesforce Two-factor Authentication with callouts to a third-party fingerprint scanning application.
  • C. Use Delegated Authentication with callouts to a third-party fingerprint scanning application.
  • D. Use an AppExchange product that does fingerprint scanning with native Salesforce Identity Confirmation.


Answer : D

Universal Containers (UC) is successfully using Delegated Authentication for their Salesforce users. The service supporting Delegated Authentication is written in Java. UC has a new CIO that is requiring all company web services be REST-ful and written in .Net.
Which two considerations should the UC Architect provide to the new CIO? (Choose two.)

  • A. Delegated Authentication will continue to work with REST services.
  • B. Delegated Authentication will continue to work with a .Net service.
  • C. Delegated Authentication will not work with REST services.
  • D. Delegated Authentication will not work with a .Net service.


Answer : BC

How should an Architect force users to authenticate with Two-factor Authentication (2FA) for Salesforce only when NOT connected to an internal company network?

  • A. Apply the “Two-factor Authentication for User Interface Logins” permission and Login IP Ranges for all Profiles.
  • B. Add the company's list of network IP addresses to the Login Range list under 2FA Setup.
  • C. Use Custom Login Flows with Apex to detect the user's IP address and prompt for 2FA if needed.
  • D. Use an Apex Trigger on the UserLogin object to detect the user's IP address and prompt for 2FA if needed.


Answer : C

What is a role of an Identity Provider in a Single Sign-on setup using SAML?

  • A. Consume assertion
  • B. Revoke assertion
  • C. Validate assertion
  • D. Create assertion


Answer : D

Universal Containers (UC) is setting up delegated authentication to allow employees to log in using their corporate credentials. UC's security team is concerned about the risks of exposing the corporate login service on the internet and has asked that a reliable trust mechanism be put in place between the login service and Salesforce.
What mechanism should an Architect put in place to enable a trusted connection between the login service and Salesforce?

  • A. Require the use of Salesforce security tokens on passwords.
  • B. Enforce mutual authentication between systems using SSL.
  • C. Set up a proxy service for the login service in the DMZ.
  • D. Include Client Id and Client Secret in the login header callout.


Answer : AB

Page:    1 / 12   
Total 60 questions