A developer has been tasked by the integration architect to build a solution based on the Streaming API. The developer has done some research and has found there are different implementations of the events in Salesforce (Push Topic Events, Change Data Capture, Generic Streaming, Platform Events), but is unsure of to proceed with the implementation.The developer asks the system architect for some guidance. What should the architect consider when making the recommendation?
A.
Push Topic Event can define a custom payload.
B.
Change Data Capture does not have record access support.
C.
Change Data Capture can be published from Apex.
D.
Apex triggers can subscribe to Generic Events.
Change Data Capture does not have record access support.
A customer imports data from an external system into Salesforce using Bulk API. These jobs have batch sizes of 2000 and are run in parallel mode. The batc fails frequently with the error "Max CPU time exceeded". A smaller batch size will fix this error. Which two options should be considered when using a smaller batch size? Choose 2 answers
A.
Smaller batch size may cause record-locking errors.
B.
Smaller batch size may increase time required to execute bulk jobs.
C.
Smaller batch size may exceed the concurrent API request limits.
D.
Smaller batch size can trigger "Too many concurrent batches" error.
Smaller batch size may cause record-locking errors.
Smaller batch size may increase time required to execute bulk jobs.
Northern Trail Outfitters (NTO) has recently changed their Corporate Security Guidelines. The guidelines require that all cloud applications pass through a secure firewall before accessing on-premise resources. NTO is evaluating middleware solutions to integrate cloud applications with on-premise resources and services. What are two considerations an Integration Architect should evaluate before choosing a middleware solution?
Choose 2 answers
A.
The middleware solution is capable of establishing a secure API gateway between cloud applications and on-premise resources.
B.
An API gateway component is deployable behind a Demilitarized Zone (DMZ) or perimeter network.
C.
The middleware solution enforces the OAuth security protocol.
D.
The middleware solution is able to interface directly with databases via an ODBC connection string.
The middleware solution is capable of establishing a secure API gateway between cloud applications and on-premise resources.
An API gateway component is deployable behind a Demilitarized Zone (DMZ) or perimeter network.
Which WSDL should an architect consider when creating an integration that might be used for more than one salesforce organization and different met
A.
Corporate WSDL
B.
Partner WSDL
C.
SOAP API WSDL
D.
Enterprise WSDL
Partner WSDL
A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce. Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure?
Choose 2 answers
A.
Encrypted Custom Fields
B.
Named Credentials
C.
Protected Custom Metadata Types
D.
Protected Custom Settings
Encrypted Custom Fields
Named Credentials
Page 6 out of 22 Pages |
Previous |