Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

Mobile-Solutions-Architecture-Designer Practice Test


Page 1 out of 17 Pages

Which two automated methods should an architect use to solve an issue with duplicate contacts? Choose 2 answers


A. Write a Batch Apex class to manage the deduplication


B. Assign new contacts to queues to be reviewed by a data quality team.


C. Leverage an AppExchange data management toolto de-duplicate contacts.


D. Enable duplicate management in the org to prevent duplicates.





C.
  Leverage an AppExchange data management toolto de-duplicate contacts.

D.
  Enable duplicate management in the org to prevent duplicates.

What are two benefits of canvas that an Integration Architect should consider when exposing external systems from within Salesforce? Choose 2 Answers


A. Canvas can provide authorization information via the signed Request.


B. The canvas SDK can be used to make an external systems UI look like Salesforce.


C. Canvas can send data to an external system asynchronously.


D. Canvas endpoint URLs can be dynamically changed via a Lifecycle Handler.





A.
  Canvas can provide authorization information via the signed Request.

D.
  Canvas endpoint URLs can be dynamically changed via a Lifecycle Handler.

Universal Containers wishes to move data between 3 back office systems: ERP, financial and a legacy home-grown shipping system that will be replaced 3 months after integration is scheduled to be complete. What integration pattern should an architect recommend to ensure minimal throwaway code?


A. point-to-point


B. Web Mashup


C. MiddleWare


D. Apex batch Processing





C.
  MiddleWare

What Salesforce technology should an Integration Architect consider when needing to securely expose an external system User Interface from within the Salesforce UI and provide that system with information about the user?


A. Visualforce


B. Custom Web Tab


C. Canvas


D. Lightning Component






Universal Containers is building an integration between Salesforce and their Accounting system. The integration will utilize outbound messaging with call back pattern toSalesforce. The security officer would like to understand the authentication solution. What are the three ways that the call back can authenticate itself to Salesforce? Choose 3 answers


A. Utilize the Enterprise WSDL login() operation to obtain a new session ID.


B. Utilize an oAuth Username-Password flow to obtain a new oAuth token for the session ID.


C. Utilize the REST API login() operation to obtain a new session ID


D. Utilize the session ID contained within the outbound message notification as theauthorization header.


E. Utilize the partner WSDL with oAuth to obtain a valid oAuth token for the session ID.





A.
  Utilize the Enterprise WSDL login() operation to obtain a new session ID.

C.
  Utilize the REST API login() operation to obtain a new session ID

D.
  Utilize the session ID contained within the outbound message notification as theauthorization header.


Page 1 out of 17 Pages