Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Salesforce Identity-and-Access-Management-Architect Practice Exam with Questions & Answers | Set: 2

Questions 11

A global company has built an external application that uses data from its Salesforce org via an OAuth 2.0 authorization flow. Upon logout, the existing Salesforce OAuth token must be invalidated.

Which action will accomplish this?

Options:
A.

Use a HTTP POST to make a call as the reverse token endpoint.

B.

Use a HTTP POST to request any refresh token for this current user.

C.

Enable Single Logout with a secure logout URL.

D.

Use a HTTP POST to file System for Cross-domain Identity Management (SCIPI) endpoint, including the current OAuth token.

Salesforce Identity-and-Access-Management-Architect Premium Access
Questions 12

Northern Trail Outfitters (NTO) is using Experience Cloud as an Identity Provider for its application on Heroku. The application on Heroku should be able to handle two brands,

Northern Trail Shoes and Northern Trail Shirts.

A user should select either of the two brands in Heroku before logging into the community. The app then performs Authorization using OAuth2.0 with the Salesforce Experience Cloud site.

NTO wants to make sure it renders login page images dynamically based on the user ' s brand

preference selected in Heroku before Authorization.

What should an identity architect do to fulfill the above requirements?

Options:
A.

Create multiple login screens using Experience Builders and use Login Flows at runtime to route to different login screens.

B.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?node=value.

C.

For each brand create different communities and redirect users to the appropriate community using a custom Login controller written in Ages.

D.

Authorize third-party service by sending authorizations requests to the community. Authorizes/search?authorize?coside_value.

Questions 13

Northern Trail Outfitters (NTO) uses Salesforce for Sales Opportunity Management. Okta was recently brought in to Just-in-Time (JIT) provision and authenticate NTO users to applications. Salesforce users also use Okta to authorize a Forecasting web application to access Salesforce records on their behalf.

Which two roles are being performed by Salesforce?

Choose 2 answers

Options:
A.

OAuth Resource Server

B.

SAML Service Provider

C.

OAuth Client

D.

SAML Identity Provider

Questions 14

Northern Trail Outfitters wants to enable single sign-on (SSO) for its Salesforce platform by integrating it with an identity provider (IdP).

Which step should be performed to establish the trust between Salesforce and the identity provider (IdP)?

Options:
A.

Setting up a VPN (Virtual Private Network) tunnel between Salesforce and the identity provider for secure communication.

B.

Embedding the identity provider’s authentication code directly into Salesforce source code.

C.

Configuring a trust relationship by exchanging metadata XML files between Salesforce and the IdP.

D.

Creating a custom login page within the Salesforce platform for user authentication.

Questions 15

Universal Containers (UC) is rolling out its new Customer Identity and Access Management Solution built on top of its existing Salesforce instance. UC wants to allow customers to login using Facebook, Google, and other social sign-on providers.

How should this functionality be enabled for UC, assuming all social sign-on providers support OpenID Connect?

Options:
A.

configure a single sign-on setting and a JTT handler for each social sign-on provider.

B.

configure an authentication provider and a Auto-Time Unit handler for each social sign-on provider.

C.

configure an authentication provider and a registration handler for each social sign-on provider.

D.

configure a single sign-on setting and a registration handler for each social sign-on provider.

Questions 16

Universal Containers is creating a mobile application that will be secured by Salesforce Identity using the QAuth 2.0 user-agent flow (this flow uses the QAuth 2.0 implicit grant type).

Which three QAuth concepts apply to this flow?

Choose 3 answers

Options:
A.

Refresh Token

B.

Client ID

C.

Verification Code

D.

Authorization Code

E.

Scopus

Questions 17

Northern Trail Outfitters (NTO) is planning to implement a community for its customers

using Salesforce Experience Cloud. Customers are not able to self-register. NTO would like to have customers set their own passwords when provided access to the community.

Which two recommendations should an identity architect make to fulfill this requirement?

Choose 2 answers

Options:
A.

Enable Welcome emails while configuring the Experience Cloud site.

B.

Use Login Flows to allow users to reset password in Experience Cloud site.

C.

Allow Password reset using the API to update Experience Cloud site membership.

D.

Add customers as contacts and add them to Experience Cloud site.

Questions 18

An identity architect ' s client has a homegrown identity provider (IdP). Salesforce is used as the service provider (SP). The head of IT is worried that during a SP initiated single sign-on (SSO), the Security Assertion Markup Language (SAML) request content will be altered.

What should the identity architect recommend to make sure that there is additional trust between the SP and the IdP?

Options:
A.

Ensure that there is an HTTPS connection between IDP and SP.

B.

Encrypt the SAML Request using certification authority (CA) signed certificate and decrypt on IdP.

C.

Ensure that the Issuer and Assertion Consumer Service (ACS) URL is properly configured between SP and IDP.

D.

Ensure that on the SSO settings page, the " Request Signing Certificate " field has a selfsigned certificate.

Questions 19

A financial services company uses Salesforce and has a compliance requirement to track information about devices from which users log in. Also, a Salesforce Security Administrator

needs to have the ability to revoke the device from which users log in.

What should be used to fulfill this requirement?

Options:
A.

Use multi-factor authentication (MFA) to meet the compliance requirement to track device information.

B.

Use the Login History object to track information about devices from which users log in.

C.

Use Login Flows to capture device from which users log in and store device and user information in a custom object.

D.

Use the Activations feature to meet the compliance requirement to track device information.

Questions 20

A web service is developed that allows secure access to customer order status on the Salesforce Platform. The service connects to Salesforce through a connected app with the web server flow. The following are the required actions for the authorization flow:

1. User Authenticates and Authorizes Access

2. Request an Access Token

3. Salesforce Grants an Access Token

4. Request an Authorization Code

5. Salesforce Grants Authorization Code

What is the correct sequence for the authorization flow?

Options:
A.

4, 1, 5, 2, 3

B.

4, 5, 2, 3, 1

C.

1, 4, 5, 2, 3

D.

2, 1, 3, 4, 5

Certification Provider: Salesforce
Exam Name: Salesforce Certified Platform Identity and Access Management Architect (Plat-Arch-203)
Last Update: Apr 7, 2026
Questions: 109