Sunday, December 24, 2023

Salesforce Architect Certification Maintenance (Winter '24)



Salesforce Architect Certification Maintenance (Winter '24)




→    Learn What’s New with Data for Winter '24

1. Which Salesforce tool can be used to create time -based system performance reports?
A. Data Spaces
B. Apex Summary
C. Flow Builder
D. Scale Center

2. What are the most recent improvements to the Salesforce Backup app?
A. Improved page design.
B. Increased storage limits.
C. Clearer setup flow guidance.
D. A and B
E. A and C

3. How can Data Cloud be used by Data Architects?
A. Grant user access.
B. Design new websites.
C. Update storage limits.
D. Map and model data.

4. How could you customize an email Contact field to target customers with the highest lifetime value across the enterprise?
A. Enter a Data Cloud related list.
B. Copy data from a CIO field for lifetime value.
C. Copy data from a DMO field for email engagement.
D. Select a data space for the action trigger of the record.

5. Which feature allows a business to segregate data and processes across multiple brands?
A. Analytics Data
B. Data Spaces
C. Data Platform
D. Segment Data

6. Which Salesforce feature enables encryption keys stored outside of Salesforce to encrypt and decrypt your Salesforce data?
A. Encryption Key Manager
B. External Key Management
C. Root Key Management
D. AWS Key Management

→    Learn What's New with Development Lifecycles for Winter '24

1. What is the advantage of using the DevOps Center to manage changes and releases?
A. Maintain up to three sources of truth.
B. Monitor Change Sets with an accessible UI.
C. Capture changes in a source control system.
D. Track changes manually in spreadsheets.

2. How can you limit sandbox access to only required users while eliminating the need to individually change the format of user email addresses?
A. Grant access using hierarchies in a sandbox.
B. Create a new sandbox and match the access currently defined in the source org.
C. Select sandbox users and click Unfreeze to allow access.
D. Specify membership to a public group in Selective Sandbox Access.

3. How is ownership of a second-generation managed package transferred from one DevHub org to another?
A. A package in a Government Cloud DevHub is transferred to an outside DevHub.
B. Packages can only be assigned to their original DevHub.
C. Salesforce performs the package transfer process.
D. A Primary Designated Contact with full administrative rights transfers the package.

→    Learn What’s New with Identity Management for Winter ’24

1. The new headless flow for guest users can assign a UVID to an unknown user and pass it to a named user authorization flow after the user registers. What type of access token must be used?
A. One-Time Password (OTP) Tokens
B. Soft API Tokens
C. Hardware Tokens (USB) Tokens
D. JSON Web (JWT) Tokens

2. Blocking the OAuth 2.0 username-password flow may disrupt a connected app. How can a user confirm if the flow is being used for the app?
A. Use the OAuth 2.0 client credentials flow.
B. Create a Login History view and add the Login Subtype field.
C. Disable OAuth Username-Password flows.
D. Create a transaction security policy in Condition Builder.

3. In a third-party app, a login button directs users to Google; they enter their Google credentials; and they are redirected back to the original app. What new Salesforce process creates this SSO experience?
A. SAML, an open-standard authentication protocol, is used to automatically create a user account before the redirect.
B. The browser briefly redirects to an Experience Cloud site, which confirms the sso_provider parameter, then redirects back to the app.
C. A web server flow or user-agent flow is set up that can exclude the sso_provider parameter in the authorization request.
D. The user is redirected to an Experience Cloud site, logs in with Salesforce credentials, and accesses stored Google credentials.

→    Learn What's New with Integration for Winter '24

1. How is a Salesforce declarative tool used to create an HTTP Callout?
A. In Journey Builder, add an Action element, then click Create HTTP Callout.
B. API specifications are created manually and added to flows.
C. Direct integrations are set up using MuleSoft.
D. The HTTP Callout is set up via External Services to be used in Flow Builder

2. What are the advantages of using Salesforce Named Credentials for server-to-server integrations?
A. Salesforce manages authentication during a callout.
B. It eliminates the need to manage credentials using a custom storage solution.
C. It securely stores sensitive information in easy-to-access spreadsheets.
D. A and B
E. C and D

3. How are JWT-based access tokens enabled in a connected app that is part of a managed package?
A. The user formats the JWT token as a string that can be decoded without calling the Salesforce User Info endpoint.
B. The user must enable JWT tokens in OAuth settings, and then opt in from the connected app policies.
C. The developer enables JWT tokens in the OAuth settings, then the package subscriber opts in from the connected app policies.
D. The developer formats the JWT token as a JSON object that contains all of the information required to authorize an app.

→    Learn What’s New with Access Control for Winter ’24

1. What’s an efficient way to see which users are members of public groups?
A. Click through each public group and compile a spreadsheet.
B. Commission a custom query from an outside developer.
C. Create a custom report type with Group Member as the primary object.
D. Submit a request for a temporary hire.

2. What has Salesforce changed to enable faster Account sharing recalculation?
A. Organization-wide defaults are set to Private.
B. Implicit share records are no longer stored for child Case, Contact, or Opportunity objects.
C. The system dynamically determines whether a specific user has account access.
D. The release update for opportunity records is available starting in Spring '24.

3. What is the new event type that can be used to see when users were not able to access a record?
A. Insufficient Access
B. Access Errors
C. LogInEvent
D. ApexCalloutEvent

4. What is the Guest User Sharing Rule Access Report used for?
A. Determine which guest users have accessed the Experience Cloud site.
B. Change record access levels for guest users.
C. See which records are at risk of exposure to guest users.
D. Document expired guest user sharing rules.

5. How can an admin view a list of users who have access to a record?
A. In Setup, select Roles then view Permission Sets.
B. Click Sharing Settings from the record and view All Record access.
C. Click Sharing Hierarchy from the Action Menu on the desired record.
D. In the Sharing Settings page, click on the Manage Sharing Settings For list.

Certification Maintenance Due Date:   December 6, 2024

No comments:

Post a Comment