Universal Containers (UC) is a leading provider of management trainingglobally, UC embarked on a Salesforce transformation journey to allow students to register for courses in the Salesforce community. UC has a learning system that
masters all courses and student registration.
UC requested a near real-time feed of student registration from Salesforce to the learning system. The integration architect recommends using Salesforce event.
Which API should be used for the Salesforce platform event solution?
A. Tooling API
B. Streaming API
C. O REST AP
D. SOAP API
Northern Trail Outfitters has a requirement to encrypt few of widely used standard fields. They also want to be able to use these fields inworkflow rules. Which security solution should an Integration Architect recommend to fulfill the business use case?
A. Cryptography Class
B. Data Masking
C. Classic Encryption
D. Platform Shield Encryption
A large enterprise customer operating in a high regulated industry is planning to implement Salesforce for customer facing associates in both Sales and Service, and back office staff. The business processes that Salesforce supports are
critical to the business.
Salesforce will be integrated to multiple back office systems to provide a single interface for associates. Reliability and monitoring of these integrations is required as associates support customers.
Which integration solution should the architect consider when planning the implementation?
A. Architect Services in back office systems to support calloutsfrom Salesforce and build reliability, monitoring and reporting capabilities.
B. Decouple back office system callouts into separate distinct services that have inbuilt error logging and monitoring frameworks.
C. Build a custom integration gateway to support back office system integrations and ensure reliability and monitoring capabilities.
D. Leverage Middleware for all back office system integrations ensuring real time alerting, monitoring and reporting capabilities.
Which three considerations should an Integration Architect consider when recommending Platform Event as a Integration solution? Choose 3 answers
A. Inability to query event messages using SOQL
B. Subscribe to an AssetToken Event stream to monitor OAuth2.0 authentication activity.
C. Inability to create a Lightning record page for platform events.
D. When you delete an event definition, it's permanently removed and can't be restored.
E. You can use Event Monitoring to track user activity, such aslogins and running reports.
Universal Containers has a requirement for all accounts that do NOT qualify for abusiness extension (Custom field on the account record) for the next month to send a meeting invite to their contacts from the marketing automation system to discuss the next steps. It is estimated there will be approximately 1MilIion contacts per month.
What is the recommended solution?
A. Use Batch Apex.
B. Use Time-based workflow rule.
C. Use Process builder.
D. Use Trigger.
An integration architect needs to build a solution that will be using the Streaming API, but the data loss should be minimized, even when the client re-connects everycouple of days. Which two types of Streaming API events should be considered? Choose 2 answers
A. Generic Events
B. Change Data Capture Events
C. PushTopic Events
D. High Volume Platform Events
Universal Containers (UC) is a global financial company. UC support agents would like to open bank accounts on the spot for a customer who is inquiring ab UC products.
During opening the bank account process, the agentsexecute credit checks for the customers through external agencies. At a given time, up to 30 concurrent rewill be using the service for performing credit checks for customers.
What error handling mechanisms should be built to display an error to the agentwhen the credit verification process failed?
A. In case the verification process is down, Use mock service to send the response to the agent.
B. Handle verification process error in the Verification Webservice API in case there is a connection issue to theWebservice if it responds with an error.
C. Handle integration errors in the middleware in case the verification process is down, thenthe middleware should retry processing the request multiple times.
D. In case the verification process is down, use fireand forget mechanism instead of request and reply to allow the agent to get the response back when the service is bar online.
An architect decided to use Platform Events for integrating Salesforce with an external system for a company.
Which three things should an architect consider when proposing this type of integration mechanism? Choose 3 answers
A. To subscribe to an event, the integration user in salesforce needs read access to theevent entity.
B. Salesforce needs to be able to store information about the external system in order toknow which event to send out.
C. External system needs to have the same uptime in order to be able to keep up with Salesforce Platform Events.
D. To publish an event, the integration user in salesforce needs create permission on the event entity.
E. Error handling must be performed by the remote service because the event is effectively handed off to the remote system for further processing.
A customer imports data from an external system into Salesforce using Bulk API. These jobs have batch sizes of 2000 and are run in parallel mode. The batc fails frequently with the error "Max CPU timeexceeded". A smaller batch size will fix this error.
Which two options should be considered when using a smaller batch size? Choose 2 answers
A. Smaller batch size may cause record-locking errors.
B. Smaller batch size may increase time required to executebulk jobs.
C. Smaller batch size may exceed the concurrent API request limits.
D. Smaller batch size can trigger "Too many concurrent batches" error.
Northern Trail Outfitters needs to use Shield Platform Encryption to encrypt social security numbers in order to meet a business requirement. Which two considerations should an Integration Architect do prior to the implementation of Shield Platform Encryption? Choose 2 answers
A. Encrypt the data using the most current key.
B. Review shield platformencryption configurations.
C. Encrypt all the data so that it is secure.
D. Use Shield Platform Encryption as a user authentication or authorization tool.