Integration Architecture Designer 1 Flashcards
Universal Containers has decided that they will be using the Bulk API to migrate the existing data into Salesforce as they will be importing a total of 80 million records.
While planning for the data migration, what techniques should the Architect recommend to make sure the load go according to schedule?
Choose 2 answers
A. Pre-process data so that the triggers and workflows can be deactivated.
B. Perform a test load using a full Sandbox prior to the Production load.
C. Perform loads over a weekend to increase server resource availability.
D. Leverage several workstations, loading different objects simultaneously.
A, B
Universal Containers are building an integration between Salesforce and their data warehouse. The architect has the following requirements:
- Salesforce users need the ability to CRUD (create, read, update and delete) data from their data warehouse without leaving the Salesforce user interface
- The integration to the data warehouse should maintain the same look and feel as the existing Salesforce user interface
- The use of custom development Should be minimized
Which two solutions should the architect consider?
Choose two options
A. Utilize lightning connect with custom Apex Adapter to provide CRUD access to the data warehouse
B. Utilize a canvas application to render the data warehouse data from within Salesforce
C. Utilize a VisualForce page from 3rd party JavaScript library that will provide CRUD capabilities to the data warehouse.
D. Utilize a 3rd party tool from the App-Exchange that will provide CRUD capabilities between the data warehouse and Salesforce
A,D
Universal Containers decided to use Salesforce sales cloud for their sales processes won Opportunities must be sent to external ERP system for order fulfillment. All the line items must also be sent along with Opportunities. The ERP system supports only SOAP-based messages for receiving orders.
What limitation of outbound messages might present a problem in this scenario?
A. Outbound messaging does not support multiple objects
B. Outbound messaging does not support SOAP
C. Outbound messaging cannot be made secure
D. Outbound messaging does not offer any reliability.
A
Universal Containers (UC) leverages the standard opportunity and opportunity product objects to manage their orders in Salesforce. When a deal is closed, all opportunity information, including products and billing contacts, must be sent to their ERP application for order fulfillment. As UC has an "express shipping" guarantee, leadership would like order information sent to ERP as quickly as possible after the deal is closed? How should an Architect fulfill this requirement?
A. Write a nightly batch job to send customer information to ERP.
B. Write a visualforce page to send order information to ERP.
C. Write an opportunity trigger to send order information to ERP.
D. Write an outbound message to send order information to ERP.
C
Universal Containers has a simple co-premise web app that is unauthenticated.
What capability should an integration Architect recommend to make the app accessible from within Salesforce?
A. Apex callout
B. Visualforce
C. Custom Web tab
D. Lightning connect
C
Universal Containers has just purchased a large volume of contact data from an external vendor. The head of sales would like to use the new data set within the existing production org. The production org currently contains a large volume of contacts.
What should an Architect recommend to prevent data duplication in salesforce?
A. Load the data into salesforce and then utilize the contact Duplicate Rule feature
B. Utilize an off-platform de-duplication tool prior to loading.
C. Create a de-duplication trigger before loading the data.
D. Utilize a batch apex process to de-duplicate the data after loading.
B
Which two automated methods should an architect use to solve an issue with duplicate contacts?
Choose 2 answers
A. Write a Batch Apex class to manage the deduplication
B. Assign new contacts to queues to be reviewed by a data quality team.
C. Leverage an AppExchange data management tool to de-duplicate contacts.
D. Enable duplicate management in the org to prevent duplicates.
C, D
Universal Containers is building a managed package to distribute on the AppExchange. As part of the solution they would like to include authentication information (username/password) inside of the package for web service calls made from the package Universal containers web services. A Salesforce security review has flagged this as a security violation and the architect must decide how best to protect these credentials
Which two methods should the architect consider in order to protect these credentials?
Choose 2 answers
A. Utilize named credentials to store the username/password of the web service end post. B. Utilize a custom object with an encrypted text field to store the username/password of the web service end point. C. Utilize protected custom settings to store the username/password of the web service end point. D. Store the username/password directly in the Apex class that will be obfuscated in the managed package.
A, C
As part of their customer setup process, Universal Containers requires that any address put into Salesforce be validated by the US Postal Service.
The customer must provide their address while they are on the phone with the Universal Containers representative.
What two solutions should a Technical Architect recommend to fulfill this requirement?
Choose 2 answers
A. Implement a VisualForce page that validates entered addresses against an API.
B. Write a trigger with an @future callout that validates addresses against an API.
C. Build a custom Address object and a trigger that will validate the address against the object.
D. Leverage an AppExchange application to validate addresses entered.
A, D
What are three capabilities of Salesforce Lightning Connect?
Choose 3 answers.
A. Write to OData - Compliant data sources without APEX.
B. Read from OData - Compliant data sources without APEX.
C. Associate external object records to Salesforce Account records.
D. Write triggers and workflows on external objects.
E. Write SOQL queries on external object.
B,C,E
Which two statements are correct about External ID?
Choose 2 answers
A. External IDs must be Text fields
B. External IDs are always searchable
C. External IDs fields are always unique
D. External IDs can be used to upsert records
B, D
Universal Container needs to integrate Salesforce with several home-grown systems. These systems require custom code to be written in order to integrate with them, and the CIO argues that if custom code needs to be written, then there is no reason to invest in middleware.
Which three considerations should an Architect bring up to the CIO?
Choose 3 answers
A. Performance B. Error Handling C. Bulkification D. Orchestration E. Logging
B,D,E
Universal Containers has built an integration using the SOAP API to load records from a back-office system into Salesforce. The records created in the back-office system must be loaded into Salesforce in almost real time, so a custom module was written to identify CRUD events in the back-office system and perform sync with Salesforce. UC has several other systems that integrate with Salesforce through the SOAP API using separate integration users.
What is a risk involved with this sort of integration? A. Too many concurrent sessions B. Reaching an API call limit. C. Reaching a logins per Day limit. D. Too many record-lock errors
B
Universal Containers is hearing complaints from users that recently released changes are breaking existing functionality.
What type of testing program should a Technical Architect implement to reduce or eliminate this complaint?
A. Performance Testing
B. Unit Testing
C. Regression Testing
D. User Acceptance Testing
C
Universal Containers would like to restrict access to Salesforce to only clients on their network
Which two mechanisms should an Integration Architect utilize to prevent unauthorized clients?
Choose 2 answers
A. Configure Login IP Ranges on any profiles used by Integration
B. Use a login flow to validate the IP and request a 2nd factor if incorrect
C. Use a trigger to change the user’s profile if their IP is not trusted.
D. Enable the “Lock sessions to the IP address from which they originated” setting.
A, B
Universal Containers manages a catalog of over one million products that it makes available to its customers. The master product catalog is stored and managed in their ERP application with frequent updates made to the product catalog by their sourcing team. The sourcing team may update attributes such as price, general catalog availability, and the product description. When the sourcing team makes an update that change must go into effect during the next business day and there may be thousands of changes made over the course of the day.
What integration pattern would you recommend to best manage this scenario?
A. Write a custom web service to accept product catalog changes from ERP.
B. Use the streaming API to receive product changes in real time from ERP.
C. Write an outbound message to send product changes in real time from ERP.
D. Build a scheduled ETL job to sync products on a nightly basis from ERP.
D
Universal Containers utilizes the REST API to update the multiple Salesforce objects in real time based upon changes from their ERP system. They recently started encountering API Limits and have consulted the Integration Architect on possible solutions.
What two possible strategies should the architect consider?
Choose 2 answers
A. Migrate the integration to the partner WSDL to support 200 DML operations in a single API call.
B. Migrate the integration to the Bulk API which does not count towards the API limits.
C. Utilize the REST API batch URI to consolidate 100 DML operations into single API call.
D. Utilize workflow outbound messaging which does not count towards the API limits.
A, C
Universal Containers is building an integration between Salesforce and their Accounting system. The integration will utilize outbound messaging with call back pattern to Salesforce. The security officer would like to understand the authentication solution.
What are the three ways that the call back can authenticate itself to Salesforce?
Choose 3 answers
A. Utilize the Enterprise WSDL login() operation to obtain a new session ID.
B. Utilize an oAuth Username-Password flow to obtain a new oAuth token for the session ID.
C. Utilize the REST API login() operation to obtain a new session ID
D. Utilize the session ID contained within the outbound message notification as the authorization header.
E. Utilize the partner WSDL with oAuth to obtain a valid oAuth token for the session ID.
A,B,D
What mechanism should an Integration Architect recommend to make a secure, authenticated connection to a remote system that results in the remote system trusting Salesforce?
A. Use a pre-shared key in a query parameter.
B. Implement two-way (or mutual) SSL certificates.
C. Utilize CA-signed certificates on the host.
D. Encrypt the payload with a shared key.
B
What are the three capabilities of the Bulk API?
Choose 3 answers
A. Process multiple batch jobs asynchronously
B. Process multiple batch jobs synchronously
C. Roll back all transactions within a batch of 10000 records
D. Monitor job status via the API.
E. Monitor job status via the Web UI.
A,D,E
Universal Containers would like to display data from an external system inside of Salesforce, and has chosen not to enable Lightning Experience. They do not need the data for any other purposes within Salesforce.
Which approach should an Integration Architect recommend that matches the Salesforce UI?
Choose 2 answers
A. An iFrame embedding a custom .Net application that displays data from the other systems.
B. A custom visualforce page with a controller thats calls-out to the other systems.
C. A custom Visualforce page with client-side calls out to the other systems.
D. A middleware orchestration to continuously persist data from other systems into Salesforce.
B,C
When making an Apex callout, what approach should an Integration Architect recommend for securely transporting sensitive data from Salesforce over an unsecure network connection?
A. Base64 encode the data before performing the call out from Apex.
B. Encrypt the data with a shared key before performing the Apex callout.
C. Use platform Encryption to secure the data before transporting.
D. Salesforce automatically secures all data transmissions to external systems.
B
Universal Containers would like to integrate Salesforce to their Accounting system. Salesforce must notify the accounting system for every new account that has been created. The security team will not allow Salesforce to integrate directly to the accounting system due to potential security issues.
Which three stages should the Architect consider to reduce the security concerns for this Integration use case?
Choose 3 answers
A. Terminate the SSL connection at a reverse proxy in the DMZ which establishes trust in the connection using mutual SSL.
B. Enable WS-security for the web services made between Salesforce and the accounting system.
C. Whitelist the Salesforce IP range on the firewall to ensure only Salesforce-originated traffic can penetrate the network.
D. Utilize an Enterprise Service Bus to ensure Accounting system credentials are not stored within Salesforce.
E. Enable platform encryption in the Salesforce org to ensure network communication to the Accounting system is encrypted.
A,C,D
Universal Containers has a customer setup process that relies on external database to send customers welcome & registration emails. When a customer contacts Universal containers via phone they need to receive the welcome email shortly following the conversation with the UC representative. Universal containers representatives work exclusively in Salesforce and any new customer contacts are created in Salesforce by the representative. The external database exposes a SOAP API for integration with other applications.
What Salesforce technology best fulfills this requirement?
A. Write a nightly batch synchronization to send customer information to the external database.
B. Write an outbound message to send customer Information to an ESB.
C. Write an outbound message to send customer Information to the external database.
D. Write a trigger with an @future method to send customer Information to the external database
C
Universal Containers built an integration using the Bulk API to load records from a legacy system into Salesforce. Parallel option with batch size 1000 was used, however, the batches often fail due to “Max CPU time exceeded” errors which could be resolved with a smaller batch size.
What are two risks involved with batch sizes that are too small?
Choose 2 answers
A. Possibility of hitting the daily limit for number of batches.
B. Possibility of very long bulk job execution times
C. Possibility of failures due to record-locking errors.
D. Possibility of hitting the “Too many concurrent batches” limit.
A, B