A new Salesforce program has the following high level abstract requirement: Business processes executed on Salesforce require data updates between the internal systems and Salesforce. Which three relevant details should a Salesforce Integration Architect seek to specifically solve for Integration architecture needs of the program? Choose 3 answers
A. Source and Target system, Directionality, data volume and transformation complexity long with any middleware that can be leveraged.
B. Integration skills, SME availability and Program Governance details.
C. Timing aspects - real-time/near real-time (synchronous or asynchronous), batch; update frequency.
D. Integration Style Process based, Data based, Virtual integration. E Core functional and non functional requirements for User Experience design, Encryptionneeds, Community, and license choices.
A company has an external system that processes and tracks orders. Sales reps manage their leads and opportunity pipeline in Salesforce. In the current state, the two systems are disconnected and processing orders requires a lot of manual entry on sales rep part. This creates delays in processing orders and incomplete data due to manual entry.
As a part of modernization efforts the company decided to integrate Salesforce and the order management system. The following technical requirements were identified:
1.
Ordersneed to be created in real time from salesforce
2.
Minimal customization*, and code should be written due to a tight timeline and lack of developer resources
3.
Sales reps need to be able to see order history and be able to see most up to date information on current order status.
4.
Managers need to be able to run reports in Salesforce to see daily and monthly order volumes and fulfillment timelines.
5.
The legacy system is hosted on premise and is currently connected to the Enterprise Service Bus (ESB).The ESB is flexible enough to provide any methods and connection types needed by salesforce team.
6.
There are 1000 sales reps. Each user processes/creates on average 15 orders per shift. Most of the orders contain 20-30 line items. How should anintegration architect integrate the two systems based on the technical requirements and system constraints?
A. Use Salesforce external object and OData connector.
B. Use Salesforce custom object, custom REST API and ETL.
C. Use Salesforce standard object,REST API and ETL.
D. Use Salesforce big object, SOAP API and Dataloader.
KiA B2C Enterprise Customer has the following use case that involves processing payment from an external payment gateway service in Salesforce.
1.
Customer requests Customer Service Representative (CSR) for a Service upgrade.
2.
Customer provides credit card details to CSR for payment.
3.
CSR submits payment information in Salesforce, and processed in a
4.
CSR receives confirmation of payment.
5.
CSR upgrades service for customer and confirms Customer.
external payment gateway.
This use case requires the CSR to obtain confirmation of payment before upgrading the service.
The integration with Payment gateway needs to be reliable and monitored for audit purposes.
The payment gateway service is an external RESTful service that the B2C Enterprise Customer has subscribed for.
What should an Integration Architect recommend for this integration?
A. Build a custom Apex Callout to external Payment gateway service and provide success message to the CSR, the details of calloutsand responses are logged for audit purposes.
B. Use External Services feature to integrate gateway to Salesforce ensuring real- timeupdates the CSR and support post payment processes.
C. Make a callout to the payment gateway through ESB supporting error handling andlogging for audit purposes.
D. Platform events allow integration to payment gateway through the exchange ofreal-time event data, platform events are scalable and secure.
A US business-to-consumer (B2C) company is planning to expand to Latin America. They project an initial Latin American customer base of about one million, and a growth rate of around 10% every year for the next 5 years. They anticipate privacy and data protection requirements similar to those in the European Union to come into effect during this time. Their initial analysis indicates that key personal data is stored in the following systems:
1.
Legacy mainframe systems that have remained untouched for years and are due to be decommissioned.
2.
Salesforce Commerce Cloud Service Cloud, Marketing Cloud, and Community Cloud.
3.
The company's CIO tasked the integration architect with ensuring that they can completely delete their Latin American customer'spersonal data on demand. Which three requirements should the integration architect consider? Choose 3 answers
A. Manual steps and procedures that may be necessary.
B. Impact of deleted records on system functionality.
C. Ability to delete personal data inevery system.
D. Feasibility to restore deleted records when needed.
E. Ability to provide a 360-degree view of the customer.
An Integration Architect has built a solution using REST API, updating Account, Contact, and other related information. The data volumes have increased, resulting in higher API calls consumed, and some days the limits are exceeded. A decision was made to decrease the number of API calls using bulk updates. The customer prefers to continue using REST API to avoid architecture changes.
Which REST API composite resources should the Integration Architect use to allow up to 200 records in one API call?
A. SObject Collections
B. SObject Tree
C. Batch
D. Composite
Northern Trail Outfitters' (NTO) Salesforce org usually goes through 8k-10k batches a day to synch data from external sources. NTO's Integration Architec has received requirements for a new custom object, FooBarc, for which 90M records
willneed to be loaded into the org.
Once complete, 20GB (about 30M records) needs to be extracted to an external auditing system.
What should the architect recommend using to meet these requirements in a day?
A. Insert using Bulk API 2.0 and query using REST API.
B. Insert and query using Bulk API 1.0.
C. Insert using Bulk API 1.0 and query using REST API.
D. Insert and query using Bulk API 2.0.
Northern Trail Outfitters (NTO) use Salesforce to track leads, opportunities, and to capture order details. However, Salesforce isn't the system that holds or processes orders. After the order details are captured in Salesforce, an order must be created in the remote system, which manages the orders lifecylce. The Integration Architect for the project is recommending a remote system that will subscribe to the platform event defined in Salesforce.
Which integration pattern should be used for this business use case?
A. Remote Call In
B. Request and Reply
C. Fire and Forget
D. Batch Data Synchronization
The URL for an external service has been changed without prior notice. The service provides up to date money exchange rates that is accessed several times from Salesforce and is a business critical function for end users. Which two solutions shouldan Integration Architect recommend be implemented to minimize potential downtime for users in this situation? Choose 2 answers
A. Named Credentials
B. Remote Site Settings
C. Content Security Policies
D. Enterprise ESB
Northern Trail Outfitters submits orders to the manufacturing system web-service. Recently, the system has experienced outages that keepservice unavailable for several days. What solution should an architect recommend to handle errors during these types of service outages?
A. Use middleware queuing and buffering to insulate Salesforce from system outages.
B. A Use Platform Event replayldand custom scheduled Apex process to retrieve missed events.
C. Use @future jobld and custom scheduled apex process to retry failed service calls.
D. Use Outbound Messaging to automatically retry failed service calls.
Northern Trail Outfitters needs to use Shield Platform Encryption to encrypt social security numbers in order to meet a business requirement. Which two considerations should an Integration Architect do prior to the implementation of Shield Platform Encryption? Choose 2 answers
A. Encrypt the data using the most current key.
B. Review shield platformencryption configurations.
C. Encrypt all the data so that it is secure.
D. Use Shield Platform Encryption as a user authentication or authorization tool.