Question 81

Given the diagram below, a Salesforce org, middleware, and Historical data store (with
20million records and growing) exists with connectivity between them
Historical records are archived from Salesforce and moved to Historical Data store (which houses 20M records and growing; fine-tuned to be performant with search queries).
Call center agents use Salesforce, when reviewing occasional special cases, have requested access to view the related historical case items that relate to submit cases.
Which mechanism and patterns are recommended to maximize declarative configuration?
  • Question 82

    Northern Trail Outfitters submits orders to the manufacturing system web-service. Recently, the system has experienced outages that keep service unavailable for several days.
    What solution should an architect recommend to handle errors during these types of service outages?
  • Question 83

    Universal Containers (UC) uses several systems as part of their enterprise system landscape, including Salesforce and an ERP system. Salesforce is the master system for CRM data, such as Accounts and Opportunities. The ERP system is the master system for customer orders, shipping, and billing information. As part of their business process flow, when an order is created in the ERP system, it also needs to be created in Salesforce in real time.
    Which two options should UC consider to ensure duplicate Orders are not created in Salesforce?
  • Question 84

    Universal Containers (UC) has an ERP application where all customer orders are stored. There are millions of customers order stored in the ERP application and a longtime customer may have thousands of individual orders. Additionally, some order information may house personally identifiable information that, due to company policy, can only be stored in ERP. UC would like the five most recent orders displayed on the account page in Salesforce.
    How should an Architect design this requirement considering both security and scalability?
  • Question 85

    A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce.
    Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure?
    Choose 2 answers