Question: 1
A company needs to integrate a legacy on premise application that can only support SOAP API. After the Integration Architect has evaluated the requirements and volume, they determined that the Fire and Forget integration pattern will be most appropriate for sending data from Salesforce to the external application and getting response back in a strongly typed format.
Which integration capabilities should be used to integrate the two systems?
Question: 2
A company's cloud-based single page application consolidates data local to the application with data from on premise and 3rd party systems. The diagram below typifies the application's combined use of synchronous and asynchronous calls.
The company wants to use the average response time of its application's user interface as a basis for certain alerts. For this purpose, the following occurs:
1. Log every call's start and finish date and time to a central analytics data store.
2. Compute response time uniformly as the difference between the start and finish date and time --- A to H in the diagram.
Which computation represents the end-to-end response time from the user's perspective?
Question: 3
Northern Trail Outfitters (NTO) leverages Sales Cloud for tracking and managing leads, accounts, contacts, and opportunities- Orders and order fulfillment is taken care of by an Order Management System (OMS) in the back-office. When an opportunity has changed it's status to 'Closed/Won' and there are products attached, the details should be passed to the OMS for fulfillment operations.
The callout from Salesforce to the OMS should be synchronous.
What should an Integration Architect do to satisfy these requirements?
Question: 4
A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce.
Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure?
Choose 2 answers
Question: 5
A customer is migrating from an old legacy system to Salesforce. As part of the modernization effort, they would like to integrate al existing systems that currently work with their legacy application with Salesforce.
Which three constraints and pain-points should an integration architect consider when choosing the integration pattern/mechanism?
Choose 3 answers