answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
2 years ago
8

Universal Containers is building an integration between Salesforce and their Accounting system. The integration will utilize out

bound messaging with call back pattern to Salesforce. The security officer would like to understand the authentication solution. What are the three ways that the call back can authenticate itself to Salesforce? Choose 3 answers A. Utilize the Enterprise WSDL login() operation to obtain a new session ID. B. Utilize an oAuth Username-Password flow to obtain a new oAuth token for the session ID. C. Utilize the REST API login() operation to obtain a new session ID D. Utilize the session ID contained within the outbound message notification as the authorization header. E. Utilize the partner WSDL with oAuth to obtain a valid oAuth token for the session ID. A,C,D Which mechanism should an Integration Architect recommend to make a secure, authenticated connection to a remote system that results in the remote system trusting Salesforce?
Computers and Technology
1 answer:
SpyIntel [72]2 years ago
4 0

Answer:Utilize the session ID contained within the outbound message notification as the authorization header.

Utilize the Enterprise WSDL login() operation to obtain a new session ID.

Utilize the REST API login() operation to obtain a new session ID.

Explanation:

For the authorization we can utilize the session I in the outbound message notification

Then, we can obtain new session IDs using WSDL login() to exchange information via http and smtp.

For integrating APIs we can utilize the REST API login()to obtain session IDs.

You might be interested in
In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second frame
DerKrebs [107]

Answer:

There could be a collision if a hidden node problem occurs.

Explanation:

CSMA/CA(carrier sense multiple access/ collision avoidance) is a multiple access method in wireless networking, that allows multiple node to transmit. Collision avoidance of this method is based on preventing signal loss or downtime as a result of collision of transmitting multi signals.

If a node at step 4(transmit frame) sends the first frame, the node still needs to send a RTS(request to send) and to receive a Clear to send (CTS) from the WAP, the is to mitigate the issue of hidden node problem as all frame are treated as unit, so other listening nodes, not detected would seek to connect and transmit as well.

5 0
2 years ago
3.26 LAB: Leap Year A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate a
Taya2010 [7]

Answer:

// program in C++ to check leap year.

// include header

#include<iostream>

using namespace std;

// main function

int main() {

// variable

  int inp_year ;

  // ask user to enter year

  cout<<"Enter year:";

  // read year

  cin>>inp_year;

  // check year is leap or not

  if (((inp_year % 4 == 0) && (inp_year % 100 != 0)) || (inp_year % 400 == 0))

  // if leap year , print leap year

     cout<<inp_year<<" is a leap year.";

  else

  // print not leap year

     cout<<inp_year<<" is not a leap year.";

  return 0;

}

Explanation:

Read year from user.Then check if year is divisible by 4 and not divisible by 100 or year is divisible by 400 then year is leap year.otherwise year is not  leap year.

Output:

Enter year:1712                                                                                                            

1712 is a leap year.

6 0
2 years ago
Read 2 more answers
Which are factors that go into a project plan? Choose four answers.
USPshnik [31]

Factors that go into a project plan

  • Estimate the scope of work, based on similar projects.
  • Make sure everyone takes responsibility.
  • Creating and defining team goal
  • Working to a budget

Explanation:

Project Estimating  : Every project is different, but that doesn’t mean you have to start from zero each time. The best way to make sure you’re on the right track is to approach it from every angle. Consider similar projects, talk to your team, and understand what the client is expecting and how they’d like things to go.

Managing your team size  : A smaller team is usually preferable as it puts your project in the most ideal position to be completed on time and at the quality you expect, without burning out your team members. A smaller team also reduces the number of communication channels, which means there’s less opportunity for misinterpretation or people simply missing something.  

Planning and managing your team resources  : That said, there may be a time when you don’t have the right resources in-house to do the job. Either they are fully allocated to another project or no one has the right skill set. In this situation you have two options, either bring in freelance contractors or hire a new employee to fill the role.  

Creating and defining team goals  : The planning phase is when you’ll want to work with the team to understand what their individual goals are for the project. Is there something different they’d like to try? A test or new idea they’d like the chance to prove? Or perhaps a roadblock they want to avoid?

Scheduling Tasks to a Project Timeline  : The timeline of the project will largely be determined by the client, as they often have deadlines they need to hit to meet certain business goals that are simply out of your control. However, setting clear expectations and agreeing on the timing of key deliverables is crucial.

7 0
2 years ago
Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a
Gnesinka [82]

Answer:

Explanation:

The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.

 public static T minmax(ArrayList<T> mylist) {

       T min = new T();

       T max = new T();

       for (int x = 0; x < mylist.size(); x++) {

           if (mylist.get(x) > max) {

               max = mylist.get(x);

           } else if (mylist.get(x) < min) {

               min = mylist.get(x);

           }

       }

       

       return (min, max);

   }

5 0
2 years ago
Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packet
murzikaleks [220]
Idk idk idk idk idk idk
8 0
2 years ago
Other questions:
  • Which data type stores images and audio visual clips?
    15·1 answer
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • What is the term for a web site that uses encryption techniques to protect its data?
    12·1 answer
  • PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How
    13·1 answer
  • Which of the following is true about protected access?
    7·1 answer
  • Why can't you use Friedman's attack on block ciphers?
    12·1 answer
  • Write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). A function j
    11·2 answers
  • Consider two vectors that are NOT sorted, each containing n comparable items. How long would it take to display all items (in an
    8·1 answer
  • Why is it important for element IDs to have meaningful names?
    11·1 answer
  • In an executing process, the program counter points __________.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!