최신 ARC-300 무료덤프 - Salesforce Architect B2C Commerce Solutions
The Client wants to offer custom made container products on its new B2C Commerce storefront. The Client provided two business requirements.
* Customer can specify container length, width, and height.
* Customer can specify the material that the container is made of.
The Client also provided the Architect a current data schema (shown below) for reference while preparing the technical documentation.

Which two gaps between the requirements and the data schema should the Architect discuss with the Client?
Choose 2 answers
* Customer can specify container length, width, and height.
* Customer can specify the material that the container is made of.
The Client also provided the Architect a current data schema (shown below) for reference while preparing the technical documentation.

Which two gaps between the requirements and the data schema should the Architect discuss with the Client?
Choose 2 answers
정답: B,D
An Architect is configuring a data replication schedule.
Which task(s) can be removed In order to reduce replication times?
Which task(s) can be removed In order to reduce replication times?
정답: A
a B2C Commerce developer has Implemented a job that connects to an SFTP, loops through a specific number of .csv rtes. and Generates a generic mapping for every file. In order to keep track of the mappings imported, if a generic mapping is created successfully, a custom object instance w created with the .csv file name. After running the job in the Development instance, the developer checks the Custom Objects m Business Manager and notices there Isn't a Custom Object for each csv file that was on SFTP.
What are two possible reasons that some generic mappings were not created? Choose 2 answers
What are two possible reasons that some generic mappings were not created? Choose 2 answers
정답: A,D
A developer is remotely fetching the reviews for a product.
Assume that it's an HTTP GET request and caching needs to be implemented, what consideration should the developer keep in mind for building the caching strategy?
Assume that it's an HTTP GET request and caching needs to be implemented, what consideration should the developer keep in mind for building the caching strategy?
정답: D
A company that is a shoe-producer is doing Salesforce B2C Commerce implementation. In their Enterprise Resource Warning (ERP) system, the products are marked as being one of three types: boots, sandals, and sneakers. The business requirements based on the type are:
* The messaging on Product Detail page is different
* Customers are able to filler their Product Search Results
The customer's operations team asks about the format in which to send this value in the catalog.
Which data type should the Architect specify for this attribute In the Data Mapping document?
* The messaging on Product Detail page is different
* Customers are able to filler their Product Search Results
The customer's operations team asks about the format in which to send this value in the catalog.
Which data type should the Architect specify for this attribute In the Data Mapping document?
정답: C
The storefront integrates with a REST based Address verification service (AVS) that uses token based security. The sequence of calls in the API documentation for this AVS looks like the following
1. Client authentication call, which contains the merchantId and secret in a GET request and returns a token in the response.
2. Address verification call, which contains the token and the address to verify in a POST request.
Once the token is obtained, it is valid for hours and it is not needed to request a new one for subsequent address verification calls, the AVS charges for every request made no matter if it is client authentication call or address verification call.
Which three strategies could be applied to allow for efficient use of the service without compromising security? Choose 3 answers
1. Client authentication call, which contains the merchantId and secret in a GET request and returns a token in the response.
2. Address verification call, which contains the token and the address to verify in a POST request.
Once the token is obtained, it is valid for hours and it is not needed to request a new one for subsequent address verification calls, the AVS charges for every request made no matter if it is client authentication call or address verification call.
Which three strategies could be applied to allow for efficient use of the service without compromising security? Choose 3 answers
정답: B,C,D
A B2C Commerce Developer has just finished implementing a new promotion code form on checkout. During review, an Architect notes that the form it not using CSRF validation correctly.

Which two options are best practice recommendations for dealing with CSRF validation? Choose 2 answers

Which two options are best practice recommendations for dealing with CSRF validation? Choose 2 answers
정답: A,C