New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Certified B2C Solution Architect (Arch-302) Exam - Topic 8 Question 1 Discussion

Actual exam question for Salesforce's Salesforce Certified B2C Solution Architect (Arch-302) exam
Question #: 1
Topic #: 8
[All Salesforce Certified B2C Solution Architect (Arch-302) Questions]

A financial services company wants to implement Service Cloud and Marketing Cloud. A number of profile attributes required for personalization in Marketing Cloud were identified as personally identifiable information (PII) and are too sensitive to be stored in Salesforce.

Tokenized Sending was presented as a way to address these concerns.

Which two implications should a Solution Architect consider if Marketing Cloud Connect is to be used for cloud integration?

Choose 2 answers

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

0/2000 characters
Micah
4 months ago
Totally agree with B, can't have disruptions in email flow!
upvoted 0 times
...
Marti
4 months ago
C makes sense; tokens are the way to go for security.
upvoted 0 times
...
Vincenza
4 months ago
Surprised to see D as a consideration; isn't that risky?
upvoted 0 times
...
Darrel
4 months ago
I think A is misleading; PII shouldn't be included at all.
upvoted 0 times
...
Aleta
4 months ago
Option B is definitely a must!
upvoted 0 times
...
Isreal
5 months ago
I vaguely remember something about storing tokens in Service Cloud, but I'm not confident if all supporting attributes need to be stored there too.
upvoted 0 times
...
Rima
5 months ago
I feel like the standard email address field needs to be populated with a token, but I can't recall if that was specifically mentioned in our study materials.
upvoted 0 times
...
Lorrie
5 months ago
I think we practiced a question about needing to send emails through Marketing Cloud to avoid issues, so option B seems familiar to me.
upvoted 0 times
...
Cassie
5 months ago
I remember discussing how tokenized sending works, but I'm not entirely sure if all PII attributes would still be included in the synchronized data extensions.
upvoted 0 times
...
Ranee
5 months ago
I'm a bit confused on the best first step here. Should I focus on evaluating the visibility tools or reviewing the logs? I want to make sure I don't miss anything important.
upvoted 0 times
...
Steffanie
5 months ago
I thought we generally needed to configure contracts with specific protocols in mind. So B makes sense, but I'm kind of conflicted about it.
upvoted 0 times
...
Alpha
5 months ago
Okay, let me see... I know fail2ban is used to detect and block SSH brute-force attacks, so it's probably doing something with the firewall rules. I'll have to consider the options carefully.
upvoted 0 times
...
Valentine
5 months ago
This feels similar to a question we did on bulk editing, but I can't recall if "Edit Issues" is the right one for resolutions.
upvoted 0 times
...

Save Cancel