New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Certified Field Service Consultant (FS-Con-101) Exam - Topic 1 Question 30 Discussion

Actual exam question for Salesforce's Salesforce Certified Field Service Consultant (FS-Con-101) exam
Question #: 30
Topic #: 1
[All Salesforce Certified Field Service Consultant (FS-Con-101) Questions]

Universal Containers (UC) currently owns a middleware tool and they have developed an API-led integration architecture with three API tiers. The first tier interfaces directly with the systems of engagement, the second tier implements business logic and aggregates data, while the third tier interfaces directly with systems of record. Some of the systems of engagement will be a mobile application, a web application, and Salesforce.

UC has a business requirement to return data to the systems of engagement in different formats while also enforcing different security protocols.

What should an Integration Architect recommend to meet these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Lorrie
4 months ago
Totally with you on B, it centralizes everything nicely!
upvoted 0 times
...
Lorean
4 months ago
Wait, can we really enforce security at the second tier? That seems risky.
upvoted 0 times
...
Merilyn
4 months ago
A seems too limiting for different formats.
upvoted 0 times
...
Edison
4 months ago
I think D is the way to go, SAML is great for security!
upvoted 0 times
...
Lon
4 months ago
Option B sounds solid, an API gateway can handle all those formats and security.
upvoted 0 times
...
Glendora
5 months ago
I vaguely recall something about using an Identity Provider for security, but I’m unsure if SAML is the right choice for this scenario.
upvoted 0 times
...
Keneth
5 months ago
I feel like the second tier is where business logic happens, so maybe that's the right place for enforcing security protocols and formats?
upvoted 0 times
...
Tori
5 months ago
I think implementing an API gateway could help manage different formats and security, but I’m not completely confident about how it fits into the architecture.
upvoted 0 times
...
Julieta
5 months ago
I remember we discussed how the first tier is more about direct interactions, so I'm not sure if enforcing security there is the best approach.
upvoted 0 times
...
Tiffiny
5 months ago
Okay, I think I know the answer here. The app builder should create a Scratch Org to test the sandbox template for Accounts, Projects, and Project Milestones.
upvoted 0 times
...
Lai
5 months ago
I'm a little confused by this question. The options seem to cover a range of different programming languages, but the question is specifically about a script that's embedded into a web page. I'm not sure if that rules out some of the options, like C++ or Java. I'll have to review my notes on web development to see if I can figure this out.
upvoted 0 times
...
Lavonna
5 months ago
I'm torn between "voir dire" and "preliminary hearing." I need to think about what each one exactly means in the context of jury selection.
upvoted 0 times
...
Niesha
5 months ago
I feel like all four quarters might be correct, but I can't recall any examples that confirm this.
upvoted 0 times
...
Octavio
5 months ago
I'm a bit unsure about the transport-layer security approach. It sounds familiar, but I feel like there might be a trust issue with Service C since it's with a different organization.
upvoted 0 times
...
Roxane
5 months ago
This question seems straightforward. I think the key is to identify the software that can provide a visual representation of the intrusion data from Snort.
upvoted 0 times
...

Save Cancel