B2C-Commerce-Architect試験無料問題集「Salesforce Certified B2C Commerce Architect 認定」
The Client has just acquired a new brand and wants toIntegrate the new brand s current ecommerce site into a current realm as a new site. The acquisition has its own Enterprise Resource Planning (ERP) system for product data and inventory. The new site will use the existing realm's Order Management System (OHS) and Customer Relationship Management (CRM) system.
What two requirements does the Architect need to keep in mind when creating the technical specification document?
Choose 2 answers
What two requirements does the Architect need to keep in mind when creating the technical specification document?
Choose 2 answers
正解:A,D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
An Architect to notify by the Business that order conversion dramatically dropped a few hours after go live.
Further investigation points out that customers cannot proceed to checkout anymore. The Architect is aware that a custom inventory checks with a third-party API is enforced at the beginning of checkout, and that customers are redirected to the basket page when items are no longer in stock Which tool can dearly confirm that the problem is indeed caused by the inventory check?
Further investigation points out that customers cannot proceed to checkout anymore. The Architect is aware that a custom inventory checks with a third-party API is enforced at the beginning of checkout, and that customers are redirected to the basket page when items are no longer in stock Which tool can dearly confirm that the problem is indeed caused by the inventory check?
正解:C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
The storefront integrates with a REST based Address verification service (AVS) that uses token based security. The sequence of calls in the API documentation for this AVS looks like the following
1. Client authentication call, which contains the merchantId and secret in a GET request and returns a token in the response.
2. Address verification call, which contains the token and the address to verify in a POST request.
Once the token is obtained, it is valid for hours and it is not needed to request a new one for subsequent address verification calls, the AVS charges for every request made no matter if it is client authentication call or address verificationcall.
Which three strategies could be applied to allow for efficient use of the service without compromising security? Choose 3 answers
1. Client authentication call, which contains the merchantId and secret in a GET request and returns a token in the response.
2. Address verification call, which contains the token and the address to verify in a POST request.
Once the token is obtained, it is valid for hours and it is not needed to request a new one for subsequent address verification calls, the AVS charges for every request made no matter if it is client authentication call or address verificationcall.
Which three strategies could be applied to allow for efficient use of the service without compromising security? Choose 3 answers
正解:A,B,D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
The Client wants to offer custom made container products on its new B2C Commerce storefront. TheClient provided two business requirements.
* Customer can specify container length, width, and height.
* Customer can specify the material that the container is made of.
The Client also provided the Architect a current data schema (shown below) for reference while preparing the technical documentation.

Which two gaps between the requirements and the data schema should the Architect discuss with the Client?
Choose 2 answers
* Customer can specify container length, width, and height.
* Customer can specify the material that the container is made of.
The Client also provided the Architect a current data schema (shown below) for reference while preparing the technical documentation.

Which two gaps between the requirements and the data schema should the Architect discuss with the Client?
Choose 2 answers
正解:B,C
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
A new project for a Client will involve a few different Integrations to their middleware system resulting in four different web services. All will use the same credentials to the middleware. Each will have the same timeout, but will require a separate log file prefix.
How should the Architect set this up with the Service framework using a minimal set of configuration?
How should the Architect set this up with the Service framework using a minimal set of configuration?
正解:D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)