You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Salesforce Certified B2C Commerce Architect Practice Test 7 "
0 of 60 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score
Your score
Salesforce Certified B2C Commerce Architect
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
You can review your answers by clicking on “View Answers” option. Important Note : Open Reference Documentation Links in New Tab (Right Click and Open in New Tab).
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Answered
Review
Question 1 of 60
1. Question
Your runbook lists legal/PCI sign-off complete as a pre-cutover task. Post-launch, you discover production logs include masked but unnecessary PAN fragments. What is the correct response?
Correct
Even masked payment data may violate logging policies. Rolling back to the last compliant code version, purging logs per retention policy, and altering logger configuration ensures compliance. Verification in Log Center confirms the change, and a security incident workflow documents impact. Option 1 underestimates compliance risk. Option 3 addresses symptoms without preventing recurrence. Option 4 blinds monitoring and increases operational risk. A controlled rollback plus policy-aligned remediation is required.
Incorrect
Even masked payment data may violate logging policies. Rolling back to the last compliant code version, purging logs per retention policy, and altering logger configuration ensures compliance. Verification in Log Center confirms the change, and a security incident workflow documents impact. Option 1 underestimates compliance risk. Option 3 addresses symptoms without preventing recurrence. Option 4 blinds monitoring and increases operational risk. A controlled rollback plus policy-aligned remediation is required.
Unattempted
Even masked payment data may violate logging policies. Rolling back to the last compliant code version, purging logs per retention policy, and altering logger configuration ensures compliance. Verification in Log Center confirms the change, and a security incident workflow documents impact. Option 1 underestimates compliance risk. Option 3 addresses symptoms without preventing recurrence. Option 4 blinds monitoring and increases operational risk. A controlled rollback plus policy-aligned remediation is required.
Question 2 of 60
2. Question
Your organization maintains multiple cartridges (base, plugins, app_custom) and frequent content/data updates. What end-to-end compile & deploy flow best reduces drift and ensures consistent promotion across environments?
Correct
Option 2 is correct because it separates build from deploy, producing a single immutable artifact per code version and a controlled, repeatable promotion path. CI ensures consistent Node/Webpack versions, linting, and tests before the artifact ever touches an instance. Uploading to Staging via the Deployment API avoids manual UX Studio variability and allows automated smoke tests. Replication from Staging to Production preserves parity and provides auditability. Data as site import XMLs with deterministic ordering prevents partial imports and aligns with replication windows. Option 1 bypasses Staging governance and increases risk. Option 3 invites ordering bugs and activation before verification. Option 4 bloats the repo, risks supply-chain issues, and breaks reproducibility. This process creates a clean artifact trail, reliable rollbacks, and predictable cutovers.
Incorrect
Option 2 is correct because it separates build from deploy, producing a single immutable artifact per code version and a controlled, repeatable promotion path. CI ensures consistent Node/Webpack versions, linting, and tests before the artifact ever touches an instance. Uploading to Staging via the Deployment API avoids manual UX Studio variability and allows automated smoke tests. Replication from Staging to Production preserves parity and provides auditability. Data as site import XMLs with deterministic ordering prevents partial imports and aligns with replication windows. Option 1 bypasses Staging governance and increases risk. Option 3 invites ordering bugs and activation before verification. Option 4 bloats the repo, risks supply-chain issues, and breaks reproducibility. This process creates a clean artifact trail, reliable rollbacks, and predictable cutovers.
Unattempted
Option 2 is correct because it separates build from deploy, producing a single immutable artifact per code version and a controlled, repeatable promotion path. CI ensures consistent Node/Webpack versions, linting, and tests before the artifact ever touches an instance. Uploading to Staging via the Deployment API avoids manual UX Studio variability and allows automated smoke tests. Replication from Staging to Production preserves parity and provides auditability. Data as site import XMLs with deterministic ordering prevents partial imports and aligns with replication windows. Option 1 bypasses Staging governance and increases risk. Option 3 invites ordering bugs and activation before verification. Option 4 bloats the repo, risks supply-chain issues, and breaks reproducibility. This process creates a clean artifact trail, reliable rollbacks, and predictable cutovers.
Question 3 of 60
3. Question
Your site supports en-US, es-MX, and es-ES on one domain. You want search engines to index all three while US visitors default to en-US. Which setup avoids cloaking and preserves discoverability?
Correct
Defaulting via alias to en-US while keeping dedicated, crawlable paths for each locale ensures discoverability. hreflang disambiguates Spanish variants, and avoiding forced redirects for bots prevents cloaking concerns. A visible switcher ensures users can change locales without query parameter hacks. Option 1 can be interpreted as cloaking and harms indexing of alternates. Option 3 makes content invisible to crawlers pre-render and can index the wrong language. Option 4 varies content on the same URL, which confuses canonicalization and hreflang. The chosen approach cleanly separates locales with clear signals.
Incorrect
Defaulting via alias to en-US while keeping dedicated, crawlable paths for each locale ensures discoverability. hreflang disambiguates Spanish variants, and avoiding forced redirects for bots prevents cloaking concerns. A visible switcher ensures users can change locales without query parameter hacks. Option 1 can be interpreted as cloaking and harms indexing of alternates. Option 3 makes content invisible to crawlers pre-render and can index the wrong language. Option 4 varies content on the same URL, which confuses canonicalization and hreflang. The chosen approach cleanly separates locales with clear signals.
Unattempted
Defaulting via alias to en-US while keeping dedicated, crawlable paths for each locale ensures discoverability. hreflang disambiguates Spanish variants, and avoiding forced redirects for bots prevents cloaking concerns. A visible switcher ensures users can change locales without query parameter hacks. Option 1 can be interpreted as cloaking and harms indexing of alternates. Option 3 makes content invisible to crawlers pre-render and can index the wrong language. Option 4 varies content on the same URL, which confuses canonicalization and hreflang. The chosen approach cleanly separates locales with clear signals.
Question 4 of 60
4. Question
A partner insists on campaign links pointing to brand.eu/de (EUR), but sometimes users should see CHF pricing when they navigate into the Swiss catalog section. What alias/currency behavior keeps SEO clean and UX correct?
Correct
Defaulting to EUR on the .eu German paths is correct for campaigns and SEO. Allowing a user-initiated CHF switch inside Swiss sections respects merchandising while not breaking canonical signals for DE pages. Session persistence avoids flip-flopping. Option 1 needlessly forces a separate domain when the use case is sectional. Option 3s IP switching can cause price thrash and poor crawl signals. Option 4s query parameters without canonical handling create duplicate content. The selected behavior balances clear defaults, intentional overrides, and stable SEO.
Incorrect
Defaulting to EUR on the .eu German paths is correct for campaigns and SEO. Allowing a user-initiated CHF switch inside Swiss sections respects merchandising while not breaking canonical signals for DE pages. Session persistence avoids flip-flopping. Option 1 needlessly forces a separate domain when the use case is sectional. Option 3s IP switching can cause price thrash and poor crawl signals. Option 4s query parameters without canonical handling create duplicate content. The selected behavior balances clear defaults, intentional overrides, and stable SEO.
Unattempted
Defaulting to EUR on the .eu German paths is correct for campaigns and SEO. Allowing a user-initiated CHF switch inside Swiss sections respects merchandising while not breaking canonical signals for DE pages. Session persistence avoids flip-flopping. Option 1 needlessly forces a separate domain when the use case is sectional. Option 3s IP switching can cause price thrash and poor crawl signals. Option 4s query parameters without canonical handling create duplicate content. The selected behavior balances clear defaults, intentional overrides, and stable SEO.
Question 5 of 60
5. Question
You must canonicalize www vs root for brand.com, force HTTPS, and ensure locale landing remains intact. Which statement describes the right alias/redirect setup?
Correct
Permanent redirects from root to www and HTTP to HTTPS consolidate signals and are SEO best practice. Using aliases for both hosts ensures the platform recognizes incoming hosts and can preserve the full path (including locale) when redirecting. Option 1s 302s are not appropriate for permanent canonicalization. Option 3s client-side rewrite is late and unreliable for bots. Option 4 still serves duplicate content at multiple hosts/protocols, relying on canonical only. The chosen configuration provides clean, durable canonicalization without breaking locale landing.
Incorrect
Permanent redirects from root to www and HTTP to HTTPS consolidate signals and are SEO best practice. Using aliases for both hosts ensures the platform recognizes incoming hosts and can preserve the full path (including locale) when redirecting. Option 1s 302s are not appropriate for permanent canonicalization. Option 3s client-side rewrite is late and unreliable for bots. Option 4 still serves duplicate content at multiple hosts/protocols, relying on canonical only. The chosen configuration provides clean, durable canonicalization without breaking locale landing.
Unattempted
Permanent redirects from root to www and HTTP to HTTPS consolidate signals and are SEO best practice. Using aliases for both hosts ensures the platform recognizes incoming hosts and can preserve the full path (including locale) when redirecting. Option 1s 302s are not appropriate for permanent canonicalization. Option 3s client-side rewrite is late and unreliable for bots. Option 4 still serves duplicate content at multiple hosts/protocols, relying on canonical only. The chosen configuration provides clean, durable canonicalization without breaking locale landing.
Question 6 of 60
6. Question
A seasonal microsite promo.brand.de should resolve to the German locale of the main site during the promotion, then consolidate back after. You want minimal SEO debt. Whats the correct approach?
Correct
Mapping the promo host as an alias that 301s into the canonical DE paths ensures any links accrued during the campaign are preserved. After the campaign, leaving permanent 301s maintains equity. hreflang continues to live on the destination pages. Option 1 creates duplicate content and poor UX. Option 3s 302 then NXDOMAIN squanders link equity. Option 4 prevents indexing but also loses promotional authority and can harm user sharing. The selected approach provides a reversible marketing entry point without long-term SEO cost.
Incorrect
Mapping the promo host as an alias that 301s into the canonical DE paths ensures any links accrued during the campaign are preserved. After the campaign, leaving permanent 301s maintains equity. hreflang continues to live on the destination pages. Option 1 creates duplicate content and poor UX. Option 3s 302 then NXDOMAIN squanders link equity. Option 4 prevents indexing but also loses promotional authority and can harm user sharing. The selected approach provides a reversible marketing entry point without long-term SEO cost.
Unattempted
Mapping the promo host as an alias that 301s into the canonical DE paths ensures any links accrued during the campaign are preserved. After the campaign, leaving permanent 301s maintains equity. hreflang continues to live on the destination pages. Option 1 creates duplicate content and poor UX. Option 3s 302 then NXDOMAIN squanders link equity. Option 4 prevents indexing but also loses promotional authority and can harm user sharing. The selected approach provides a reversible marketing entry point without long-term SEO cost.
Question 7 of 60
7. Question
Your content team wants short, human-readable slugs for all locales. Some languages require transliteration (e.g., Cyrillic). How do you ensure clean URLs and correct locale/currency landing?
Correct
Locale-specific URL rules with transliteration produce readable, consistent slugs while keeping paths crawlable. Aliases still determine the landing locale/currency, and 301s from legacy paths avoid duplication. hreflang ensures alternates across languages. Option 1 risks messy percent-encoded URLs and inconsistencies. Option 3 erases language relevance and harms local SEO. Option 4 mixes parameters and slugs, creating weak canonicalization and poor UX. The selected method respects language, SEO, and landing behavior together.
Incorrect
Locale-specific URL rules with transliteration produce readable, consistent slugs while keeping paths crawlable. Aliases still determine the landing locale/currency, and 301s from legacy paths avoid duplication. hreflang ensures alternates across languages. Option 1 risks messy percent-encoded URLs and inconsistencies. Option 3 erases language relevance and harms local SEO. Option 4 mixes parameters and slugs, creating weak canonicalization and poor UX. The selected method respects language, SEO, and landing behavior together.
Unattempted
Locale-specific URL rules with transliteration produce readable, consistent slugs while keeping paths crawlable. Aliases still determine the landing locale/currency, and 301s from legacy paths avoid duplication. hreflang ensures alternates across languages. Option 1 risks messy percent-encoded URLs and inconsistencies. Option 3 erases language relevance and harms local SEO. Option 4 mixes parameters and slugs, creating weak canonicalization and poor UX. The selected method respects language, SEO, and landing behavior together.
Question 8 of 60
8. Question
During cutover, you must be able to roll back within 10 minutes if CDN or checkout errors spike. DNS TTL is already reduced. Which rollback plan best satisfies the goal without data loss?
Correct
A fast rollback relies on pre-provisioned origins, certificates, and code version dual-running, so the CDN alias and active code version can be flipped quickly. That avoids costly database restores and prevents order loss. DNS TTL reduction helps, but alias re-pointing at the CDN edge is faster and safer than full DNS reversal. Option 1 introduces data loss risk and long RTO due to backup restoration. Option 2 is close, but omits the explicit pause on replication, which can push problematic data to both versions during rollback. Option 4 preserves DNS but blocks revenue and hurts trust; its not a rollback. The chosen approach delivers a time-bounded, low-risk backout.
Incorrect
A fast rollback relies on pre-provisioned origins, certificates, and code version dual-running, so the CDN alias and active code version can be flipped quickly. That avoids costly database restores and prevents order loss. DNS TTL reduction helps, but alias re-pointing at the CDN edge is faster and safer than full DNS reversal. Option 1 introduces data loss risk and long RTO due to backup restoration. Option 2 is close, but omits the explicit pause on replication, which can push problematic data to both versions during rollback. Option 4 preserves DNS but blocks revenue and hurts trust; its not a rollback. The chosen approach delivers a time-bounded, low-risk backout.
Unattempted
A fast rollback relies on pre-provisioned origins, certificates, and code version dual-running, so the CDN alias and active code version can be flipped quickly. That avoids costly database restores and prevents order loss. DNS TTL reduction helps, but alias re-pointing at the CDN edge is faster and safer than full DNS reversal. Option 1 introduces data loss risk and long RTO due to backup restoration. Option 2 is close, but omits the explicit pause on replication, which can push problematic data to both versions during rollback. Option 4 preserves DNS but blocks revenue and hurts trust; its not a rollback. The chosen approach delivers a time-bounded, low-risk backout.
Question 9 of 60
9. Question
Fifteen minutes after launch, payments fail intermittently. Logs show 401 from the PSPs live endpoint due to profile misconfiguration. What is the best immediate action sequence?
Correct
Targeted rollback of the payment integration is safer and faster than taking the whole site down. Switching to a known-good service profile and rotating credentials in the Service Framework fixes the 401 without full DNS backout. If the controller changed, flipping the active code version is part of the minimal rollback. Option 1 is excessive and causes significant downtime. Option 3 damages conversion and introduces operational risk. Option 4 may violate PSP rules and create settlement failures. Focused remediation keeps revenue flowing and aligns with a well-prepared launch runbook.
Incorrect
Targeted rollback of the payment integration is safer and faster than taking the whole site down. Switching to a known-good service profile and rotating credentials in the Service Framework fixes the 401 without full DNS backout. If the controller changed, flipping the active code version is part of the minimal rollback. Option 1 is excessive and causes significant downtime. Option 3 damages conversion and introduces operational risk. Option 4 may violate PSP rules and create settlement failures. Focused remediation keeps revenue flowing and aligns with a well-prepared launch runbook.
Unattempted
Targeted rollback of the payment integration is safer and faster than taking the whole site down. Switching to a known-good service profile and rotating credentials in the Service Framework fixes the 401 without full DNS backout. If the controller changed, flipping the active code version is part of the minimal rollback. Option 1 is excessive and causes significant downtime. Option 3 damages conversion and introduces operational risk. Option 4 may violate PSP rules and create settlement failures. Focused remediation keeps revenue flowing and aligns with a well-prepared launch runbook.
Question 10 of 60
10. Question
New recommendations features cause service timeouts at peak. You want to keep the site live and measure impact while mitigating. What is the most appropriate move?
Correct
Feature flags allow selective rollback of high-risk features without undoing the entire release. Turning the flag off reduces timeouts quickly while maintaining other improvements. This also preserves search and index state, minimizing side effects. Option 1 is too disruptive and increases recovery work. Option 2 exposes users to errors and hurts performance. Option 3 likely worsens the bottleneck. A granular backout plus monitoring is the safest path aligned with mature release management.
Incorrect
Feature flags allow selective rollback of high-risk features without undoing the entire release. Turning the flag off reduces timeouts quickly while maintaining other improvements. This also preserves search and index state, minimizing side effects. Option 1 is too disruptive and increases recovery work. Option 2 exposes users to errors and hurts performance. Option 3 likely worsens the bottleneck. A granular backout plus monitoring is the safest path aligned with mature release management.
Unattempted
Feature flags allow selective rollback of high-risk features without undoing the entire release. Turning the flag off reduces timeouts quickly while maintaining other improvements. This also preserves search and index state, minimizing side effects. Option 1 is too disruptive and increases recovery work. Option 2 exposes users to errors and hurts performance. Option 3 likely worsens the bottleneck. A granular backout plus monitoring is the safest path aligned with mature release management.
Question 11 of 60
11. Question
Post-production, organic traffic is flat and crawl stats show many 302s from legacy URLs to new canonical paths. What must be verified and corrected first?
Correct
The presence of 302s suggests temporary redirects, which dilute authority consolidation. Converting to 301s and preserving exact paths gives search engines a clear permanent mapping. Canonical and hreflang must match the destination to avoid conflicting signals. Option 2 doesnt address redirect semantics and may slow freshness. Option 3 relies on client-side rewrites that bots can ignore. Option 4 is cloaking risk and harms SEO. Fixing redirect status and signals is the correct first step in a post-launch checklist.
Incorrect
The presence of 302s suggests temporary redirects, which dilute authority consolidation. Converting to 301s and preserving exact paths gives search engines a clear permanent mapping. Canonical and hreflang must match the destination to avoid conflicting signals. Option 2 doesnt address redirect semantics and may slow freshness. Option 3 relies on client-side rewrites that bots can ignore. Option 4 is cloaking risk and harms SEO. Fixing redirect status and signals is the correct first step in a post-launch checklist.
Unattempted
The presence of 302s suggests temporary redirects, which dilute authority consolidation. Converting to 301s and preserving exact paths gives search engines a clear permanent mapping. Canonical and hreflang must match the destination to avoid conflicting signals. Option 2 doesnt address redirect semantics and may slow freshness. Option 3 relies on client-side rewrites that bots can ignore. Option 4 is cloaking risk and harms SEO. Fixing redirect status and signals is the correct first step in a post-launch checklist.
Question 12 of 60
12. Question
Your launch plan includes go/no-go and T+60 min validation. Which items should be in the first 60-minute validation set?
Correct
The first hour focuses on availability and revenue-path validation. Smoke tests verify core flows, while dashboards confirm latency, error rates, and external dependencies. Option 1 is too heavy and risky to run right after cutover. Option 3 and 4 are important but belong slightly later in the post-production plan. Prioritizing payments, cart, identity, and critical services aligns with a disciplined launch checklist.
Incorrect
The first hour focuses on availability and revenue-path validation. Smoke tests verify core flows, while dashboards confirm latency, error rates, and external dependencies. Option 1 is too heavy and risky to run right after cutover. Option 3 and 4 are important but belong slightly later in the post-production plan. Prioritizing payments, cart, identity, and critical services aligns with a disciplined launch checklist.
Unattempted
The first hour focuses on availability and revenue-path validation. Smoke tests verify core flows, while dashboards confirm latency, error rates, and external dependencies. Option 1 is too heavy and risky to run right after cutover. Option 3 and 4 are important but belong slightly later in the post-production plan. Prioritizing payments, cart, identity, and critical services aligns with a disciplined launch checklist.
Question 13 of 60
13. Question
A replication push after launch accidentally changed tax rounding preferences. Orders show mismatched totals. What is the quickest, safest correction?
Correct
Using a pre-launch preferences snapshot keeps the change scoped and reversible. Re-replicating just preferences corrects behavior with minimal impact. Option 1 is dangerous and overbroad. Option 2 risks missing related dependent settings and drifts from controlled replication. Option 4 allows bad orders to continue. Precise rollback using the captured snapshot is the intended safeguard in a launch plan.
Incorrect
Using a pre-launch preferences snapshot keeps the change scoped and reversible. Re-replicating just preferences corrects behavior with minimal impact. Option 1 is dangerous and overbroad. Option 2 risks missing related dependent settings and drifts from controlled replication. Option 4 allows bad orders to continue. Precise rollback using the captured snapshot is the intended safeguard in a launch plan.
Unattempted
Using a pre-launch preferences snapshot keeps the change scoped and reversible. Re-replicating just preferences corrects behavior with minimal impact. Option 1 is dangerous and overbroad. Option 2 risks missing related dependent settings and drifts from controlled replication. Option 4 allows bad orders to continue. Precise rollback using the captured snapshot is the intended safeguard in a launch plan.
Question 14 of 60
14. Question
You are launching three locales. After cutover, only the JP locale has 5xx on checkout due to a PSP locale config. What is the best approach?
Correct
Localized rollback avoids collateral damage. If code or service configuration can be segmented by locale, reverting just JPs PSP profile or code version resolves the checkout issue while preserving other markets. Option 1 penalizes all locales unnecessarily. Option 2 halts revenue entirely in JP. Option 3 might preserve browsing but still loses orders and introduces SEO complexities. A targeted backout plus comms is the correct, minimal-impact response.
Incorrect
Localized rollback avoids collateral damage. If code or service configuration can be segmented by locale, reverting just JPs PSP profile or code version resolves the checkout issue while preserving other markets. Option 1 penalizes all locales unnecessarily. Option 2 halts revenue entirely in JP. Option 3 might preserve browsing but still loses orders and introduces SEO complexities. A targeted backout plus comms is the correct, minimal-impact response.
Unattempted
Localized rollback avoids collateral damage. If code or service configuration can be segmented by locale, reverting just JPs PSP profile or code version resolves the checkout issue while preserving other markets. Option 1 penalizes all locales unnecessarily. Option 2 halts revenue entirely in JP. Option 3 might preserve browsing but still loses orders and introduces SEO complexities. A targeted backout plus comms is the correct, minimal-impact response.
Question 15 of 60
15. Question
After launch, CDN cache hit rate is poor and origin is overloaded. What is the best immediate remediation that aligns with the launch checklist?
Correct
Proper cache configuration reduces origin load and improves TTFB. Defining cache keys and vary headers prevents cross-locale leakage while allowing HTML caching where safe, and warming popular pages stabilizes hit rates. Option 1 further reduces effectiveness. Option 3 amplifies origin pressure. Option 4 is costly and treats symptoms, not cause. The checklist should include cache verification and warm-up procedures for post-production stabilization.
Incorrect
Proper cache configuration reduces origin load and improves TTFB. Defining cache keys and vary headers prevents cross-locale leakage while allowing HTML caching where safe, and warming popular pages stabilizes hit rates. Option 1 further reduces effectiveness. Option 3 amplifies origin pressure. Option 4 is costly and treats symptoms, not cause. The checklist should include cache verification and warm-up procedures for post-production stabilization.
Unattempted
Proper cache configuration reduces origin load and improves TTFB. Defining cache keys and vary headers prevents cross-locale leakage while allowing HTML caching where safe, and warming popular pages stabilizes hit rates. Option 1 further reduces effectiveness. Option 3 amplifies origin pressure. Option 4 is costly and treats symptoms, not cause. The checklist should include cache verification and warm-up procedures for post-production stabilization.
Question 16 of 60
16. Question
A migration changes product URL patterns from /p/{slug} to /products/{category}/{slug}. Old links must consolidate to the new structure without creating duplicate content across locales. Whats the best plan?
Correct
Permanent 301s from the old pattern to the new prevent duplication and pass equity. Locale segmentation in rules ensures /en-GB paths map to their GB equivalents. Updating sitemaps accelerates discovery, and hreflang remains on the destination URLs. Option 1 serves duplicates, leaving consolidation to canonical only (weaker). Option 2s 302s dont pass clear permanence. Option 4 hides pages from crawling but preserves them in the index for a time, producing soft errors. The alias-based 301 mapping is the robust migration approach.
Incorrect
Permanent 301s from the old pattern to the new prevent duplication and pass equity. Locale segmentation in rules ensures /en-GB paths map to their GB equivalents. Updating sitemaps accelerates discovery, and hreflang remains on the destination URLs. Option 1 serves duplicates, leaving consolidation to canonical only (weaker). Option 2s 302s dont pass clear permanence. Option 4 hides pages from crawling but preserves them in the index for a time, producing soft errors. The alias-based 301 mapping is the robust migration approach.
Unattempted
Permanent 301s from the old pattern to the new prevent duplication and pass equity. Locale segmentation in rules ensures /en-GB paths map to their GB equivalents. Updating sitemaps accelerates discovery, and hreflang remains on the destination URLs. Option 1 serves duplicates, leaving consolidation to canonical only (weaker). Option 2s 302s dont pass clear permanence. Option 4 hides pages from crawling but preserves them in the index for a time, producing soft errors. The alias-based 301 mapping is the robust migration approach.
Question 17 of 60
17. Question
A last-minute hotfix is deployed right before go-live and skips a tag in the runbook. After launch, search indexing jobs fail. What should you do first according to a disciplined post-production plan?
Correct
The manifest is the source of truth; verifying against it reveals missing job definitions or permissions. Restoring from tagged artifacts is a safe, scoped fix, and then rerunning the index build brings search online. Option 1 is disruptive and unnecessary. Option 3 halts revenue without clear benefit. Option 4 risks further failures by adding load. A manifest-driven correction followed by targeted re-execution is the best practice.
Incorrect
The manifest is the source of truth; verifying against it reveals missing job definitions or permissions. Restoring from tagged artifacts is a safe, scoped fix, and then rerunning the index build brings search online. Option 1 is disruptive and unnecessary. Option 3 halts revenue without clear benefit. Option 4 risks further failures by adding load. A manifest-driven correction followed by targeted re-execution is the best practice.
Unattempted
The manifest is the source of truth; verifying against it reveals missing job definitions or permissions. Restoring from tagged artifacts is a safe, scoped fix, and then rerunning the index build brings search online. Option 1 is disruptive and unnecessary. Option 3 halts revenue without clear benefit. Option 4 risks further failures by adding load. A manifest-driven correction followed by targeted re-execution is the best practice.
Question 18 of 60
18. Question
At T+5 minutes postDNS cutover, which dashboard composition gives the most reliable signal that the site is healthy across the stack?
Correct
System health at launch is best measured by technical indicators across layers: latency percentiles, error rates per controller, cache efficacy, and downstream service health. Synthetic smoke confirms end-to-end flows. Option 1 is useful but lags and can mask technical issues early. Option 3 mixes environments and lacks structured metrics by component. Option 4 uses averages and sessions, which hide tail latency and specific failure domains. The chosen set offers breadth (edge, app, services) and depth (by endpoint/ID), enabling fast diagnosis. It also correlates user-path uptime with infrastructure signals. Cache hit ratio reveals whether origin is overloaded. Service timeouts isolate third-party instability. OCAPI/SCAPI errors highlight headless and app usage issues. This holistic view supports confident go/no-go checks.
Incorrect
System health at launch is best measured by technical indicators across layers: latency percentiles, error rates per controller, cache efficacy, and downstream service health. Synthetic smoke confirms end-to-end flows. Option 1 is useful but lags and can mask technical issues early. Option 3 mixes environments and lacks structured metrics by component. Option 4 uses averages and sessions, which hide tail latency and specific failure domains. The chosen set offers breadth (edge, app, services) and depth (by endpoint/ID), enabling fast diagnosis. It also correlates user-path uptime with infrastructure signals. Cache hit ratio reveals whether origin is overloaded. Service timeouts isolate third-party instability. OCAPI/SCAPI errors highlight headless and app usage issues. This holistic view supports confident go/no-go checks.
Unattempted
System health at launch is best measured by technical indicators across layers: latency percentiles, error rates per controller, cache efficacy, and downstream service health. Synthetic smoke confirms end-to-end flows. Option 1 is useful but lags and can mask technical issues early. Option 3 mixes environments and lacks structured metrics by component. Option 4 uses averages and sessions, which hide tail latency and specific failure domains. The chosen set offers breadth (edge, app, services) and depth (by endpoint/ID), enabling fast diagnosis. It also correlates user-path uptime with infrastructure signals. Cache hit ratio reveals whether origin is overloaded. Service timeouts isolate third-party instability. OCAPI/SCAPI errors highlight headless and app usage issues. This holistic view supports confident go/no-go checks.
Question 19 of 60
19. Question
During the first 30 minutes, synthetic checkout fails intermittently while real-user errors are low. What should you verify first to determine if theres a systemic issue?
Correct
Synthetic failures can be configuration drift rather than real defects. Validating credentials, aliases, and locale-specific paths ensures the monitors reflect production reality. Option 1 is orthogonal to checkout success. Option 3 matters for search but rarely causes PSP-specific failures. Option 4 is unrelated to checkout. By checking monitor parity first, you avoid misclassifying noise as a launch incident. If parity is correct and failures persist, you can then escalate to Service Framework logs. This step preserves focus and reduces false positives. It also aligns with a runbook step: validate monitors after cutover. Accurate monitors are essential for ongoing SLO enforcement.
Incorrect
Synthetic failures can be configuration drift rather than real defects. Validating credentials, aliases, and locale-specific paths ensures the monitors reflect production reality. Option 1 is orthogonal to checkout success. Option 3 matters for search but rarely causes PSP-specific failures. Option 4 is unrelated to checkout. By checking monitor parity first, you avoid misclassifying noise as a launch incident. If parity is correct and failures persist, you can then escalate to Service Framework logs. This step preserves focus and reduces false positives. It also aligns with a runbook step: validate monitors after cutover. Accurate monitors are essential for ongoing SLO enforcement.
Unattempted
Synthetic failures can be configuration drift rather than real defects. Validating credentials, aliases, and locale-specific paths ensures the monitors reflect production reality. Option 1 is orthogonal to checkout success. Option 3 matters for search but rarely causes PSP-specific failures. Option 4 is unrelated to checkout. By checking monitor parity first, you avoid misclassifying noise as a launch incident. If parity is correct and failures persist, you can then escalate to Service Framework logs. This step preserves focus and reduces false positives. It also aligns with a runbook step: validate monitors after cutover. Accurate monitors are essential for ongoing SLO enforcement.
Question 20 of 60
20. Question
Ten minutes after go-live, CDN hit ratio is 25% and origin CPU is spiking. Which immediate action gives the clearest signal improvement without risking stale content or localization leakage?
Correct
Correctly keyed HTML caching improves performance and protects localization. Warming top routes accelerates stabilization. Option 2 worsens load and latency. Option 3 treats symptoms and delays feedback on cache configuration. Option 4 prevents cache from converging and causes thundering herds. With proper vary headers, you avoid cross-locale bleed. Monitoring QPS and p95 confirms success. This approach is reversible if anomalies appear. It aligns with a standard cache validation checklist. It also lowers error amplification from downstream services. The result is a safer, clearer health signal in minutes.
Incorrect
Correctly keyed HTML caching improves performance and protects localization. Warming top routes accelerates stabilization. Option 2 worsens load and latency. Option 3 treats symptoms and delays feedback on cache configuration. Option 4 prevents cache from converging and causes thundering herds. With proper vary headers, you avoid cross-locale bleed. Monitoring QPS and p95 confirms success. This approach is reversible if anomalies appear. It aligns with a standard cache validation checklist. It also lowers error amplification from downstream services. The result is a safer, clearer health signal in minutes.
Unattempted
Correctly keyed HTML caching improves performance and protects localization. Warming top routes accelerates stabilization. Option 2 worsens load and latency. Option 3 treats symptoms and delays feedback on cache configuration. Option 4 prevents cache from converging and causes thundering herds. With proper vary headers, you avoid cross-locale bleed. Monitoring QPS and p95 confirms success. This approach is reversible if anomalies appear. It aligns with a standard cache validation checklist. It also lowers error amplification from downstream services. The result is a safer, clearer health signal in minutes.
Question 21 of 60
21. Question
Your p99 latency spikes while p50 remains stable. Error rate is flat. Which dashboard drill-down is most likely to identify the cause?
Correct
Divergence between p50 and p99 indicates tail latency, often from specific endpoints or slow dependencies. Endpoint histograms and service timing expose outliers and retry storms. Option 1 is observational and not causal. Option 2 is limited in SFCC and rarely isolative for controller-level slowness. Option 4 is a lagging business metric. The drill-down correlates slow controllers with service calls. It reveals whether timeouts or high retry counts drive tails. It also shows if caching is bypassed. This method supports targeted mitigation (e.g., disable a feature flag). Its a core health-indicator practice at launch.
Incorrect
Divergence between p50 and p99 indicates tail latency, often from specific endpoints or slow dependencies. Endpoint histograms and service timing expose outliers and retry storms. Option 1 is observational and not causal. Option 2 is limited in SFCC and rarely isolative for controller-level slowness. Option 4 is a lagging business metric. The drill-down correlates slow controllers with service calls. It reveals whether timeouts or high retry counts drive tails. It also shows if caching is bypassed. This method supports targeted mitigation (e.g., disable a feature flag). Its a core health-indicator practice at launch.
Unattempted
Divergence between p50 and p99 indicates tail latency, often from specific endpoints or slow dependencies. Endpoint histograms and service timing expose outliers and retry storms. Option 1 is observational and not causal. Option 2 is limited in SFCC and rarely isolative for controller-level slowness. Option 4 is a lagging business metric. The drill-down correlates slow controllers with service calls. It reveals whether timeouts or high retry counts drive tails. It also shows if caching is bypassed. This method supports targeted mitigation (e.g., disable a feature flag). Its a core health-indicator practice at launch.
Question 22 of 60
22. Question
Alerts show increasing 429s from SCAPI during peak. Error budget for API clients is at risk. What is the best immediate stabilization step?
Correct
Per-client throttling preserves platform health while isolating heavy clients. Encouraging exponential backoff reduces retry storms. Option 1 may exceed safe capacity and hides abuse. Option 3 removes a channel and can break integrations. Option 4 adds origin pressure and worsens conditions. Monitoring per-client quota usage is a standard health indicator. Circuit-breakers protect user flows from cascading failures. This action buys time to analyze long-term scaling. It aligns with least-disruption stabilization. It also protects the error budget for other channels.
Incorrect
Per-client throttling preserves platform health while isolating heavy clients. Encouraging exponential backoff reduces retry storms. Option 1 may exceed safe capacity and hides abuse. Option 3 removes a channel and can break integrations. Option 4 adds origin pressure and worsens conditions. Monitoring per-client quota usage is a standard health indicator. Circuit-breakers protect user flows from cascading failures. This action buys time to analyze long-term scaling. It aligns with least-disruption stabilization. It also protects the error budget for other channels.
Unattempted
Per-client throttling preserves platform health while isolating heavy clients. Encouraging exponential backoff reduces retry storms. Option 1 may exceed safe capacity and hides abuse. Option 3 removes a channel and can break integrations. Option 4 adds origin pressure and worsens conditions. Monitoring per-client quota usage is a standard health indicator. Circuit-breakers protect user flows from cascading failures. This action buys time to analyze long-term scaling. It aligns with least-disruption stabilization. It also protects the error budget for other channels.
Question 23 of 60
23. Question
You see elevated payment declines and increased PSP timeouts. A/B groups show the issue only on one tender route. What should you check first to confirm health vs. configuration?
Correct
A tender-specific failure points to service configuration or endpoint selection. Verifying the Service Framework profile ensures the route targets correct credentials and URLs. Option 1 is unrelated to declines and timeouts. Option 3 concerns search, not payments. Option 4 is too broad; TLS issues would affect more routes. Comparing logs across A/B variants confirms where latency and errors originate. This isolates config drift from platform health. It lets you remediate without full rollback. Its an expected step in launch health checks. It keeps revenue impact minimal while evidence is gathered.
Incorrect
A tender-specific failure points to service configuration or endpoint selection. Verifying the Service Framework profile ensures the route targets correct credentials and URLs. Option 1 is unrelated to declines and timeouts. Option 3 concerns search, not payments. Option 4 is too broad; TLS issues would affect more routes. Comparing logs across A/B variants confirms where latency and errors originate. This isolates config drift from platform health. It lets you remediate without full rollback. Its an expected step in launch health checks. It keeps revenue impact minimal while evidence is gathered.
Unattempted
A tender-specific failure points to service configuration or endpoint selection. Verifying the Service Framework profile ensures the route targets correct credentials and URLs. Option 1 is unrelated to declines and timeouts. Option 3 concerns search, not payments. Option 4 is too broad; TLS issues would affect more routes. Comparing logs across A/B variants confirms where latency and errors originate. This isolates config drift from platform health. It lets you remediate without full rollback. Its an expected step in launch health checks. It keeps revenue impact minimal while evidence is gathered.
Question 24 of 60
24. Question
Inventory calls to OMS occasionally exceed timeout thresholds, but PDPs still render. What monitoring change improves detection without over-alerting?
Correct
Tail-latency thresholds with correlation provide a balanced signal. Monitoring fallback rates indicates user impact. Option 1 creates noise and lacks context. Option 3 misses slow failures that degrade UX. Option 4 is a broad performance metric not specific to OMS health. By focusing on p95/p99 and fallbacks, you detect real issues early. Correlating with error rate avoids false positives. This supports SLO-based alerting. It aligns with proactive launch monitoring. It guides targeted scaling and caching changes.
Incorrect
Tail-latency thresholds with correlation provide a balanced signal. Monitoring fallback rates indicates user impact. Option 1 creates noise and lacks context. Option 3 misses slow failures that degrade UX. Option 4 is a broad performance metric not specific to OMS health. By focusing on p95/p99 and fallbacks, you detect real issues early. Correlating with error rate avoids false positives. This supports SLO-based alerting. It aligns with proactive launch monitoring. It guides targeted scaling and caching changes.
Unattempted
Tail-latency thresholds with correlation provide a balanced signal. Monitoring fallback rates indicates user impact. Option 1 creates noise and lacks context. Option 3 misses slow failures that degrade UX. Option 4 is a broad performance metric not specific to OMS health. By focusing on p95/p99 and fallbacks, you detect real issues early. Correlating with error rate avoids false positives. This supports SLO-based alerting. It aligns with proactive launch monitoring. It guides targeted scaling and caching changes.
Question 25 of 60
25. Question
After launch, replication to Production just ran. Suddenly, login errors spike for a subset of users using SSO. Which health indicator correlation is most useful first?
Correct
Replication can move configuration. Correlating BM audit logs for identity settings with specific SSO error codes quickly identifies misconfiguration. Option 1 is unrelated to SSO. Option 2 concerns search. Option 4 is lagging and non-diagnostic. Mapping errors to routes confirms whether login flow or callback is failing. This narrows to IDP metadata, certificates, or callback URLs. Its a standard post-replication health check. Quick identification allows config rollback. It minimizes authentication downtime. It aligns with controlled launch procedures.
Incorrect
Replication can move configuration. Correlating BM audit logs for identity settings with specific SSO error codes quickly identifies misconfiguration. Option 1 is unrelated to SSO. Option 2 concerns search. Option 4 is lagging and non-diagnostic. Mapping errors to routes confirms whether login flow or callback is failing. This narrows to IDP metadata, certificates, or callback URLs. Its a standard post-replication health check. Quick identification allows config rollback. It minimizes authentication downtime. It aligns with controlled launch procedures.
Unattempted
Replication can move configuration. Correlating BM audit logs for identity settings with specific SSO error codes quickly identifies misconfiguration. Option 1 is unrelated to SSO. Option 2 concerns search. Option 4 is lagging and non-diagnostic. Mapping errors to routes confirms whether login flow or callback is failing. This narrows to IDP metadata, certificates, or callback URLs. Its a standard post-replication health check. Quick identification allows config rollback. It minimizes authentication downtime. It aligns with controlled launch procedures.
Question 26 of 60
26. Question
Ops flags a rise in 404s on localized PDPs shortly after launch. What monitoring validation best distinguishes routing issues from catalog gaps?
Correct
Route-pattern and locale analysis reveals whether slugs or aliases are misconfigured. Joining with online flags and sitemap exports distinguishes missing products from routing. Option 1 lacks diagnostics. Option 3 introduces user-visible regressions. Option 4 hides the problem and hurts agility. Validating locale alias/slug mappings is a core health task after launch. It ensures bots and users land correctly. It supports rapid remediation via redirects. It preserves SEO equity. It directly targets the issue domain.
Incorrect
Route-pattern and locale analysis reveals whether slugs or aliases are misconfigured. Joining with online flags and sitemap exports distinguishes missing products from routing. Option 1 lacks diagnostics. Option 3 introduces user-visible regressions. Option 4 hides the problem and hurts agility. Validating locale alias/slug mappings is a core health task after launch. It ensures bots and users land correctly. It supports rapid remediation via redirects. It preserves SEO equity. It directly targets the issue domain.
Unattempted
Route-pattern and locale analysis reveals whether slugs or aliases are misconfigured. Joining with online flags and sitemap exports distinguishes missing products from routing. Option 1 lacks diagnostics. Option 3 introduces user-visible regressions. Option 4 hides the problem and hurts agility. Validating locale alias/slug mappings is a core health task after launch. It ensures bots and users land correctly. It supports rapid remediation via redirects. It preserves SEO equity. It directly targets the issue domain.
Question 27 of 60
27. Question
Ten minutes postfeature toggle, you see flat error rates but rising client-side long tasks and CLS on PLPs. What should your health monitoring workflow do next?
Correct
Health isnt only server-side; front-end regressions matter. RUM with Web Vitals per template and device gives precise impact. Correlating with controller and CDN rules out backend causes. Option 1 is heavy-handed without backend issues. Option 3 can worsen stale content and not fix long tasks. Option 4 waits for user harm. Rolling back the specific bundle is targeted if RUM confirms. This approach embeds UX metrics in launch health. It prevents silent performance debt. It aligns with comprehensive monitoring. It protects conversion before it dips.
Incorrect
Health isnt only server-side; front-end regressions matter. RUM with Web Vitals per template and device gives precise impact. Correlating with controller and CDN rules out backend causes. Option 1 is heavy-handed without backend issues. Option 3 can worsen stale content and not fix long tasks. Option 4 waits for user harm. Rolling back the specific bundle is targeted if RUM confirms. This approach embeds UX metrics in launch health. It prevents silent performance debt. It aligns with comprehensive monitoring. It protects conversion before it dips.
Unattempted
Health isnt only server-side; front-end regressions matter. RUM with Web Vitals per template and device gives precise impact. Correlating with controller and CDN rules out backend causes. Option 1 is heavy-handed without backend issues. Option 3 can worsen stale content and not fix long tasks. Option 4 waits for user harm. Rolling back the specific bundle is targeted if RUM confirms. This approach embeds UX metrics in launch health. It prevents silent performance debt. It aligns with comprehensive monitoring. It protects conversion before it dips.
Question 28 of 60
28. Question
Your client is migrating 8M customer accounts from a legacy site to SFCC with a requirement of no forced password resets and zero downtime. Legacy passwords are salted bcrypt with user-specific salts. Which migration approach best satisfies security and customer experience?
Correct
JIT migration preserves UX because customers keep using existing credentials without a reset and are upgraded seamlessly. Storing legacy metadata allows the login hook to verify with the old algorithm and then rehash to the platform standard to improve security. Option 1 violates the no forced reset requirement and creates deliverability risk. Option 2 leaves legacy hashes indefinitely and fails to meet the platform policy objective. Option 4 introduces unacceptable downtime and operational risk. JIT scales horizontally because only first logins pay the verification cost. It reduces blast radius if issues arise because legacy fields are removed progressively. It is straightforward to roll back by toggling the hook if needed. Auditable logs can confirm rehash completion rates. This pattern is widely used for secure, low-friction cutovers.
Incorrect
JIT migration preserves UX because customers keep using existing credentials without a reset and are upgraded seamlessly. Storing legacy metadata allows the login hook to verify with the old algorithm and then rehash to the platform standard to improve security. Option 1 violates the no forced reset requirement and creates deliverability risk. Option 2 leaves legacy hashes indefinitely and fails to meet the platform policy objective. Option 4 introduces unacceptable downtime and operational risk. JIT scales horizontally because only first logins pay the verification cost. It reduces blast radius if issues arise because legacy fields are removed progressively. It is straightforward to roll back by toggling the hook if needed. Auditable logs can confirm rehash completion rates. This pattern is widely used for secure, low-friction cutovers.
Unattempted
JIT migration preserves UX because customers keep using existing credentials without a reset and are upgraded seamlessly. Storing legacy metadata allows the login hook to verify with the old algorithm and then rehash to the platform standard to improve security. Option 1 violates the no forced reset requirement and creates deliverability risk. Option 2 leaves legacy hashes indefinitely and fails to meet the platform policy objective. Option 4 introduces unacceptable downtime and operational risk. JIT scales horizontally because only first logins pay the verification cost. It reduces blast radius if issues arise because legacy fields are removed progressively. It is straightforward to roll back by toggling the hook if needed. Auditable logs can confirm rehash completion rates. This pattern is widely used for secure, low-friction cutovers.
Question 29 of 60
29. Question
A global catalog migration requires preserving existing SEO URLs and product IDs for analytics continuity across locales. Feeds arrive from PIM with new GUIDs and locale-specific slugs. What should the technical plan mandate?
Correct
Deterministic ID mapping preserves identities for analytics and downstream systems while allowing ingestion of new PIM GUIDs. Loading the master first ensures products exist before locale attributes, minimizing orphan risk. Computing URL keys from legacy values maintains SEO equity. A single reindex reduces load and avoids partial indexing with mismatched locales. Option 1 produces churn in URLs and breaks analytics continuity. Option 3 risks referential issues if locales precede the master, and wastes resources with multiple reindexes. Option 4 harms both tracking and organic rankings even with redirects. Pre-validation avoids runtime failures during replication. The plan also simplifies rollback because mappings are explicit. It ensures consistent product identity across channels and locales.
Incorrect
Deterministic ID mapping preserves identities for analytics and downstream systems while allowing ingestion of new PIM GUIDs. Loading the master first ensures products exist before locale attributes, minimizing orphan risk. Computing URL keys from legacy values maintains SEO equity. A single reindex reduces load and avoids partial indexing with mismatched locales. Option 1 produces churn in URLs and breaks analytics continuity. Option 3 risks referential issues if locales precede the master, and wastes resources with multiple reindexes. Option 4 harms both tracking and organic rankings even with redirects. Pre-validation avoids runtime failures during replication. The plan also simplifies rollback because mappings are explicit. It ensures consistent product identity across channels and locales.
Unattempted
Deterministic ID mapping preserves identities for analytics and downstream systems while allowing ingestion of new PIM GUIDs. Loading the master first ensures products exist before locale attributes, minimizing orphan risk. Computing URL keys from legacy values maintains SEO equity. A single reindex reduces load and avoids partial indexing with mismatched locales. Option 1 produces churn in URLs and breaks analytics continuity. Option 3 risks referential issues if locales precede the master, and wastes resources with multiple reindexes. Option 4 harms both tracking and organic rankings even with redirects. Pre-validation avoids runtime failures during replication. The plan also simplifies rollback because mappings are explicit. It ensures consistent product identity across channels and locales.
Question 30 of 60
30. Question
The business wants 18 months of historical orders in My Account day one, but Production quotas are tight and emails must not resend. How should you approach order history migration?
Correct
Using batch imports with suppression flags prevents duplicate communications while honoring historical context. Preserving order numbers (or a reserved prefix strategy) keeps customer recognition and downstream references intact. Throttling imports off-peak respects quota and avoids contention. Reconciling counts before replication ensures correctness. Option 1 risks customer-facing downtime and operational errors. Option 2 introduces cross-environment data access that violates governance and latency expectations. Option 4 loses granular data needed for returns, taxation, and service. Proper sequencing avoids index or cache inconsistencies. Disable only event triggers tied to the import operation, not global emails. Post-import validation and a dry-run in a full-copy sandbox reduce risk.
Incorrect
Using batch imports with suppression flags prevents duplicate communications while honoring historical context. Preserving order numbers (or a reserved prefix strategy) keeps customer recognition and downstream references intact. Throttling imports off-peak respects quota and avoids contention. Reconciling counts before replication ensures correctness. Option 1 risks customer-facing downtime and operational errors. Option 2 introduces cross-environment data access that violates governance and latency expectations. Option 4 loses granular data needed for returns, taxation, and service. Proper sequencing avoids index or cache inconsistencies. Disable only event triggers tied to the import operation, not global emails. Post-import validation and a dry-run in a full-copy sandbox reduce risk.
Unattempted
Using batch imports with suppression flags prevents duplicate communications while honoring historical context. Preserving order numbers (or a reserved prefix strategy) keeps customer recognition and downstream references intact. Throttling imports off-peak respects quota and avoids contention. Reconciling counts before replication ensures correctness. Option 1 risks customer-facing downtime and operational errors. Option 2 introduces cross-environment data access that violates governance and latency expectations. Option 4 loses granular data needed for returns, taxation, and service. Proper sequencing avoids index or cache inconsistencies. Disable only event triggers tied to the import operation, not global emails. Post-import validation and a dry-run in a full-copy sandbox reduce risk.
Question 31 of 60
31. Question
CI/CD must validate that pipeline endpoints fronted by SFRA gateways remain functional after cartridge updates. What test design is most appropriate?
Correct
End-to-end integration tests are vital when two execution models meet. Exercising the SFRA gateway ensures middleware protections work, redirects remain intact, and pipeline behavior still produces the expected side effects. Embedding correlation IDs simplifies log triage across both stacks. Blocking direct pipeline URLs in tests verifies that traffic must traverse the controlled gateway. Option 1 lacks confidence because unit tests wont catch routing, security, or integration regressions. Option 3 is slow, error-prone, and not repeatable. Option 4 checks only superficial status codes and bypasses the very gateway you rely on for policy enforcement. Robust integration tests deliver the right safety net for mixed pipeline/controller deployments.
Incorrect
End-to-end integration tests are vital when two execution models meet. Exercising the SFRA gateway ensures middleware protections work, redirects remain intact, and pipeline behavior still produces the expected side effects. Embedding correlation IDs simplifies log triage across both stacks. Blocking direct pipeline URLs in tests verifies that traffic must traverse the controlled gateway. Option 1 lacks confidence because unit tests wont catch routing, security, or integration regressions. Option 3 is slow, error-prone, and not repeatable. Option 4 checks only superficial status codes and bypasses the very gateway you rely on for policy enforcement. Robust integration tests deliver the right safety net for mixed pipeline/controller deployments.
Unattempted
End-to-end integration tests are vital when two execution models meet. Exercising the SFRA gateway ensures middleware protections work, redirects remain intact, and pipeline behavior still produces the expected side effects. Embedding correlation IDs simplifies log triage across both stacks. Blocking direct pipeline URLs in tests verifies that traffic must traverse the controlled gateway. Option 1 lacks confidence because unit tests wont catch routing, security, or integration regressions. Option 3 is slow, error-prone, and not repeatable. Option 4 checks only superficial status codes and bypasses the very gateway you rely on for policy enforcement. Robust integration tests deliver the right safety net for mixed pipeline/controller deployments.
Question 32 of 60
32. Question
Marketing wants daily customer exports to a CDP in CSV, with PII masked except for hashed emails (SHA-256 + salt). The export must be split into 500k-row files and transferred securely. Which design satisfies all needs?
Correct
The second option addresses privacy, scale, and security within the Job Framework. Chunked queries avoid memory pressure, while deterministic hashing with a securely stored salt creates stable identifiers without exposing raw emails. File splitting by row count eases downstream ingestion, and SFTP with PGP protects data in transit and at rest. Logging only metrics prevents PII leakage. Option 1 is insecure and operationally fragile; emailing large sensitive files is a bad practice and hard-limited. Option 3 circumvents governance and exposes PII to client machines. Option 4 converts batch to chatty real-time calls, risking rate limits and complicating retries. The selected design is compliant, scalable, and auditable.
Incorrect
The second option addresses privacy, scale, and security within the Job Framework. Chunked queries avoid memory pressure, while deterministic hashing with a securely stored salt creates stable identifiers without exposing raw emails. File splitting by row count eases downstream ingestion, and SFTP with PGP protects data in transit and at rest. Logging only metrics prevents PII leakage. Option 1 is insecure and operationally fragile; emailing large sensitive files is a bad practice and hard-limited. Option 3 circumvents governance and exposes PII to client machines. Option 4 converts batch to chatty real-time calls, risking rate limits and complicating retries. The selected design is compliant, scalable, and auditable.
Unattempted
The second option addresses privacy, scale, and security within the Job Framework. Chunked queries avoid memory pressure, while deterministic hashing with a securely stored salt creates stable identifiers without exposing raw emails. File splitting by row count eases downstream ingestion, and SFTP with PGP protects data in transit and at rest. Logging only metrics prevents PII leakage. Option 1 is insecure and operationally fragile; emailing large sensitive files is a bad practice and hard-limited. Option 3 circumvents governance and exposes PII to client machines. Option 4 converts batch to chatty real-time calls, risking rate limits and complicating retries. The selected design is compliant, scalable, and auditable.
Question 33 of 60
33. Question
Finance needs a month-end order revenue reconciliation that joins order data with tax files delivered by the tax vendor. The run can take hours but must not impact cache or storefront responsiveness. What Job configuration is best?
Correct
The second option uses the Job Framework to perform a heavy but isolated batch task. Streaming and read-only queries minimize database contention, while writing outputs to a Custom Object and files gives both API and file-based consumers access. Low Job priority and off-peak scheduling reduce resource contention, and avoiding cache invalidations prevents collateral impact on shoppers. Option 1 misuses controllers and can still collide with traffic or time out. Option 3 increases load and changes historical data, which is undesirable for reconciliation. Option 4 fragments the process and relies on manual steps, losing repeatability and auditability. The chosen configuration is safe, observable, and reproducible.
Incorrect
The second option uses the Job Framework to perform a heavy but isolated batch task. Streaming and read-only queries minimize database contention, while writing outputs to a Custom Object and files gives both API and file-based consumers access. Low Job priority and off-peak scheduling reduce resource contention, and avoiding cache invalidations prevents collateral impact on shoppers. Option 1 misuses controllers and can still collide with traffic or time out. Option 3 increases load and changes historical data, which is undesirable for reconciliation. Option 4 fragments the process and relies on manual steps, losing repeatability and auditability. The chosen configuration is safe, observable, and reproducible.
Unattempted
The second option uses the Job Framework to perform a heavy but isolated batch task. Streaming and read-only queries minimize database contention, while writing outputs to a Custom Object and files gives both API and file-based consumers access. Low Job priority and off-peak scheduling reduce resource contention, and avoiding cache invalidations prevents collateral impact on shoppers. Option 1 misuses controllers and can still collide with traffic or time out. Option 3 increases load and changes historical data, which is undesirable for reconciliation. Option 4 fragments the process and relies on manual steps, losing repeatability and auditability. The chosen configuration is safe, observable, and reproducible.
Question 34 of 60
34. Question
Operations want a dead-letter reprocessor that reruns failed records from prior Jobs. They require controlled concurrency, idempotency, and a clear audit trail of what was retried and why. Which pattern should you adopt?
Correct
The reprocessor pattern leverages the Job Framework for targeted, safe retries. Storing failed items with metadata enables reasoned triage, while controlled concurrency and locking prevent overlap and resource contention. Idempotent handlers allow safe re-execution, and archiving payloads ensures future auditability. Option 1 repeats known work unnecessarily and may violate rate limits. Option 3 invites risk and lacks governance, observability, and access controls. Option 4 pushes the problem upstream and can cause duplicates without a clear audit trail. The dedicated reprocessor Job gives repeatability, control, and compliance.
Incorrect
The reprocessor pattern leverages the Job Framework for targeted, safe retries. Storing failed items with metadata enables reasoned triage, while controlled concurrency and locking prevent overlap and resource contention. Idempotent handlers allow safe re-execution, and archiving payloads ensures future auditability. Option 1 repeats known work unnecessarily and may violate rate limits. Option 3 invites risk and lacks governance, observability, and access controls. Option 4 pushes the problem upstream and can cause duplicates without a clear audit trail. The dedicated reprocessor Job gives repeatability, control, and compliance.
Unattempted
The reprocessor pattern leverages the Job Framework for targeted, safe retries. Storing failed items with metadata enables reasoned triage, while controlled concurrency and locking prevent overlap and resource contention. Idempotent handlers allow safe re-execution, and archiving payloads ensures future auditability. Option 1 repeats known work unnecessarily and may violate rate limits. Option 3 invites risk and lacks governance, observability, and access controls. Option 4 pushes the problem upstream and can cause duplicates without a clear audit trail. The dedicated reprocessor Job gives repeatability, control, and compliance.
Question 35 of 60
35. Question
A global program with four sites needs staggered batch windows: APAC first, then EMEA, then AMER, with site-specific parameters and different file paths. Operations want one artifact to manage. What is the best approach?
Correct
The parameterized single Job keeps one artifact while allowing site-specific behavior. Using Job Parameters allows Business Manager to control paths and windows without code changes, and orchestrating sub-steps per site preserves order and isolation. One master schedule reduces complexity and avoids accidental overlaps. Option 1 explodes maintenance by duplicating Jobs and branches. Option 3 hard-codes behavior, making changes risky and opaque. Option 4 is insecure and bypasses BM governance by putting secrets in URLs and control outside the Job Framework. The parameterized orchestration strikes the right balance between reuse and regional nuance.
Incorrect
The parameterized single Job keeps one artifact while allowing site-specific behavior. Using Job Parameters allows Business Manager to control paths and windows without code changes, and orchestrating sub-steps per site preserves order and isolation. One master schedule reduces complexity and avoids accidental overlaps. Option 1 explodes maintenance by duplicating Jobs and branches. Option 3 hard-codes behavior, making changes risky and opaque. Option 4 is insecure and bypasses BM governance by putting secrets in URLs and control outside the Job Framework. The parameterized orchestration strikes the right balance between reuse and regional nuance.
Unattempted
The parameterized single Job keeps one artifact while allowing site-specific behavior. Using Job Parameters allows Business Manager to control paths and windows without code changes, and orchestrating sub-steps per site preserves order and isolation. One master schedule reduces complexity and avoids accidental overlaps. Option 1 explodes maintenance by duplicating Jobs and branches. Option 3 hard-codes behavior, making changes risky and opaque. Option 4 is insecure and bypasses BM governance by putting secrets in URLs and control outside the Job Framework. The parameterized orchestration strikes the right balance between reuse and regional nuance.
Question 36 of 60
36. Question
An AppExchange payment cartridge delivers only legacy Pipelines (no SFRA controllers). The storefront is SFRA. You must integrate quickly without rewriting the vendor code, ensure CSRF/HTTPS enforcement, and isolate the blast radius. What approach best fits?
Correct
The selected option creates a thin compatibility layer that preserves the vendors pipeline logic, adds guardrails (HTTPS, CSRF, origin checks), and avoids a risky wholesale rewrite. Using URL Rules keeps routing declarative and auditable, while the proxy controller concentrates security checks and feature flags in one place. Isolation on the cartridge path limits coupling with SFRA controllers and eases rollback. Option 1 adds some protections but mixes redirect flows and can leak state across boundaries if not consistently applied; it also spreads security logic across many endpoints. Option 2 is high risk and time-boxed conversion efforts often miss edge cases, jeopardizing checkout. Option 4 depends on internal pipeline invocation patterns that are deprecated and brittle; it bypasses Business Manager routing and weakens observability. The compatibility cartridge plus URL mapping gives a controlled, incremental integration path with clear security gates and minimal vendor code churn.
Incorrect
The selected option creates a thin compatibility layer that preserves the vendors pipeline logic, adds guardrails (HTTPS, CSRF, origin checks), and avoids a risky wholesale rewrite. Using URL Rules keeps routing declarative and auditable, while the proxy controller concentrates security checks and feature flags in one place. Isolation on the cartridge path limits coupling with SFRA controllers and eases rollback. Option 1 adds some protections but mixes redirect flows and can leak state across boundaries if not consistently applied; it also spreads security logic across many endpoints. Option 2 is high risk and time-boxed conversion efforts often miss edge cases, jeopardizing checkout. Option 4 depends on internal pipeline invocation patterns that are deprecated and brittle; it bypasses Business Manager routing and weakens observability. The compatibility cartridge plus URL mapping gives a controlled, incremental integration path with clear security gates and minimal vendor code churn.
Unattempted
The selected option creates a thin compatibility layer that preserves the vendors pipeline logic, adds guardrails (HTTPS, CSRF, origin checks), and avoids a risky wholesale rewrite. Using URL Rules keeps routing declarative and auditable, while the proxy controller concentrates security checks and feature flags in one place. Isolation on the cartridge path limits coupling with SFRA controllers and eases rollback. Option 1 adds some protections but mixes redirect flows and can leak state across boundaries if not consistently applied; it also spreads security logic across many endpoints. Option 2 is high risk and time-boxed conversion efforts often miss edge cases, jeopardizing checkout. Option 4 depends on internal pipeline invocation patterns that are deprecated and brittle; it bypasses Business Manager routing and weakens observability. The compatibility cartridge plus URL mapping gives a controlled, incremental integration path with clear security gates and minimal vendor code churn.
Question 37 of 60
37. Question
Youre assessing three AppExchange cartridges. Which evidence most strongly indicates a cartridge still uses legacy Pipelines and not SFRA controllers?
Correct
The clearest markers of pipeline usage are the existence of .pipeline XML files, pipelet references, and Business Manager URL Rules pointing to pipeline start nodes. These artifacts are unique to the legacy Pipeline architecture. Option 2 actually signals SFRA controllers: routes via server.get/post and middleware are a hallmark of the controller model. Option 3 is orthogonal; using modern front-end tooling tells you little about server-side architecture. Option 4 indicates a back-office or headless integration focus but not a storefront implementation pattern. The correct choice ties directly to the legacy execution model (pipelines, pipelets, and dictionaries) and the routing method older packages depend on, which is precisely what you must identify before proposing controller-based integration strategies.
Incorrect
The clearest markers of pipeline usage are the existence of .pipeline XML files, pipelet references, and Business Manager URL Rules pointing to pipeline start nodes. These artifacts are unique to the legacy Pipeline architecture. Option 2 actually signals SFRA controllers: routes via server.get/post and middleware are a hallmark of the controller model. Option 3 is orthogonal; using modern front-end tooling tells you little about server-side architecture. Option 4 indicates a back-office or headless integration focus but not a storefront implementation pattern. The correct choice ties directly to the legacy execution model (pipelines, pipelets, and dictionaries) and the routing method older packages depend on, which is precisely what you must identify before proposing controller-based integration strategies.
Unattempted
The clearest markers of pipeline usage are the existence of .pipeline XML files, pipelet references, and Business Manager URL Rules pointing to pipeline start nodes. These artifacts are unique to the legacy Pipeline architecture. Option 2 actually signals SFRA controllers: routes via server.get/post and middleware are a hallmark of the controller model. Option 3 is orthogonal; using modern front-end tooling tells you little about server-side architecture. Option 4 indicates a back-office or headless integration focus but not a storefront implementation pattern. The correct choice ties directly to the legacy execution model (pipelines, pipelets, and dictionaries) and the routing method older packages depend on, which is precisely what you must identify before proposing controller-based integration strategies.
Question 38 of 60
38. Question
A loyalty extension exposes enrollment via a pipeline and returns an ISML page. You must plug it into SFRA Account routes with minimal change and preserve the vendors upgrade path. What is the best integration choice?
Correct
The chosen option maintains vendor upgradability and minimizes churn by keeping the pipeline intact but fronting it with an SFRA route for security and flow control. Validating CSRF/HTTPS in the SFRA layer ensures consistent protections and lets you control when and how the pipeline is reached. URL Rules keep routing configuration clean, and redirect/return patterns preserve the user journey while you progressively wrap content with SFRA templates. Option 1 couples runtime to an HTTP hop, losing session context and complicating error handling. Option 2 weakens security by dropping CSRF and leaks implementation details to the client. Option 4 may be ideal eventually, but it contradicts the minimal change, preserve upgrade path constraint and significantly increases project risk. Therefore, a guarded SFRA gateway plus URL mapping is the pragmatic step toward coexistence.
Incorrect
The chosen option maintains vendor upgradability and minimizes churn by keeping the pipeline intact but fronting it with an SFRA route for security and flow control. Validating CSRF/HTTPS in the SFRA layer ensures consistent protections and lets you control when and how the pipeline is reached. URL Rules keep routing configuration clean, and redirect/return patterns preserve the user journey while you progressively wrap content with SFRA templates. Option 1 couples runtime to an HTTP hop, losing session context and complicating error handling. Option 2 weakens security by dropping CSRF and leaks implementation details to the client. Option 4 may be ideal eventually, but it contradicts the minimal change, preserve upgrade path constraint and significantly increases project risk. Therefore, a guarded SFRA gateway plus URL mapping is the pragmatic step toward coexistence.
Unattempted
The chosen option maintains vendor upgradability and minimizes churn by keeping the pipeline intact but fronting it with an SFRA route for security and flow control. Validating CSRF/HTTPS in the SFRA layer ensures consistent protections and lets you control when and how the pipeline is reached. URL Rules keep routing configuration clean, and redirect/return patterns preserve the user journey while you progressively wrap content with SFRA templates. Option 1 couples runtime to an HTTP hop, losing session context and complicating error handling. Option 2 weakens security by dropping CSRF and leaks implementation details to the client. Option 4 may be ideal eventually, but it contradicts the minimal change, preserve upgrade path constraint and significantly increases project risk. Therefore, a guarded SFRA gateway plus URL mapping is the pragmatic step toward coexistence.
Question 39 of 60
39. Question
A fraud-screening plugin exposes only pipeline endpoints for order review. Security insists on CSRF tokens for all POSTs. Whats the most appropriate way to enforce this with SFRA controllers?
Correct
Enforcing CSRF in the SFRA layer lets you apply standardized, supported protections (csrfProtection) while retaining the pipelines core review logic. Validating on the controller boundary, then forwarding via a URL Rule with session context intact, centralizes security and keeps vendor code unchanged. Option 1 (referrer checks) is not a robust CSRF defense and is easy to spoof. Option 3 reinvents CSRF mechanisms in a legacy pipelet, duplicating effort and creating maintenance risk. Option 4 weakens security and risks leaking sensitive data through URLs; GET is inappropriate for state-changing actions. The controller-fronted pattern balances compliance demands with backward compatibility and reduces the surface of ad-hoc security code in legacy components.
Incorrect
Enforcing CSRF in the SFRA layer lets you apply standardized, supported protections (csrfProtection) while retaining the pipelines core review logic. Validating on the controller boundary, then forwarding via a URL Rule with session context intact, centralizes security and keeps vendor code unchanged. Option 1 (referrer checks) is not a robust CSRF defense and is easy to spoof. Option 3 reinvents CSRF mechanisms in a legacy pipelet, duplicating effort and creating maintenance risk. Option 4 weakens security and risks leaking sensitive data through URLs; GET is inappropriate for state-changing actions. The controller-fronted pattern balances compliance demands with backward compatibility and reduces the surface of ad-hoc security code in legacy components.
Unattempted
Enforcing CSRF in the SFRA layer lets you apply standardized, supported protections (csrfProtection) while retaining the pipelines core review logic. Validating on the controller boundary, then forwarding via a URL Rule with session context intact, centralizes security and keeps vendor code unchanged. Option 1 (referrer checks) is not a robust CSRF defense and is easy to spoof. Option 3 reinvents CSRF mechanisms in a legacy pipelet, duplicating effort and creating maintenance risk. Option 4 weakens security and risks leaking sensitive data through URLs; GET is inappropriate for state-changing actions. The controller-fronted pattern balances compliance demands with backward compatibility and reduces the surface of ad-hoc security code in legacy components.
Question 40 of 60
40. Question
You need consistent logging and correlation IDs across both SFRA controllers and vendor pipelines to debug rare checkout errors. What should you implement?
Correct
A unified correlation ID across both execution models is essential for end-to-end tracing. Creating the ID in a base SFRA middleware ensures it exists at request entry; propagating it to pipelines via session or redirect preserves continuity. Normalizing log prefixes in both controllers and custom pipelets makes searches deterministic, and exposing the ID in error pages empowers support to retrieve traces. Option 1 floods logs and lacks deterministic correlation. Option 3 silences half the stack, breaking traceability at the boundary. Option 4 adds headers but doesnt guarantee the ID reaches application logs unless code reads and uses it; relying on proxies alone leaves gaps. The standardized middleware-plus-log-convention approach integrates cleanly with Log Center and supports effective diagnostics.
Incorrect
A unified correlation ID across both execution models is essential for end-to-end tracing. Creating the ID in a base SFRA middleware ensures it exists at request entry; propagating it to pipelines via session or redirect preserves continuity. Normalizing log prefixes in both controllers and custom pipelets makes searches deterministic, and exposing the ID in error pages empowers support to retrieve traces. Option 1 floods logs and lacks deterministic correlation. Option 3 silences half the stack, breaking traceability at the boundary. Option 4 adds headers but doesnt guarantee the ID reaches application logs unless code reads and uses it; relying on proxies alone leaves gaps. The standardized middleware-plus-log-convention approach integrates cleanly with Log Center and supports effective diagnostics.
Unattempted
A unified correlation ID across both execution models is essential for end-to-end tracing. Creating the ID in a base SFRA middleware ensures it exists at request entry; propagating it to pipelines via session or redirect preserves continuity. Normalizing log prefixes in both controllers and custom pipelets makes searches deterministic, and exposing the ID in error pages empowers support to retrieve traces. Option 1 floods logs and lacks deterministic correlation. Option 3 silences half the stack, breaking traceability at the boundary. Option 4 adds headers but doesnt guarantee the ID reaches application logs unless code reads and uses it; relying on proxies alone leaves gaps. The standardized middleware-plus-log-convention approach integrates cleanly with Log Center and supports effective diagnostics.
Question 41 of 60
41. Question
A tax service AppExchange cartridge is pipeline-based and expects SiteGenesis form dictionaries. How do you integrate with SFRA without breaking the vendors assumptions?
Correct
An adapter at the controller boundary lets you convert SFRA form structures into the form dictionary the vendor pipeline expects, preserving compatibility while keeping the rest of the site on SFRA patterns. Forwarding via URL Rules maintains session continuity, and mapping results back to SFRA models isolates differences. Option 2 changes the payload shape the pipeline expects and presumes JSON support that legacy code may not have. Option 3 pollutes the broader site with legacy patterns and raises the risk of regressions and maintenance overhead. Option 4 introduces cross-domain session complexity and cart synchronization challenges unnecessarily. The adapter-and-forward approach respects vendor contracts and keeps architectural seams clean.
Incorrect
An adapter at the controller boundary lets you convert SFRA form structures into the form dictionary the vendor pipeline expects, preserving compatibility while keeping the rest of the site on SFRA patterns. Forwarding via URL Rules maintains session continuity, and mapping results back to SFRA models isolates differences. Option 2 changes the payload shape the pipeline expects and presumes JSON support that legacy code may not have. Option 3 pollutes the broader site with legacy patterns and raises the risk of regressions and maintenance overhead. Option 4 introduces cross-domain session complexity and cart synchronization challenges unnecessarily. The adapter-and-forward approach respects vendor contracts and keeps architectural seams clean.
Unattempted
An adapter at the controller boundary lets you convert SFRA form structures into the form dictionary the vendor pipeline expects, preserving compatibility while keeping the rest of the site on SFRA patterns. Forwarding via URL Rules maintains session continuity, and mapping results back to SFRA models isolates differences. Option 2 changes the payload shape the pipeline expects and presumes JSON support that legacy code may not have. Option 3 pollutes the broader site with legacy patterns and raises the risk of regressions and maintenance overhead. Option 4 introduces cross-domain session complexity and cart synchronization challenges unnecessarily. The adapter-and-forward approach respects vendor contracts and keeps architectural seams clean.
Question 42 of 60
42. Question
A third-party search extension includes both controllers and legacy pipelines. You must enable only the autocomplete feature (pipeline-based) while keeping the rest in SFRA. What integration plan is most sustainable?
Correct
Targeted enablement through URL Rules for just the needed pipeline endpoints minimizes surface area and upgrade risk. A façade/controller wrapper centralizes rate limiting and caching policies, so the legacy endpoint is invoked under your operational controls. This approach avoids pulling in unwanted features and lets SFRA retain ownership of the main search flows. Option 1 increases coupling and can override SFRA behavior broadly. Option 3 assumes templates alone resolve architectural mismatches, but the logic remains pipeline-bound. Option 4 duplicates vendor code, hindering upgrades and risking functional drift. The façade-plus-URL-Rule pattern gives precision, control, and an upgrade-friendly seam.
Incorrect
Targeted enablement through URL Rules for just the needed pipeline endpoints minimizes surface area and upgrade risk. A façade/controller wrapper centralizes rate limiting and caching policies, so the legacy endpoint is invoked under your operational controls. This approach avoids pulling in unwanted features and lets SFRA retain ownership of the main search flows. Option 1 increases coupling and can override SFRA behavior broadly. Option 3 assumes templates alone resolve architectural mismatches, but the logic remains pipeline-bound. Option 4 duplicates vendor code, hindering upgrades and risking functional drift. The façade-plus-URL-Rule pattern gives precision, control, and an upgrade-friendly seam.
Unattempted
Targeted enablement through URL Rules for just the needed pipeline endpoints minimizes surface area and upgrade risk. A façade/controller wrapper centralizes rate limiting and caching policies, so the legacy endpoint is invoked under your operational controls. This approach avoids pulling in unwanted features and lets SFRA retain ownership of the main search flows. Option 1 increases coupling and can override SFRA behavior broadly. Option 3 assumes templates alone resolve architectural mismatches, but the logic remains pipeline-bound. Option 4 duplicates vendor code, hindering upgrades and risking functional drift. The façade-plus-URL-Rule pattern gives precision, control, and an upgrade-friendly seam.
Question 43 of 60
43. Question
The risk team wants to ensure all legacy pipeline endpoints used by AppExchange packages are accessible only via HTTPS and require logged-in sessions when appropriate. What is the best enforcement mechanism?
Correct
Centralizing enforcement in controller gateways ensures uniform HTTPS, auth, and CSRF policies while avoiding the brittle work of touching numerous pipeline files. URL Rules can be constrained to deny direct access, funneling requests through secured SFRA routes. Option 1 is error-prone and hard to audit. Option 3 weakens zero-trust posture and risks sensitive data traversing internal links unencrypted. Option 4 overestimates site preferences; pipelines may not uniformly inherit POST protections, and exceptions often exist. Controller-fronted enforcement with explicit middleware creates a reliable, testable security boundary that works across both architectures.
Incorrect
Centralizing enforcement in controller gateways ensures uniform HTTPS, auth, and CSRF policies while avoiding the brittle work of touching numerous pipeline files. URL Rules can be constrained to deny direct access, funneling requests through secured SFRA routes. Option 1 is error-prone and hard to audit. Option 3 weakens zero-trust posture and risks sensitive data traversing internal links unencrypted. Option 4 overestimates site preferences; pipelines may not uniformly inherit POST protections, and exceptions often exist. Controller-fronted enforcement with explicit middleware creates a reliable, testable security boundary that works across both architectures.
Unattempted
Centralizing enforcement in controller gateways ensures uniform HTTPS, auth, and CSRF policies while avoiding the brittle work of touching numerous pipeline files. URL Rules can be constrained to deny direct access, funneling requests through secured SFRA routes. Option 1 is error-prone and hard to audit. Option 3 weakens zero-trust posture and risks sensitive data traversing internal links unencrypted. Option 4 overestimates site preferences; pipelines may not uniformly inherit POST protections, and exceptions often exist. Controller-fronted enforcement with explicit middleware creates a reliable, testable security boundary that works across both architectures.
Question 44 of 60
44. Question
You plan to sunset a pipeline-based wishlist plugin. During transition, you want new traffic on SFRA routes, while existing bookmarked pipeline URLs should still function, then gradually 301 to SFRA. What strategy do you recommend?
Correct
The strangler-fig approach enables controlled migration with observability. Keeping both paths initially allows comparison, and using feature flags plus metrics lets you switch cohorts methodically. Starting with 301s for low-risk segments preserves SEO and user bookmarks, while instrumented telemetry shows when it is safe to retire pipelines. Option 1 is disruptive and risks breaking user journeys. Option 2s blanket 302 lacks permanence and can hurt SEO and caching behavior; also it removes the ability to regress selectively. Option 4 doubles maintenance indefinitely and increases defect probability. The measured strangler plan balances user impact, SEO, and technical safety.
Incorrect
The strangler-fig approach enables controlled migration with observability. Keeping both paths initially allows comparison, and using feature flags plus metrics lets you switch cohorts methodically. Starting with 301s for low-risk segments preserves SEO and user bookmarks, while instrumented telemetry shows when it is safe to retire pipelines. Option 1 is disruptive and risks breaking user journeys. Option 2s blanket 302 lacks permanence and can hurt SEO and caching behavior; also it removes the ability to regress selectively. Option 4 doubles maintenance indefinitely and increases defect probability. The measured strangler plan balances user impact, SEO, and technical safety.
Unattempted
The strangler-fig approach enables controlled migration with observability. Keeping both paths initially allows comparison, and using feature flags plus metrics lets you switch cohorts methodically. Starting with 301s for low-risk segments preserves SEO and user bookmarks, while instrumented telemetry shows when it is safe to retire pipelines. Option 1 is disruptive and risks breaking user journeys. Option 2s blanket 302 lacks permanence and can hurt SEO and caching behavior; also it removes the ability to regress selectively. Option 4 doubles maintenance indefinitely and increases defect probability. The measured strangler plan balances user impact, SEO, and technical safety.
Question 45 of 60
45. Question
During code review, you discover a controller directly extends app_storefront_base to call a legacy pipeline for address validation. What is the preferred refactor?
Correct
Composition via middleware is the SFRA pattern; it avoids fragile inheritance chains and makes the seam to legacy code explicit and testable. Guarding the redirect to the pipeline with security middleware maintains a clean boundary, and helpers prevent controller bloat. Option 1 entrenches a brittle inheritance model and spreads legacy coupling. Option 3 confuses concernsOCAPI is not a drop-in replacement for pipeline logic and may change payloads and limits. Option 4 mixes control flow into templates, which is an anti-pattern and harms maintainability. The refactor towards composition, helpers, and guarded URL Rule integration aligns with SFRA best practices and clarifies upgrade pathways.
Incorrect
Composition via middleware is the SFRA pattern; it avoids fragile inheritance chains and makes the seam to legacy code explicit and testable. Guarding the redirect to the pipeline with security middleware maintains a clean boundary, and helpers prevent controller bloat. Option 1 entrenches a brittle inheritance model and spreads legacy coupling. Option 3 confuses concernsOCAPI is not a drop-in replacement for pipeline logic and may change payloads and limits. Option 4 mixes control flow into templates, which is an anti-pattern and harms maintainability. The refactor towards composition, helpers, and guarded URL Rule integration aligns with SFRA best practices and clarifies upgrade pathways.
Unattempted
Composition via middleware is the SFRA pattern; it avoids fragile inheritance chains and makes the seam to legacy code explicit and testable. Guarding the redirect to the pipeline with security middleware maintains a clean boundary, and helpers prevent controller bloat. Option 1 entrenches a brittle inheritance model and spreads legacy coupling. Option 3 confuses concernsOCAPI is not a drop-in replacement for pipeline logic and may change payloads and limits. Option 4 mixes control flow into templates, which is an anti-pattern and harms maintainability. The refactor towards composition, helpers, and guarded URL Rule integration aligns with SFRA best practices and clarifies upgrade pathways.
Question 46 of 60
46. Question
A PIM delivers two daily feeds: categories first, then products. If products arrive before categories, the run should wait up to 45 minutes; otherwise process immediately. What Job plan should you implement?
Correct
The orchestrator Job is a classic use of the Job Framework for dependency management. Polling with a bounded wait prevents indefinite hangs, while conditional sub-job launches keep logic modular. Persisting orchestration state in a Custom Object enables transparency and recovery. Option 1 pushes coordination onto humans and risks missed SLAs. Option 3 produces partial data integrity because products may refer to missing categories. Option 4 changes the integration contract to real-time without addressing readiness or rate-limit concerns, and its unnecessary when batch suffices. Thus, a wait-with-timeout orchestrator is the pragmatic, controllable solution.
Incorrect
The orchestrator Job is a classic use of the Job Framework for dependency management. Polling with a bounded wait prevents indefinite hangs, while conditional sub-job launches keep logic modular. Persisting orchestration state in a Custom Object enables transparency and recovery. Option 1 pushes coordination onto humans and risks missed SLAs. Option 3 produces partial data integrity because products may refer to missing categories. Option 4 changes the integration contract to real-time without addressing readiness or rate-limit concerns, and its unnecessary when batch suffices. Thus, a wait-with-timeout orchestrator is the pragmatic, controllable solution.
Unattempted
The orchestrator Job is a classic use of the Job Framework for dependency management. Polling with a bounded wait prevents indefinite hangs, while conditional sub-job launches keep logic modular. Persisting orchestration state in a Custom Object enables transparency and recovery. Option 1 pushes coordination onto humans and risks missed SLAs. Option 3 produces partial data integrity because products may refer to missing categories. Option 4 changes the integration contract to real-time without addressing readiness or rate-limit concerns, and its unnecessary when batch suffices. Thus, a wait-with-timeout orchestrator is the pragmatic, controllable solution.
Question 47 of 60
47. Question
A checkout must call a third-party tax REST API with a 700 ms SLO and occasional 429 responses. Data must not expose PII in logs, and lower environments should use stubs. What implementation best fits SFCC real-time integration?
Correct
The Service Framework is the productized real-time mechanism in SFCC for outbound HTTP/SOAP, giving standardized timeouts, retries, credential binding, and environment profiles. Implementing createRequest centralizes headers and idempotency, while parseResponse normalizes the API payload. filterLogMessage allows masking of PII so logs remain compliant. Profiles let you switch between live and mock behavior without code changes using mockCall. Option 1 re-implements features Service Framework already provides and spreads networking logic across controllers, increasing risk. Option 2 misuses OCAPI (intended for platform APIs) as a general reverse proxy, complicating auth and throttling. Option 3 is batch, which cannot meet a 700 ms synchronous checkout requirement. The selected approach aligns with SFCC best practices, keeps concerns in service definitions, and supports graceful handling of 429s through built-in retry plus idempotency headers.
Incorrect
The Service Framework is the productized real-time mechanism in SFCC for outbound HTTP/SOAP, giving standardized timeouts, retries, credential binding, and environment profiles. Implementing createRequest centralizes headers and idempotency, while parseResponse normalizes the API payload. filterLogMessage allows masking of PII so logs remain compliant. Profiles let you switch between live and mock behavior without code changes using mockCall. Option 1 re-implements features Service Framework already provides and spreads networking logic across controllers, increasing risk. Option 2 misuses OCAPI (intended for platform APIs) as a general reverse proxy, complicating auth and throttling. Option 3 is batch, which cannot meet a 700 ms synchronous checkout requirement. The selected approach aligns with SFCC best practices, keeps concerns in service definitions, and supports graceful handling of 429s through built-in retry plus idempotency headers.
Unattempted
The Service Framework is the productized real-time mechanism in SFCC for outbound HTTP/SOAP, giving standardized timeouts, retries, credential binding, and environment profiles. Implementing createRequest centralizes headers and idempotency, while parseResponse normalizes the API payload. filterLogMessage allows masking of PII so logs remain compliant. Profiles let you switch between live and mock behavior without code changes using mockCall. Option 1 re-implements features Service Framework already provides and spreads networking logic across controllers, increasing risk. Option 2 misuses OCAPI (intended for platform APIs) as a general reverse proxy, complicating auth and throttling. Option 3 is batch, which cannot meet a 700 ms synchronous checkout requirement. The selected approach aligns with SFCC best practices, keeps concerns in service definitions, and supports graceful handling of 429s through built-in retry plus idempotency headers.
Question 48 of 60
48. Question
A carriers SOAP shipping label service requires mutual TLS and must run in real time during order confirmation. How should you design this with SFCC?
Correct
The Service Framework supports SOAP services that can be bound to credentials including client certificates, which is the correct way to implement mutual TLS. Using createRequest constructs the SOAP message reliably and parseResponse can decode base64 content and map faults to meaningful errors. A mock profile allows safe lower-environment testing without contacting the carrier. Option 1 misuses HTTP Service and cannot implement true mutual TLS through headers. Option 3 is batch and risks stale/missing labels at confirmation time. Option 4 exposes the carrier endpoint to the browser, leaking credentials and increasing attack surface. The correct design leverages the SOAP Service type and credential store so security and structure live in Business Manager rather than ad-hoc code.
Incorrect
The Service Framework supports SOAP services that can be bound to credentials including client certificates, which is the correct way to implement mutual TLS. Using createRequest constructs the SOAP message reliably and parseResponse can decode base64 content and map faults to meaningful errors. A mock profile allows safe lower-environment testing without contacting the carrier. Option 1 misuses HTTP Service and cannot implement true mutual TLS through headers. Option 3 is batch and risks stale/missing labels at confirmation time. Option 4 exposes the carrier endpoint to the browser, leaking credentials and increasing attack surface. The correct design leverages the SOAP Service type and credential store so security and structure live in Business Manager rather than ad-hoc code.
Unattempted
The Service Framework supports SOAP services that can be bound to credentials including client certificates, which is the correct way to implement mutual TLS. Using createRequest constructs the SOAP message reliably and parseResponse can decode base64 content and map faults to meaningful errors. A mock profile allows safe lower-environment testing without contacting the carrier. Option 1 misuses HTTP Service and cannot implement true mutual TLS through headers. Option 3 is batch and risks stale/missing labels at confirmation time. Option 4 exposes the carrier endpoint to the browser, leaking credentials and increasing attack surface. The correct design leverages the SOAP Service type and credential store so security and structure live in Business Manager rather than ad-hoc code.
Question 49 of 60
49. Question
A catalog autocomplete feature calls a REST endpoint that may degrade under peak load. Stakeholders want fast fail with graceful fallback and consistent telemetry across instances. Which approach is best?
Correct
Real-time UX needs a bounded timeout and resiliency. The Service Framework allows precise timeout and retry settings and returns availability states you can use to trigger fallbacks. A short timeout ensures the page stays responsive; a small retry count handles transient issues without overloading the provider. Serving a local cached fallback preserves UX. Redacting via filterLogMessage and logging correlation IDs produce actionable telemetry without exposing PII. Option 1 bypasses server protections and secrets management, creating security and observability gaps. Option 2 increases tail latency and logs sensitive data, harming compliance. Option 4 is purely batch and cannot reflect latest terms or respond to personalized contexts. The selected design balances performance, reliability, and compliance using Service Framework capabilities.
Incorrect
Real-time UX needs a bounded timeout and resiliency. The Service Framework allows precise timeout and retry settings and returns availability states you can use to trigger fallbacks. A short timeout ensures the page stays responsive; a small retry count handles transient issues without overloading the provider. Serving a local cached fallback preserves UX. Redacting via filterLogMessage and logging correlation IDs produce actionable telemetry without exposing PII. Option 1 bypasses server protections and secrets management, creating security and observability gaps. Option 2 increases tail latency and logs sensitive data, harming compliance. Option 4 is purely batch and cannot reflect latest terms or respond to personalized contexts. The selected design balances performance, reliability, and compliance using Service Framework capabilities.
Unattempted
Real-time UX needs a bounded timeout and resiliency. The Service Framework allows precise timeout and retry settings and returns availability states you can use to trigger fallbacks. A short timeout ensures the page stays responsive; a small retry count handles transient issues without overloading the provider. Serving a local cached fallback preserves UX. Redacting via filterLogMessage and logging correlation IDs produce actionable telemetry without exposing PII. Option 1 bypasses server protections and secrets management, creating security and observability gaps. Option 2 increases tail latency and logs sensitive data, harming compliance. Option 4 is purely batch and cannot reflect latest terms or respond to personalized contexts. The selected design balances performance, reliability, and compliance using Service Framework capabilities.
Question 50 of 60
50. Question
Security mandates that any outbound inventory lookup must include tenant-managed API keys, rotate credentials per environment, and avoid leaking keys in logs. Which configuration is most appropriate?
Correct
The Service Framework integrates directly with the Credential store so secrets are not embedded in code. Binding a Credential per environment (via service profiles) simplifies rotation and governance. In createRequest, headers can be composed using the credential values, and filterLogMessage prevents keys from appearing in logs. Option 1 places secrets in code repositories and base64 is not encryption. Option 3 relocates secrets to a data table without proper key management or audit trails. Option 4 uses preferences not intended for sensitive key material and risks accidental exposure. The selected design keeps secrets in the right control plane and aligns with auditing and rotation best practices.
Incorrect
The Service Framework integrates directly with the Credential store so secrets are not embedded in code. Binding a Credential per environment (via service profiles) simplifies rotation and governance. In createRequest, headers can be composed using the credential values, and filterLogMessage prevents keys from appearing in logs. Option 1 places secrets in code repositories and base64 is not encryption. Option 3 relocates secrets to a data table without proper key management or audit trails. Option 4 uses preferences not intended for sensitive key material and risks accidental exposure. The selected design keeps secrets in the right control plane and aligns with auditing and rotation best practices.
Unattempted
The Service Framework integrates directly with the Credential store so secrets are not embedded in code. Binding a Credential per environment (via service profiles) simplifies rotation and governance. In createRequest, headers can be composed using the credential values, and filterLogMessage prevents keys from appearing in logs. Option 1 places secrets in code repositories and base64 is not encryption. Option 3 relocates secrets to a data table without proper key management or audit trails. Option 4 uses preferences not intended for sensitive key material and risks accidental exposure. The selected design keeps secrets in the right control plane and aligns with auditing and rotation best practices.
Question 51 of 60
51. Question
A payments provider returns occasional malformed JSON during maintenance. You must avoid controller crashes and still capture an error record. What pattern fits Service Framework usage?
Correct
Parsing and error normalization belong inside the service definition so controllers receive consistent structures regardless of provider behavior. parseResponse is designed to translate HTTP responses into application-level results and can defend against malformed JSON, returning typed error results while preserving status via svc.getStatus(). Controllers become simpler and more robust, and sanitized logs can still include correlation IDs. Option 1 spreads parsing logic and increases duplication and crash risk. Option 3 hides real conditions and is unsuitable for production maintenance windows. Option 4 relies on generic error handling, producing poor UX and limited context for remediation. The chosen pattern leverages Service Framework hooks to provide predictable, safe integration boundaries.
Incorrect
Parsing and error normalization belong inside the service definition so controllers receive consistent structures regardless of provider behavior. parseResponse is designed to translate HTTP responses into application-level results and can defend against malformed JSON, returning typed error results while preserving status via svc.getStatus(). Controllers become simpler and more robust, and sanitized logs can still include correlation IDs. Option 1 spreads parsing logic and increases duplication and crash risk. Option 3 hides real conditions and is unsuitable for production maintenance windows. Option 4 relies on generic error handling, producing poor UX and limited context for remediation. The chosen pattern leverages Service Framework hooks to provide predictable, safe integration boundaries.
Unattempted
Parsing and error normalization belong inside the service definition so controllers receive consistent structures regardless of provider behavior. parseResponse is designed to translate HTTP responses into application-level results and can defend against malformed JSON, returning typed error results while preserving status via svc.getStatus(). Controllers become simpler and more robust, and sanitized logs can still include correlation IDs. Option 1 spreads parsing logic and increases duplication and crash risk. Option 3 hides real conditions and is unsuitable for production maintenance windows. Option 4 relies on generic error handling, producing poor UX and limited context for remediation. The chosen pattern leverages Service Framework hooks to provide predictable, safe integration boundaries.
Question 52 of 60
52. Question
You need to test real-time address verification without hitting the vendor in CI and in developer sandboxes, while staging/production should call live. What should you configure?
Correct
Service profiles are the intended mechanism to vary behavior per environment for the same service definition. Implementing mockCall enables deterministic responses in CI and dev, while binding live credentials for higher environments keeps configuration out of code. Controllers remain unchanged and rely on the ServiceRegistry for behavior. Option 1 puts environment logic in code and risks drift. Option 3 centralizes a single variable but still requires branching in controllers and does not provide full mock behavior. Option 4 is brittle and mixes deployment tasks with runtime configuration. Profiles and mockCall give clean separation and repeatable testing.
Incorrect
Service profiles are the intended mechanism to vary behavior per environment for the same service definition. Implementing mockCall enables deterministic responses in CI and dev, while binding live credentials for higher environments keeps configuration out of code. Controllers remain unchanged and rely on the ServiceRegistry for behavior. Option 1 puts environment logic in code and risks drift. Option 3 centralizes a single variable but still requires branching in controllers and does not provide full mock behavior. Option 4 is brittle and mixes deployment tasks with runtime configuration. Profiles and mockCall give clean separation and repeatable testing.
Unattempted
Service profiles are the intended mechanism to vary behavior per environment for the same service definition. Implementing mockCall enables deterministic responses in CI and dev, while binding live credentials for higher environments keeps configuration out of code. Controllers remain unchanged and rely on the ServiceRegistry for behavior. Option 1 puts environment logic in code and risks drift. Option 3 centralizes a single variable but still requires branching in controllers and does not provide full mock behavior. Option 4 is brittle and mixes deployment tasks with runtime configuration. Profiles and mockCall give clean separation and repeatable testing.
Question 53 of 60
53. Question
A loyalty API enforces a per-request signature using a shared secret and timestamp. Where should you implement signing to keep the design maintainable and secure?
Correct
Computing the signature inside createRequest encapsulates request construction concerns, guarantees the header is present for every call, and keeps the secret in the Credential store. This avoids duplication and prevents leakage into controllers or the client. Option 1 spreads sensitive logic and stores secrets in preferences rather than credentials. Option 3 exposes the secret to end users and undermines security. Option 4 overreaches OCAPI hook scope and couples unrelated concerns. The createRequest location keeps the integration cohesive and adheres to Service Framework responsibilities.
Incorrect
Computing the signature inside createRequest encapsulates request construction concerns, guarantees the header is present for every call, and keeps the secret in the Credential store. This avoids duplication and prevents leakage into controllers or the client. Option 1 spreads sensitive logic and stores secrets in preferences rather than credentials. Option 3 exposes the secret to end users and undermines security. Option 4 overreaches OCAPI hook scope and couples unrelated concerns. The createRequest location keeps the integration cohesive and adheres to Service Framework responsibilities.
Unattempted
Computing the signature inside createRequest encapsulates request construction concerns, guarantees the header is present for every call, and keeps the secret in the Credential store. This avoids duplication and prevents leakage into controllers or the client. Option 1 spreads sensitive logic and stores secrets in preferences rather than credentials. Option 3 exposes the secret to end users and undermines security. Option 4 overreaches OCAPI hook scope and couples unrelated concerns. The createRequest location keeps the integration cohesive and adheres to Service Framework responsibilities.
Question 54 of 60
54. Question
Product detail pages call a real-time pricing service. Marketing wants brief caching of identical requests to reduce vendor cost without stale prices. What is the correct use of Service Framework here?
Correct
The Service Framework supports response caching at the service layer, allowing short-lived caches keyed by request characteristics. Including SKU, currency, and locale in the cache key prevents cross-context contamination. This reduces outbound calls while staying near real time. Option 1 caches full HTML and risks serving stale or personalized content incorrectly. Option 3 stores per-shopper data and does not de-duplicate across users, missing the cost objective. Option 4 is batch and cannot respond to immediate price changes. Service-level caching is designed for exactly this micro-TTL scenario.
Incorrect
The Service Framework supports response caching at the service layer, allowing short-lived caches keyed by request characteristics. Including SKU, currency, and locale in the cache key prevents cross-context contamination. This reduces outbound calls while staying near real time. Option 1 caches full HTML and risks serving stale or personalized content incorrectly. Option 3 stores per-shopper data and does not de-duplicate across users, missing the cost objective. Option 4 is batch and cannot respond to immediate price changes. Service-level caching is designed for exactly this micro-TTL scenario.
Unattempted
The Service Framework supports response caching at the service layer, allowing short-lived caches keyed by request characteristics. Including SKU, currency, and locale in the cache key prevents cross-context contamination. This reduces outbound calls while staying near real time. Option 1 caches full HTML and risks serving stale or personalized content incorrectly. Option 3 stores per-shopper data and does not de-duplicate across users, missing the cost objective. Option 4 is batch and cannot respond to immediate price changes. Service-level caching is designed for exactly this micro-TTL scenario.
Question 55 of 60
55. Question
A fraud provider occasionally returns HTTP 503 during deploys. Business requires a soft-fail path (place order with review flag) if two attempts fail within one second. How do you build this?
Correct
The Service Framework supports retry configuration and returns status codes indicating availability problems. Setting a tight timeout and two retries meets the one-second window. parseResponse can convert 503s into a consistent result, and controllers can act on that status to soft-fail and flag the order. Option 1 embeds timing logic in controllers and risks blocking the request thread. Option 3 masks real-world failures and could lead to chargebacks. Option 4 changes the business process by moving a required real-time check out of the transaction. The selected solution keeps resilience policies in the service and business decisions in controllers.
Incorrect
The Service Framework supports retry configuration and returns status codes indicating availability problems. Setting a tight timeout and two retries meets the one-second window. parseResponse can convert 503s into a consistent result, and controllers can act on that status to soft-fail and flag the order. Option 1 embeds timing logic in controllers and risks blocking the request thread. Option 3 masks real-world failures and could lead to chargebacks. Option 4 changes the business process by moving a required real-time check out of the transaction. The selected solution keeps resilience policies in the service and business decisions in controllers.
Unattempted
The Service Framework supports retry configuration and returns status codes indicating availability problems. Setting a tight timeout and two retries meets the one-second window. parseResponse can convert 503s into a consistent result, and controllers can act on that status to soft-fail and flag the order. Option 1 embeds timing logic in controllers and risks blocking the request thread. Option 3 masks real-world failures and could lead to chargebacks. Option 4 changes the business process by moving a required real-time check out of the transaction. The selected solution keeps resilience policies in the service and business decisions in controllers.
Question 56 of 60
56. Question
During a security review, auditors ask how your real-time services prevent sensitive fields (email, token) from appearing in Log Center while preserving enough detail for debugging. What should you present?
Correct
The Service Framework offers filterLogMessage to sanitize request/response logs, allowing redaction of headers and body fields while keeping operational metadata. This enables effective debugging with correlation IDs without exposing PII or secrets. Option 1 reduces visibility and does not guarantee safety if lower levels are enabled elsewhere. Option 3 is reactive and unreliable. Option 4 eliminates observability, which harms operations and incident response. Redaction at the service layer is the correct, proactive mechanism aligned with governance requirements.
Incorrect
The Service Framework offers filterLogMessage to sanitize request/response logs, allowing redaction of headers and body fields while keeping operational metadata. This enables effective debugging with correlation IDs without exposing PII or secrets. Option 1 reduces visibility and does not guarantee safety if lower levels are enabled elsewhere. Option 3 is reactive and unreliable. Option 4 eliminates observability, which harms operations and incident response. Redaction at the service layer is the correct, proactive mechanism aligned with governance requirements.
Unattempted
The Service Framework offers filterLogMessage to sanitize request/response logs, allowing redaction of headers and body fields while keeping operational metadata. This enables effective debugging with correlation IDs without exposing PII or secrets. Option 1 reduces visibility and does not guarantee safety if lower levels are enabled elsewhere. Option 3 is reactive and unreliable. Option 4 eliminates observability, which harms operations and incident response. Redaction at the service layer is the correct, proactive mechanism aligned with governance requirements.
Question 57 of 60
57. Question
A brand launches example.com for US (USD) and example.co.uk for UK (GBP). Legacy links point to example.com/uk/*. They want UK shoppers to land on GBP pages on the .co.uk domain, preserve SEO equity, and ensure bots arent auto-redirected by geo-IP. Whats the best alias/SEO setup?
Correct
The correct approach is domain-level aliases that directly route hosts to the intended site/locale/currency combination and permanent (301) redirects from legacy paths. This preserves link equity, prevents duplicate content, and reliably lands users on GBP. hreflang communicates alternates between US and UK to search engines. Option 1 overuses query parameters and 302s, which are not ideal for permanent locale routing and are weak for SEO consolidation. Option 2s automatic 302 based on Accept-Language can confuse bots and cause crawling loops; its also not a durable mapping. Option 4 lacks redirect consolidation, leaving duplicate content across domains. The chosen design balances SEO canonicalization with precise host?site?locale routing and currency defaults.
Incorrect
The correct approach is domain-level aliases that directly route hosts to the intended site/locale/currency combination and permanent (301) redirects from legacy paths. This preserves link equity, prevents duplicate content, and reliably lands users on GBP. hreflang communicates alternates between US and UK to search engines. Option 1 overuses query parameters and 302s, which are not ideal for permanent locale routing and are weak for SEO consolidation. Option 2s automatic 302 based on Accept-Language can confuse bots and cause crawling loops; its also not a durable mapping. Option 4 lacks redirect consolidation, leaving duplicate content across domains. The chosen design balances SEO canonicalization with precise host?site?locale routing and currency defaults.
Unattempted
The correct approach is domain-level aliases that directly route hosts to the intended site/locale/currency combination and permanent (301) redirects from legacy paths. This preserves link equity, prevents duplicate content, and reliably lands users on GBP. hreflang communicates alternates between US and UK to search engines. Option 1 overuses query parameters and 302s, which are not ideal for permanent locale routing and are weak for SEO consolidation. Option 2s automatic 302 based on Accept-Language can confuse bots and cause crawling loops; its also not a durable mapping. Option 4 lacks redirect consolidation, leaving duplicate content across domains. The chosen design balances SEO canonicalization with precise host?site?locale routing and currency defaults.
Question 58 of 60
58. Question
You host French for France on fr.example.eu (EUR) and Canadian French on fr-ca.example.com (CAD). Teams want search engines to index each market separately and avoid mixing currencies via shared URLs. What should you configure?
Correct
Separate host aliases per market, each with its default locale and currency, ensure URLs are market-specific and indexed appropriately. 301s consolidate legacy or cross-market paths to the correct host while hreflang clarifies FR-FR vs FR-CA alternates. Option 1 centralizes on one domain and relies on cookies, which breaks shareable URLs and confuses crawlers. Option 3 mixes a single canonical with 302s, diluting market signals. Option 4s query params create duplicates and weak canonicalization. The selected plan provides clean, market-scoped URLs with correct currency landing and strong SEO signals.
Incorrect
Separate host aliases per market, each with its default locale and currency, ensure URLs are market-specific and indexed appropriately. 301s consolidate legacy or cross-market paths to the correct host while hreflang clarifies FR-FR vs FR-CA alternates. Option 1 centralizes on one domain and relies on cookies, which breaks shareable URLs and confuses crawlers. Option 3 mixes a single canonical with 302s, diluting market signals. Option 4s query params create duplicates and weak canonicalization. The selected plan provides clean, market-scoped URLs with correct currency landing and strong SEO signals.
Unattempted
Separate host aliases per market, each with its default locale and currency, ensure URLs are market-specific and indexed appropriately. 301s consolidate legacy or cross-market paths to the correct host while hreflang clarifies FR-FR vs FR-CA alternates. Option 1 centralizes on one domain and relies on cookies, which breaks shareable URLs and confuses crawlers. Option 3 mixes a single canonical with 302s, diluting market signals. Option 4s query params create duplicates and weak canonicalization. The selected plan provides clean, market-scoped URLs with correct currency landing and strong SEO signals.
A 301 redirect from the retired .co.uk to canonical .com/en-GB paths preserves link equity and lands shoppers on GBP pages, while hreflang on the destination reinforces locale targeting. Option 1s 302 is non-permanent and suboptimal for equity consolidation. Option 2s JS redirect delays and risks bots not following. Option 4 wastes accrued authority and harms user experience. The alias-based 301 mapping is the cleanest SEO and landing solution without running a full additional site.
Incorrect
A 301 redirect from the retired .co.uk to canonical .com/en-GB paths preserves link equity and lands shoppers on GBP pages, while hreflang on the destination reinforces locale targeting. Option 1s 302 is non-permanent and suboptimal for equity consolidation. Option 2s JS redirect delays and risks bots not following. Option 4 wastes accrued authority and harms user experience. The alias-based 301 mapping is the cleanest SEO and landing solution without running a full additional site.
Unattempted
A 301 redirect from the retired .co.uk to canonical .com/en-GB paths preserves link equity and lands shoppers on GBP pages, while hreflang on the destination reinforces locale targeting. Option 1s 302 is non-permanent and suboptimal for equity consolidation. Option 2s JS redirect delays and risks bots not following. Option 4 wastes accrued authority and harms user experience. The alias-based 301 mapping is the cleanest SEO and landing solution without running a full additional site.
Question 60 of 60
60. Question
Your AU market requires AUD by default on au.brand.com. Some campaigns link to au.brand.com/en-us with USD. You must keep AUD as default for organic visits but preserve USD when explicitly requested. What should the alias and routing do?
Correct
An alias default sets the safe baseline (AUD) for direct/organic visits, while explicit overrides in URL should be respected to meet campaign intents. Session persistence prevents oscillation. Canonical should reflect the default pricing page; alternate/parameterized views can carry self-referential canonicals or noindex if necessary. Option 1 erases intentional USD contexts and harms campaign UX. Option 3 uses temporary redirects that still disrupt explicit requests and provide unclear SEO signals. Option 4s Accept-Language is not a currency control and can misalign. The selected approach balances SEO defaulting with intentional overrides.
Incorrect
An alias default sets the safe baseline (AUD) for direct/organic visits, while explicit overrides in URL should be respected to meet campaign intents. Session persistence prevents oscillation. Canonical should reflect the default pricing page; alternate/parameterized views can carry self-referential canonicals or noindex if necessary. Option 1 erases intentional USD contexts and harms campaign UX. Option 3 uses temporary redirects that still disrupt explicit requests and provide unclear SEO signals. Option 4s Accept-Language is not a currency control and can misalign. The selected approach balances SEO defaulting with intentional overrides.
Unattempted
An alias default sets the safe baseline (AUD) for direct/organic visits, while explicit overrides in URL should be respected to meet campaign intents. Session persistence prevents oscillation. Canonical should reflect the default pricing page; alternate/parameterized views can carry self-referential canonicals or noindex if necessary. Option 1 erases intentional USD contexts and harms campaign UX. Option 3 uses temporary redirects that still disrupt explicit requests and provide unclear SEO signals. Option 4s Accept-Language is not a currency control and can misalign. The selected approach balances SEO defaulting with intentional overrides.
X
Use Page numbers below to navigate to other practice tests