Your company has a use case where they want to import bulk data from an external system into Salesforce. This operation will be performed on a weekly basis and requires data transformation before import. Which components would create a solution that meets this business requirement?
Your organization is designing a real-time integration between Salesforce and an external service desk application. The service desk application has known issues with occasional service disruptions. What should be considered for error handling in this scenario?
Your company is integrating a high-volume third-party logistics system with Salesforce. The logistics system handles thousands of transactions per minute, and these transactions need to be available in Salesforce with minimum latency. Which Salesforce integration approach best meets these performance needs?
You are working on an integration project for a multinational organization. Given an existing system landscape diagram with numerous systems and applications, what would be the first step to create an inventory of the systems and their integration patterns?
A company's security assessment noted vulnerabilities on the un managed packages in their Salesforce orgs, notably secrets that are easily accessible and in plain text, such as usernames, passwords, and OAuth tokens used in callouts from Salesforce.
Which two persistence mechanisms should an integration architect require to be used to ensure that secrets are protected from deliberate or inadvertent exposure?