Last Updated On : 20-May-2026


Salesforce Certified Platform Integration Architect (SP25) Practice Test

Prepare with our free Salesforce Certified Platform Integration Architect (SP25) sample questions and pass with confidence. Our Salesforce-Platform-Integration-Architect practice test is designed to help you succeed on exam day.

118 Questions
Salesforce 2026

The URL for an external service has been changed without prior notice. The service provides up-to-date money exchange rates that are accessedseveral times from Salesforce and are a Dusiness-critical function for end users.

Which solutions should an integration architect recommend be implemented to minimize potential downtime for users in this situation?

A. Named Credentials and Content Security Policies

B. Remote Site Settings and Named Credentials

C. Enterprise Service Blus (ESB) and Remote Site Settings

B.   Remote Site Settings and Named Credentials

Explanation:

This question focuses on resiliency and maintainability of external service integrations. The key issue is handling endpoint changes with minimal disruption. Salesforce provides configuration-based approaches to avoid hardcoding URLs and to centralize endpoint and authentication management.

🟢 Correct Option:

B. Remote Site Settings and Named Credentials
Named Credentials allow endpoint URLs and authentication details to be centrally managed and updated without changing code. Remote Site Settings ensure the endpoint is authorized for callouts. Together, they provide flexibility and quick updates when URLs change, minimizing downtime and avoiding code redeployment for business-critical integrations.

🔴 Incorrect options:

A. Named Credentials and Content Security Policies
Content Security Policy (CSP) is mainly used for controlling browser-based resource loading in Lightning components. It does not impact server-side callouts or integration endpoint management, so it doesn’t help reduce downtime caused by endpoint URL changes.

C. Enterprise Service Bus (ESB) and Remote Site Settings
While an ESB can provide abstraction and flexibility, it introduces additional complexity and infrastructure. It’s not the most direct or Salesforce-native way to handle endpoint changes. Also, it doesn’t eliminate the need for proper endpoint configuration within Salesforce.

🔧 Reference:
Named Credentials as Callout Endpoints
Confirms centralized management of endpoints and authentication.

→ Remote Site Settings
Explains requirement for authorizing external endpoints for callouts.

What should an Integration architect consider when recommending Platform Events as an Integration solution?

A. Event Monitoring Is used to track user activity, such as logins and running reports.

B. Subscribe to an AssetTokenEvent stream to monitor OAuth 2.0 authentication activity.

C. When an event definition Is deleted, It's permanently removed and can't be restored.

C.   When an event definition Is deleted, It's permanently removed and can't be restored.

Explanation:

The question evaluates key considerations an integration architect must highlight when recommending Platform Events as a solution. It focuses on governance, maintainability, and long-term implications of using Platform Events in enterprise integrations.

✔️ Correct Option:

C. When an event definition Is deleted, It's permanently removed and can't be restored.
When recommending Platform Events, architects must consider that deleting an event definition is irreversible. The definition, along with any associated published events and triggers, is permanently removed with no recovery option. This impacts change management, versioning strategy, and deployment processes, requiring careful planning before creation and deletion.

❌ Incorrect options:

A. Event Monitoring Is used to track user activity, such as logins and running reports.
This is incorrect in this context. Event Monitoring tracks user and system activity (logins, reports, etc.) but is unrelated to the core considerations of using Platform Events for integration. It does not highlight a specific risk or limitation of Platform Events themselves.

B. Subscribe to an AssetTokenEvent stream to monitor OAuth 2.0 authentication activity.
This is incorrect. AssetTokenEvent is a standard platform event for monitoring OAuth 2.0 asset token flows. While useful for security monitoring, it is not a general consideration when recommending custom Platform Events for business integration solutions.

🔧 Reference:
Define and Manage Platform Events
Confirms that when an event definition is deleted, it is permanently removed and cannot be restored.

Considerations for Defining and Publishing Platform Events
Highlights the permanent deletion behavior and advises deleting associated triggers first.

An integration architect has received a request to prevent employees that leave the company from accessing data in Salesforce after they are deactivated in the company's HR system.

What should the integration architect determine before recommending a solution?

A. Data access prevention requirements, integration requirements, and system constraints

B. Data access prevention requirements, then identify frequency

C. Inbound integration requirements, then identify frequency

A.   Data access prevention requirements, integration requirements, and system constraints

Explanation:

The question tests your approach to solution design for identity lifecycle management. It checks whether you know that all business, technical, and constraint factors must be gathered before proposing an integration to handle user deactivation between HR and Salesforce.

✔️ Correct Option:

A. Data access prevention requirements, integration requirements, and system constraints
Before designing, an architect must confirm what “prevent access” means—immediate deactivation, freeze, or revoke sessions. Then define how HR will send the event, what APIs/events are available, data mapping, error handling, and limits like API volumes, latency, or SSO dependencies. Only with business needs, integration approach, and constraints together can you recommend a viable, secure solution.

❌ Incorrect options:

B. Data access prevention requirements, then identify frequency
Frequency is only one integration detail. This option ignores system constraints, available APIs, SSO, error handling, and session management. Without those, you risk proposing a batch solution when real-time is needed, or missing limits that make the design fail.

C. Inbound integration requirements, then identify frequency
Starting with inbound requirements skips the core business definition of “data access prevention.” You might build a feed that deactivates users but miss requirements like immediate session kill, audit logging, or handling delegated admins. Frequency alone doesn’t define the integration pattern or security needs.

🔧 Reference:
→ Integration Architecture Planning Confirms architects must assess business requirements, integration capabilities, and system constraints before selecting patterns.
Identify Your Users and Manage Access Confirms user lifecycle automation from HR systems should address deactivation, session control, and provisioning constraints.

An integration architect has been tasked with integrating Salesforce with an on-premises system. Due to some established policies, this system must remain on-premises.

What should the integration architect use to build a solutionfor this requirement?

A. Use Salesforce Connect if the database supports Open Database Connectivity (ODBC).

B. Use Heroku Connect if the data is hosted in Heroku.

C. Use Salesforce Connect If the database supports Open Data Protocol (OData).

C.   Use Salesforce Connect If the database supports Open Data Protocol (OData).

Explanation:

This question tests knowledge of Salesforce's native integration tools for accessing external on-premises data without migrating it into Salesforce. The key constraint is that the system must remain on-premises, so the solution must allow real-time data access externally. Salesforce Connect is the right tool when the external system supports a compatible protocol.

✔️ Correct Option:

C. Salesforce Connect with OData
Salesforce Connect is specifically designed to integrate Salesforce with external data sources that remain outside the platform — including on-premises systems. It supports OData 2.0 and 4.0 adapters, enabling real-time access to external data via External Objects without physically importing the data into Salesforce. This perfectly satisfies the "must remain on-premises" policy.

❌ Incorrect Options:

A. Salesforce Connect with ODBC
Salesforce Connect does not natively support ODBC (Open Database Connectivity). ODBC is a different connectivity standard used by other middleware or ETL tools. Using this option would require additional layers and is not a supported Salesforce Connect adapter, making it technically incorrect.

B. Heroku Connect
Heroku Connect is designed to sync data between Heroku Postgres databases and Salesforce — not on-premises systems. Since the question explicitly states the system must stay on-premises and there is no mention of Heroku hosting, this option is entirely irrelevant to the use case.

🔧 Reference:
Salesforce Connect
Confirms that Salesforce Connect uses OData protocol adapters to access external data sources in real time without data migration.

→ OData Adapter for Salesforce Connect
Confirms support for OData 2.0 and 4.0 as the standard protocol for external on-premises system integration via Salesforce Connect.

Northern Trail Outfitters (NTO) has recently changed its Corporate Security Guidelines. The guidelines require that all cloud applications pass through a secure firewall before accessing on-premise resources. NTO is evaluating middleware solutions to integrate cloud applications with on-premise resources and services.

Which consideration should an integration architect evaluate before choosing a middleware solution?

A. The middleware solution is able to interface directly with databases via an Open Database Connectivity (ODBC) connection string.

B. The middleware solution enforces the OAuth security protocol.

C. An API Gateway component is deployable behind a Demilitarized Zone (DMZ) or perimeter network.

C.   An API Gateway component is deployable behind a Demilitarized Zone (DMZ) or perimeter network.

Explanation:

This question addresses the architectural requirements for securing integrations between cloud environments (like Salesforce) and on-premise systems. It focuses on the structural placement of middleware components to satisfy corporate security mandates regarding firewalls and perimeter security.

✔️ Correct Option: C. An API Gateway component is deployable behind a Demilitarized Zone (DMZ) or perimeter network.
To comply with a "secure firewall" requirement, the middleware must support a deployment model that includes an API Gateway or proxy within the DMZ. This setup acts as a buffer, ensuring that Salesforce does not connect directly to the internal network. The gateway intercepts external requests, performs security checks, and then forwards authorized traffic through the inner firewall to on-premise resources, maintaining a multi-layered defense-in-depth strategy.

❌ Incorrect Option: A. The middleware solution is able to interface directly with databases via an ODBC connection string.
While direct database connectivity via ODBC is a functional feature of many middleware tools, it does not address the core security requirement of passing through a secure firewall. In fact, allowing a middleware solution to open direct database connections across network boundaries without a proper security proxy or gateway layer is often considered a security risk rather than a compliance solution for modern corporate guidelines.

❌ Incorrect Option: B. The middleware solution enforces the OAuth security protocol.
OAuth is a robust authorization framework, but it primarily handles identity and access permissions (the "who" and "what"), not the network path (the "how"). A solution can enforce OAuth while still failing to meet the requirement of routing traffic through a specific secure firewall or DMZ architecture. While necessary for security, it is not the specific structural consideration needed to satisfy the perimeter network mandate.

🔧 Reference:
→ Salesforce Integration Patterns: Firewall and DMZ
This documentation confirms the role of a DMZ and reverse proxy in securing on-premise resources during cloud-to-local integrations.

→ API Gateway Deployment Models
This link provides insights into how gateway components should be positioned within a network to provide a secure entry point for external API calls.

Salesforce-Platform-Integration-Architect Exam Questions - Home
Page 2 out of 24 Pages