Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Exam Heroku Architect Topic 7 Question 21 Discussion

Actual exam question for Salesforce's Heroku Architect exam
Question #: 21
Topic #: 7
[All Heroku Architect Questions]

Universal Containers (UC) has a Heroku Postgres database attached to a Heroku app, which is running in the Common Runtime.

What should an Architect recommend UC do to secure their database to only trusted locations?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Melissa
1 months ago
I wonder if the Heroku Postgres database has any jokes pre-installed. Maybe it's a 'Postgres-a-Joke' feature.
upvoted 0 times
...
Rene
1 months ago
Option B? More like 'Add a Trusted IP range to the Heroku Postgres configuration.' Haha, who writes these questions?
upvoted 0 times
...
Mammie
1 months ago
Option A is a bit overkill, in my opinion. Moving the whole app and database to a Private Space might be unnecessary for this use case.
upvoted 0 times
Shawn
23 days ago
Setting up a VPN from the trusted locations to the app could also work to secure the database.
upvoted 0 times
...
Lachelle
24 days ago
I think adding a Trusted IP range to the Heroku Postgres configuration would be a good option.
upvoted 0 times
...
...
Francis
2 months ago
Option D sounds a bit more complex, but setting up a VPC could give you more control over the networking and security aspects.
upvoted 0 times
Linsey
18 days ago
Option D sounds a bit more complex, but setting up a VPC could give you more control over the networking and security aspects.
upvoted 0 times
...
Aleisha
1 months ago
B) Add a Trusted IP range to the Heroku Postgres configuration.
upvoted 0 times
...
Javier
1 months ago
A) Move the database and the app into the Private Space.
upvoted 0 times
...
...
Erick
2 months ago
I like the idea of a VPN setup in Option C. That would provide an extra layer of security by creating a secure tunnel to the app.
upvoted 0 times
Rolande
10 days ago
It's always better to have multiple layers of security in place.
upvoted 0 times
...
Asha
14 days ago
I agree, setting up a VPN would definitely help protect the database.
upvoted 0 times
...
Sean
1 months ago
Option C sounds like a good choice for added security.
upvoted 0 times
...
...
Dalene
2 months ago
Option B seems the most straightforward approach to secure the database. Limiting access to trusted IP ranges is a simple and effective way to restrict access.
upvoted 0 times
Ilene
1 days ago
True, but it might be more complex than just setting up a Trusted IP range.
upvoted 0 times
...
Angella
3 days ago
Moving the database and app into a Private Space could also work.
upvoted 0 times
...
Craig
4 days ago
I agree, setting up a Trusted IP range is a good way to restrict access.
upvoted 0 times
...
Janet
8 days ago
Option B seems the most straightforward approach to secure the database.
upvoted 0 times
...
Freida
9 days ago
User 4: Setting up a VPN from trusted locations seems like a secure option as well.
upvoted 0 times
...
Olive
13 days ago
User 3: Moving the database and app into a Private Space could also work.
upvoted 0 times
...
Mose
21 days ago
User 2: I agree, limiting access to trusted IP ranges is a good security measure.
upvoted 0 times
...
Renato
1 months ago
User 1: I think option B is the best choice.
upvoted 0 times
...
...
Gabriele
2 months ago
I see both points. However, I think setting up a VPN from the trusted locations to the app, as mentioned in option C, would provide a secure connection while allowing access from specific locations.
upvoted 0 times
...
Danica
2 months ago
I disagree with Pearlie. I believe option B is more practical. Adding a Trusted IP range to the Heroku Postgres configuration will restrict access to only trusted locations.
upvoted 0 times
...
Pearlie
3 months ago
I think option A is the best choice. Moving the database and app into a Private Space will provide the highest level of security.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77