Certified Professional - PingAccess Questions and Answers
All style sheets should be accessible to all users without authentication across all applications. Which configuration option should the administrator use?
An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?
All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?
An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?
An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?
Refer to the following applications:
hr.company.com
finance.company.com
customer.order.company.com
Which action should be taken to allow these applications to share the same web session?
A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)
The application team is requesting step-up authentication only for a few specific resources while maintaining previous authentication for other resources. What change would the administrator need to make?
A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?
A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?
An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?
An application owner would like customized errors for rule violations within an application. Where is this configured?
Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)
Which of the following is a processing rule?
A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?
An internal audit reveals that an agent has been compromised. What action must be taken to re-secure the agent?
A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?
Users report the following about access to an application:
Inconsistent behavior depending on the browser used
Denied access
Prompt to accept a security exception
Which configuration option should the administrator adjust?
An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)
A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)
A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?