Certified Professional - PingAccess Questions and Answers
Under which top-level directory are PingAccess configuration archives stored?
A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)
The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?
A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?
All style sheets should be accessible to all users without authentication across all applications. Which configuration option should the administrator use?
An administrator needs to prevent PingAccess from automatically starting on a Windows Server. Which command would accomplish this task?
An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?
Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)
A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?
An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)
An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?
During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)
A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)
An administrator needs to add a set of rules to an application protected by a PingAccess agent. Which rule will be unavailable to add to the application?
An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?
Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)
Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)
What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?
An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?
Where should an administrator adjustSameSite Cookiesettings?
An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?