Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Ping Identity PAP-001 Dumps

Page: 1 / 7
Total 70 questions

Certified Professional - PingAccess Questions and Answers

Question 1

Under which top-level directory are PingAccess configuration archives stored?

Options:

A.

tools

B.

conf

C.

data

D.

bin

Question 2

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

Options:

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

Question 3

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

Options:

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Question 4

A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?

Options:

A.

HTTP Request Header Rule

B.

Header Identity Mapping

C.

JWT Identity Mapping

D.

Web Session Attribute Rule

Question 5

All style sheets should be accessible to all users without authentication across all applications. Which configuration option should the administrator use?

Options:

A.

Define a Protocol Source for the resource.

B.

Define Authentication Challenge Policy of none for the resource.

C.

Define Global Unprotected Resources for the resource.

D.

Define a Default Availability Profile of on-demand for the resource.

Question 6

An administrator needs to prevent PingAccess from automatically starting on a Windows Server. Which command would accomplish this task?

Options:

A.

init.bat

B.

uninstall-service.bat

C.

remove-install.bat

D.

wrapper-service.bat

Question 7

An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?

Options:

A.

Upgrade the Admin Console.

B.

Disable cluster communication.

C.

Disable Key Rolling.

D.

Upgrade the Replica Admin.

Question 8

Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)

Options:

A.

Default logs location

B.

URL for heartbeat endpoint

C.

Operational mode for PingAccess

D.

X-Frame-Options header

E.

Logging levels

Question 9

A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?

Options:

A.

Virtual Hosts

B.

Applications

C.

Sites

D.

Web Sessions

Question 10

An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)

Options:

A.

Changepa.operational.modetoCLUSTERED_CONSOLE_REPLICAon one of the engine nodes.

B.

Restart all nodes in the cluster.

C.

Changepa.operational.modetoCLUSTERED_CONSOLEon the replica admin node.

D.

Restart the replica admin node.

E.

Modifybootstrap.propertiesand set theengine.admin.configuration.hostvalue to point at the replica admin node.

Question 11

An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?

Options:

A.

log4j2.db.properties

B.

jvm-memory.options

C.

run.properties

D.

log4j2.xml

Question 12

During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)

Options:

A.

The resource requires no further authentication, and no rules will apply.

B.

The resource requires no further authentication, and Identity Mappings still apply.

C.

The resource requires no further authentication, and Processing rules still apply.

D.

Requests to this resource are not logged, and Identity Mappings are applied.

E.

The resource requires no further authentication, and all Access Control rules still apply.

Question 13

A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)

Options:

A.

PingFederate

B.

Kerberos

C.

Common SAML provider

D.

Common OIDC provider

E.

PingAuthorize

Question 14

An administrator needs to add a set of rules to an application protected by a PingAccess agent. Which rule will be unavailable to add to the application?

Options:

A.

Rewrite Cookie Domain

B.

Network Range

C.

Rate Limiting

D.

Cross-Origin Request

Question 15

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

Options:

A.

Assign the Key Pair to the Virtual Host

B.

Enable Require HTTPS in the Application configuration

C.

Assign the Key Pair to the Agent Listener

D.

Set the secure flag to Yes in the Site configuration

Question 16

Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)

Options:

A.

J2EE_HOME

B.

JAVA_HOME

C.

PA_PATH

D.

PA_HOME

E.

JAVA_PATH

Question 17

Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)

Options:

A.

Apple Safari

B.

Opera

C.

Google Chrome

D.

Microsoft Edge

E.

Brave

Question 18

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

Options:

A.

Issuer

B.

Client ID

C.

Host

D.

Port

Question 19

An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?

Options:

A.

Configure one active and one replica administrative node with engine cluster pointed to both administrative nodes

B.

Configure four active administrative nodes with engine cluster pointed to all administrative nodes for configuration

C.

Configure two active administrative nodes with engine cluster pointed to both administrative nodes for configuration

D.

Configure one active and three replica administrative nodes with engine cluster pointed to all administrative nodes

Question 20

Where should an administrator adjustSameSite Cookiesettings?

Options:

A.

Rules

B.

Sites

C.

Applications

D.

Web Sessions

Question 21

An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?

Options:

A.

/pa/authtoken/JWKS

B.

/pa-admin-api/v3/identityMappinga/descriptora/jwtidentitymapping

C.

/pa/aidc/cb

D.

/pa-admin-api/v3/authTokenManagement

Page: 1 / 7
Total 70 questions