Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Ping Identity PAP-001 Dumps

Page: 1 / 7
Total 70 questions

Certified Professional - PingAccess Questions and Answers

Question 1

All style sheets should be accessible to all users without authentication across all applications. Which configuration option should the administrator use?

Options:

A.

Define a Protocol Source for the resource.

B.

Define Authentication Challenge Policy of none for the resource.

C.

Define Global Unprotected Resources for the resource.

D.

Define a Default Availability Profile of on-demand for the resource.

Question 2

An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?

Options:

A.

Create an Authentication Requirement named MFA_Required.

B.

Apply an Authentication Requirements rule to the resource.

C.

Apply a Web Session Attribute rule to the resource.

D.

Apply an HTTP Request Parameter rule to the resource.

Question 3

All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?

Options:

A.

Enable the Audit option for the/adminresource

B.

Enable the Audit option for the/*resource

C.

Set Splunk audit logging for/admin

D.

Setlog4j2.xmlaudit logging for/admin

Question 4

An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?

Options:

A.

Token Provider

B.

Web Session

C.

Site Authenticator

D.

Access Control Rule

Question 5

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Question 6

Refer to the following applications:

    hr.company.com

    finance.company.com

    customer.order.company.com

Which action should be taken to allow these applications to share the same web session?

Options:

A.

Set Audience option

B.

Set Cookie Domain option

C.

Use Rewrite Cookie Domain rule

D.

Use Rewrite Cookie Path rule

Question 7

A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)

Options:

A.

PingFederate

B.

Kerberos

C.

Common SAML provider

D.

Common OIDC provider

E.

PingAuthorize

Question 8

The application team is requesting step-up authentication only for a few specific resources while maintaining previous authentication for other resources. What change would the administrator need to make?

Options:

A.

Authentication Challenge Policy

B.

Use context root as reserved resource base path

C.

Change the Context Root

D.

Manual Resource Ordering

Question 9

A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?

Options:

A.

HTTP Request Header Rule

B.

Header Identity Mapping

C.

JWT Identity Mapping

D.

Web Session Attribute Rule

Question 10

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Question 11

An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?

Options:

A.

Apply an Identity Mapping that includes the username and password

B.

Apply a valid Web Session that contains the username and password

C.

Configure a Basic Authentication Site Authenticator to the Site

D.

Configure a Mutual TLS Site Authenticator to the Site

Question 12

An application owner would like customized errors for rule violations within an application. Where is this configured?

Options:

A.

When assigning a Rule to a Resource

B.

Within the Root Resource of the Application

C.

When combining Rules into Rule Sets

D.

Within the Rule definition

Question 13

Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)

Options:

A.

Default logs location

B.

URL for heartbeat endpoint

C.

Operational mode for PingAccess

D.

X-Frame-Options header

E.

Logging levels

Question 14

Which of the following is a processing rule?

Options:

A.

Web Session Attribute

B.

Cross-Origin Request

C.

HTTP Request Parameter

D.

HTTP Request Header

Question 15

A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?

Options:

A.

pingaccess.log

B.

pingaccess_engine_audit.log

C.

pingaccess_agent_audit.log

D.

pingaccess_api_audit.log

Question 16

An internal audit reveals that an agent has been compromised. What action must be taken to re-secure the agent?

Options:

A.

Change theagent.engine.configuration.shared.secretvalue in theagent.propertiesfile

B.

Select a new Agent Trusted Certificate

C.

Reinstall the agent

D.

Download and apply a newagent.propertiesfile

Question 17

A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?

Options:

A.

Subject Attribute Name

B.

Send Audience

C.

Use Token Introspection Endpoint

D.

Client Secret

Question 18

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

Options:

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

Question 19

An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)

Options:

A.

Changepa.operational.modetoCLUSTERED_CONSOLE_REPLICAon one of the engine nodes.

B.

Restart all nodes in the cluster.

C.

Changepa.operational.modetoCLUSTERED_CONSOLEon the replica admin node.

D.

Restart the replica admin node.

E.

Modifybootstrap.propertiesand set theengine.admin.configuration.hostvalue to point at the replica admin node.

Question 20

A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)

Options:

A.

Request that the token provider update the ID token with the additional attributes.

B.

Update the Identity Mapping.

C.

Update the Site Authenticator.

D.

Request that the token provider update the access token with the additional attributes.

E.

Update the Web Session.

Question 21

A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?

Options:

A.

Virtual Hosts

B.

Applications

C.

Sites

D.

Web Sessions

Page: 1 / 7
Total 70 questions