New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Ping Identity PT-AM-CPE Dumps

Page: 1 / 10
Total 100 questions

Certified Professional - PingAM Exam Questions and Answers

Question 1

What should be executed to ensure a successful upgrade when PingAM requires a version upgrade?

Options:

A.

Post-upgrade, run a set of functional tests

B.

Post-upgrade, run a set of functional and non-functional tests

C.

Post-upgrade, run a set of non-functional tests

D.

Post-upgrade, set the PingAM Version Control Flag to the correct version

Question 2

Which of the following tab pages in the PingAM admin UI can be used to configure the OAuth2 and OpenID Connect may act scripts used for token exchange requests?

A) The OAuth2 provider service > Advanced tab page

B) The OAuth2 provider service > Core tab page

C) The OAuth2 client profile > Advanced tab page

D) The OAuth2 client profile > OAuth2 Provider Overrides tab page

Options:

A.

B and D only

B.

A and D only

C.

A and C only

D.

B and C only

Question 3

When making a request to the /oauth2/access_token endpoint using the JWT profile client authentication method, which parameter is used to provide the JWT value?

Options:

A.

client_credentials

B.

client_token_value

C.

client_id

D.

client_assertion

Question 4

What happens when an end user accesses the following login page: .../XUI/?ForceAuth=true#login?

Options:

A.

Even if the end user is already authenticated, they will be redirected to the login page

B.

The end user will be presented with second factor authentication

C.

Nothing. ForceAuth is not a parameter that PingAM knows how to process

D.

A screen is presented to the end user suggesting they enable second factor authentication

Question 5

Which statements are correct in relation to an OAuth2 token exchange impersonation pattern?

A) The client may want to act as the subject on another service.

B) The client is used by a subject to act on behalf of another subject.

C) The requested token exchange involves a subject token only.

D) The requested token exchange involves a subject and actor token.

Options:

A.

A and C only

B.

B and D only

C.

B and C only

D.

A and D only

Question 6

What is session denylisting used for?

Options:

A.

Keeping track of session inactivity

B.

Keeping track of restricted sessions

C.

Keeping track of logged out sessions

D.

Keeping track of absolute session timeouts

Question 7

Which of the following is considered a confidential OAuth2 client?

Options:

A.

Desktop clients

B.

JavaScript clients

C.

Web browsers

D.

Web applications

Question 8

What are the possible outcomes of the Push Result Verifier node?

Options:

A.

Success, Failure, Waiting, Retry

B.

Success, Failure, Expired, Retry

C.

Success, Failure, Expired, Waiting

D.

Success, Failure, Expired, Waiting, Retry

Question 9

Which of the following needs to be configured in order to use social authentication in PingAM?

Options:

A.

A data store

B.

A realm service

C.

An OAuth2 client

D.

A realm policy

Question 10

What is the purpose of the extended metadata in PingAM?

Options:

A.

It specifies the certificates and keys for the SAML2 entity

B.

It specifies the policy to invoke during SAML2 federation

C.

It is a standard way to communicate supported SAML2 features

D.

It specifies additional information about a SAML2 entity specific to PingAM

Question 11

Which of the following parameters must be provided by the edge client when requesting step-up authentication or transactional authorization?

Options:

A.

authIndexType and authIndexValue

B.

service, authIndexType, and authIndexValue

C.

ForceAuth, authIndexType, and authIndexValue

D.

service and ForceAuth

Question 12

Which area of PingAM does affinity mode relate to?

Options:

A.

Authentication

B.

Load balancing

C.

Self-service

D.

Authorization

Question 13

Which multi-factor authentication methods require a separate device and an application?

Options:

A.

Push, WebAuthn

B.

Push, WebAuthn, Open Authentication

C.

WebAuthn, Open Authentication

D.

Open Authentication, Push

Question 14

When making a token exchange request for an ID token using the /oauth2/access_token endpoint, what is the value for the grant_type parameter?

Options:

A.

urn:ietf:params:oidc:grant-type:token-exchange

B.

urn:ietf:params:oauth2:grant-type:token-exchange

C.

urn:ietf:params:oauth:grant-type:token-exchange

D.

urn:ietf:params:oauth:grant-type:idtoken-exchange

Question 15

A customer wishes to customize the OpenID Connect (OIDC) id_token JSON Web Token (JWT) to include the subject's employee number. Which of the following scripts should be customized to meet this requirement?

Options:

A.

OIDC parameters script

B.

OIDC claims script

C.

OIDC attributes script

D.

OIDC JWT script

Question 16

Which of the following options represents best practice for an implementation that configures an ID token in a subject condition for policies validating the token's claims?

Options:

A.

Policy evaluation only validates the claims, not the ID token. The ID token should be validated after making the policy evaluation request

B.

Policy evaluation only validates the claims, not the ID token. There is no need to validate the ID token that was obtained before the policy is evaluated

C.

Policy evaluation only validates the claims, not the ID token. The ID token should be validated before making the policy evaluation request

D.

Policy evaluation validates the claims and the ID token. There is no need to validate the ID token before the policy is evaluated

Question 17

Which of the following components is used to return data to PingGateway or the agent to be included with the policy decision?

Options:

A.

Subjects

B.

Resources

C.

Response attributes

D.

Actions

Question 18

Which of the following is an incorrect statement about session upgrade outcomes?

Options:

A.

In a server-side session configuration, when using the ForceAuth parameter and an authentication tree, PingAM issues a new session token to a user who reauthenticates, even if the current session already meets the security requirements

B.

In a server-side or client-side session configuration, PingAM issues a new session token to a user who reauthenticates, only when the current session does not meet the security requirements

C.

In a server-side session configuration, when using advices, PingAM copies the session properties to a new session and replaces the client's original session token with a new session token

D.

In a client-side session configuration, PingAM replaces the client's original session token with a new session token

Question 19

In PingAM, which OpenID Connect endpoint can be used to validate an unencrypted ID token?

Options:

A.

/oauth2/idtokeninfo

B.

/oauth2/userinfo

C.

/oauth2/introspect

D.

/oauth2/tokeninfo

Question 20

Why should module-based authentication be disabled in production?

Options:

A.

Module-based authentication allows a user to authenticate with the amAdmin account

B.

Module-based authentication allows a user to select any authentication level

C.

Module-based authentication allows a user to bypass steps in an authentication chain

D.

Module-based authentication allows users to authenticate in any realm

Question 21

Does the user who runs the PingAM process need to have a home directory?

Options:

A.

Yes, because this is where PingAM stores a pointer to the configuration

B.

Yes, because this is where PingAM stores some of the configuration

C.

Yes, because otherwise the process cannot listen on a port below 1024

D.

No, not at all

Question 22

Which of the following statements are correct regarding session upgrades in PingAM?

A) An authenticated user is required to authenticate again either to the same or a different authentication service.

B) The user must not change for the session upgrade to succeed.

C) The only PingAM mechanism to do a session upgrade is the ForceAuth=true request parameter.

D) A session upgrade is PingAM's mechanism to perform what is called step-up authentication.1

Options:

A.

A, C, and D

B.

B, C, and D

C.

A, B, and D

D.

A, B, and C

Question 23

Which statements are correct about PingAM sessions?

A) When a web browser is involved, the web browser is instructed to set a cookie as the session reference.

B) When no browser is involved, PingAM returns the session reference in the JSON response.

C) PingAM can only track the session in the Core Token Service store.

D) The default session cookie name created in a web browser is iPlanetDirectoryPro.

Options:

A.

A, B, and D only

B.

A, B, and C only

C.

A, C, and D only

D.

A and B only

Question 24

Which statements are correct about push notification authentication implemented with PingAM?

Options:

A.

The user must have a device with a camera and install the Authenticator app.

B.

The registration and authentication steps must be part of the same authentication tree.

C.

To register a device the user scans a barcode with the Authenticator installed on their device.1

D.

During subsequent authentication processes, PingAM instructs the push server to send a notification to the registered device, and waits for the user to use the Authenticator app to approve the request.2

Options:

E.

A, B, and C only

F.

B, C, and D only

G.

A and D only

Question 25

During the PingAM startup process, what is the location and name of the file that the PingAM bootstrap process uses to connect to the configuration Directory Services repository?

Options:

A.

/.openam/config/boot.json

B.

/path/to/tomcat//webapps//boot.json

C.

//boot.json

D.

//config/boot.json

Question 26

A user's SSOTokenID is stored in a cookie when they successfully log in. What is the name of the PingAM property used to configure this cookie?

Options:

A.

com.iplanet.am.cookie.name

B.

iPlanetDirectoryPro

C.

comIplanetAmSessionCookieName

D.

com.sun.identity.agents.config.cookie.name

Question 27

An administrator has a requirement to reconfigure the attribute used to search for users in a LDAP Data Store. What Data Store configuration attribute would they need to change?

Options:

A.

LDAP Users Search Attribute

B.

LDAP Users Index Attribute

C.

LDAP Users Bind Attribute

D.

LDAP Users Find Attribute

Question 28

After installing a PingAM instance with the configuration directory path set to /home/forgerock/am, where is the default directory that contains the debug log files?

Options:

A.

/home/forgerock/am/logs

B.

/home/forgerock/am/var/logs

C.

/home/forgerock/am/var/debug

D.

/home/forgerock/am/debug

Question 29

Which of the following actions can be specified in a policy by default?

Options:

A.

HEAD

B.

INSERT

C.

CREATE

D.

UPDATE

Question 30

What does the acronym SAML stand for?

Options:

A.

Scoped Assertion Markup Language

B.

Secure Assertion Markup Language

C.

Security Assertion Markup Language

D.

Strong Assertion Markup Language

Page: 1 / 10
Total 100 questions