Big Halloween Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Ping Identity PAP-001 Dumps Questions Answers

Page: 1 / 5
Total 70 questions

Certified Professional - PingAccess Questions and Answers

Question 1

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

Options:

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Buy Now
Question 2

A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?

Options:

A.

Use Java Trust Store

B.

Validate disordered certificate chains

C.

Skip Certificate Date Check

D.

Deny when unable to determine revocation status

Question 3

An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.

What initial action must the administrator take in PingAccess in this situation?

Options:

A.

Go to the Certificates section and create a new certificate

B.

Go to the Key Pairs section and import the PKCS#12 file provided by the customer's internal Certificate Authority

C.

Go to the Key Pairs section and import the PKCS#12 file provided by the publicly trusted Certificate Authority

D.

Go to the Key Pairs section and create a new certificate

Question 4

Where should an administrator adjustSameSite Cookiesettings?

Options:

A.

Rules

B.

Sites

C.

Applications

D.

Web Sessions

Question 5

The application team has changed their directory paths. An administrator must adjust the following paths:

    /images/sitel/

    /images/sitel/checkout/default.html

    /images/sitel/homepage/english/default.html

Which pattern would match the paths?

Options:

A.

/images/aitel/checkout

B.

/images/site*

C.

/images/sitel/english/*

D.

/images/sitel/*

Question 6

An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?

Options:

A.

Import the SSL public key with the full certificate chain into the Certificates.

B.

Import the PKCS#12 file with the full certificate chain into the Certificates.

C.

Import the SSL public key with the full certificate chain into the Key Pairs.

D.

Import the PKCS#12 file with the full certificate chain into the Key Pairs.

Question 7

Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)

Options:

A.

Default logs location

B.

URL for heartbeat endpoint

C.

Operational mode for PingAccess

D.

X-Frame-Options header

E.

Logging levels

Question 8

Under which top-level directory are PingAccess configuration archives stored?

Options:

A.

tools

B.

conf

C.

data

D.

bin

Question 9

Refer to the following applications:

    hr.company.com

    finance.company.com

    customer.order.company.com

Which action should be taken to allow these applications to share the same web session?

Options:

A.

Set Audience option

B.

Set Cookie Domain option

C.

Use Rewrite Cookie Domain rule

D.

Use Rewrite Cookie Path rule

Question 10

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Question 11

An administrator needs to prevent PingAccess from automatically starting on a Windows Server. Which command would accomplish this task?

Options:

A.

init.bat

B.

uninstall-service.bat

C.

remove-install.bat

D.

wrapper-service.bat

Question 12

An administrator configures PingAccess to use PingFederate as the token provider. Which benefit does this provide?

Options:

A.

The ability to use Single Sign-On support for the administrative console and OAuth for Admin API

B.

The ability to define new OAuth clients in PingFederate from within PingAccess

C.

The ability to manage token issuance criteria from within PingAccess

D.

The automatic population of the Client ID field for selection in creating or editing a Web Session

Question 13

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

Options:

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Question 14

Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)

Options:

A.

SAML

B.

WS-Fed

C.

WS-Trust

D.

OAuth2

E.

OIDC

Question 15

An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?

Options:

A.

Create an Authentication Requirement named MFA_Required.

B.

Apply an Authentication Requirements rule to the resource.

C.

Apply a Web Session Attribute rule to the resource.

D.

Apply an HTTP Request Parameter rule to the resource.

Question 16

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

Options:

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

Question 17

Which of the following is a processing rule?

Options:

A.

Web Session Attribute

B.

Cross-Origin Request

C.

HTTP Request Parameter

D.

HTTP Request Header

Question 18

Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)

Options:

A.

J2EE_HOME

B.

JAVA_HOME

C.

PA_PATH

D.

PA_HOME

E.

JAVA_PATH

Question 19

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

Options:

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

Question 20

PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.

What are two ways this requirement can be met? (Choose 2 answers.)

Options:

A.

Assign unique Key Pairs to each Virtual Host

B.

Assign a wildcard certificate to the Engine Listener

C.

Assign a Subject Alternative Name Certificate to the Engine Listener

D.

Assign a Subject Alternative Name Certificate to the Agent Listener

E.

Assign a wildcard certificate to the Agent Listener

Question 21

A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?

Options:

A.

pingaccess.log

B.

pingaccess_engine_audit.log

C.

pingaccess_agent_audit.log

D.

pingaccess_api_audit.log

Page: 1 / 5
Total 70 questions