An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?
How many administrators are supported using HTTP Basic Authentication in the Administrative Console?
An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?
An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?
A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?
An auto parts company wants to protect the path/parts/suspension/struts/manufacturer. Resources appear under an applicationContext Root of/partswith default ordering.
Which resource will the policy engine select?
An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?
Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)
A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?
What is the purpose of PingAccess processing rules?
A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?
The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?
The application team has changed their directory paths. An administrator must adjust the following paths:
/images/sitel/
/images/sitel/checkout/default.html
/images/sitel/homepage/english/default.html
Which pattern would match the paths?
An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?
Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)
What is the purpose of thepa.operational.modeconfiguration setting?
According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?
A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?
What is the default port for the administrative console?
A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.
Which two actions should the administrator take? (Choose 2 answers.)
An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?