Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Ping Identity PAP-001 Certified Professional - PingAccess Exam Practice Test

Page: 1 / 7
Total 70 questions

Certified Professional - PingAccess Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?

Options:

A.

Create an Authentication Requirement named MFA_Required.

B.

Apply an Authentication Requirements rule to the resource.

C.

Apply a Web Session Attribute rule to the resource.

D.

Apply an HTTP Request Parameter rule to the resource.

Question 2

How many administrators are supported using HTTP Basic Authentication in the Administrative Console?

Options:

A.

1000

B.

1

C.

10

D.

100

Question 3

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

Options:

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Question 4

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Question 5

A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?

Options:

A.

Use Java Trust Store

B.

Validate disordered certificate chains

C.

Skip Certificate Date Check

D.

Deny when unable to determine revocation status

Question 6

An auto parts company wants to protect the path/parts/suspension/struts/manufacturer. Resources appear under an applicationContext Root of/partswith default ordering.

Which resource will the policy engine select?

Options:

A.

//struts/manufacturer

B.

//manufacturer

C.

/suspension/struts/manufacturer

D.

///manufacturer

Question 7

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Question 8

Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)

Options:

A.

Apple Safari

B.

Opera

C.

Google Chrome

D.

Microsoft Edge

E.

Brave

Question 9

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Question 10

What is the purpose of PingAccess processing rules?

Options:

A.

To collect data for offline processing

B.

To modify web traffic in real time

C.

To override upstream access control decisions

D.

To allow for more detailed auditing

Question 11

A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?

Options:

A.

Subject Attribute Name

B.

Send Audience

C.

Use Token Introspection Endpoint

D.

Client Secret

Question 12

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

Options:

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Question 13

The application team has changed their directory paths. An administrator must adjust the following paths:

    /images/sitel/

    /images/sitel/checkout/default.html

    /images/sitel/homepage/english/default.html

Which pattern would match the paths?

Options:

A.

/images/aitel/checkout

B.

/images/site*

C.

/images/sitel/english/*

D.

/images/sitel/*

Question 14

An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?

Options:

A.

Upgrade the Admin Console.

B.

Disable cluster communication.

C.

Disable Key Rolling.

D.

Upgrade the Replica Admin.

Question 15

Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)

Options:

A.

J2EE_HOME

B.

JAVA_HOME

C.

PA_PATH

D.

PA_HOME

E.

JAVA_PATH

Question 16

What is the purpose of thepa.operational.modeconfiguration setting?

Options:

A.

To determine if a server should participate in cluster replication

B.

To determine the role the server performs in a cluster

C.

To determine whether a server is a development or production server

D.

To determine if a cluster node is enabled or disabled

Question 17

According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?

Options:

A.

UI Authentication

B.

Auth Token Management

C.

Authentication Requirements

D.

Authentication Challenge Policy

Question 18

A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?

Options:

A.

Virtual Hosts

B.

Applications

C.

Sites

D.

Web Sessions

Question 19

What is the default port for the administrative console?

Options:

A.

9000

B.

3000

C.

9090

D.

3030

Question 20

A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.

Which two actions should the administrator take? (Choose 2 answers.)

Options:

A.

Verify that a rejection handler rule exists and is applied to the application to see if a user has met the required authentication context

B.

Verify that an authentication requirement rule is applied to the application to see if a user has met the required authentication context

C.

Make sure that the existing rule's authentication requirements contain the appropriate minimum authentication requirements

D.

Create a new identity mapping containing authentication context values and add the mapping to the existing rule

E.

Make sure that the existing rule's token validation contains the appropriate minimum authentication requirements

Question 21

An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?

Options:

A.

log4j2.db.properties

B.

jvm-memory.options

C.

run.properties

D.

log4j2.xml

Page: 1 / 7
Total 70 questions