Winter Sale Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Ping Identity PAP-001 Certified Professional - PingAccess Exam Practice Test

Page: 1 / 7
Total 70 questions

Certified Professional - PingAccess Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

An internal audit reveals that an agent has been compromised. What action must be taken to re-secure the agent?

Options:

A.

Change theagent.engine.configuration.shared.secretvalue in theagent.propertiesfile

B.

Select a new Agent Trusted Certificate

C.

Reinstall the agent

D.

Download and apply a newagent.propertiesfile

Question 2

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Question 3

An administrator needs to add a set of rules to an application protected by a PingAccess agent. Which rule will be unavailable to add to the application?

Options:

A.

Rewrite Cookie Domain

B.

Network Range

C.

Rate Limiting

D.

Cross-Origin Request

Question 4

A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.

Where should the administrator update this behavior without affecting existing applications?

Options:

A.

Token Validation

B.

Web Sessions

C.

Sites

D.

Token Provider

Question 5

An administrator needs to configure a protected web application using theAuthorization Codelogin flow. Which two configuration parameters must be set? (Choose 2 answers.)

Options:

A.

OAuth Token Introspection Endpoint

B.

OAuth Client ID

C.

OpenID Connect Issuer

D.

Virtual Host

E.

OpenID Connect Login Type

Question 6

Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?

Options:

A.

AsyncLogger

B.

RollingFile

C.

Logger

D.

Appenders

Question 7

An administrator is integrating a new PingAccess Proxied Application for which the target site uses a certificate issued by a publicly trusted Certificate Authority.

How should the administrator configure PingAccess to trust the target site?

Options:

A.

Import the certificate chain into Key Pairs and add it to a Trusted Certificate Group

B.

Configure the PingAccess Site to use the Java Trust Store Certificate Group

C.

Import the certificate chain into Key Pairs

D.

Drop the certificate chain into a Trusted Certificate Group

Question 8

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

Options:

A.

Issuer

B.

Client ID

C.

Host

D.

Port

Question 9

An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.

What initial action must the administrator take in PingAccess in this situation?

Options:

A.

Go to the Certificates section and create a new certificate

B.

Go to the Key Pairs section and import the PKCS#12 file provided by the customer's internal Certificate Authority

C.

Go to the Key Pairs section and import the PKCS#12 file provided by the publicly trusted Certificate Authority

D.

Go to the Key Pairs section and create a new certificate

Question 10

An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?

Options:

A.

Apply an Identity Mapping that includes the username and password

B.

Apply a valid Web Session that contains the username and password

C.

Configure a Basic Authentication Site Authenticator to the Site

D.

Configure a Mutual TLS Site Authenticator to the Site

Question 11

The application team has changed their directory paths. An administrator must adjust the following paths:

    /images/sitel/

    /images/sitel/checkout/default.html

    /images/sitel/homepage/english/default.html

Which pattern would match the paths?

Options:

A.

/images/aitel/checkout

B.

/images/site*

C.

/images/sitel/english/*

D.

/images/sitel/*

Question 12

A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?

Options:

A.

HTTP Request Header Rule

B.

Header Identity Mapping

C.

JWT Identity Mapping

D.

Web Session Attribute Rule

Question 13

According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?

Options:

A.

UI Authentication

B.

Auth Token Management

C.

Authentication Requirements

D.

Authentication Challenge Policy

Question 14

A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)

Options:

A.

PingFederate

B.

Kerberos

C.

Common SAML provider

D.

Common OIDC provider

E.

PingAuthorize

Question 15

A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?

Options:

A.

pingaccess.log

B.

pingaccess_engine_audit.log

C.

pingaccess_agent_audit.log

D.

pingaccess_api_audit.log

Question 16

Anycompany has several applications that need to load images and fonts from . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?

Options:

A.

Allowed Origins value for each of the listed domains

B.

Allowed Origins to*.anycompany.comand disable the Allow Credentials option

C.

Allowed Origins to*and enable the Allow Credentials option

D.

Allowed Origins towww.anycompany.com and enable the Allow Credentials option

Question 17

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

Options:

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

Question 18

The application team is requesting step-up authentication only for a few specific resources while maintaining previous authentication for other resources. What change would the administrator need to make?

Options:

A.

Authentication Challenge Policy

B.

Use context root as reserved resource base path

C.

Change the Context Root

D.

Manual Resource Ordering

Question 19

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

Options:

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Question 20

An application owner would like customized errors for rule violations within an application. Where is this configured?

Options:

A.

When assigning a Rule to a Resource

B.

Within the Root Resource of the Application

C.

When combining Rules into Rule Sets

D.

Within the Rule definition

Question 21

An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?

Options:

A.

log4j2.db.properties

B.

jvm-memory.options

C.

run.properties

D.

log4j2.xml

Page: 1 / 7
Total 70 questions