Big Halloween Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Ping Identity PAP-001 Certified Professional - PingAccess Exam Practice Test

Page: 1 / 7
Total 70 questions

Certified Professional - PingAccess Questions and Answers

Question 1

An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?

Options:

A.

Create an Authentication Requirement named MFA_Required.

B.

Apply an Authentication Requirements rule to the resource.

C.

Apply a Web Session Attribute rule to the resource.

D.

Apply an HTTP Request Parameter rule to the resource.

Question 2

An administrator needs to support SLO (Single Logout) for a protected web application. What must be configured in a PingAccess Web Session in this situation?

Options:

A.

SLO scope

B.

Idle timeout

C.

Validate Session

D.

Refresh User Attributes

Question 3

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

Options:

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

Question 4

Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:

    (A) Look for department = sales

    (B) Look for department = marketing

    (C) Look for job_title = manager

Which additional actions should be taken to properly enforce this requirement?

Options:

A.

Create a Rule Set (D) to accept ALL (A) (B AND C) → Add Rule Set (D) to the resource

B.

Create a Rule Set (D) to accept ANY (A) (B) (C) → Add Rule Set (D) to the resource

C.

Create a Rule Set (D) to accept ALL (A) → Create a Rule Set (E) to accept ANY (B) (C) → Create a Rule Set Group (F) to accept ALL (D) (E) → Add Rule Set Group (F) to the resource

D.

Create a Rule Set (D) to accept ANY (A) → Create a Rule Set (E) to accept ALL (B) (C) → Create a Rule Set Group (F) to accept ANY (D) (E) → Add Rule Set Group (F) to the resource

Question 5

An administrator must protect an application on multiple domains or hosts. What should the administrator configure to complete this action?

Options:

A.

Sites

B.

Virtual Hosts

C.

Redirects

D.

Rules

Question 6

An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?

Options:

A.

db-passwd-rotate.bat

B.

memoryoptions.bat

C.

run.bat

D.

obfuscate.bat

Question 7

A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?

Options:

A.

Subject Attribute Name

B.

Send Audience

C.

Use Token Introspection Endpoint

D.

Client Secret

Question 8

An administrator needs to configure a protected web application using theAuthorization Codelogin flow. Which two configuration parameters must be set? (Choose 2 answers.)

Options:

A.

OAuth Token Introspection Endpoint

B.

OAuth Client ID

C.

OpenID Connect Issuer

D.

Virtual Host

E.

OpenID Connect Login Type

Question 9

What is the default port for the administrative console?

Options:

A.

9000

B.

3000

C.

9090

D.

3030

Question 10

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

Options:

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Question 11

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Question 12

Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)

Options:

A.

Default logs location

B.

URL for heartbeat endpoint

C.

Operational mode for PingAccess

D.

X-Frame-Options header

E.

Logging levels

Question 13

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

Options:

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

Question 14

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Question 15

A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.

Where should the administrator update this behavior without affecting existing applications?

Options:

A.

Token Validation

B.

Web Sessions

C.

Sites

D.

Token Provider

Question 16

PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.

What are two ways this requirement can be met? (Choose 2 answers.)

Options:

A.

Assign unique Key Pairs to each Virtual Host

B.

Assign a wildcard certificate to the Engine Listener

C.

Assign a Subject Alternative Name Certificate to the Engine Listener

D.

Assign a Subject Alternative Name Certificate to the Agent Listener

E.

Assign a wildcard certificate to the Agent Listener

Question 17

An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?

Options:

A.

Configure one active and one replica administrative node with engine cluster pointed to both administrative nodes

B.

Configure four active administrative nodes with engine cluster pointed to all administrative nodes for configuration

C.

Configure two active administrative nodes with engine cluster pointed to both administrative nodes for configuration

D.

Configure one active and three replica administrative nodes with engine cluster pointed to all administrative nodes

Question 18

What is the purpose of PingAccess processing rules?

Options:

A.

To collect data for offline processing

B.

To modify web traffic in real time

C.

To override upstream access control decisions

D.

To allow for more detailed auditing

Question 19

A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?

Options:

A.

pingaccess.log

B.

pingaccess_engine_audit.log

C.

pingaccess_agent_audit.log

D.

pingaccess_api_audit.log

Question 20

An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?

Options:

A.

Apply an Identity Mapping that includes the username and password

B.

Apply a valid Web Session that contains the username and password

C.

Configure a Basic Authentication Site Authenticator to the Site

D.

Configure a Mutual TLS Site Authenticator to the Site

Question 21

Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?

Options:

A.

AsyncLogger

B.

RollingFile

C.

Logger

D.

Appenders

Page: 1 / 7
Total 70 questions