Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Ping Identity PAP-001 Certified Professional - PingAccess Exam Practice Test

Demo: 21 questions
Total 70 questions

Certified Professional - PingAccess Questions and Answers

Question 1

Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)

Options:

A.

SAML

B.

WS-Fed

C.

WS-Trust

D.

OAuth2

E.

OIDC

Question 2

An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?

Options:

A.

Import the SSL public key with the full certificate chain into the Certificates.

B.

Import the PKCS#12 file with the full certificate chain into the Certificates.

C.

Import the SSL public key with the full certificate chain into the Key Pairs.

D.

Import the PKCS#12 file with the full certificate chain into the Key Pairs.

Question 3

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Question 4

A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.

Which two actions should the administrator take? (Choose 2 answers.)

Options:

A.

Verify that a rejection handler rule exists and is applied to the application to see if a user has met the required authentication context

B.

Verify that an authentication requirement rule is applied to the application to see if a user has met the required authentication context

C.

Make sure that the existing rule's authentication requirements contain the appropriate minimum authentication requirements

D.

Create a new identity mapping containing authentication context values and add the mapping to the existing rule

E.

Make sure that the existing rule's token validation contains the appropriate minimum authentication requirements

Question 5

An administrator configures PingAccess to use PingFederate as the token provider. Which benefit does this provide?

Options:

A.

The ability to use Single Sign-On support for the administrative console and OAuth for Admin API

B.

The ability to define new OAuth clients in PingFederate from within PingAccess

C.

The ability to manage token issuance criteria from within PingAccess

D.

The automatic population of the Client ID field for selection in creating or editing a Web Session

Question 6

A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?

Options:

A.

Subject Attribute Name

B.

Send Audience

C.

Use Token Introspection Endpoint

D.

Client Secret

Question 7

Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.

What should the administrator add for the access token claims?

Options:

A.

An authentication requirement definition

B.

A web session attribute rule

C.

An identity mapping definition

D.

An OAuth attribute rule

Question 8

A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.

Where should the administrator update this behavior without affecting existing applications?

Options:

A.

Token Validation

B.

Web Sessions

C.

Sites

D.

Token Provider

Question 9

An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?

Options:

A.

Upgrade the Admin Console.

B.

Disable cluster communication.

C.

Disable Key Rolling.

D.

Upgrade the Replica Admin.

Question 10

An administrator is integrating a new PingAccess Proxied Application for which the target site uses a certificate issued by a publicly trusted Certificate Authority.

How should the administrator configure PingAccess to trust the target site?

Options:

A.

Import the certificate chain into Key Pairs and add it to a Trusted Certificate Group

B.

Configure the PingAccess Site to use the Java Trust Store Certificate Group

C.

Import the certificate chain into Key Pairs

D.

Drop the certificate chain into a Trusted Certificate Group

Question 11

Anycompany has several applications that need to load images and fonts fromwww.anycompany.com . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?

Options:

A.

Allowed Origins value for each of the listed domains

B.

Allowed Origins to*.anycompany.comand disable the Allow Credentials option

C.

Allowed Origins to*and enable the Allow Credentials option

D.

Allowed Origins towww.anycompany.com and enable the Allow Credentials option

Question 12

An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.

What initial action must the administrator take in PingAccess in this situation?

Options:

A.

Go to the Certificates section and create a new certificate

B.

Go to the Key Pairs section and import the PKCS#12 file provided by the customer's internal Certificate Authority

C.

Go to the Key Pairs section and import the PKCS#12 file provided by the publicly trusted Certificate Authority

D.

Go to the Key Pairs section and create a new certificate

Question 13

What is the purpose of the Mutual TLS Site Authenticator?

Options:

A.

Allows the backend server to authenticate to PingAccess

B.

Allows the user to authenticate to the backend server

C.

Allows PingAccess to authenticate to the backend server

D.

Allows PingAccess to authenticate to the token provider

Question 14

During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)

Options:

A.

The resource requires no further authentication, and no rules will apply.

B.

The resource requires no further authentication, and Identity Mappings still apply.

C.

The resource requires no further authentication, and Processing rules still apply.

D.

Requests to this resource are not logged, and Identity Mappings are applied.

E.

The resource requires no further authentication, and all Access Control rules still apply.

Question 15

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

Options:

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Question 16

An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?

Options:

A.

/pa/authtoken/JWKS

B.

/pa-admin-api/v3/identityMappinga/descriptora/jwtidentitymapping

C.

/pa/aidc/cb

D.

/pa-admin-api/v3/authTokenManagement

Question 17

A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?

Options:

A.

Virtual Hosts

B.

Applications

C.

Sites

D.

Web Sessions

Question 18

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Question 19

An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?

Options:

A.

db-passwd-rotate.bat

B.

memoryoptions.bat

C.

run.bat

D.

obfuscate.bat

Question 20

A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)

Options:

A.

PingFederate

B.

Kerberos

C.

Common SAML provider

D.

Common OIDC provider

E.

PingAuthorize

Question 21

How many administrators are supported using HTTP Basic Authentication in the Administrative Console?

Options:

A.

1000

B.

1

C.

10

D.

100

Demo: 21 questions
Total 70 questions