Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Ping Identity > PingAccess > PAP-001

PAP-001 Certified Professional - PingAccess Question and Answers

Question # 4

An administrator configures the following:

    HTTP Request Parameter Rule for"can_read=yes"

    Web Session Attribute Rule forOpt-in = yes

    Web Session Attribute Rule forgroup = customerService

    Rule SetA(ALL) → includes (HTTP Request Parameter Rule)

    Rule SetB(ANY) → includes (Opt-in yes, group customerService)

    Rule Set GroupC(ALL) → includes (Rule Set A, Rule Set B)Assigned to the web application.

Which set of conditions must be met to be able to access the application?

A.

The request requires a parameter called can_read with a value of yes. Additionally, the authenticated user must be in customer service and have the opt-in attribute set to yes.

B.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in either customer service or has the opt-in attribute set to yes.

C.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in customer service and the opt-in attribute set to yes.

D.

The request requires a parameter called can_read with a value of yes. The authenticated usermust be either in customer service or have the opt-in attribute set to yes.

Full Access
Question # 5

An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?

A.

log4j2.db.properties

B.

jvm-memory.options

C.

run.properties

D.

log4j2.xml

Full Access
Question # 6

Anycompany has several applications that need to load images and fonts fromwww.anycompany.com . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?

A.

Allowed Origins value for each of the listed domains

B.

Allowed Origins to*.anycompany.comand disable the Allow Credentials option

C.

Allowed Origins to*and enable the Allow Credentials option

D.

Allowed Origins towww.anycompany.com and enable the Allow Credentials option

Full Access
Question # 7

An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?

A.

Configure one active and one replica administrative node with engine cluster pointed to both administrative nodes

B.

Configure four active administrative nodes with engine cluster pointed to all administrative nodes for configuration

C.

Configure two active administrative nodes with engine cluster pointed to both administrative nodes for configuration

D.

Configure one active and three replica administrative nodes with engine cluster pointed to all administrative nodes

Full Access
Question # 8

An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.

What initial action must the administrator take in PingAccess in this situation?

A.

Go to the Certificates section and create a new certificate

B.

Go to the Key Pairs section and import the PKCS#12 file provided by the customer's internal Certificate Authority

C.

Go to the Key Pairs section and import the PKCS#12 file provided by the publicly trusted Certificate Authority

D.

Go to the Key Pairs section and create a new certificate

Full Access
Question # 9

What is the default port for the administrative console?

A.

9000

B.

3000

C.

9090

D.

3030

Full Access
Question # 10

Under which top-level directory are PingAccess configuration archives stored?

A.

tools

B.

conf

C.

data

D.

bin

Full Access
Question # 11

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Full Access
Question # 12

Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)

A.

Default logs location

B.

URL for heartbeat endpoint

C.

Operational mode for PingAccess

D.

X-Frame-Options header

E.

Logging levels

Full Access
Question # 13

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

A.

Assign the Key Pair to the Virtual Host

B.

Enable Require HTTPS in the Application configuration

C.

Assign the Key Pair to the Agent Listener

D.

Set the secure flag to Yes in the Site configuration

Full Access
Question # 14

How many administrators are supported using HTTP Basic Authentication in the Administrative Console?

A.

1000

B.

1

C.

10

D.

100

Full Access
Question # 15

An administrator needs to configure a protected web application using theAuthorization Codelogin flow. Which two configuration parameters must be set? (Choose 2 answers.)

A.

OAuth Token Introspection Endpoint

B.

OAuth Client ID

C.

OpenID Connect Issuer

D.

Virtual Host

E.

OpenID Connect Login Type

Full Access
Question # 16

Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)

A.

J2EE_HOME

B.

JAVA_HOME

C.

PA_PATH

D.

PA_HOME

E.

JAVA_PATH

Full Access
Question # 17

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

Full Access
Question # 18

During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)

A.

The resource requires no further authentication, and no rules will apply.

B.

The resource requires no further authentication, and Identity Mappings still apply.

C.

The resource requires no further authentication, and Processing rules still apply.

D.

Requests to this resource are not logged, and Identity Mappings are applied.

E.

The resource requires no further authentication, and all Access Control rules still apply.

Full Access
Question # 19

Refer to the following applications:

    hr.company.com

    finance.company.com

    customer.order.company.com

Which action should be taken to allow these applications to share the same web session?

A.

Set Audience option

B.

Set Cookie Domain option

C.

Use Rewrite Cookie Domain rule

D.

Use Rewrite Cookie Path rule

Full Access
Question # 20

An internal audit reveals that an agent has been compromised. What action must be taken to re-secure the agent?

A.

Change theagent.engine.configuration.shared.secretvalue in theagent.propertiesfile

B.

Select a new Agent Trusted Certificate

C.

Reinstall the agent

D.

Download and apply a newagent.propertiesfile

Full Access
Question # 21

The application team has changed their directory paths. An administrator must adjust the following paths:

    /images/sitel/

    /images/sitel/checkout/default.html

    /images/sitel/homepage/english/default.html

Which pattern would match the paths?

A.

/images/aitel/checkout

B.

/images/site*

C.

/images/sitel/english/*

D.

/images/sitel/*

Full Access