Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Ping Identity > PingAccess > PAP-001

PAP-001 Certified Professional - PingAccess Question and Answers

Question # 4

An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?

A.

/pa/authtoken/JWKS

B.

/pa-admin-api/v3/identityMappinga/descriptora/jwtidentitymapping

C.

/pa/aidc/cb

D.

/pa-admin-api/v3/authTokenManagement

Full Access
Question # 5

What is the purpose of theadmin.authconfiguration setting?

A.

To configure SSO for the administrative user interface.

B.

To define the method to use for authenticating to the administrative API.

C.

To override the SSO configuration for the administrative user interface.

D.

To enable automatic authentication to the PingAccess administrative console.

Full Access
Question # 6

An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)

A.

Changepa.operational.modetoCLUSTERED_CONSOLE_REPLICAon one of the engine nodes.

B.

Restart all nodes in the cluster.

C.

Changepa.operational.modetoCLUSTERED_CONSOLEon the replica admin node.

D.

Restart the replica admin node.

E.

Modifybootstrap.propertiesand set theengine.admin.configuration.hostvalue to point at the replica admin node.

Full Access
Question # 7

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

Full Access
Question # 8

A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?

A.

Use Java Trust Store

B.

Validate disordered certificate chains

C.

Skip Certificate Date Check

D.

Deny when unable to determine revocation status

Full Access
Question # 9

Under which top-level directory are PingAccess configuration archives stored?

A.

tools

B.

conf

C.

data

D.

bin

Full Access
Question # 10

How many administrators are supported using HTTP Basic Authentication in the Administrative Console?

A.

1000

B.

1

C.

10

D.

100

Full Access
Question # 11

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Full Access
Question # 12

A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?

A.

HTTP Request Header Rule

B.

Header Identity Mapping

C.

JWT Identity Mapping

D.

Web Session Attribute Rule

Full Access
Question # 13

A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.

Which two actions should the administrator take? (Choose 2 answers.)

A.

Verify that a rejection handler rule exists and is applied to the application to see if a user has met the required authentication context

B.

Verify that an authentication requirement rule is applied to the application to see if a user has met the required authentication context

C.

Make sure that the existing rule's authentication requirements contain the appropriate minimum authentication requirements

D.

Create a new identity mapping containing authentication context values and add the mapping to the existing rule

E.

Make sure that the existing rule's token validation contains the appropriate minimum authentication requirements

Full Access
Question # 14

Where should an administrator adjustSameSite Cookiesettings?

A.

Rules

B.

Sites

C.

Applications

D.

Web Sessions

Full Access
Question # 15

An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?

A.

Import the SSL public key with the full certificate chain into the Certificates.

B.

Import the PKCS#12 file with the full certificate chain into the Certificates.

C.

Import the SSL public key with the full certificate chain into the Key Pairs.

D.

Import the PKCS#12 file with the full certificate chain into the Key Pairs.

Full Access
Question # 16

What is the purpose of PingAccess processing rules?

A.

To collect data for offline processing

B.

To modify web traffic in real time

C.

To override upstream access control decisions

D.

To allow for more detailed auditing

Full Access
Question # 17

An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?

A.

Upgrade the Admin Console.

B.

Disable cluster communication.

C.

Disable Key Rolling.

D.

Upgrade the Replica Admin.

Full Access
Question # 18

Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?

A.

AsyncLogger

B.

RollingFile

C.

Logger

D.

Appenders

Full Access
Question # 19

An administrator is setting up a new PingAccess cluster with the following:

• Administrative node hostname: pa-admin.company.com

• Replica administrative node hostname: pa-admin2.company.com

Which two options in the certificate would be valid for the administrative node key pair? (Choose 2.)

A.

Issuer = pa-admin.company.com

B.

Subject = *.company.com

C.

Subject = pa-admin.company.com

D.

Subject Alternative Names = pa-admin.company.com, pa-admin2.company.com

E.

Subject = pa-admin2.company.com

Full Access
Question # 20

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

A.

Assign the Key Pair to the Virtual Host

B.

Enable Require HTTPS in the Application configuration

C.

Assign the Key Pair to the Agent Listener

D.

Set the secure flag to Yes in the Site configuration

Full Access
Question # 21

What is the default port for the administrative console?

A.

9000

B.

3000

C.

9090

D.

3030

Full Access