Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Ping Identity PingAccess PAP-001 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

An administrator needs to add a set of rules to an application protected by a PingAccess agent. Which rule will be unavailable to add to the application?

Options:

A.

Rewrite Cookie Domain


B.

Network Range


C.

Rate Limiting


D.

Cross-Origin Request


Expert Solution
Questions # 2:

Where in the administrative console should an administrator make user attributes available as HTTP request headers?

Options:

A.

Site Authenticators


B.

Identity Mappings


C.

Web Sessions


D.

HTTP Requests


Expert Solution
Questions # 3:

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

Options:

A.

Configure log4j2.xml and log4j2.db.properties.


B.

Remove the logs located in PA_HOME/log.


C.

Enable the Audit flag in the Resource.


D.

Copy the database driver JAR file to the PA_HOME/lib directory.


E.

Import the database certificate into the Trusted Certificate Group.


Expert Solution
Questions # 4:

Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:

    (A) Look for department = sales

    (B) Look for department = marketing

    (C) Look for job_title = manager

Which additional actions should be taken to properly enforce this requirement?

Options:

A.

Create a Rule Set (D) to accept ALL (A) (B AND C) → Add Rule Set (D) to the resource


B.

Create a Rule Set (D) to accept ANY (A) (B) (C) → Add Rule Set (D) to the resource


C.

Create a Rule Set (D) to accept ALL (A) → Create a Rule Set (E) to accept ANY (B) (C) → Create a Rule Set Group (F) to accept ALL (D) (E) → Add Rule Set Group (F) to the resource


D.

Create a Rule Set (D) to accept ANY (A) → Create a Rule Set (E) to accept ALL (B) (C) → Create a Rule Set Group (F) to accept ANY (D) (E) → Add Rule Set Group (F) to the resource


Expert Solution
Questions # 5:

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

Options:

A.

Assign the Key Pair to the Virtual Host


B.

Enable Require HTTPS in the Application configuration


C.

Assign the Key Pair to the Agent Listener


D.

Set the secure flag to Yes in the Site configuration


Expert Solution
Questions # 6:

An administrator needs to support SLO (Single Logout) for a protected web application. What must be configured in a PingAccess Web Session in this situation?

Options:

A.

SLO scope


B.

Idle timeout


C.

Validate Session


D.

Refresh User Attributes


Expert Solution
Questions # 7:

A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?

Options:

A.

HTTP Request Header Rule


B.

Header Identity Mapping


C.

JWT Identity Mapping


D.

Web Session Attribute Rule


Expert Solution
Questions # 8:

A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.

Which two actions should the administrator take? (Choose 2 answers.)

Options:

A.

Verify that a rejection handler rule exists and is applied to the application to see if a user has met the required authentication context


B.

Verify that an authentication requirement rule is applied to the application to see if a user has met the required authentication context


C.

Make sure that the existing rule's authentication requirements contain the appropriate minimum authentication requirements


D.

Create a new identity mapping containing authentication context values and add the mapping to the existing rule


E.

Make sure that the existing rule's token validation contains the appropriate minimum authentication requirements


Expert Solution
Questions # 9:

An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?

Options:

A.

Upgrade the Admin Console.


B.

Disable cluster communication.


C.

Disable Key Rolling.


D.

Upgrade the Replica Admin.


Expert Solution
Questions # 10:

A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)

Options:

A.

Request that the token provider update the ID token with the additional attributes.


B.

Update the Identity Mapping.


C.

Update the Site Authenticator.


D.

Request that the token provider update the access token with the additional attributes.


E.

Update the Web Session.


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions