Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Ping Identity PAP-001 - Certified Professional - PingAccess

Page: 2 / 3
Total 70 questions

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

A.

Issuer

B.

Client ID

C.

Host

D.

Port

Refer to the following applications:

    hr.company.com

    finance.company.com

    customer.order.company.com

Which action should be taken to allow these applications to share the same web session?

A.

Set Audience option

B.

Set Cookie Domain option

C.

Use Rewrite Cookie Domain rule

D.

Use Rewrite Cookie Path rule

An auto parts company wants to protect the path/parts/suspension/struts/manufacturer. Resources appear under an applicationContext Root of/partswith default ordering.

Which resource will the policy engine select?

A.

//struts/manufacturer

B.

//manufacturer

C.

/suspension/struts/manufacturer

D.

///manufacturer

An administrator must protect an application on multiple domains or hosts. What should the administrator configure to complete this action?

A.

Sites

B.

Virtual Hosts

C.

Redirects

D.

Rules

What is the default port for the administrative console?

A.

9000

B.

3000

C.

9090

D.

3030

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

An administrator is integrating a new PingAccess Proxied Application. The target site uses a certificate issued by an internal Certificate Authority hosted by the customer. Prior to assigning the certificate group in the Site configuration, which action should the administrator take to configure PingAccess to trust the certificate?

A.

Configure the PingAccess Site to use the Java Trust Store Certificate Group.

B.

Import the certificate chain into Key Pairs and add it to the Trusted Certificate Group.

C.

Import the certificate chain into Key Pairs and assign it to a new engine listener.

D.

Import the certificate chain and add it to the Trusted Certificate Group.

An administrator needs to configure a protected web application using theAuthorization Codelogin flow. Which two configuration parameters must be set? (Choose 2 answers.)

A.

OAuth Token Introspection Endpoint

B.

OAuth Client ID

C.

OpenID Connect Issuer

D.

Virtual Host

E.

OpenID Connect Login Type

An administrator is setting up a new PingAccess cluster with the following:

• Administrative node hostname: pa-admin.company.com

• Replica administrative node hostname: pa-admin2.company.com

Which two options in the certificate would be valid for the administrative node key pair? (Choose 2.)

A.

Issuer = pa-admin.company.com

B.

Subject = *.company.com

C.

Subject = pa-admin.company.com

D.

Subject Alternative Names = pa-admin.company.com, pa-admin2.company.com

E.

Subject = pa-admin2.company.com

Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)

A.

SAML

B.

WS-Fed

C.

WS-Trust

D.

OAuth2

E.

OIDC