Ping Identity PAP-001 - Certified Professional - PingAccess
During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)
An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?
An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)
An internal audit reveals that an agent has been compromised. What action must be taken to re-secure the agent?
An administrator configures the following:
HTTP Request Parameter Rule for"can_read=yes"
Web Session Attribute Rule forOpt-in = yes
Web Session Attribute Rule forgroup = customerService
Rule SetA(ALL) → includes (HTTP Request Parameter Rule)
Rule SetB(ANY) → includes (Opt-in yes, group customerService)
Rule Set GroupC(ALL) → includes (Rule Set A, Rule Set B)Assigned to the web application.
Which set of conditions must be met to be able to access the application?
A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)
An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?
For a Web Application, theid_tokenmust be transmitted through a back channel with the OIDC standards-based approach. Which action should the administrator perform in the Web Session to meet this requirement?
Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.
What should the administrator add for the access token claims?
Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:
(A) Look for department = sales
(B) Look for department = marketing
(C) Look for job_title = manager
Which additional actions should be taken to properly enforce this requirement?
