Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Ping Identity PAP-001 - Certified Professional - PingAccess

Page: 1 / 3
Total 70 questions

During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)

A.

The resource requires no further authentication, and no rules will apply.

B.

The resource requires no further authentication, and Identity Mappings still apply.

C.

The resource requires no further authentication, and Processing rules still apply.

D.

Requests to this resource are not logged, and Identity Mappings are applied.

E.

The resource requires no further authentication, and all Access Control rules still apply.

An administrator needs to configure a signed JWT identity mapping for an application that expects to be able to validate the signature. Which endpoint does the application need to access to validate the signature?

A.

/pa/authtoken/JWKS

B.

/pa-admin-api/v3/identityMappinga/descriptora/jwtidentitymapping

C.

/pa/aidc/cb

D.

/pa-admin-api/v3/authTokenManagement

An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)

A.

Changepa.operational.modetoCLUSTERED_CONSOLE_REPLICAon one of the engine nodes.

B.

Restart all nodes in the cluster.

C.

Changepa.operational.modetoCLUSTERED_CONSOLEon the replica admin node.

D.

Restart the replica admin node.

E.

Modifybootstrap.propertiesand set theengine.admin.configuration.hostvalue to point at the replica admin node.

An internal audit reveals that an agent has been compromised. What action must be taken to re-secure the agent?

A.

Change theagent.engine.configuration.shared.secretvalue in theagent.propertiesfile

B.

Select a new Agent Trusted Certificate

C.

Reinstall the agent

D.

Download and apply a newagent.propertiesfile

An administrator configures the following:

    HTTP Request Parameter Rule for"can_read=yes"

    Web Session Attribute Rule forOpt-in = yes

    Web Session Attribute Rule forgroup = customerService

    Rule SetA(ALL) → includes (HTTP Request Parameter Rule)

    Rule SetB(ANY) → includes (Opt-in yes, group customerService)

    Rule Set GroupC(ALL) → includes (Rule Set A, Rule Set B)Assigned to the web application.

Which set of conditions must be met to be able to access the application?

A.

The request requires a parameter called can_read with a value of yes. Additionally, the authenticated user must be in customer service and have the opt-in attribute set to yes.

B.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in either customer service or has the opt-in attribute set to yes.

C.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in customer service and the opt-in attribute set to yes.

D.

The request requires a parameter called can_read with a value of yes. The authenticated usermust be either in customer service or have the opt-in attribute set to yes.

A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)

A.

Request that the token provider update the ID token with the additional attributes.

B.

Update the Identity Mapping.

C.

Update the Site Authenticator.

D.

Request that the token provider update the access token with the additional attributes.

E.

Update the Web Session.

An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?

A.

Apply an Identity Mapping that includes the username and password

B.

Apply a valid Web Session that contains the username and password

C.

Configure a Basic Authentication Site Authenticator to the Site

D.

Configure a Mutual TLS Site Authenticator to the Site

For a Web Application, theid_tokenmust be transmitted through a back channel with the OIDC standards-based approach. Which action should the administrator perform in the Web Session to meet this requirement?

A.

Set the login type to code

B.

Set the request preservation to POST

C.

Set the login type to POST

D.

Set the request preservation to None

Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.

What should the administrator add for the access token claims?

A.

An authentication requirement definition

B.

A web session attribute rule

C.

An identity mapping definition

D.

An OAuth attribute rule

Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:

    (A) Look for department = sales

    (B) Look for department = marketing

    (C) Look for job_title = manager

Which additional actions should be taken to properly enforce this requirement?

A.

Create a Rule Set (D) to accept ALL (A) (B AND C) → Add Rule Set (D) to the resource

B.

Create a Rule Set (D) to accept ANY (A) (B) (C) → Add Rule Set (D) to the resource

C.

Create a Rule Set (D) to accept ALL (A) → Create a Rule Set (E) to accept ANY (B) (C) → Create a Rule Set Group (F) to accept ALL (D) (E) → Add Rule Set Group (F) to the resource

D.

Create a Rule Set (D) to accept ANY (A) → Create a Rule Set (E) to accept ALL (B) (C) → Create a Rule Set Group (F) to accept ANY (D) (E) → Add Rule Set Group (F) to the resource