Ping Identity PT-AM-CPE - Certified Professional - PingAM Exam
Which of the following is considered a confidential OAuth2 client?
What should be executed to ensure a successful upgrade when PingAM requires a version upgrade?
What are the possible outcomes of the Push Result Verifier node?
Consider the following LDAP connection string:
DS1.example.com:389|01, DS2.example.com:389|01, DS2.example.com:389|02, DS1.example.com:389|02
This connection string can be used in:
Which statement does not reflect best practice when configuring a PingAM cluster for secure communication with external servers?
What is session denylisting used for?
Which of the following needs to be configured in order to use social authentication in PingAM?
Which of the following code examples inserts a may_act claim to the resulting token in a PingAM implementation?
In a PingAM cluster, how is the debug level set?
Samantha decides to implement SAML2 auto-federation to link accounts on the service provider (SP) with the corresponding account in the identity provider (IdP). Which of the following statements describe characteristics of auto-federation?
A) Linking is based on a common NameId format value.
B) Linking is achieved by using a common attribute value.11
C) The user must log in to the IdP only to link accounts.
D) The user must log in to both the SP and the IdP to link accounts.
Answer Selection:
