New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Ping Identity PT-AM-CPE - Certified Professional - PingAM Exam

Page: 2 / 3
Total 100 questions

Which of the following is considered a confidential OAuth2 client?

A.

Desktop clients

B.

JavaScript clients

C.

Web browsers

D.

Web applications

What should be executed to ensure a successful upgrade when PingAM requires a version upgrade?

A.

Post-upgrade, run a set of functional tests

B.

Post-upgrade, run a set of functional and non-functional tests

C.

Post-upgrade, run a set of non-functional tests

D.

Post-upgrade, set the PingAM Version Control Flag to the correct version

What are the possible outcomes of the Push Result Verifier node?

A.

Success, Failure, Waiting, Retry

B.

Success, Failure, Expired, Retry

C.

Success, Failure, Expired, Waiting

D.

Success, Failure, Expired, Waiting, Retry

Consider the following LDAP connection string:

DS1.example.com:389|01, DS2.example.com:389|01, DS2.example.com:389|02, DS1.example.com:389|02

This connection string can be used in:

A.

Identity Store

B.

Core Token Service

C.

Configuration Data Store

Which of the above options are correct?

D.

Only A is correct

E.

Only B is correct

F.

Only C is correct

G.

A, B, and C are correct

Which statement does not reflect best practice when configuring a PingAM cluster for secure communication with external servers?

A.

Create the new truststore as a copy of the JVM container truststore to isolate the PingAM truststore from changes to the JVM container's truststore when the JVM container's truststore is updated

B.

Create a new truststore with the certificates needed in the environment, and configure the container to use it

C.

Create a new truststore using a copy of the JVM container truststore and add the PingDS instances certificates to the new truststore

D.

Don't add PingDS instances certificates to the JVM container truststore

What is session denylisting used for?

A.

Keeping track of session inactivity

B.

Keeping track of restricted sessions

C.

Keeping track of logged out sessions

D.

Keeping track of absolute session timeouts

Which of the following needs to be configured in order to use social authentication in PingAM?

A.

A data store

B.

A realm service

C.

An OAuth2 client

D.

A realm policy

Which of the following code examples inserts a may_act claim to the resulting token in a PingAM implementation?

A.

var mayAct = /* is a JSON object with may act property data */ token.addMayAct(mayAct)

B.

var mayAct = /* is a JSON object with may act property data */ requestedToken.addMayAct(mayAct)

C.

var mayAct = /* is a JSON object with may act property data */ requestedToken.setMayAct(mayAct)

D.

var mayAct = /* is a JSON object with may act property data */ token.setMayAct(mayAct)

In a PingAM cluster, how is the debug level set?

A.

On each server in the debug.properties file

B.

On a per-instance basis in the admin console

C.

On a per-site basis in the admin console

D.

It is not recommended to change the level at all

Samantha decides to implement SAML2 auto-federation to link accounts on the service provider (SP) with the corresponding account in the identity provider (IdP). Which of the following statements describe characteristics of auto-federation?

A) Linking is based on a common NameId format value.

B) Linking is achieved by using a common attribute value.11

C) The user must log in to the IdP only to link accounts.

D) The user must log in to both the SP and the IdP to link accounts.

Answer Selection:

A.

A and D

B.

B and C

C.

B and D

D.

A and C