New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Ping Identity PT-AM-CPE - Certified Professional - PingAM Exam

Page: 1 / 3
Total 100 questions

A user's SSOTokenID is stored in a cookie when they successfully log in. What is the name of the PingAM property used to configure this cookie?

A.

com.iplanet.am.cookie.name

B.

iPlanetDirectoryPro

C.

comIplanetAmSessionCookieName

D.

com.sun.identity.agents.config.cookie.name

In a multi-server deployment, what is the impact of not ensuring stickiness in the load balancer configuration?

A.

Session failover will not work

B.

The browser will not be able to validate the user session with the correct PingAM server

C.

The user will see more redirects in their browser

D.

Performance may decrease as load on the system will be higher

When making a request to the /oauth2/access_token endpoint using the JWT profile client authentication method, which parameter is used to provide the JWT value?

A.

client_credentials

B.

client_token_value

C.

client_id

D.

client_assertion

Which of the following would be a possible combination of fields in the JSON body when making a policy evaluation via REST?

A.

resources, subject, advices

B.

resources, subject, application

C.

resources, application, advices

D.

subject, application, advices

During the PingAM startup process, what is the location and name of the file that the PingAM bootstrap process uses to connect to the configuration Directory Services repository?

A.

/.openam/config/boot.json

B.

/path/to/tomcat//webapps//boot.json

C.

//boot.json

D.

//config/boot.json

Which audit event handler is used by PingAM by default, when audit logging is enabled?

A.

Elasticsearch audit event handler

B.

CSV audit event handler

C.

Syslog audit event handler

D.

JSON audit event handler

Which statements are correct in relation to an OAuth2 token exchange impersonation pattern?

A) The client may want to act as the subject on another service.

B) The client is used by a subject to act on behalf of another subject.

C) The requested token exchange involves a subject token only.

D) The requested token exchange involves a subject and actor token.

A.

A and C only

B.

B and D only

C.

B and C only

D.

A and D only

Does the user who runs the PingAM process need to have a home directory?

A.

Yes, because this is where PingAM stores a pointer to the configuration

B.

Yes, because this is where PingAM stores some of the configuration

C.

Yes, because otherwise the process cannot listen on a port below 1024

D.

No, not at all

Which PingAM feature only uses the PingAM keystore?

A.

Client-side sessions

B.

Persistent Cookie node

C.

Authentication trees

D.

OAuth2 providers

Which of the following multi-factor authentication protocols are supported by PingAM?

A) Open authentication

B) Security questions

C) Web authentication

D) Universal 2nd factor authentication

E) Push authentication

A.

B, C, and D

B.

A, B, and E

C.

A, C, and E

D.

A, B, and C