Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

PAP-001 Questions and Answers

Question # 6

An application owner would like customized errors for rule violations within an application. Where is this configured?

A.

When assigning a Rule to a Resource

B.

Within the Root Resource of the Application

C.

When combining Rules into Rule Sets

D.

Within the Rule definition

Full Access
Question # 7

What is the purpose of the Mutual TLS Site Authenticator?

A.

Allows the backend server to authenticate to PingAccess

B.

Allows the user to authenticate to the backend server

C.

Allows PingAccess to authenticate to the backend server

D.

Allows PingAccess to authenticate to the token provider

Full Access
Question # 8

An administrator configures the following:

    HTTP Request Parameter Rule for"can_read=yes"

    Web Session Attribute Rule forOpt-in = yes

    Web Session Attribute Rule forgroup = customerService

    Rule SetA(ALL) → includes (HTTP Request Parameter Rule)

    Rule SetB(ANY) → includes (Opt-in yes, group customerService)

    Rule Set GroupC(ALL) → includes (Rule Set A, Rule Set B)Assigned to the web application.

Which set of conditions must be met to be able to access the application?

A.

The request requires a parameter called can_read with a value of yes. Additionally, the authenticated user must be in customer service and have the opt-in attribute set to yes.

B.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in either customer service or has the opt-in attribute set to yes.

C.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in customer service and the opt-in attribute set to yes.

D.

The request requires a parameter called can_read with a value of yes. The authenticated usermust be either in customer service or have the opt-in attribute set to yes.

Full Access
Question # 9

Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)

A.

Apple Safari

B.

Opera

C.

Google Chrome

D.

Microsoft Edge

E.

Brave

Full Access
Question # 10

PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.

What are two ways this requirement can be met? (Choose 2 answers.)

A.

Assign unique Key Pairs to each Virtual Host

B.

Assign a wildcard certificate to the Engine Listener

C.

Assign a Subject Alternative Name Certificate to the Engine Listener

D.

Assign a Subject Alternative Name Certificate to the Agent Listener

E.

Assign a wildcard certificate to the Agent Listener

Full Access
Question # 11

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

Full Access
Question # 12

Which of the following is a processing rule?

A.

Web Session Attribute

B.

Cross-Origin Request

C.

HTTP Request Parameter

D.

HTTP Request Header

Full Access
Question # 13

The application team is requesting step-up authentication only for a few specific resources while maintaining previous authentication for other resources. What change would the administrator need to make?

A.

Authentication Challenge Policy

B.

Use context root as reserved resource base path

C.

Change the Context Root

D.

Manual Resource Ordering

Full Access
Question # 14

An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?

A.

Token Provider

B.

Web Session

C.

Site Authenticator

D.

Access Control Rule

Full Access
Question # 15

A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)

A.

Request that the token provider update the ID token with the additional attributes.

B.

Update the Identity Mapping.

C.

Update the Site Authenticator.

D.

Request that the token provider update the access token with the additional attributes.

E.

Update the Web Session.

Full Access
Question # 16

A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?

A.

Virtual Hosts

B.

Applications

C.

Sites

D.

Web Sessions

Full Access
Question # 17

What is the default port for the administrative console?

A.

9000

B.

3000

C.

9090

D.

3030

Full Access
Question # 18

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

A.

Issuer

B.

Client ID

C.

Host

D.

Port

Full Access
Question # 19

Anycompany has several applications that need to load images and fonts fromwww.anycompany.com . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?

A.

Allowed Origins value for each of the listed domains

B.

Allowed Origins to*.anycompany.comand disable the Allow Credentials option

C.

Allowed Origins to*and enable the Allow Credentials option

D.

Allowed Origins towww.anycompany.com and enable the Allow Credentials option

Full Access
Question # 20

All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?

A.

Enable the Audit option for the/adminresource

B.

Enable the Audit option for the/*resource

C.

Set Splunk audit logging for/admin

D.

Setlog4j2.xmlaudit logging for/admin

Full Access
Question # 21

A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?

A.

pingaccess.log

B.

pingaccess_engine_audit.log

C.

pingaccess_agent_audit.log

D.

pingaccess_api_audit.log

Full Access