Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

PAP-001 Questions and Answers

Question # 6

A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?

A.

Subject Attribute Name

B.

Send Audience

C.

Use Token Introspection Endpoint

D.

Client Secret

Full Access
Question # 7

All style sheets should be accessible to all users without authentication across all applications. Which configuration option should the administrator use?

A.

Define a Protocol Source for the resource.

B.

Define Authentication Challenge Policy of none for the resource.

C.

Define Global Unprotected Resources for the resource.

D.

Define a Default Availability Profile of on-demand for the resource.

Full Access
Question # 8

A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)

A.

PingFederate

B.

Kerberos

C.

Common SAML provider

D.

Common OIDC provider

E.

PingAuthorize

Full Access
Question # 9

The application team has changed their directory paths. An administrator must adjust the following paths:

    /images/sitel/

    /images/sitel/checkout/default.html

    /images/sitel/homepage/english/default.html

Which pattern would match the paths?

A.

/images/aitel/checkout

B.

/images/site*

C.

/images/sitel/english/*

D.

/images/sitel/*

Full Access
Question # 10

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Full Access
Question # 11

Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?

A.

AsyncLogger

B.

RollingFile

C.

Logger

D.

Appenders

Full Access
Question # 12

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Full Access
Question # 13

An administrator must protect an application on multiple domains or hosts. What should the administrator configure to complete this action?

A.

Sites

B.

Virtual Hosts

C.

Redirects

D.

Rules

Full Access
Question # 14

A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.

Where should the administrator update this behavior without affecting existing applications?

A.

Token Validation

B.

Web Sessions

C.

Sites

D.

Token Provider

Full Access
Question # 15

A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)

A.

Request that the token provider update the ID token with the additional attributes.

B.

Update the Identity Mapping.

C.

Update the Site Authenticator.

D.

Request that the token provider update the access token with the additional attributes.

E.

Update the Web Session.

Full Access
Question # 16

All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?

A.

Enable the Audit option for the/adminresource

B.

Enable the Audit option for the/*resource

C.

Set Splunk audit logging for/admin

D.

Setlog4j2.xmlaudit logging for/admin

Full Access
Question # 17

During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)

A.

The resource requires no further authentication, and no rules will apply.

B.

The resource requires no further authentication, and Identity Mappings still apply.

C.

The resource requires no further authentication, and Processing rules still apply.

D.

Requests to this resource are not logged, and Identity Mappings are applied.

E.

The resource requires no further authentication, and all Access Control rules still apply.

Full Access
Question # 18

An administrator configures the following:

    HTTP Request Parameter Rule for"can_read=yes"

    Web Session Attribute Rule forOpt-in = yes

    Web Session Attribute Rule forgroup = customerService

    Rule SetA(ALL) → includes (HTTP Request Parameter Rule)

    Rule SetB(ANY) → includes (Opt-in yes, group customerService)

    Rule Set GroupC(ALL) → includes (Rule Set A, Rule Set B)Assigned to the web application.

Which set of conditions must be met to be able to access the application?

A.

The request requires a parameter called can_read with a value of yes. Additionally, the authenticated user must be in customer service and have the opt-in attribute set to yes.

B.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in either customer service or has the opt-in attribute set to yes.

C.

The request requires a parameter called can_read with a value of yes unless the authenticated user is in customer service and the opt-in attribute set to yes.

D.

The request requires a parameter called can_read with a value of yes. The authenticated usermust be either in customer service or have the opt-in attribute set to yes.

Full Access
Question # 19

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

A.

Assign the Key Pair to the Virtual Host

B.

Enable Require HTTPS in the Application configuration

C.

Assign the Key Pair to the Agent Listener

D.

Set the secure flag to Yes in the Site configuration

Full Access
Question # 20

For a Web Application, theid_tokenmust be transmitted through a back channel with the OIDC standards-based approach. Which action should the administrator perform in the Web Session to meet this requirement?

A.

Set the login type to code

B.

Set the request preservation to POST

C.

Set the login type to POST

D.

Set the request preservation to None

Full Access
Question # 21

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Full Access