Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Ping Identity PingAccess PAP-001 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam PAP-001 Premium Access

View all detail and faqs for the PAP-001 exam


512 Students Passed

94% Average Score

95% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the following applications:

    hr.company.com

    finance.company.com

    customer.order.company.com

Which action should be taken to allow these applications to share the same web session?

Options:

A.

Set Audience option

B.

Set Cookie Domain option

C.

Use Rewrite Cookie Domain rule

D.

Use Rewrite Cookie Path rule

Questions # 2:

An internal audit reveals that an agent has been compromised. What action must be taken to re-secure the agent?

Options:

A.

Change theagent.engine.configuration.shared.secretvalue in theagent.propertiesfile

B.

Select a new Agent Trusted Certificate

C.

Reinstall the agent

D.

Download and apply a newagent.propertiesfile

Questions # 3:

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

Options:

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

Questions # 4:

What is the purpose of thepa.operational.modeconfiguration setting?

Options:

A.

To determine if a server should participate in cluster replication

B.

To determine the role the server performs in a cluster

C.

To determine whether a server is a development or production server

D.

To determine if a cluster node is enabled or disabled

Questions # 5:

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

Options:

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Questions # 6:

Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)

Options:

A.

SAML

B.

WS-Fed

C.

WS-Trust

D.

OAuth2

E.

OIDC

Questions # 7:

PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.

What are two ways this requirement can be met? (Choose 2 answers.)

Options:

A.

Assign unique Key Pairs to each Virtual Host

B.

Assign a wildcard certificate to the Engine Listener

C.

Assign a Subject Alternative Name Certificate to the Engine Listener

D.

Assign a Subject Alternative Name Certificate to the Agent Listener

E.

Assign a wildcard certificate to the Agent Listener

Questions # 8:

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

Options:

A.

Assign the Key Pair to the Virtual Host

B.

Enable Require HTTPS in the Application configuration

C.

Assign the Key Pair to the Agent Listener

D.

Set the secure flag to Yes in the Site configuration

Questions # 9:

An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?

Options:

A.

Upgrade the Admin Console.

B.

Disable cluster communication.

C.

Disable Key Rolling.

D.

Upgrade the Replica Admin.

Questions # 10:

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.