Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Ping Identity PingAM PT-AM-CPE Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam PT-AM-CPE Premium Access

View all detail and faqs for the PT-AM-CPE exam


639 Students Passed

91% Average Score

90% Same Questions
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Examine the following JWT client assertion in JSON format. From the subset of claims listed below, which claim can be optional?

JSON

JSON

{

"iss": "myClient",

"sub": "myClient",

"aud": "https://am.example.com/login/oauth2/access_token",

"jti": "id012345",

"exp": 1633363568,

"iat": 1633356368

}

Options:

A.

jti

B.

aud

C.

iss

D.

sub

Questions # 12:

Sam wants to start a service provider-initiated single sign-on and redirect to their own application, myapp.com. Which of the following URLs is the correct one to perform this action?

Options:

A.

http://sso.domain.com/openam/saml2/jsp/idpSSOInit.jsp &RelayState=http%3A%2F%2Fmyapp.com

B.

http://sso.domain.com/openam/saml2/jsp/idpSSOInit.jsp &goto=http%3A%2F%2Fmyapp.com

C.

http://sso.domain.com/openam/saml2/jsp/spSSOInit.jsp &goto=http%3A%2F%2Fmyapp.com

D.

http://sso.domain.com/openam/saml2/jsp/spSSOInit.jsp &RelayState=http%3A%2F%2Fmyapp.com

Questions # 13:

Which set of Directory Server stores can be enabled for affinity in a PingAM cluster configuration?

Options:

A.

Identity Store, Configuration Store, Policy Data Store, Application Data Store

B.

Core Token Service Store, Identity Store, Policy Data Store, Application Data Store

C.

Core Token Service Store, Identity Stores, Configuration Store, Application Data Store

D.

Core Token Service Store, Identity Stores, Configuration Store, Policy Data Store

Questions # 14:

A user enters their credentials, but is faced with the error message "user requires profile to login". What is a possible cause of this message?

Options:

A.

Policies have not been defined to allow a user to access their profile page

B.

The realm has not been set to user profile ignore mode

C.

The user has not filled in the required information in their profile

D.

The user has not entered the correct credentials

Questions # 15:

Which statements are correct about push notification authentication implemented with PingAM?

Options:

A.

The user must have a device with a camera and install the Authenticator app.

B.

The registration and authentication steps must be part of the same authentication tree.

C.

To register a device the user scans a barcode with the Authenticator installed on their device.1

D.

During subsequent authentication processes, PingAM instructs the push server to send a notification to the registered device, and waits for the user to use the Authenticator app to approve the request.2

Options:

E.

A, B, and C only

F.

B, C, and D only

G.

A and D only

Questions # 16:

Which of the following would be a possible combination of fields in the JSON body when making a policy evaluation via REST?

Options:

A.

resources, subject, advices

B.

resources, subject, application

C.

resources, application, advices

D.

subject, application, advices

Questions # 17:

In a PingAM cluster, how is the debug level set?

Options:

A.

On each server in the debug.properties file

B.

On a per-instance basis in the admin console

C.

On a per-site basis in the admin console

D.

It is not recommended to change the level at all

Questions # 18:

In order to support rollback in case of a failed PingAM upgrade in a two server PingDS environment, what PingDS safety measure can be configured?

Options:

A.

Keep both PingDS instances active, upgrade against both PingDS instances, and use the PingDS ./uninstall.sh backout script if required

B.

A PingAM upgrade in a two server PingDS environment does not support rollback

C.

Stop replication between the two PingDS servers, stop a PingDS instance, upgrade against the active PingDS instance, and simply start up the shutdown PingDS instance

D.

Stop replication between the two PingDS servers, stop a PingDS instance, upgrade against the active PingDS instance, and use the shutdown instance in case of rollback

Questions # 19:

A non-authenticated user requests a resource protected by PingGateway or a Web Agent. Put the following events of the authentication lifecycle in chronological order:

    User answers the "questions asked" (callbacks) by PingAM.

    User tries to access a resource protected by PingGateway or a Web Agent.

    Session reaches a timeout value or user logs out.

    PingGateway or the Web Agent validates the session.

    User is redirected to the authentication user interface of PingAM.

    User is redirected to the resource.

Options:

A.

2-1-4-3-5-6

B.

2-5-1-6-4-3

C.

2-5-1-6-3-4

D.

2-1-5-6-4-3

Questions # 20:

For Proof of Possession OAuth2 tokens, in addition to the access token, what must be presented to the authorization server?

Options:

A.

Nonce

B.

Client JSON Web Key (JWK)

C.

State

D.

Client private certificate

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.