Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Ping Identity PingAM PT-AM-CPE Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam PT-AM-CPE Premium Access

View all detail and faqs for the PT-AM-CPE exam


639 Students Passed

91% Average Score

90% Same Questions
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following actions can be specified in a policy by default?

Options:

A.

HEAD

B.

INSERT

C.

CREATE

D.

UPDATE

Questions # 22:

In a default PingAM configuration, what type of keystore stores the secret ID named storepass, which contains the encrypted password of the default-keystore secret store?

Options:

A.

Keystore secret store

B.

Environment and system property secret store

C.

Filesystem secret store

D.

Hardware Security Module secret store

Questions # 23:

What happens when an end user accesses the following login page: .../XUI/?ForceAuth=true#login?

Options:

A.

Even if the end user is already authenticated, they will be redirected to the login page

B.

The end user will be presented with second factor authentication

C.

Nothing. ForceAuth is not a parameter that PingAM knows how to process

D.

A screen is presented to the end user suggesting they enable second factor authentication

Questions # 24:

When defining a policy and specifying a resource pattern, which of the following statements is true concerning the difference between the wildcards * and -*-?

Options:

A.

The wildcard * will match query parameters, whereas -*- will not match query parameters.

B.

The wildcard * will match multiple levels in a path, whereas -*- will match only a single level

C.

The wildcard * and the wildcard -*- can be mixed liberally within the same pattern

D.

Neither the * wildcard nor the -*- wildcard can be used to match the port number

Questions # 25:

In the OAuth2 Device Flow, which of the following HTTP codes is returned if a user has not yet authorized a client device?

Options:

A.

HTTP 403

B.

HTTP 400

C.

HTTP 401

D.

HTTP 302

Questions # 26:

What is the purpose of the extended metadata in PingAM?

Options:

A.

It specifies the certificates and keys for the SAML2 entity

B.

It specifies the policy to invoke during SAML2 federation

C.

It is a standard way to communicate supported SAML2 features

D.

It specifies additional information about a SAML2 entity specific to PingAM

Questions # 27:

Which audit event handler is used by PingAM by default, when audit logging is enabled?

Options:

A.

Elasticsearch audit event handler

B.

CSV audit event handler

C.

Syslog audit event handler

D.

JSON audit event handler

Questions # 28:

In a multi-server deployment, what is the impact of not ensuring stickiness in the load balancer configuration?

Options:

A.

Session failover will not work

B.

The browser will not be able to validate the user session with the correct PingAM server

C.

The user will see more redirects in their browser

D.

Performance may decrease as load on the system will be higher

Questions # 29:

Which authentication node can you use in PingAM to add a key:value property to the user's session after successful authentication?

Options:

A.

The Get Session Data node

B.

You have to use a webhook, not a node

C.

The Provision Dynamic Account node

D.

The Set Session Properties node

Questions # 30:

Which of the following multi-factor authentication protocols are supported by PingAM?

A) Open authentication

B) Security questions

C) Web authentication

D) Universal 2nd factor authentication

E) Push authentication

Options:

A.

B, C, and D

B.

A, B, and E

C.

A, C, and E

D.

A, B, and C

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.