Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Certified Professional - PingAccess Question and Answers

Certified Professional - PingAccess

Last Update Oct 2, 2025
Total Questions : 70

We are offering FREE PAP-001 Ping Identity exam questions. All you do is to just go and sign up. Give your details, prepare PAP-001 free exam questions and then go for complete pool of Certified Professional - PingAccess test questions that will help you more.

PAP-001 pdf

PAP-001 PDF

$42  $104.99
PAP-001 Engine

PAP-001 Testing Engine

$50  $124.99
PAP-001 PDF + Engine

PAP-001 PDF + Testing Engine

$66  $164.99
Questions 1

A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.

Which two actions should the administrator take? (Choose 2 answers.)

Options:

A.  

Verify that a rejection handler rule exists and is applied to the application to see if a user has met the required authentication context

B.  

Verify that an authentication requirement rule is applied to the application to see if a user has met the required authentication context

C.  

Make sure that the existing rule's authentication requirements contain the appropriate minimum authentication requirements

D.  

Create a new identity mapping containing authentication context values and add the mapping to the existing rule

E.  

Make sure that the existing rule's token validation contains the appropriate minimum authentication requirements

Discussion 0
Questions 2

A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)

Options:

A.  

PingFederate

B.  

Kerberos

C.  

Common SAML provider

D.  

Common OIDC provider

E.  

PingAuthorize

Discussion 0
Questions 3

A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?

Options:

A.  

HTTP Request Header Rule

B.  

Header Identity Mapping

C.  

JWT Identity Mapping

D.  

Web Session Attribute Rule

Discussion 0
Questions 4

An administrator needs to add a set of rules to an application protected by a PingAccess agent. Which rule will be unavailable to add to the application?

Options:

A.  

Rewrite Cookie Domain

B.  

Network Range

C.  

Rate Limiting

D.  

Cross-Origin Request

Discussion 0
Questions 5

All style sheets should be accessible to all users without authentication across all applications. Which configuration option should the administrator use?

Options:

A.  

Define a Protocol Source for the resource.

B.  

Define Authentication Challenge Policy of none for the resource.

C.  

Define Global Unprotected Resources for the resource.

D.  

Define a Default Availability Profile of on-demand for the resource.

Discussion 0
Questions 6

Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)

Options:

A.  

SAML

B.  

WS-Fed

C.  

WS-Trust

D.  

OAuth2

E.  

OIDC

Discussion 0
Questions 7

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.  

Use ID Tokens

B.  

Add Site Authenticator

C.  

Require HTTPS

D.  

Use Target Host Header

Discussion 0
Questions 8

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

Options:

A.  

Configure log4j2.xml and log4j2.db.properties.

B.  

Remove the logs located in PA_HOME/log.

C.  

Enable the Audit flag in the Resource.

D.  

Copy the database driver JAR file to the PA_HOME/lib directory.

E.  

Import the database certificate into the Trusted Certificate Group.

Discussion 0
Questions 9

Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?

Options:

A.  

AsyncLogger

B.  

RollingFile

C.  

Logger

D.  

Appenders

Discussion 0
Questions 10

A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?

Options:

A.  

Virtual Hosts

B.  

Applications

C.  

Sites

D.  

Web Sessions

Discussion 0
Questions 11

An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?

Options:

A.  

Import the SSL public key with the full certificate chain into the Certificates.

B.  

Import the PKCS#12 file with the full certificate chain into the Certificates.

C.  

Import the SSL public key with the full certificate chain into the Key Pairs.

D.  

Import the PKCS#12 file with the full certificate chain into the Key Pairs.

Discussion 0
Questions 12

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

Options:

A.  

Assign the Key Pair to the Virtual Host

B.  

Enable Require HTTPS in the Application configuration

C.  

Assign the Key Pair to the Agent Listener

D.  

Set the secure flag to Yes in the Site configuration

Discussion 0
Questions 13

An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?

Options:

A.  

Token Provider

B.  

Web Session

C.  

Site Authenticator

D.  

Access Control Rule

Discussion 0
Questions 14

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.  

escalated/

B.  

*/escalated/

C.  

*/escalated/+

D.  

/*escalated/

Discussion 0
Questions 15

Where in the administrative console should an administrator make user attributes available as HTTP request headers?

Options:

A.  

Site Authenticators

B.  

Identity Mappings

C.  

Web Sessions

D.  

HTTP Requests

Discussion 0
Questions 16

What is the default port for the administrative console?

Options:

A.  

9000

B.  

3000

C.  

9090

D.  

3030

Discussion 0
Questions 17

Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.

What should the administrator add for the access token claims?

Options:

A.  

An authentication requirement definition

B.  

A web session attribute rule

C.  

An identity mapping definition

D.  

An OAuth attribute rule

Discussion 0
Questions 18

An administrator is setting up a new PingAccess cluster with the following:

• Administrative node hostname: pa-admin.company.com

• Replica administrative node hostname: pa-admin2.company.com

Which two options in the certificate would be valid for the administrative node key pair? (Choose 2.)

Options:

A.  

Issuer = pa-admin.company.com

B.  

Subject = *.company.com

C.  

Subject = pa-admin.company.com

D.  

Subject Alternative Names = pa-admin.company.com, pa-admin2.company.com

E.  

Subject = pa-admin2.company.com

Discussion 0
Questions 19

An administrator is integrating a new PingAccess Proxied Application for which the target site uses a certificate issued by a publicly trusted Certificate Authority.

How should the administrator configure PingAccess to trust the target site?

Options:

A.  

Import the certificate chain into Key Pairs and add it to a Trusted Certificate Group

B.  

Configure the PingAccess Site to use the Java Trust Store Certificate Group

C.  

Import the certificate chain into Key Pairs

D.  

Drop the certificate chain into a Trusted Certificate Group

Discussion 0
Questions 20

An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.

What initial action must the administrator take in PingAccess in this situation?

Options:

A.  

Go to the Certificates section and create a new certificate

B.  

Go to the Key Pairs section and import the PKCS#12 file provided by the customer's internal Certificate Authority

C.  

Go to the Key Pairs section and import the PKCS#12 file provided by the publicly trusted Certificate Authority

D.  

Go to the Key Pairs section and create a new certificate

Discussion 0
Questions 21

An administrator must protect an application on multiple domains or hosts. What should the administrator configure to complete this action?

Options:

A.  

Sites

B.  

Virtual Hosts

C.  

Redirects

D.  

Rules

Discussion 0