Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

PAP-001 Certified Professional - PingAccess Questions and Answers

Questions 4

A PingAccess API deployment requires multiple Access Token Managers to maintain compliance with customer requirements. Which feature must be set on the Token Provider configuration?

Options:

A.

Subject Attribute Name

B.

Send Audience

C.

Use Token Introspection Endpoint

D.

Client Secret

Buy Now
Questions 5

According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?

Options:

A.

UI Authentication

B.

Auth Token Management

C.

Authentication Requirements

D.

Authentication Challenge Policy

Buy Now
Questions 6

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Buy Now
Questions 7

A financial application should be prompted for step-up authentication on a URL that allows money transfers. A previous administrator configured rules to be applied on the required application URL. Users are not prompted for step-up authentication when accessing the/sranafemmeneyURL endpoint.

Which two actions should the administrator take? (Choose 2 answers.)

Options:

A.

Verify that a rejection handler rule exists and is applied to the application to see if a user has met the required authentication context

B.

Verify that an authentication requirement rule is applied to the application to see if a user has met the required authentication context

C.

Make sure that the existing rule's authentication requirements contain the appropriate minimum authentication requirements

D.

Create a new identity mapping containing authentication context values and add the mapping to the existing rule

E.

Make sure that the existing rule's token validation contains the appropriate minimum authentication requirements

Buy Now
Questions 8

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Buy Now
Questions 9

How many administrators are supported using HTTP Basic Authentication in the Administrative Console?

Options:

A.

1000

B.

1

C.

10

D.

100

Buy Now
Questions 10

An auto parts company wants to protect the path/parts/suspension/struts/manufacturer. Resources appear under an applicationContext Root of/partswith default ordering.

Which resource will the policy engine select?

Options:

A.

//struts/manufacturer

B.

//manufacturer

C.

/suspension/struts/manufacturer

D.

///manufacturer

Buy Now
Questions 11

An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?

Options:

A.

Apply an Identity Mapping that includes the username and password

B.

Apply a valid Web Session that contains the username and password

C.

Configure a Basic Authentication Site Authenticator to the Site

D.

Configure a Mutual TLS Site Authenticator to the Site

Buy Now
Questions 12

An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?

Options:

A.

Configure one active and one replica administrative node with engine cluster pointed to both administrative nodes

B.

Configure four active administrative nodes with engine cluster pointed to all administrative nodes for configuration

C.

Configure two active administrative nodes with engine cluster pointed to both administrative nodes for configuration

D.

Configure one active and three replica administrative nodes with engine cluster pointed to all administrative nodes

Buy Now
Questions 13

An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.

What initial action must the administrator take in PingAccess in this situation?

Options:

A.

Go to the Certificates section and create a new certificate

B.

Go to the Key Pairs section and import the PKCS#12 file provided by the customer's internal Certificate Authority

C.

Go to the Key Pairs section and import the PKCS#12 file provided by the publicly trusted Certificate Authority

D.

Go to the Key Pairs section and create a new certificate

Buy Now
Questions 14

An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?

Options:

A.

db-passwd-rotate.bat

B.

memoryoptions.bat

C.

run.bat

D.

obfuscate.bat

Buy Now
Questions 15

The application team has changed their directory paths. An administrator must adjust the following paths:

    /images/sitel/

    /images/sitel/checkout/default.html

    /images/sitel/homepage/english/default.html

Which pattern would match the paths?

Options:

A.

/images/aitel/checkout

B.

/images/site*

C.

/images/sitel/english/*

D.

/images/sitel/*

Buy Now
Questions 16

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

Options:

A.

Issuer

B.

Client ID

C.

Host

D.

Port

Buy Now
Questions 17

Under which top-level directory are PingAccess configuration archives stored?

Options:

A.

tools

B.

conf

C.

data

D.

bin

Buy Now
Questions 18

An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?

Options:

A.

Token Provider

B.

Web Session

C.

Site Authenticator

D.

Access Control Rule

Buy Now
Questions 19

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Buy Now
Questions 20

An organization wants to take advantage of a new product feature that requires upgrading the PingAccess cluster from 7.3 to the current version. The administrator downloads the required files and places the files on the PingAccess servers. What should the administrator do next?

Options:

A.

Upgrade the Admin Console.

B.

Disable cluster communication.

C.

Disable Key Rolling.

D.

Upgrade the Replica Admin.

Buy Now
Questions 21

An administrator needs to prevent PingAccess from automatically starting on a Windows Server. Which command would accomplish this task?

Options:

A.

init.bat

B.

uninstall-service.bat

C.

remove-install.bat

D.

wrapper-service.bat

Buy Now
Exam Code: PAP-001
Exam Name: Certified Professional - PingAccess
Last Update: Sep 20, 2025
Questions: 70
PAP-001 pdf

PAP-001 PDF

$25.5  $84.99
PAP-001 Engine

PAP-001 Testing Engine

$30  $99.99
PAP-001 PDF + Engine

PAP-001 PDF + Testing Engine

$40.5  $134.99