An administrator is integrating a new PingAccess Proxied Application for which the target site uses a certificate issued by a publicly trusted Certificate Authority.
How should the administrator configure PingAccess to trust the target site?
Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)
An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?
What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?
Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)
An administrator is integrating a new PingAccess Proxied Application. The target site uses a certificate issued by an internal Certificate Authority hosted by the customer. Prior to assigning the certificate group in the Site configuration, which action should the administrator take to configure PingAccess to trust the certificate?
An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?
According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?
Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:
(A) Look for department = sales
(B) Look for department = marketing
(C) Look for job_title = manager
Which additional actions should be taken to properly enforce this requirement?
PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.
What are two ways this requirement can be met? (Choose 2 answers.)
A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?
All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?
Anycompany has several applications that need to load images and fonts fromwww.anycompany.com . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?
An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?
Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.
What should the administrator add for the access token claims?
An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?