Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

PAP-001 Certified Professional - PingAccess Questions and Answers

Questions 4

An administrator is integrating a new PingAccess Proxied Application for which the target site uses a certificate issued by a publicly trusted Certificate Authority.

How should the administrator configure PingAccess to trust the target site?

Options:

A.

Import the certificate chain into Key Pairs and add it to a Trusted Certificate Group

B.

Configure the PingAccess Site to use the Java Trust Store Certificate Group

C.

Import the certificate chain into Key Pairs

D.

Drop the certificate chain into a Trusted Certificate Group

Buy Now
Questions 5

Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)

Options:

A.

SAML

B.

WS-Fed

C.

WS-Trust

D.

OAuth2

E.

OIDC

Buy Now
Questions 6

An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?

Options:

A.

Apply an Identity Mapping that includes the username and password

B.

Apply a valid Web Session that contains the username and password

C.

Configure a Basic Authentication Site Authenticator to the Site

D.

Configure a Mutual TLS Site Authenticator to the Site

Buy Now
Questions 7

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

Options:

A.

Issuer

B.

Client ID

C.

Host

D.

Port

Buy Now
Questions 8

Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)

Options:

A.

J2EE_HOME

B.

JAVA_HOME

C.

PA_PATH

D.

PA_HOME

E.

JAVA_PATH

Buy Now
Questions 9

An administrator is integrating a new PingAccess Proxied Application. The target site uses a certificate issued by an internal Certificate Authority hosted by the customer. Prior to assigning the certificate group in the Site configuration, which action should the administrator take to configure PingAccess to trust the certificate?

Options:

A.

Configure the PingAccess Site to use the Java Trust Store Certificate Group.

B.

Import the certificate chain into Key Pairs and add it to the Trusted Certificate Group.

C.

Import the certificate chain into Key Pairs and assign it to a new engine listener.

D.

Import the certificate chain and add it to the Trusted Certificate Group.

Buy Now
Questions 10

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Buy Now
Questions 11

According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?

Options:

A.

UI Authentication

B.

Auth Token Management

C.

Authentication Requirements

D.

Authentication Challenge Policy

Buy Now
Questions 12

Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:

    (A) Look for department = sales

    (B) Look for department = marketing

    (C) Look for job_title = manager

Which additional actions should be taken to properly enforce this requirement?

Options:

A.

Create a Rule Set (D) to accept ALL (A) (B AND C) → Add Rule Set (D) to the resource

B.

Create a Rule Set (D) to accept ANY (A) (B) (C) → Add Rule Set (D) to the resource

C.

Create a Rule Set (D) to accept ALL (A) → Create a Rule Set (E) to accept ANY (B) (C) → Create a Rule Set Group (F) to accept ALL (D) (E) → Add Rule Set Group (F) to the resource

D.

Create a Rule Set (D) to accept ANY (A) → Create a Rule Set (E) to accept ALL (B) (C) → Create a Rule Set Group (F) to accept ANY (D) (E) → Add Rule Set Group (F) to the resource

Buy Now
Questions 13

PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.

What are two ways this requirement can be met? (Choose 2 answers.)

Options:

A.

Assign unique Key Pairs to each Virtual Host

B.

Assign a wildcard certificate to the Engine Listener

C.

Assign a Subject Alternative Name Certificate to the Engine Listener

D.

Assign a Subject Alternative Name Certificate to the Agent Listener

E.

Assign a wildcard certificate to the Agent Listener

Buy Now
Questions 14

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Buy Now
Questions 15

All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?

Options:

A.

Enable the Audit option for the/adminresource

B.

Enable the Audit option for the/*resource

C.

Set Splunk audit logging for/admin

D.

Setlog4j2.xmlaudit logging for/admin

Buy Now
Questions 16

Anycompany has several applications that need to load images and fonts fromwww.anycompany.com . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?

Options:

A.

Allowed Origins value for each of the listed domains

B.

Allowed Origins to*.anycompany.comand disable the Allow Credentials option

C.

Allowed Origins to*and enable the Allow Credentials option

D.

Allowed Origins towww.anycompany.com and enable the Allow Credentials option

Buy Now
Questions 17

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

Options:

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Buy Now
Questions 18

Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.

What should the administrator add for the access token claims?

Options:

A.

An authentication requirement definition

B.

A web session attribute rule

C.

An identity mapping definition

D.

An OAuth attribute rule

Buy Now
Questions 19

What is the purpose of the Mutual TLS Site Authenticator?

Options:

A.

Allows the backend server to authenticate to PingAccess

B.

Allows the user to authenticate to the backend server

C.

Allows PingAccess to authenticate to the backend server

D.

Allows PingAccess to authenticate to the token provider

Buy Now
Questions 20

What is the purpose of theadmin.authconfiguration setting?

Options:

A.

To configure SSO for the administrative user interface.

B.

To define the method to use for authenticating to the administrative API.

C.

To override the SSO configuration for the administrative user interface.

D.

To enable automatic authentication to the PingAccess administrative console.

Buy Now
Questions 21

An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?

Options:

A.

db-passwd-rotate.bat

B.

memoryoptions.bat

C.

run.bat

D.

obfuscate.bat

Buy Now
Exam Code: PAP-001
Exam Name: Certified Professional - PingAccess
Last Update: Nov 5, 2025
Questions: 70
PAP-001 pdf

PAP-001 PDF

$29.75  $84.99
PAP-001 Engine

PAP-001 Testing Engine

$35  $99.99
PAP-001 PDF + Engine

PAP-001 PDF + Testing Engine

$47.25  $134.99