Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

PAP-001 Certified Professional - PingAccess Questions and Answers

Questions 4

An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?

Options:

A.

db-passwd-rotate.bat

B.

memoryoptions.bat

C.

run.bat

D.

obfuscate.bat

Buy Now
Questions 5

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Buy Now
Questions 6

Which two browsers are supported for the PingAccess Admin console? (Choose 2 answers.)

Options:

A.

Apple Safari

B.

Opera

C.

Google Chrome

D.

Microsoft Edge

E.

Brave

Buy Now
Questions 7

A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.

Where should the administrator update this behavior without affecting existing applications?

Options:

A.

Token Validation

B.

Web Sessions

C.

Sites

D.

Token Provider

Buy Now
Questions 8

During a business review of an application, the administrator needs to change the Resource Authentication toanonymous. What are the two effects of making this change to the resource? (Choose 2 answers.)

Options:

A.

The resource requires no further authentication, and no rules will apply.

B.

The resource requires no further authentication, and Identity Mappings still apply.

C.

The resource requires no further authentication, and Processing rules still apply.

D.

Requests to this resource are not logged, and Identity Mappings are applied.

E.

The resource requires no further authentication, and all Access Control rules still apply.

Buy Now
Questions 9

Anycompany has several applications that need to load images and fonts fromwww.anycompany.com . Users are currently getting CORS errors. How should the Cross-Origin Request rule be set to allow secure access?

Options:

A.

Allowed Origins value for each of the listed domains

B.

Allowed Origins to*.anycompany.comand disable the Allow Credentials option

C.

Allowed Origins to*and enable the Allow Credentials option

D.

Allowed Origins towww.anycompany.com and enable the Allow Credentials option

Buy Now
Questions 10

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

Options:

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Buy Now
Questions 11

An administrator needs to support SLO (Single Logout) for a protected web application. What must be configured in a PingAccess Web Session in this situation?

Options:

A.

SLO scope

B.

Idle timeout

C.

Validate Session

D.

Refresh User Attributes

Buy Now
Questions 12

What is the default port for the administrative console?

Options:

A.

9000

B.

3000

C.

9090

D.

3030

Buy Now
Questions 13

An administrator configures PingAccess to use PingFederate as the token provider. Which benefit does this provide?

Options:

A.

The ability to use Single Sign-On support for the administrative console and OAuth for Admin API

B.

The ability to define new OAuth clients in PingFederate from within PingAccess

C.

The ability to manage token issuance criteria from within PingAccess

D.

The automatic population of the Client ID field for selection in creating or editing a Web Session

Buy Now
Questions 14

All access requests to the existing/adminresource must be captured in the audit log. How should this be accomplished?

Options:

A.

Enable the Audit option for the/adminresource

B.

Enable the Audit option for the/*resource

C.

Set Splunk audit logging for/admin

D.

Setlog4j2.xmlaudit logging for/admin

Buy Now
Questions 15

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

Options:

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

Buy Now
Questions 16

Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.

What should the administrator add for the access token claims?

Options:

A.

An authentication requirement definition

B.

A web session attribute rule

C.

An identity mapping definition

D.

An OAuth attribute rule

Buy Now
Questions 17

Which element in thelog4j2.xmlfile must be modified to change the log level in PingAccess?

Options:

A.

AsyncLogger

B.

RollingFile

C.

Logger

D.

Appenders

Buy Now
Questions 18

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

Options:

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

Buy Now
Questions 19

An auto parts company wants to protect the path/parts/suspension/struts/manufacturer. Resources appear under an applicationContext Root of/partswith default ordering.

Which resource will the policy engine select?

Options:

A.

//struts/manufacturer

B.

//manufacturer

C.

/suspension/struts/manufacturer

D.

///manufacturer

Buy Now
Questions 20

Where should an administrator adjustSameSite Cookiesettings?

Options:

A.

Rules

B.

Sites

C.

Applications

D.

Web Sessions

Buy Now
Questions 21

An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?

Options:

A.

Token Provider

B.

Web Session

C.

Site Authenticator

D.

Access Control Rule

Buy Now
Exam Code: PAP-001
Exam Name: Certified Professional - PingAccess
Last Update: Sep 17, 2025
Questions: 70

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now PAP-001 testing engine

PDF (Q&A)

$49.8  $124.49
buy now PAP-001 pdf