New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

PT-AM-CPE Certified Professional - PingAM Exam Questions and Answers

Questions 4

To ensure the user's full name is displayed on the consent screen for an OpenID Connect application, which string should be added into the Support Claims property on the OpenID Connect tab page of the OAuth2 Provider service in PingAM?

Options:

A.

name|en|Full name

B.

Full name|en|name

C.

full_name|Full name

D.

name|en|given_name+' '+family_name

Buy Now
Questions 5

Sam wants to start a service provider-initiated single sign-on and redirect to their own application, myapp.com. Which of the following URLs is the correct one to perform this action?

Options:

A.

http://sso.domain.com/openam/saml2/jsp/idpSSOInit.jsp &RelayState=http%3A%2F%2Fmyapp.com

B.

http://sso.domain.com/openam/saml2/jsp/idpSSOInit.jsp &goto=http%3A%2F%2Fmyapp.com

C.

http://sso.domain.com/openam/saml2/jsp/spSSOInit.jsp &goto=http%3A%2F%2Fmyapp.com

D.

http://sso.domain.com/openam/saml2/jsp/spSSOInit.jsp &RelayState=http%3A%2F%2Fmyapp.com

Buy Now
Questions 6

Consider the following LDAP connection string:

DS1.example.com:389|01, DS2.example.com:389|01, DS2.example.com:389|02, DS1.example.com:389|02

This connection string can be used in:

Options:

A.

Identity Store

B.

Core Token Service

C.

Configuration Data Store

Which of the above options are correct?

D.

Only A is correct

E.

Only B is correct

F.

Only C is correct

G.

A, B, and C are correct

Buy Now
Questions 7

Which of the following statements about the PingAM tree designer is not true?

Options:

A.

The PingAM tree designer lets you terminate the tree with a success node, a failure node, or a node linking to another authentication tree

B.

The PingAM tree designer lets you create complex authentication by linking nodes together, creating loops, and nesting nodes within a tree

C.

The PingAM tree designer is able to display custom and Ping Identity Marketplace nodes to use together with shipped nodes

D.

The PingAM tree designer lets you integrate inner trees in the authentication flow

Buy Now
Questions 8

What is a SAML2 artifact?

Options:

A.

The SAML2 assertion

B.

The SAML2 binding name

C.

The name of a specific attribute in the assertion

D.

A value sent by the service provider to retrieve the assertion

Buy Now
Questions 9

Why should module-based authentication be disabled in production?

Options:

A.

Module-based authentication allows a user to authenticate with the amAdmin account

B.

Module-based authentication allows a user to select any authentication level

C.

Module-based authentication allows a user to bypass steps in an authentication chain

D.

Module-based authentication allows users to authenticate in any realm

Buy Now
Questions 10

Which OAuth2 flow is most appropriate to support the use case of a client application implemented in a browser using a scripted language such as JavaScript?

Options:

A.

Authorization code grant flow with PKCE

B.

Implicit grant flow

C.

Resource owner grant flow

D.

Client credentials grant flow

Buy Now
Questions 11

What is the purpose of the extended metadata in PingAM?

Options:

A.

It specifies the certificates and keys for the SAML2 entity

B.

It specifies the policy to invoke during SAML2 federation

C.

It is a standard way to communicate supported SAML2 features

D.

It specifies additional information about a SAML2 entity specific to PingAM

Buy Now
Questions 12

In a PingAM cluster, how is the debug level set?

Options:

A.

On each server in the debug.properties file

B.

On a per-instance basis in the admin console

C.

On a per-site basis in the admin console

D.

It is not recommended to change the level at all

Buy Now
Questions 13

Which OAuth2 web endpoint is used to validate a token?

Options:

A.

/oauth2/userinfo

B.

/oauth2/introspect

C.

/oauth2/validate

D.

/oauth2/access_token

Buy Now
Questions 14

To protect against cross-site request forgery attacks, a default PingAM installation requires that some requests, such as POST requests, include:

Options:

A.

X-OpenAM-Password header

B.

If-Match: _rev header

C.

X-Requested-With or Accept-API-Version header

D.

X-OpenAM-Username header

Buy Now
Questions 15

In the OAuth2 Device Flow, which of the following HTTP codes is returned if a user has not yet authorized a client device?

Options:

A.

HTTP 403

B.

HTTP 400

C.

HTTP 401

D.

HTTP 302

Buy Now
Questions 16

A PingAM administrator wants to deny access to an area of a protected application if the end user has been logged in for more than 10 minutes. How can this be achieved?

Options:

A.

Use a policy with a Time environment condition

B.

Use a policy with a Current session properties environment condition

C.

Use a policy with a Scripted environment condition

D.

Use a policy with an Active session time environment condition

Buy Now
Questions 17

In an authentication tree process, considering best practice, where can the collected context data for mobile devices be persisted for subsequent risk analysis?

Options:

A.

In the session state

B.

In shared node state

C.

With the user profile

D.

In a browser cookie

Buy Now
Questions 18

Which authentication node can you use in PingAM to add a key:value property to the user's session after successful authentication?

Options:

A.

The Get Session Data node

B.

You have to use a webhook, not a node

C.

The Provision Dynamic Account node

D.

The Set Session Properties node

Buy Now
Questions 19

When developing a PingAM may act script for OAuth2 token exchange patterns, which variables are made available for use in the script?

Options:

A.

clientProperties, identity, logger, requestProperties, scopes, scriptName, session, token

B.

clientProperties, identity, logger, requestProperties, scopes, scriptName, session, requestedToken

C.

clientProperties, identity, logger, requestProperties, scopeList, scriptName, session, requestedToken

D.

clientProperties, identity, logger, requestProperties, scopeList, scriptName, session, token

Buy Now
Questions 20

OpenID Connect acr_values map to what component within PingAM?

Options:

A.

Authentication trees

B.

SAML Circles of Trust

C.

Authorization policies

D.

Authentication levels

Buy Now
Questions 21

In the default Cloud Developer Kit (CDK) deployment of the forgeops repository, which pods provide the user interface functionality?

Options:

A.

admin-ui, end-user-ui, login-ui

B.

amadmin-ui, idmadmin-ui, login-ui

C.

am-ui, idm-ui, login-ui

D.

am-ui, idm-ui, end-user-ui

Buy Now
Questions 22

A multi-server PingAM deployment is scheduled for upgrade. What measure can be implemented to prevent external user access during this process?

Options:

A.

Shut down the PingAM instances

B.

Shut down the PingDS instances

C.

Disable access from the firewall

D.

Disable access from the load balancer

Buy Now
Questions 23

In which OAuth2 grant would you find a user code?

Options:

A.

Client credentials grant

B.

Authorization code grant

C.

Resource owner password credentials grant

D.

Device flow

Buy Now
Questions 24

In order to secure a PingAM deployment with an external configuration data store and user data store using server-side sessions, which of the following should be considered?

Options:

A.

Changing the default iPlanetDirectoryPro cookie name, Using your own key for signing, Using a specific bind account for LDAP connections, Renaming and reducing the assigned privileges of the amAdmin account

B.

Encrypting the iPlanetDirectoryPro cookie contents, Changing the default iPlanetDirectoryPro cookie name, Using your own key for signing, Using a specific bind account for LDAP connections

C.

Changing the default iPlanetDirectoryPro cookie name, Using your own key for signing, Using a specific bind account for LDAP connections, Creation of a top-level administrator other than amAdmin

D.

Changing the default iPlanetDirectoryPro cookie name, Using your own key for signing, Using a specific bind account for LDAP connections, Reducing the privileges of the amAdmin user in production

Buy Now
Questions 25

If there is a need to reset a registered device over the REST API, which one of the following statements is incorrect?

Options:

A.

Administrators can provide authenticated users with a self-service page to reset their devices via the REST API

B.

Administrators can call the REST API to reset a device that is out of sync, where the HOTP counter exceeds the HOTP threshold window and requires a reset

C.

Only administrator accounts, not user accounts, have the ability to use the REST API for resetting a device profile

D.

Administrators can call the REST API to reset a user's device profile

Buy Now
Questions 26

Which PingAM feature only uses the PingAM keystore?

Options:

A.

Client-side sessions

B.

Persistent Cookie node

C.

Authentication trees

D.

OAuth2 providers

Buy Now
Questions 27

During the PingAM startup process, what is the location and name of the file that the PingAM bootstrap process uses to connect to the configuration Directory Services repository?

Options:

A.

<user-home-dir>/.openam/config/boot.json

B.

/path/to/tomcat//webapps/<am-instance-dir>/boot.json

C.

<user-home>/<am-instance-dir>/boot.json

D.

<user-home-dir>/<am-instance-dir>/config/boot.json

Buy Now
Questions 28

What is the purpose of the SAML2 account mapper on the service provider (SP) side?

Options:

A.

Maps multiple identity provider assertions together

B.

Maps multiple SP user accounts together

C.

Maps local user attributes to remote users' attributes

D.

Maps remote users to local user profiles

Buy Now
Questions 29

Examining the following JSON object, what is a valid value for the type part (shown in bold font) of the claim value in a PingAM implementation?

JSON

JSON

"act": {

"sub": "(type!subject)"

}

Options:

A.

agent

B.

usr

C.

uid

D.

user

Buy Now
Questions 30

Which authentication nodes can be used for risk analysis related to device context?

A) Device Profile Collector node1

B) Device GeoFencing node2

C) Device Profile Save node3

D) Device Tampering Verification node

E) Device Location Match node4

F) Device Match node

Multiple Choice Options:

Options:

A.

A, B, C, and D

B.

B, D, E, and F

C.

B, C, D, and F

D.

A, C, D, and E

Buy Now
Exam Code: PT-AM-CPE
Exam Name: Certified Professional - PingAM Exam
Last Update: Jan 15, 2026
Questions: 100

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now PT-AM-CPE testing engine

PDF (Q&A)

$43.57  $124.49
buy now PT-AM-CPE pdf