Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

PAP-001 Sample Questions Answers

Questions 4

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

Options:

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Buy Now
Questions 5

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

Options:

A.

Issuer

B.

Client ID

C.

Host

D.

Port

Buy Now
Questions 6

A company uses an internally based legacy PKI solution that does not adhere to theCertification Path Validationsection of RFC-5280. Which configuration option needs to be enabled when creating Trusted Certificate Groups in PingAccess?

Options:

A.

Use Java Trust Store

B.

Validate disordered certificate chains

C.

Skip Certificate Date Check

D.

Deny when unable to determine revocation status

Buy Now
Questions 7

Which two protocols does PingAccess use for authentication and authorization? (Choose 2 answers.)

Options:

A.

SAML

B.

WS-Fed

C.

WS-Trust

D.

OAuth2

E.

OIDC

Buy Now
Questions 8

An administrator is integrating a new PingAccess Proxied Application. The target site uses a certificate issued by an internal Certificate Authority hosted by the customer. Prior to assigning the certificate group in the Site configuration, which action should the administrator take to configure PingAccess to trust the certificate?

Options:

A.

Configure the PingAccess Site to use the Java Trust Store Certificate Group.

B.

Import the certificate chain into Key Pairs and add it to the Trusted Certificate Group.

C.

Import the certificate chain into Key Pairs and assign it to a new engine listener.

D.

Import the certificate chain and add it to the Trusted Certificate Group.

Buy Now
Questions 9

An administrator is integrating a new PingAccess Proxied Application. The application will temporarily need a self-signed certificate during the POC/demo phase. PingAccess is terminating SSL and is responsible for loading the SSL certificate for the application.

What initial action must the administrator take in PingAccess in this situation?

Options:

A.

Go to the Certificates section and create a new certificate

B.

Go to the Key Pairs section and import the PKCS#12 file provided by the customer's internal Certificate Authority

C.

Go to the Key Pairs section and import the PKCS#12 file provided by the publicly trusted Certificate Authority

D.

Go to the Key Pairs section and create a new certificate

Buy Now
Questions 10

For a Web Application, theid_tokenmust be transmitted through a back channel with the OIDC standards-based approach. Which action should the administrator perform in the Web Session to meet this requirement?

Options:

A.

Set the login type to code

B.

Set the request preservation to POST

C.

Set the login type to POST

D.

Set the request preservation to None

Buy Now
Questions 11

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Buy Now
Questions 12

An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?

Options:

A.

log4j2.db.properties

B.

jvm-memory.options

C.

run.properties

D.

log4j2.xml

Buy Now
Questions 13

A department has a requirement to protect anything in its application that resides in a folder named "escalated," no matter where that folder is in the path. Which path prefix should be used in this situation?

Options:

A.

escalated/

B.

*/escalated/

C.

*/escalated/+

D.

/*escalated/

Buy Now
Questions 14

What is the default port for the administrative console?

Options:

A.

9000

B.

3000

C.

9090

D.

3030

Buy Now
Questions 15

An application owner would like customized errors for rule violations within an application. Where is this configured?

Options:

A.

When assigning a Rule to a Resource

B.

Within the Root Resource of the Application

C.

When combining Rules into Rule Sets

D.

Within the Rule definition

Buy Now
Questions 16

The application team has changed their directory paths. An administrator must adjust the following paths:

    https://www.dumpspedia.com/images/sitel/

    https://www.dumpspedia.com/images/sitel/checkout/default.html

    https://www.dumpspedia.com/images/sitel/homepage/english/default.html

Which pattern would match the paths?

Options:

A.

https://www.dumpspedia.com/images/aitel/checkout

B.

https://www.dumpspedia.com/images/site*

C.

https://www.dumpspedia.com/images/sitel/english/*

D.

https://www.dumpspedia.com/images/sitel/*

Buy Now
Questions 17

What is the purpose of theadmin.authconfiguration setting?

Options:

A.

To configure SSO for the administrative user interface.

B.

To define the method to use for authenticating to the administrative API.

C.

To override the SSO configuration for the administrative user interface.

D.

To enable automatic authentication to the PingAccess administrative console.

Buy Now
Questions 18

According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?

Options:

A.

UI Authentication

B.

Auth Token Management

C.

Authentication Requirements

D.

Authentication Challenge Policy

Buy Now
Questions 19

Where in the administrative console should an administrator make user attributes available as HTTP request headers?

Options:

A.

Site Authenticators

B.

Identity Mappings

C.

Web Sessions

D.

HTTP Requests

Buy Now
Questions 20

A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)

Options:

A.

Request that the token provider update the ID token with the additional attributes.

B.

Update the Identity Mapping.

C.

Update the Site Authenticator.

D.

Request that the token provider update the access token with the additional attributes.

E.

Update the Web Session.

Buy Now
Questions 21

What is the purpose of theengine.ssl.protocolsin therun.propertiesfile?

Options:

A.

To configure the supported ciphers

B.

To configure the supported HTTPS port

C.

To configure the supported TLS versions

D.

To configure SSL protocols used for clustering

Buy Now
Exam Code: PAP-001
Exam Name: Certified Professional - PingAccess
Last Update: Nov 3, 2025
Questions: 70
$66  $164.99
$50  $124.99
$42  $104.99
buy now PAP-001