New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

PAP-001 Certified Professional - PingAccess Questions and Answers

Questions 4

An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)

Options:

A.

Changepa.operational.modetoCLUSTERED_CONSOLE_REPLICAon one of the engine nodes.

B.

Restart all nodes in the cluster.

C.

Changepa.operational.modetoCLUSTERED_CONSOLEon the replica admin node.

D.

Restart the replica admin node.

E.

Modifybootstrap.propertiesand set theengine.admin.configuration.hostvalue to point at the replica admin node.

Buy Now
Questions 5

An administrator needs to configure an application that uses a backend web server that has its own authentication mechanism. Which type of object must be configured for PingAccess to provide access to the target server?

Options:

A.

Token Provider

B.

Web Session

C.

Site Authenticator

D.

Access Control Rule

Buy Now
Questions 6

What is the purpose of theengine.ssl.protocolsin therun.propertiesfile?

Options:

A.

To configure the supported ciphers

B.

To configure the supported HTTPS port

C.

To configure the supported TLS versions

D.

To configure SSL protocols used for clustering

Buy Now
Questions 7

An administrator needs to support SLO (Single Logout) for a protected web application. What must be configured in a PingAccess Web Session in this situation?

Options:

A.

SLO scope

B.

Idle timeout

C.

Validate Session

D.

Refresh User Attributes

Buy Now
Questions 8

What is the purpose of PingAccess processing rules?

Options:

A.

To collect data for offline processing

B.

To modify web traffic in real time

C.

To override upstream access control decisions

D.

To allow for more detailed auditing

Buy Now
Questions 9

Developers report an issue with an application that is protected by PingAccess. Certain requests are not providing claims that are part of the access token.

What should the administrator add for the access token claims?

Options:

A.

An authentication requirement definition

B.

A web session attribute rule

C.

An identity mapping definition

D.

An OAuth attribute rule

Buy Now
Questions 10

An administrator must onboard a new application from the application team. The application has multiple paths that will need different rules. What would be the first step in this process?

Options:

A.

Identity mapping

B.

Web session

C.

Application

D.

Resource

Buy Now
Questions 11

An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?

Options:

A.

Configure one active and one replica administrative node with engine cluster pointed to both administrative nodes

B.

Configure four active administrative nodes with engine cluster pointed to all administrative nodes for configuration

C.

Configure two active administrative nodes with engine cluster pointed to both administrative nodes for configuration

D.

Configure one active and three replica administrative nodes with engine cluster pointed to all administrative nodes

Buy Now
Questions 12

An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?

Options:

A.

Create an Authentication Requirement named MFA_Required.

B.

Apply an Authentication Requirements rule to the resource.

C.

Apply a Web Session Attribute rule to the resource.

D.

Apply an HTTP Request Parameter rule to the resource.

Buy Now
Questions 13

An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?

Options:

A.

Request that the additional attributes be added by the token provider administrator

B.

Create a Rewrite Content rule for the additional attributes

C.

Request that the additional attributes be added by the web developer

D.

Create a Web Session Attribute rule for the additional attributes

Buy Now
Questions 14

A business application must be accessible via two FQDNs. Which PingAccess functionality should an administrator use to meet this requirement?

Options:

A.

Virtual Hosts

B.

Applications

C.

Sites

D.

Web Sessions

Buy Now
Questions 15

A modified application now requires additional attributes to be passed in the headers. What needs to be modified in order to pass the additional attributes?

Options:

A.

HTTP Request Header Rule

B.

Header Identity Mapping

C.

JWT Identity Mapping

D.

Web Session Attribute Rule

Buy Now
Questions 16

An application owner would like customized errors for rule violations within an application. Where is this configured?

Options:

A.

When assigning a Rule to a Resource

B.

Within the Root Resource of the Application

C.

When combining Rules into Rule Sets

D.

Within the Rule definition

Buy Now
Questions 17

An administrator needs to configure a protected web application using theAuthorization Codelogin flow. Which two configuration parameters must be set? (Choose 2 answers.)

Options:

A.

OAuth Token Introspection Endpoint

B.

OAuth Client ID

C.

OpenID Connect Issuer

D.

Virtual Host

E.

OpenID Connect Login Type

Buy Now
Questions 18

Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:

    (A) Look for department = sales

    (B) Look for department = marketing

    (C) Look for job_title = manager

Which additional actions should be taken to properly enforce this requirement?

Options:

A.

Create a Rule Set (D) to accept ALL (A) (B AND C) → Add Rule Set (D) to the resource

B.

Create a Rule Set (D) to accept ANY (A) (B) (C) → Add Rule Set (D) to the resource

C.

Create a Rule Set (D) to accept ALL (A) → Create a Rule Set (E) to accept ANY (B) (C) → Create a Rule Set Group (F) to accept ALL (D) (E) → Add Rule Set Group (F) to the resource

D.

Create a Rule Set (D) to accept ANY (A) → Create a Rule Set (E) to accept ALL (B) (C) → Create a Rule Set Group (F) to accept ANY (D) (E) → Add Rule Set Group (F) to the resource

Buy Now
Questions 19

What is the purpose of thepa.operational.modeconfiguration setting?

Options:

A.

To determine if a server should participate in cluster replication

B.

To determine the role the server performs in a cluster

C.

To determine whether a server is a development or production server

D.

To determine if a cluster node is enabled or disabled

Buy Now
Questions 20

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

Options:

A.

Assign the Key Pair to the Virtual Host

B.

Enable Require HTTPS in the Application configuration

C.

Assign the Key Pair to the Agent Listener

D.

Set the secure flag to Yes in the Site configuration

Buy Now
Questions 21

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

Options:

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Buy Now
Exam Code: PAP-001
Exam Name: Certified Professional - PingAccess
Last Update: Dec 17, 2025
Questions: 70

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99