An auto parts company wants to protect the path/parts/suspension/struts/manufacturer. Resources appear under an applicationContext Root of/partswith default ordering.
Which resource will the policy engine select?
A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.
Where should the administrator update this behavior without affecting existing applications?
An application owner would like customized errors for rule violations within an application. Where is this configured?
An administrator configures the following:
HTTP Request Parameter Rule for"can_read=yes"
Web Session Attribute Rule forOpt-in = yes
Web Session Attribute Rule forgroup = customerService
Rule SetA(ALL) → includes (HTTP Request Parameter Rule)
Rule SetB(ANY) → includes (Opt-in yes, group customerService)
Rule Set GroupC(ALL) → includes (Rule Set A, Rule Set B)Assigned to the web application.
Which set of conditions must be met to be able to access the application?
How many administrators are supported using HTTP Basic Authentication in the Administrative Console?
An application is hosted on a server that requires clients to authenticate using a username:password pair. This application is behind PingAccess, which is acting as a gateway. What action should the administrator take to allow PingAccess to access the application?
The application team is requesting step-up authentication only for a few specific resources while maintaining previous authentication for other resources. What change would the administrator need to make?
PingAccess will terminate SSL for multiple proxied applications that share thecustomer.comURL domain. The administrator needs different ways to minimize the number of SSL certificates to manage these user-facing applications.
What are two ways this requirement can be met? (Choose 2 answers.)
An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?
An administrator needs to use attributes that are not currently available in theIdentity Mapping Attribute Namedropdown. Which action should the administrator take?
Users report the following about access to an application:
Inconsistent behavior depending on the browser used
Denied access
Prompt to accept a security exception
Which configuration option should the administrator adjust?
An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?
All style sheets should be accessible to all users without authentication across all applications. Which configuration option should the administrator use?
Refer to the following applications:
hr.company.com
finance.company.com
customer.order.company.com
Which action should be taken to allow these applications to share the same web session?
Any user who accesses an application must be insalesunless the user is amanager in the marketing department. The administrator creates the following web session rules:
(A) Look for department = sales
(B) Look for department = marketing
(C) Look for job_title = manager
Which additional actions should be taken to properly enforce this requirement?
An administrator needs to configure a protected web application using theAuthorization Codelogin flow. Which two configuration parameters must be set? (Choose 2 answers.)