Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator needs to support SLO (Single Logout) for a protected web application. What must be configured in a PingAccess Web Session in this situation?

A.

SLO scope

B.

Idle timeout

C.

Validate Session

D.

Refresh User Attributes

An API is hosted onsite and is using only header-based Identity Mapping. It is exposed to all clients running on the corporate network. How should the administrator prevent a malicious actor from bypassing PingAccess and spoofing the headers to gain unauthorized access to the API?

A.

Use ID Tokens

B.

Add Site Authenticator

C.

Require HTTPS

D.

Use Target Host Header

Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)

A.

Default logs location

B.

URL for heartbeat endpoint

C.

Operational mode for PingAccess

D.

X-Frame-Options header

E.

Logging levels

A business requires logs to be written to a centralized Oracle database. Which two actions must the PingAccess administrator take to enable this? (Choose 2 answers.)

A.

Configure log4j2.xml and log4j2.db.properties.

B.

Remove the logs located in PA_HOME/log.

C.

Enable the Audit flag in the Resource.

D.

Copy the database driver JAR file to the PA_HOME/lib directory.

E.

Import the database certificate into the Trusted Certificate Group.

An application owner would like customized errors for rule violations within an application. Where is this configured?

A.

When assigning a Rule to a Resource

B.

Within the Root Resource of the Application

C.

When combining Rules into Rule Sets

D.

Within the Rule definition

An application requires MFA for URLs that are considered high risk. Which action should the administrator take to meet this requirement?

A.

Create an Authentication Requirement named MFA_Required.

B.

Apply an Authentication Requirements rule to the resource.

C.

Apply a Web Session Attribute rule to the resource.

D.

Apply an HTTP Request Parameter rule to the resource.

The performance testing team finds that an API hosted in a remote datacenter is experiencing higher response times compared to similar APIs hosted onsite. Which option in PingAccess can be used to improve performance in this scenario?

A.

Reduce the Key Roll Interval on the web session

B.

Move the API to a separate Virtual Host

C.

Reduce the number of attributes in the ID Token

D.

Enable Cache Token on the OAuth Resource Server

Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)

A.

J2EE_HOME

B.

JAVA_HOME

C.

PA_PATH

D.

PA_HOME

E.

JAVA_PATH

A PingAccess administrator needs to configure PingAccess to validate tokens. Which two options can the administrator use? (Choose 2 answers)

A.

PingFederate

B.

Kerberos

C.

Common SAML provider

D.

Common OIDC provider

E.

PingAuthorize

An administrator needs to reduce the number of archive backups that are maintained in thedata/archivefolder. Which file does the administrator need to modify to make this change?

A.

log4j2.db.properties

B.

jvm-memory.options

C.

run.properties

D.

log4j2.xml