Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the purpose of theadmin.authconfiguration setting?

A.

To configure SSO for the administrative user interface.

B.

To define the method to use for authenticating to the administrative API.

C.

To override the SSO configuration for the administrative user interface.

D.

To enable automatic authentication to the PingAccess administrative console.

What information must be provided when setting the PingFederate Standard Token Provider for the Runtime engines?

A.

Issuer

B.

Client ID

C.

Host

D.

Port

An organization has a highly available PingAccess cluster with four runtime nodes. The administrator wants to provide the same availability to administrative users. What should the administrator do?

A.

Configure one active and one replica administrative node with engine cluster pointed to both administrative nodes

B.

Configure four active administrative nodes with engine cluster pointed to all administrative nodes for configuration

C.

Configure two active administrative nodes with engine cluster pointed to both administrative nodes for configuration

D.

Configure one active and three replica administrative nodes with engine cluster pointed to all administrative nodes

Under which top-level directory are PingAccess configuration archives stored?

A.

tools

B.

conf

C.

data

D.

bin

An administrator is setting up PingAccess to terminate SSL for a proxied application. What action must the administrator take to configure an existing certificate for that application?

A.

Assign the Key Pair to the Virtual Host

B.

Enable Require HTTPS in the Application configuration

C.

Assign the Key Pair to the Agent Listener

D.

Set the secure flag to Yes in the Site configuration

According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications. Which configuration object should the administrator use in the applications?

A.

UI Authentication

B.

Auth Token Management

C.

Authentication Requirements

D.

Authentication Challenge Policy

Users report the following about access to an application:

    Inconsistent behavior depending on the browser used

    Denied access

    Prompt to accept a security exception

Which configuration option should the administrator adjust?

A.

Enable PKCE

B.

SameSite Cookie

C.

Request Preservation

D.

Validate Session

A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.

Where should the administrator update this behavior without affecting existing applications?

A.

Token Validation

B.

Web Sessions

C.

Sites

D.

Token Provider

An administrator must protect a configuration by changing the default key. Which script can be used to meet this goal?

A.

db-passwd-rotate.bat

B.

memoryoptions.bat

C.

run.bat

D.

obfuscate.bat

An administrator is integrating a new PingAccess Proxied Application for which the target site uses a certificate issued by a publicly trusted Certificate Authority.

How should the administrator configure PingAccess to trust the target site?

A.

Import the certificate chain into Key Pairs and add it to a Trusted Certificate Group

B.

Configure the PingAccess Site to use the Java Trust Store Certificate Group

C.

Import the certificate chain into Key Pairs

D.

Drop the certificate chain into a Trusted Certificate Group