Ping Identity PAP-001 Exam (page: 2)
Ping Identity Certified Professional - PingAccess
Updated on: 07-Feb-2026

Viewing Page 2 of 10

Which two options can be changed in the run.properties file? (Choose 2 answers.)

  1. Default logs location
  2. URL for heartbeat endpoint
  3. Operational mode for PingAccess
  4. X-Frame-Options header
  5. Logging levels

Answer(s): C,E

Explanation:

The run.properties file in PingAccess is the primary configuration file that defines system-level runtime behavior. According to PingAccess documentation:
Exact Extract:
"The run.properties file contains configuration properties for PingAccess, including operational mode, logging levels, admin authentication fallback, cluster settings, and system defaults." (PingAccess Administrator's Guide ­ run.properties Reference) From this, we can determine:
C . Operational mode for PingAccess Correct
The property pa.operational.mode in run.properties defines whether the node operates as STANDALONE, CLUSTERED_CONSOLE, CLUSTERED_CONSOLE_REPLICA, or CLUSTERED_ENGINE. This is one of the core configurable options.

E . Logging levels Correct
Properties such as log.level and other logging configurations are explicitly defined in run.properties, allowing administrators to adjust the verbosity of logs (DEBUG, INFO, WARN, ERROR).

Why the others are incorrect:
A . Default logs location Incorrect
The log file path is not controlled via run.properties. It is defined in log4j2.xml, not in run.properties.
B . URL for heartbeat endpoint Incorrect
The heartbeat endpoint (/pa/heartbeat.ping) is a fixed system endpoint and is not configurable in run.properties.
D . X-Frame-Options header Incorrect
Security headers like X-Frame-Options are managed under application security policies or global response headers, not in run.properties.


Reference:

PingAccess Administrator's Guide ­ run.properties Reference (section describing pa.operational.mode and logging configuration properties).



An administrator needs to support SLO (Single Logout) for a protected web application.
What must be configured in a PingAccess Web Session in this situation?

  1. SLO scope
  2. Idle timeout
  3. Validate Session
  4. Refresh User Attributes

Answer(s): A

Explanation:

To enable Single Logout (SLO), the SLO scope must be defined in the PingAccess Web Session configuration. This determines which sessions are ended when a logout request occurs.
Exact Extract:

"The SLO scope option in a web session specifies which applications are included in a logout event when Single Logout is triggered."
Option A (SLO scope) is correct; it explicitly enables SLO support by linking session termination across apps.
Option B (Idle timeout) is unrelated; this controls session expiration, not SLO. Option C (Validate Session) ensures session state is synchronized but does not configure SLO. Option D (Refresh User Attributes) is unrelated; it only controls whether attributes are reloaded.


Reference:

PingAccess Administration Guide ­ Configuring Web Sessions



According to a new business requirement, critical applications require dual-factor authentication when specific resources are accessed in those applications.
Which configuration object should the administrator use in the applications?

  1. UI Authentication
  2. Auth Token Management
  3. Authentication Requirements
  4. Authentication Challenge Policy

Answer(s): C

Explanation:

PingAccess enforces step-up or multi-factor authentication using Authentication Requirements, which can be applied to specific resources within an application.
Exact Extract:
"Authentication requirements allow administrators to configure additional authentication (for example, MFA) when accessing sensitive application resources." Option A (UI Authentication) applies to access to the admin console, not application resources. Option B (Auth Token Management) relates to OAuth token lifetimes and refresh, not MFA enforcement.
Option C (Authentication Requirements) is correct -- these rules enforce MFA or step-up auth for specific URLs/resources.
Option D (Authentication Challenge Policy) governs how failed auth challenges are presented but does not enforce MFA.


Reference:

PingAccess Administration Guide ­ Authentication Requirements



During a business review of an application, the administrator needs to change the Resource Authentication to anonymous.
What are the two effects of making this change to the resource? (Choose 2 answers.)

  1. The resource requires no further authentication, and no rules will apply.
  2. The resource requires no further authentication, and Identity Mappings still apply.
  3. The resource requires no further authentication, and Processing rules still apply.
  4. Requests to this resource are not logged, and Identity Mappings are applied.
  5. The resource requires no further authentication, and all Access Control rules still apply.

Answer(s): B,C

Explanation:

When a resource is configured as anonymous, PingAccess does not challenge the user for authentication. However, certain processing and identity propagation still occur.

Exact Extract:
"Anonymous resources do not require authentication. Identity mappings and request/response processing rules still apply."
Option A is incorrect because rules such as identity mappings and processing still apply. Option B is correct -- Identity Mappings can still forward attributes, even for anonymous access. Option C is correct -- Processing rules (e.g., request/response modifications) still apply. Option D is incorrect -- requests are logged; anonymous does not disable logging. Option E is incorrect -- access control rules (authorization) are not evaluated for anonymous resources.


Reference:

PingAccess Administration Guide ­ Resource Authentication



An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application.
What initial action must the administrator take in PingAccess in this situation?

  1. Import the SSL public key with the full certificate chain into the Certificates.
  2. Import the PKCS#12 file with the full certificate chain into the Certificates.
  3. Import the SSL public key with the full certificate chain into the Key Pairs.
  4. Import the PKCS#12 file with the full certificate chain into the Key Pairs.

Answer(s): D

Explanation:

For PingAccess to terminate SSL for a proxied application, it requires access to the private key and certificate chain. These are stored as Key Pairs.
Exact Extract:
"For SSL termination, you must import the server certificate and its private key as a PKCS#12 file into Key Pairs."
Option A is incorrect -- a public key alone cannot terminate SSL. Option B is incorrect -- PKCS#12 files must go into Key Pairs, not Certificates. Option C is incorrect -- public keys alone are insufficient; PingAccess must have the private key.

Option D is correct -- the PKCS#12 file with full chain and private key is imported into Key Pairs.


Reference:

PingAccess Administration Guide ­ Managing Certificates and Key Pairs



An administrator needs to prevent PingAccess from automatically starting on a Windows Server.
Which command would accomplish this task?

  1. init.bat
  2. uninstall-service.bat
  3. remove-install.bat
  4. wrapper-service.bat

Answer(s): B

Explanation:

PingAccess installs as a Windows service. To remove or prevent automatic startup, the uninstall- service.bat script is used.
Exact Extract:
"On Windows, use install-service.bat to install PingAccess as a service and uninstall-service.bat to remove the service."
Option A (init.bat) initializes environment variables but does not manage services. Option B (uninstall-service.bat) is correct -- it removes the Windows service, preventing auto-start. Option C (remove-install.bat) is not a valid PingAccess script. Option D (wrapper-service.bat) configures wrapper options, not service removal.


Reference:

PingAccess Installation Guide ­ Windows Service Scripts



A protected web application requires that additional attributes be provided once the user is authenticated.
Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)

  1. Request that the token provider update the ID token with the additional attributes.
  2. Update the Identity Mapping.
  3. Update the Site Authenticator.
  4. Request that the token provider update the access token with the additional attributes.
  5. Update the Web Session.

Answer(s): B,E

Explanation:

When applications require additional attributes:
The Web Session must be configured to retrieve those attributes from the token provider (OIDC or PingFederate).
The Identity Mapping must be updated to forward those attributes to the application (e.g., as headers).
Exact Extract:
"Web sessions define how user attributes are retrieved from the token provider. Identity mappings determine how those attributes are inserted into requests to applications." Option A is not necessarily required; attributes can be retrieved via userinfo endpoint or access token, not only ID tokens.
Option B is correct -- Identity Mappings must be updated to pass attributes to the app. Option C is incorrect -- Site Authenticators define how PingAccess authenticates to apps, not attribute handling.
Option D is incorrect unless the architecture specifically requires access token updates; PingAccess often uses the Web Session to fetch attributes.
Option E is correct -- Web Session must be updated to retrieve additional attributes.


Reference:

PingAccess Administration Guide ­ Web Sessions and Identity Mapping



A modified application now requires additional attributes to be passed in the headers.
What needs to be modified in order to pass the additional attributes?

  1. HTTP Request Header Rule
  2. Header Identity Mapping
  3. JWT Identity Mapping
  4. Web Session Attribute Rule

Answer(s): B

Explanation:

To pass user attributes into HTTP headers for applications, PingAccess uses Identity Mappings.
When attributes need to be passed specifically as headers, the administrator must update the Header Identity Mapping.
Exact Extract:
"Header identity mappings map attributes from a user's web session to HTTP headers that are then sent to the back-end application."
Option A (HTTP Request Header Rule) is incorrect -- this adds or modifies static request headers, not user attributes.
Option B (Header Identity Mapping) is correct -- this maps identity attributes into headers dynamically.
Option C (JWT Identity Mapping) is incorrect -- that's used for passing attributes as claims in JWTs. Option D (Web Session Attribute Rule) is incorrect -- that is for access control evaluation, not propagation of attributes.


Reference:

PingAccess Administration Guide ­ Identity Mapping (Header Identity Mapping)



Viewing Page 2 of 10



Share your comments for Ping Identity PAP-001 exam with other users:

binEY 10/6/2023 5:15:00 AM

good questions
Anonymous


Neha 9/28/2023 1:58:00 PM

its helpful
Anonymous


Desmond 1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.
SINGAPORE


Davidson OZ 9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot
Anonymous


381 9/2/2023 4:31:00 PM

is question 1 correct?
Anonymous


Laurent 10/6/2023 5:09:00 PM

good content
Anonymous


Sniper69 5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.
UNITED STATES


Deepak 12/27/2023 2:37:00 AM

good questions
SINGAPORE


dba 9/23/2023 3:10:00 AM

can we please have the latest exam questions?
Anonymous


Prasad 9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps
HONG KONG


GTI9982 7/31/2023 10:15:00 PM

please i need this dump. thanks
CANADA


Elton Riva 12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.
Anonymous


Berihun Desalegn Wonde 7/13/2023 11:00:00 AM

all questions are more important
Anonymous


gr 7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure
Anonymous


RS 7/27/2023 7:17:00 AM

very very useful page
INDIA


Blessious Phiri 8/12/2023 11:47:00 AM

the exams are giving me an eye opener
Anonymous


AD 10/22/2023 9:08:00 AM

3rd so far, need to cover more
Anonymous


Matt 11/18/2023 2:32:00 AM

aligns with the pecd notes
Anonymous


Sri 10/15/2023 4:38:00 PM

question 4: b securityadmin is the correct answer. https://docs.snowflake.com/en/user-guide/security-access-control-overview#access-control-framework
GERMANY


H.T.M. D 6/25/2023 2:55:00 PM

kindly please share dumps
Anonymous


Satish 11/6/2023 4:27:00 AM

it is very useful, thank you
Anonymous


Chinna 7/30/2023 8:37:00 AM

need safe rte dumps
FRANCE


1234 6/30/2023 3:40:00 AM

can you upload the cis - cpg dumps
Anonymous


Did 1/12/2024 3:01:00 AM

q6 = 1. download odt application 2. create a configuration file (xml) 3. setup.exe /download to download the installation files 4. setup.exe /configure to deploy the application
FRANCE


John 10/12/2023 12:30:00 PM

great material
Anonymous


Dinesh 8/1/2023 2:26:00 PM

could you please upload sap c_arsor_2302 questions? it will be very much helpful.
Anonymous


LBert 6/19/2023 10:23:00 AM

vraag 20c: rsa veilig voor symmtrische cryptografie? antwoord c is toch fout. rsa is voor asymmetrische cryptogafie??
NETHERLANDS


g 12/22/2023 1:51:00 PM

so far good
UNITED STATES


Milos 8/4/2023 9:33:00 AM

question 31 has obviously wrong answers. tls and ssl are used to encrypt data at transit, not at rest.
Serbia And Montenegro


Diksha 9/25/2023 2:32:00 AM

pls provide dump for 1z0-1080-23 planning exams
Anonymous


H 7/17/2023 4:28:00 AM

could you please upload the exam?
Anonymous


Anonymous 9/14/2023 4:47:00 AM

please upload this
UNITED STATES


Naveena 1/13/2024 9:55:00 AM

good material
Anonymous


WildWilly 1/19/2024 10:43:00 AM

lets see if this is good stuff...
Anonymous