New Year Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

PT-AM-CPE Certified Professional - PingAM Exam Questions and Answers

Questions 4

Examining the following JSON object, what is a valid value for the type part (shown in bold font) of the claim value in a PingAM implementation?

JSON

JSON

"act": {

"sub": "(type!subject)"

}

Options:

A.

agent

B.

usr

C.

uid

D.

user

Buy Now
Questions 5

Which type of logs are written by PingAM?

Options:

A.

Debug logs and Java logs

B.

Audit logs and Java logs

C.

Debug logs and audit logs

D.

Java logs, debug logs, and audit logs

Buy Now
Questions 6

An administrator has a requirement to reconfigure the attribute used to search for users in a LDAP Data Store. What Data Store configuration attribute would they need to change?

Options:

A.

LDAP Users Search Attribute

B.

LDAP Users Index Attribute

C.

LDAP Users Bind Attribute

D.

LDAP Users Find Attribute

Buy Now
Questions 7

Which multi-factor authentication methods require a separate device and an application?

Options:

A.

Push, WebAuthn

B.

Push, WebAuthn, Open Authentication

C.

WebAuthn, Open Authentication

D.

Open Authentication, Push

Buy Now
Questions 8

Which area of PingAM does affinity mode relate to?

Options:

A.

Authentication

B.

Load balancing

C.

Self-service

D.

Authorization

Buy Now
Questions 9

Which of the following components is used to return data to PingGateway or the agent to be included with the policy decision?

Options:

A.

Subjects

B.

Resources

C.

Response attributes

D.

Actions

Buy Now
Questions 10

Consider the following LDAP connection string:

DS1.example.com:389|01, DS2.example.com:389|01, DS2.example.com:389|02, DS1.example.com:389|02

This connection string can be used in:

Options:

A.

Identity Store

B.

Core Token Service

C.

Configuration Data Store

Which of the above options are correct?

D.

Only A is correct

E.

Only B is correct

F.

Only C is correct

G.

A, B, and C are correct

Buy Now
Questions 11

Examine the following JWT client assertion in JSON format. From the subset of claims listed below, which claim can be optional?

JSON

JSON

{

"iss": "myClient",

"sub": "myClient",

"aud": "https://am.example.com/login/oauth2/access_token",

"jti": "id012345",

"exp": 1633363568,

"iat": 1633356368

}

Options:

A.

jti

B.

aud

C.

iss

D.

sub

Buy Now
Questions 12

Which OAuth2 flow is most appropriate to support the use case of a client application implemented in a browser using a scripted language such as JavaScript?

Options:

A.

Authorization code grant flow with PKCE

B.

Implicit grant flow

C.

Resource owner grant flow

D.

Client credentials grant flow

Buy Now
Questions 13

Which of the following steps must be configured in PingAM to implement mutual TLS using the public key infrastructure (PKI) approach?

    Import the trusted certificates into the trust store used by the PingAM web container.

    Create a secret store in the realm that maps the appropriate secret ID with the certificate alias in the trust store.18

    Select tls_client_auth as the authentication method in the client profile.

    Select self_signed_tls_client_auth as the authentication method in the client profile.19

    Provide the certificate subject distinguished name in the client profile.20

    Configure a revocation check in the client profile.

    Register the X.509 certificate in the client profile.

Options:

A.

1, 2, 4, and 7 only

B.

1, 2, 4, and 6 only

C.

1, 2, 3, and 5 only

D.

1, 2, 4, and 5 only

Buy Now
Questions 14

When the OATH Registration node's OATH Algorithm property is set to TOTP in an authentication tree, which node needs to have the same value set?

Options:

A.

OATH Token Verifier node

B.

Recovery Code Collector Decision node11

C.

MFA Registration Options node12

D.

OATH Device Storage node13

Buy Now
Questions 15

If there is a need to reset a registered device over the REST API, which one of the following statements is incorrect?

Options:

A.

Administrators can provide authenticated users with a self-service page to reset their devices via the REST API

B.

Administrators can call the REST API to reset a device that is out of sync, where the HOTP counter exceeds the HOTP threshold window and requires a reset

C.

Only administrator accounts, not user accounts, have the ability to use the REST API for resetting a device profile

D.

Administrators can call the REST API to reset a user's device profile

Buy Now
Questions 16

An OpenID Connect application makes a request for an ID token with the openid and profile scope. Which set of claim attributes are available with the profile scope?

Options:

A.

givenName, familyName, preferredLocale, name

B.

givenname, family_name, locale, name

C.

given_name, family_name, locale, name

D.

given_name, family_name, preferred_locale, name

Buy Now
Questions 17

Which of the following options represents best practice for an implementation that configures an ID token in a subject condition for policies validating the token's claims?

Options:

A.

Policy evaluation only validates the claims, not the ID token. The ID token should be validated after making the policy evaluation request

B.

Policy evaluation only validates the claims, not the ID token. There is no need to validate the ID token that was obtained before the policy is evaluated

C.

Policy evaluation only validates the claims, not the ID token. The ID token should be validated before making the policy evaluation request

D.

Policy evaluation validates the claims and the ID token. There is no need to validate the ID token before the policy is evaluated

Buy Now
Questions 18

In a default PingAM configuration, what type of keystore stores the secret ID named storepass, which contains the encrypted password of the default-keystore secret store?

Options:

A.

Keystore secret store

B.

Environment and system property secret store

C.

Filesystem secret store

D.

Hardware Security Module secret store

Buy Now
Questions 19

What does the acronym SAML stand for?

Options:

A.

Scoped Assertion Markup Language

B.

Secure Assertion Markup Language

C.

Security Assertion Markup Language

D.

Strong Assertion Markup Language

Buy Now
Questions 20

Which is the correct simplified TLS handshake sequence needed to authenticate clients using a mutual TLS exchange?

Options:

A.

1. Client sends a request to a server to establish a secure connection

2. The server requests the client certificate

3. The client sends its certificate and the session key to the server

4. The server sends its certificate to the client if the client certificate and key are valid

5. The mutually secure connection is established and the client is authenticated

B.

1. Client sends a request to a server to establish a secure connection

2. The client sends its certificate to the server

3. The server presents its certificate in a response to the client

4. The client sends its session key to the server

5. The mutually secure connection is established and the client is authenticated

C.

1. Client sends a certificate in the request to a server to establish a secure connection

2. The client sends its session key to the server

3. The server presents its certificate in a response to the client

4. The mutually secure connection is established and the client is authenticated

D.

1. Client sends a request to a server to establish a secure connection

2. The server presents its certificate in a response to the client

3. The client sends its certificate to the server

4. The mutually secure connection is established and the client is authenticated

Buy Now
Questions 21

In the OAuth2 Device Flow, which of the following HTTP codes is returned if a user has not yet authorized a client device?

Options:

A.

HTTP 403

B.

HTTP 400

C.

HTTP 401

D.

HTTP 302

Buy Now
Questions 22

Which statements are correct about push notification authentication implemented with PingAM?

Options:

A.

The user must have a device with a camera and install the Authenticator app.

B.

The registration and authentication steps must be part of the same authentication tree.

C.

To register a device the user scans a barcode with the Authenticator installed on their device.1

D.

During subsequent authentication processes, PingAM instructs the push server to send a notification to the registered device, and waits for the user to use the Authenticator app to approve the request.2

Options:

E.

A, B, and C only

F.

B, C, and D only

G.

A and D only

Buy Now
Questions 23

If the session cookie is configured as a domain based cookie for the am.example.com domain, in which of the following domains is the cookie visible?

Options:

A.

example.com

B.

am.example.com

C.

sub.am.example.com

D.

login.am.example.com

E.

B only

F.

A and B

G.

B and C

Buy Now
Questions 24

Which feature of PingAM protects against cookie hijacking in a cross-domain single sign-on environment?

Options:

A.

Random tokens

B.

Bound tokens

C.

Lockout tokens

D.

Restricted tokens1

Buy Now
Questions 25

Which of the following multi-factor authentication protocols are supported by PingAM?

A) Open authentication

B) Security questions

C) Web authentication

D) Universal 2nd factor authentication

E) Push authentication

Options:

A.

B, C, and D

B.

A, B, and E

C.

A, C, and E

D.

A, B, and C

Buy Now
Questions 26

What is the purpose of the SAML2 account mapper on the service provider (SP) side?

Options:

A.

Maps multiple identity provider assertions together

B.

Maps multiple SP user accounts together

C.

Maps local user attributes to remote users' attributes

D.

Maps remote users to local user profiles

Buy Now
Questions 27

Which audit event handler is used by PingAM by default, when audit logging is enabled?

Options:

A.

Elasticsearch audit event handler

B.

CSV audit event handler

C.

Syslog audit event handler

D.

JSON audit event handler

Buy Now
Questions 28

What scope is required to be included in a client's request if you wish to utilize the OpenID Connect capabilities of PingAM's OAuth2 implementation?

Options:

A.

profile

B.

openid+connect

C.

openid

D.

id

Buy Now
Questions 29

Which authentication node can you use in PingAM to add a key:value property to the user's session after successful authentication?

Options:

A.

The Get Session Data node

B.

You have to use a webhook, not a node

C.

The Provision Dynamic Account node

D.

The Set Session Properties node

Buy Now
Questions 30

If PingAM is deployed in Apache Tomcat under /openam, what file system backups should be taken when PingAM needs to be upgraded?

Options:

A.

Back up /path/to/tomcat/webapps/openam/ only

B.

No explicit backups are required for PingAM as this is done automatically

C.

Back up /path/to/tomcat/webapps/openam/, /openam/ and /.openamcfg/

D.

Execute the PingAM backup script in /path/to/tomcat/webapps/openam/

Buy Now
Exam Code: PT-AM-CPE
Exam Name: Certified Professional - PingAM Exam
Last Update: Jan 17, 2026
Questions: 100

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now PT-AM-CPE testing engine

PDF (Q&A)

$31.5  $104.99
buy now PT-AM-CPE pdf
dumpsmate guaranteed to pass

24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 18 Jan 2026