An administrator is preparing to rebuild an unrecoverable primary console and must promote the replica admin node. Which two actions must the administrator take? (Choose 2 answers.)
What is the purpose of PingAccess processing rules?
A company has removed the requirement to record back-channel requests from PingAccess to PingFederate in the audit log.
Where should the administrator update this behavior without affecting existing applications?
A change is made to the configuration that prevents user access to an application. No one claims to have made the change. Which log file should the administrator use to determine who made the change?
Which two options can be changed in therun.propertiesfile? (Choose 2 answers.)
Which two variables should be set in order for the PingAccess service script to start? (Choose 2 answers.)
An administrator is integrating a new PingAccess Proxied Application. The application will use an SSL certificate issued by a publicly trusted Certificate Authority. PingAccess is terminating SSL and is responsible for loading the SSL certificate for that application. What initial action must the administrator take in PingAccess in this situation?
An administrator configures PingAccess to use PingFederate as the token provider. Which benefit does this provide?
Users report the following about access to an application:
Inconsistent behavior depending on the browser used
Denied access
Prompt to accept a security exception
Which configuration option should the administrator adjust?
An administrator needs to prevent PingAccess from automatically starting on a Windows Server. Which command would accomplish this task?