An administrator must protect an application on multiple domains or hosts. What should the administrator configure to complete this action?
An administrator is setting up a new PingAccess cluster with the following:
• Administrative node hostname: pa-admin.company.com
• Replica administrative node hostname: pa-admin2.company.com
Which two options in the certificate would be valid for the administrative node key pair? (Choose 2.)
A protected web application requires that additional attributes be provided once the user is authenticated. Which two steps must the administrator perform to meet this requirement? (Choose 2 answers.)