Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A customer wants to minimize the Kubernetes application code developers must change to adopt Conjur for secrets access.

Which solutions can meet this requirement? (Choose two.)

A.

CPM Push-to-File

B.

Secrets Provider

C.

authn-Azure

D.

Secretless

E.

Application Server Credential Provider

Refer to the exhibit.

How can you confirm that the Follower has a current copy of the database?

A.

Compare the pgcurrentxlog_locationlocation from the Leader to the Follower you need to validate against.

B.

Count the number of components in pgstartreplication and compare this to the total number of Followers in the deployment.

C.

Validate that the Follower container ID matches the node in the info endpoint on the Leader.

D.

Retrieve the credential from a test application on the Leader cluster; then retrieve against the Follower and compare if they are accurate.

What is a possible Conjur node role change?

A.

A Standby may be promoted to a Leader.

B.

A Follower may be promoted to a Leader.

C.

A Standby may be promoted to a Follower.

D.

A Leader may be demoted to a Standby in the event of a failover.

You are setting up the Secrets Provider for Kubernetes to support rotation with Push-to-File mode.

Which deployment option should be used?

A.

Init container

B.

Application container

C.

Sidecar

D.

Service Broker

An application owner reports that their application is suddenly receiving an incorrect password. CPM logs show the password was recently changed, but the value currently being retrieved by the application is a different value. The Vault Conjur Synchronizer service is running.

What is the most likely cause of this issue?

A.

The Vault Conjur Synchronizer is not configured with the DR Vault IP address and there has been a failover event.

B.

Dual Accounts are in use, but after the CPM changed the password for the Inactive account, it accidentally updated the password for the Active account instead.

C.

The CPM is writing password changes to the Primary Vault while the Vault Conjur Synchronizer is configured to replicate from the DR Vault.

D.

The application has been configured to retrieve the wrong password.

Arrange the steps to configure authenticators in the correct the sequence.

When working with Summon, what is the purpose of the secrets.yml file?

A.

It is where Summon outputs the secret value after retrieval.

B.

It is where you define which secrets to retrieve.

C.

It is where you store the Conjur URL and host API key.

D.

It is the log file for Summon.

When working with Credential Providers in a Privileged Cloud setting, what is a special consideration?

A.

If there are installation issues, troubleshooting may need to involve the Privileged Cloud support team.

B.

Credential Providers are not supported in a Privileged Cloud setting.

C.

The AWS Cloud account number must be defined in the file main appprovider.conf. . found in the AppProviderConf Safe.

D.

Debug logging for Credential Providers deployed in a Privileged Cloud setting can inadvertently exhaust available disk space.