Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which API endpoint can be used to discover secrets inside of Conjur?

A.

Resources

B.

Roles

C.

Policies

D.

WhoAmi

After manually failing over to your disaster recovery site (Site B) for testing purposes, you need to failback to your primary site (Site A).

Which step is required?

A.

Contact CyberArk for a new license file.

B.

Reconfigure the Vault Conjur Synchronizer to point to the new Conjur Leader.

C.

Generate a seed for the new Leader to be deployed in Site A.

D.

Trigger autofailover to promote the Standby in Site A to Leader.

When attempting to retrieve a credential, you receive an error 401 – Malformed Authorization Token.

What is the cause of the issue?

A.

The token is not correctly encoded.

B.

The token you are trying to retrieve does not exist.

C.

The host does not have access to the credential with the current token.

D.

The credential has not been initialized.

Findings were obtained after cataloging pending Secrets Manager use cases.

Arrange the findings in the correct order for prioritization.

While installing the first CP in an environment, errors that occurred when the environment was created are displayed; however, the installation procedure continued and finished successfully.

What should you do?

A.

Continue configuring the application to use the CP. No further action is needed since the successful installation makes the error message benign.

B.

Review the lag file 'CreateEnv.loq' and investigate any error messages it contains.

C.

Run setup.exe again and select 'Recreate Vault Environment'. Provide the details of a user with more privileges when prompted by the installer.

D.

Review the PV WA lags to determine which REST API call used during the installation failed.

When installing the CCP and configuring it for use behind a load balancer, which authentication methods may be affected? (Choose two.)

A.

Allowed Machines authentication

B.

[Client Certificate authentication

C.

OS User

D.

Path

E.

Hash

Match each use case to the appropriate Secrets Manager Solution.

Which statement is true for the Conjur Command Line Interface (CLI)?

A.

It is supported on Windows, Red Hat Enterprise Linux, and macOS.

B.

It can only be run from the Conjur Leader node.

C.

It is required for working with the Conjur REST API.

D.

It does not implement the Conjur REST API for managing Conjur resources.

Match each scenario to the appropriate Secrets Manager solution.

What is the correct command to import the root CA certificate into Conjur?

A.

docker exec evoke ca import – –no-restart – –root

B.

docker exec evoke import – –no-restart – –root

C.

docker exec evoke ca import – –no-restart

D.

docker exec ca import