Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

True or False? Once you authenticate to Vault using the API, subsequent requests will automatically be permitted without further interaction.

A.

True

B.

False

A security architect is designing a solution to address the "Secret Zero" problem for a Kubernetes-based application that needs to authenticate to HashiCorp Vault. Which approach correctly leverages Vault features to solve this challenge?

A.

Store the Vault root token in a ConfigMap and mount it to all containers that require access to sensitive information

B.

Generate a long-lived token during deployment and store it as an environment variable within each container that needs to access Vault

C.

Configure the Kubernetes auth method in Vault and enable applications to authenticate without pre-shared secrets

D.

Implement a custom sidecar container that uses AppRole role-id and secret-id each time the application needs to access Vault

Your organization is integrating its legacy application with Vault to improve its security. However, you have discovered that the application has issues when the token changes for authentication during testing. What type of token could be used to help alleviate this issue without compromising security?

A.

Periodic Service Token

B.

Root Token

C.

Orphan Service Token

D.

Batch Token

You have logged into the Vault UI and see this screen. What Vault component is being enabled in the screenshot below?

A.

Storage Backends

B.

Secrets Engine

C.

Auth Methods

D.

Audit Devices

You need to write a new policy for Vault for a group of users on the automation team. The requirements stipulate that each user (and all future users) get access to their own private section of a KV secrets engine at the path kv/team/ and be able to manage their own secrets. Which policy below meets these requirements while minimizing the administrative effort and following the principle of least privilege?

A.

path "secret/data/groups/{{identity.groups.ids.2f62-9503-42aa7A869741.name}}/" { capabilities = ["list"] }

B.

path "kv/team/frank/" { capabilities = ["create", "update", "read", "delete"] } path "kv/team/steve/" { capabilities = ["create", "update", "read", "delete"] } path "kv/team/bryan/" { capabilities = ["create", "update", "read", "delete"] }

C.

path "kv/team/" { capabilities = ["create", "update", "read", "delete"] }

D.

path "kv/team/{{identity.entity.id}}/" { capabilities = ["create", "update", "read", "delete"] } path "kv/team/{{identity.entity.id}}" { capabilities = ["create", "update", "read", "delete"] }

Before data is written to the storage backend, the data is encrypted by which Vault feature?

A.

TLS certificate

B.

Cryptographic barrier

C.

Unseal keys

D.

Transit secrets engine

You are working on a new project and need to retrieve a secret from Vault. You log into the Vault UI and browse to the path where the secret is stored. Based on the screenshot below, what is true about the secrets stored in this path? (Select four)

A.

The secrets are stored in a KV v1 secrets engine

B.

The user does not have permission to delete the secret

C.

The secrets are stored in a KV v2 secrets engine

D.

The secrets engine is mounted at the path developers/

E.

There are four previous versions of the secret

F.

The user has additional permissions on the path beyond just list and read

You are planning the deployment of your first Vault cluster and have decided to use Integrated Storage as the storage backend. Where do you configure the storage backend to be used by Vault?

A.

In the systemd service file

B.

Inside the Vault service once Vault is up and running

C.

In the Vault configuration file

D.

In the Vault Agent sink file

Your co-worker has asked you to perform certain operations in Vault and has provided you with a token accessor (not the token itself). What Vault operations would you be allowed to perform using only the provided accessor? (Select three)

A.

Renew the token to extend the TTL

B.

Revoke the token in Vault to make it invalid

C.

Create child tokens associated with the same policies as the related token

D.

Lookup properties of the token, such as the TTL, policies, and metadata

How does the instance updates feature work when using the Vault Secrets Operator?

A.

By monitoring the Vault audit logs to watch for changes to the target path

B.

By constantly validating the current secret stored in Vault

C.

By continuously launching an init container to check for updates

D.

By subscribing to event notifications from Vault