Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Your organization has enabled the LDAP auth method on the path of corp-auth/. When you access the Vault UI, you cannot log in despite providing the correct credentials. Based on the screenshot below, what action should you take to log in?

A.

Select corp-auth from the dropdown list

B.

Enter the username as corp-auth/bryan.krausen

C.

Select More Options and enter the Mount path that LDAP was enabled on (corp-auth/)

D.

Change to the Namespace of corp-auth before trying to authenticate

Your organization recently suffered a security breach on a specific application, and the security response team believes that MySQL database credentials were likely obtained during the event. The application generated the credentials using the database secrets engine in Vault mounted at the path database/. How can you quickly revoke all of the secrets generated by this secrets engine?

A.

vault token revoke database/*

B.

vault secrets disable mysql

C.

vault lease renew database/creds/mysql

D.

vault lease revoke -prefix database/

A developer team requests integration of their legacy application with Vault to encrypt and decrypt data for a backend database. They cannot modify the application for Vault authentication. What is the best way to achieve this integration?

A.

Enable the Transit secrets engine and configure the secrets engine to send data directly to the legacy app

B.

Have the app team call the Vault API to encrypt and decrypt the required data

C.

Enable and configure the Kubernetes auth method to allow the application to authenticate to Vault using a JWT

D.

Run the Vault Agent on the application server(s) and use the Auto Auth feature to manage the tokens

Your supervisor has requested that you log into Vault and update a policy for one of the development teams. You successfully authenticated to Vault via OIDC but do not see a way to manage the Vault policies. Why are you unable to manage policies in the Vault UI?

A.

Policies are only available on Vault Enterprise

B.

The Vault node is sealed, and therefore you cannot manage policies

C.

Policies cannot be managed in the UI, only the CLI and API

D.

The policy associated with your login does not permit access to manage policies

All Vault instances, or clusters, include two built-in policies that are created automatically. Choose the two policies below and the correct information regarding each policy. (Select two)

A.

The root policy is created automatically. This policy provides superuser privileges and cannot be deleted

B.

The admin policy is created automatically. It provides administrative permissions but can be deleted if needed

C.

The default policy is created automatically. This policy can be modified but not deleted

D.

The default policy is created automatically. This policy cannot be modified but it can be deleted

Your organization runs workloads on both AWS and Azure for production applications. The security team has requested that a single Vault authentication mechanism be enabled to support applications on both public cloud platforms. Which of the following would be a valid auth method you can use?

A.

AWS

B.

GitHub

C.

AppRole

D.

Azure

Why are short-lived, dynamic secrets in Vault more secure than long-lived, static credentials?

A.

They provide better performance by caching credentials for longer durations

B.

They are created on-demand and expire after a short period, minimizing the risk of credential leakage

C.

They eliminate the need for authentication, allowing seamless access to Vault-managed systems

D.

They automatically rotate on a set schedule, reducing the need for manual intervention

You are configuring your application to retrieve a new PKI certificate upon provisioning. The Vault admins have given you an AppRole role-id and secret-id to inject into the CI/CD pipeline job that provisions your app. The application uses the credentials to successfully authenticate to Vault using the API. Which of the following is true about the step next required after authenticating to Vault?

A.

The client token needs to be retrieved from the API response before requesting the new PKI certificate

B.

The initial API response should include the new PKI certificate and no further action is required

C.

The app still needs to use the role-id and secret-id to request the new PKI certificate via API

D.

Now that the app is authenticated, it can simply make another API request for the PKI certificate

What are orphan tokens?

A.

Orphan tokens are tokens with a use limit so you can set the number of uses when you createthem

B.

Orphan tokens are not children of their parent; therefore, orphan tokens do not expire when their parent does

C.

Orphan tokens are tokens with no policies attached

D.

Orphan tokens do not expire when their own max TTL is reached

Which of the following statements describe the CLI command below?

S vault login -method-1dap username-mitche11h

A.

Generates a token which is response wrapped

B.

You will be prompted to enter the password

C.

By default the generated token is valid for 24 hours

D.

Fails because the password is not provided