Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following Vault features is available only in the Enterprise version? (select three)

A.

MFA

B.

dynamic credentials

C.

cloud auto unseal

D.

replication

E.

auto unseal with HSM

When using parent/child modules to deploy infrastructure, how would you export value from one module to import into another module?

For example, a module dynamically deploys an application instance or virtual machine, and you need the IP address in another module to configure a related DNS record in order to reach the newly deployed application.

A.

configure an output value in the application module in order to use that value for the DNS module

B.

preconfigure the IP address as a parameter in the DNS module

C.

configure the pertinent provider's configuration with a list of possible IP addresses to use

D.

export the value using terraform export and input the value using terraform input

Which is not a benefit of running HashiCorp Vault in your environment?

A.

Integrate with your code repository to pull secrets when deploying your applications

B.

Consolidate static, long-lived passwords used throughout your organization

C.

Act as root or intermediate certificate authority to automate the generation of PKI certificates

D.

The ability to generate dynamic secrets for applications and resource access

True or False:

Multiple providers can be declared within a single Terraform configuration file.

A.

False

B.

True

You've set up multiple Vault clusters, one on-premises which is intended to be the primary cluster, and the second cluster in AWS, which was deployed to be used for performance replication. After enabling replication, developers complain that all the data they've stored in the AWS Vault cluster is missing. What happened?

A.

the data was moved to a recovery path after replication was enabled. Use the vault secrets move command to move the data back to its intended location

B.

there is a certificate mismatch after replication was enabled since Vault replication generates its own TLS certificates to ensure nodes are trusted entities

C.

the data was automatically copied to the primary cluster after replication was enabled since all writes are always forwarded to the primary cluster

D.

all of the data on the secondary cluster was deleted after replication was enabled

Environment variables can be used to set variables. The environment variables must be in the format "____"_. Select the correct prefix string from the following list.

A.

TF_VAR

B.

TF_VAR_NAME

C.

TF_ENV

D.

TF_ENV_VAR

Which of the following commands will remove all secrets at a specific path?

A.

vault lease revoke -prefix

B.

vault delete lease -all

C.

vault lease revoke -all

D.

vault revoke -all

After a client has authenticated, what security feature is used to make subsequent calls?

A.

key shard

B.

ldap

C.

pgp

D.

token

E.

listener

F.

path

In regards to the transit secrets engine, which of the following is true given the following command and output: (select three)

1. $ vault write encryption/encrypt/creditcard plaintext=$(base64 <<< "1234 5678 9101 1121")

2. Key Value

3. --- -----

4. ciphertext vault:v3:cZNHVx+sxdMErXRSuDa1q/pz49fXTn1PScKfhf+PIZPvy8xKfkytpwKcbC0fF2U=

A.

there are at least three data keys associated with this keyring

B.

the name of the keyring used to encrypt the data is creditcard

C.

the data was written to the encryption path, which is provided by default when enabling the transit secrets engine

D.

the transit secrets engine is mounted at the encryption path

In a Consul cluster, participating nodes can be only one of two types. Select the valid types. (select two)

A.

follower

B.

secondary

C.

active

D.

primary

E.

leader

F.

passive