Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An authentication method should be selected for a use case based on:

A.

The auth method that best establishes the identity of the client

B.

The cloud provider for which the client is located on

C.

The strongest available cryptographic hash for the use case

D.

Compatibility with the secret engine which is to be used

How many Shamir's key shares are required to unseal a Vault instance?

A.

All key shares

B.

A quorum of key shares

C.

One or more keys

D.

The threshold number of key shares

The following three policies exist in Vault. What do these policies allow an organization to do?

A.

Separates permissions allowed on actions associated with the transit secret engine

B.

Nothing, as the minimum permissions to perform useful tasks are not present

C.

Encrypt, decrypt, and rewrap data using the transit engine all in one policy

D.

Create a transit encryption key for encrypting, decrypting, and rewrapping encrypted data

You are using the Vault userpass auth method mounted at auth/userpass. How do you create a new user named "sally" with password "h0wN0wB4r0wnC0w"? This new user will need the power-users policy.

A.

B.

C.

D.

The vault lease renew command increments the lease time from:

A.

The current time

B.

The end of the lease

An organization wants to authenticate an AWS EC2 virtual machine with Vault to access a dynamic database secret. The only authentication method which they can use in this case is AWS.

A.

True

B.

False

An organization would like to use a scheduler to track & revoke access granted to a job (by Vault) at completion. What auth-associated Vault object should be tracked to enable this behavior?

A.

Token accessor

B.

Token ID

C.

Lease ID

D.

Authentication method