Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

When unsealing Vault, each Shamir unseal key should be entered:

A.

Sequentially from one system that all of the administrators are in front of

B.

By different administrators each connecting from different computers

C.

While encrypted with each administrators PGP key

D.

At the command line in one single command

When using Integrated Storage, which of the following should you do to recover from possible data loss?

A.

Failover to a standby node

B.

Use snapshot

C.

Use audit logs

D.

Use server logs

To give a role the ability to display or output all of the end points under the /secrets/apps/* end point it would need to have which capability set?

A.

update

B.

read

C.

sudo

D.

list

E.

None of the above

The key/value v2 secrets engine is enabled at secret/ See the following policy:

Which of the following operations are permitted by this policy? Choose two correct answers.

A.

vault kv get secret/webapp1

B.

vault kv put secret/webapp1 apikey-"ABCDEFGHI] K123M"

C.

vault kv metadata get secret/webapp1

D.

vault kv delete secret/super-secret

E.

vault kv list secret/super-secret

To make an authenticated request via the Vault HTTP API, which header would you use?

A.

The X-Vault-Token HTTP Header

B.

The x-Vault-Request HTTP Header

C.

The Content-Type HTTP Header

D.

The X-Vault-Namespace HTTP Header

A web application uses Vault's transit secrets engine to encrypt data in-transit. If an attacker intercepts the data in transit which of the following statements are true? Choose two correct answers.

A.

You can rotate the encryption key so that the attacker won’t be able to decrypt the data

B.

The keys can be rotated and min_decryption_version moved forward to ensure this data cannot be decrypted

C.

The Vault administrator would need to seal the Vault server immediately

D.

Even if the attacker was able to access the raw data, they would only have encrypted bits (TLS in transit)

Your DevOps team would like to provision VMs in GCP via a CICD pipeline. They would like to integrate Vault to protect the credentials used by the tool. Which secrets engine would you recommend?

A.

Google Cloud Secrets Engine

B.

Identity secrets engine

C.

Key/Value secrets engine version 2

D.

SSH secrets engine

As a best practice, the root token should be stored in which of the following ways?

A.

Should be revoked and never stored after initial setup

B.

Should be stored in configuration automation tooling

C.

Should be stored in another password safe

D.

Should be stored in Vault

A user issues the following cURL command to encrypt data using the transit engine and the Vault AP:

Which payload.json file has the correct contents?

A.

B.

C.

D.

Which of these are a benefit of using the Vault Agent?

A.

Vault Agent allows for centralized configuration of application secrets engines

B.

Vault Agent will auto-discover which authentication mechanism to use

C.

Vault Agent will enforce minimum levels of encryption an application can use

D.

Vault Agent will manage the lifecycle of cached tokens and leases automatically