Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Vault-Associate Exam Dumps - HashiCorp Certified: Vault Associate (002)

Go to page:
Question # 9

Which statement describes the results of this command: $ vault secrets enable transit

A.

Enables the transit secrets engine at transit path

B.

Requires a root token to execute the command successfully

C.

Enables the transit secrets engine at secret path

D.

Fails due to missing -path parameter

E.

Fails because the transit secrets engine is enabled by default

Full Access
Question # 10

Which of the following is a machine-oriented Vault authentication backend?

A.

Okta

B.

AppRole

C.

Transit

D.

GitHub

Full Access
Question # 11

You have been tasked with writing a policy that will allow read permissions for all secrets at path secret/bar. The users that are assigned this policy should also be able to list the secrets. What should this policy look like?

A.

B.

C.

D.

Full Access
Question # 12

Which of the following describes usage of an identity group?

A.

Limit the policies that would otherwise apply to an entity in the group

B.

When they want to revoke the credentials for a whole set of entities simultaneously

C.

Audit token usage

D.

Consistently apply the same set of policies to a collection of entities

Full Access
Question # 13

A developer mistakenly committed code that contained AWS S3 credentials into a public repository. You have been tasked with revoking the AWS S3 credential that was in the code. This credential was created using Vault's AWS secrets engine and the developer received the following output when requesting a credential from Vault.

Which Vault command will revoke the lease and remove the credential from AWS?

A.

vault lease revoke aws/creds/s3-access/f3e92392-7d9c-99c8-c921-57Sd62fe89d8

B.

vault lease revoke AKIAI0WQXTLW36DV7IEA

C.

vault lease revoke f3e92392-7d9c-O9c8-c921-575d62fe80d8

D.

vault lease revoke access_key-AKIAI0WQXTLW36DV7IEA

Full Access
Question # 14

A web application uses Vault's transit secrets engine to encrypt data in-transit. If an attacker intercepts the data in transit which of the following statements are true? Choose two correct answers.

A.

You can rotate the encryption key so that the attacker won’t be able to decrypt the data

B.

The keys can be rotated and min_decryption_version moved forward to ensure this data cannot be decrypted

C.

The Vault administrator would need to seal the Vault server immediately

D.

Even if the attacker was able to access the raw data, they would only have encrypted bits (TLS in transit)

Full Access
Question # 15

Use this screenshot to answer the question below:

Where on this page would you click to view a secret located at secret/my-secret?

A.

A

B.

B

C.

C

D.

D

E.

E

Full Access
Question # 16

Which of the following cannot define the maximum time-to-live (TTL) for a token?

A.

By the authentication method t natively provide a method of expiring credentials

B.

By the client system f credentials leaking

C.

By the mount endpoint configurationvery password used

D.

A parent token TTL e password rotation tools and practices

E.

System max TTL

Full Access
Go to page: