Where can you set the Vault seal configuration? (Choose two.)
Answer : CD
Which of the following vault lease operations uses a lease_id as an argument? (Choose two.)
Answer : AE
An organization wants to authenticate an AWS EC2 virtual machine with Vault to access a dynamic database secret. The only authentication method which they can use in this case is AWS.
Answer : B
You are using Vault’s Transit secrets engine to encrypt your data. You want to reduce the amount of content encrypted with a single key in case the key gets compromised. How would you do this?
Answer : D
What does the following policy do?
Answer : A
To make an authenticated request via the Vault HTTP API, which header would you use?
Answer : A
Which of the following are replication methods available in Vault Enterprise? (Choose two.)
Answer : CD
Use this screenshot to answer the question below:
When are you shown these options in the GUI?
Answer : C
Examine the command below. Output has been trimmed.
Which of the following statements describe the command and its output?
Answer : D
The key/value v2 secrets engine is enabled at secret/. See the following policy:
Which of the following operations are permitted by this policy? (Choose two.)
Answer : AB
You are performing a high number of authentications in a short amount of time. You're experiencing slow throughput for token generation. How would you solve this problem?
Answer : B
When looking at Vault token details, which key helps you find the paths the token is able to access?
Answer : C
A developer mistakenly committed code that contained AWS S3 credentials into a public repository. You have been tasked with revoking the AWS S3 credential that was in the code. This credential was created using Vault’s AWS secrets engine and the developer received the following output when requesting a credential from Vault.
Which Vault command will revoke the lease and remove the credential from AWS?
Answer : A
When an auth method is disabled, all users authenticated via that method lose access.
Answer : A
An authentication method should be selected for a use case based on:
Answer : A
Have any questions or issues ? Please dont hesitate to contact us