Q: 1
After a client has authenticated to Vault, what security feature is used to make all subsequent calls?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
What are the primary benefits of running Vault in a production deployment over dev server mode
(select two)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Which of the following are benefits of using the Vault Secrets Operator (VSO)? (Select three)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Based on the following output, what command can Steve use to determine if the KV store is
configured for versioning?
text
CollapseWrapCopy
$ vault secrets list
Path
Type
Accessor
Description
----
----
--------
-----------
automation/
kv
kv_56f991b9
Automation team for CI/CD
cloud/
kv
kv_4426c541
Cloud team for static secrets
cubbyhole/
cubbyhole
cubbyhole_9bd538e
per-token priv secret storage
data_team/
kv
kv_96d57692
Data warehouse KV for certs
identity/
identity
identity_0042595e
identity store
network/
kv
kv_3e53aaab
Network team secret storage
secret/
kv
kv_d66e2adc
key/value secret storage
sys/
system
system_d6f218a9
system endpoints
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which two interfaces automatically assume the token for subsequent requests after successfully
authenticating? (Select two)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Which statement most accurately describes how the response wrapping feature functions in Vault?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
From the options below, select the benefits of using a batch token over a service token (select four).
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
An application is trying to use a dynamic secret in which the lease has expired. What can be done in
order for the application to successfully request data from Vault?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which scenario most strongly indicates a need to run a self-hosted Vault cluster instead of using HCP
Vault Dedicated?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2