Hahicorp HCVA0 003
Q: 1
After a client has authenticated to Vault, what security feature is used to make all subsequent calls?
Options
Q: 2
What are the primary benefits of running Vault in a production deployment over dev server mode
(select two)?
Options
Q: 3
Which of the following are benefits of using the Vault Secrets Operator (VSO)? (Select three)
Options
Q: 4
Based on the following output, what command can Steve use to determine if the KV store is
configured for versioning?
text
CollapseWrapCopy
$ vault secrets list
Path
Type
Accessor
Description
----
----
--------
-----------
automation/
kv
kv_56f991b9
Automation team for CI/CD
cloud/
kv
kv_4426c541
Cloud team for static secrets
cubbyhole/
cubbyhole
cubbyhole_9bd538e
per-token priv secret storage
data_team/
kv
kv_96d57692
Data warehouse KV for certs
identity/
identity
identity_0042595e
identity store
network/
kv
kv_3e53aaab
Network team secret storage
secret/
kv
kv_d66e2adc
key/value secret storage
sys/
system
system_d6f218a9
system endpoints
Options
Q: 5
Which two interfaces automatically assume the token for subsequent requests after successfully
authenticating? (Select two)
Options
Q: 6
Which statement most accurately describes how the response wrapping feature functions in Vault?
Options
Q: 7
From the options below, select the benefits of using a batch token over a service token (select four).
Options
Q: 8
An application is trying to use a dynamic secret in which the lease has expired. What can be done in
order for the application to successfully request data from Vault?
Options
Q: 9
Which scenario most strongly indicates a need to run a self-hosted Vault cluster instead of using HCP
Vault Dedicated?
Options
Q: 10
You need to write a Vault operator policy and give the users access to perform administrative actions
in Vault. What path is used for Vault backend functions?
Options
Question 1 of 10