Pass the CyberArk CyberArk Secrets Manager SECRET-SEN Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

In which example will auto-failover occur?

Question # 1

A)

Question # 1

B)

Question # 1

C)

Question # 1

D)

Question # 1

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 2:

You modified a Conjur host policy to change its annotations for authentication.

How should you load the policy to make those changes?

Options:

A.

Use the default “append” method (e.g. conjur policy load ).


B.

Use the “replace” method (e.g. conjur policy load – –replace ).


C.

Use the “delete” method (e.g. conjur policy load – –delete ).


D.

Use the “update” method (e.g. conjur policy load – –update ).


Expert Solution
Questions # 3:

Where can all the self-signed/imported certificates be found in Conjur?

Options:

A.

/opt/conjur/etc/ssl from the Conjur containers


B.

/opt/conjur/certificates from the Conjur containers


C.

/opt/cyberark/dap/certs from the Conjur containers


D.

Log in to the Conjur UI > Conjur Cluster > Certificates > view.


Expert Solution
Questions # 4:

Which API endpoint can be used to discover secrets inside of Conjur?

Options:

A.

Resources


B.

Roles


C.

Policies


D.

WhoAmi


Expert Solution
Questions # 5:

You want to allow retrieval of a secret with the CCP. The safe and the required secrets already exist.

Assuming the CCP is installed, arrange the steps in the correct sequence.

Question # 5


Expert Solution
Questions # 6:

You are diagnosing this log entry:

From Conjur logs:

Question # 6

Given these errors, which problem is causing the breakdown?

Options:

A.

The Jenkins certificate chain is not trusted by Conjur.


B.

The Conjur certificate chain is not trusted by Jenkins.


C.

The JWT sent by Jenkins does not match the Conjur host annotations.


D.

The Jenkins certificate is malformed and will not be trusted by Conjur.


Expert Solution
Questions # 7:

When an application is retrieving a credential from Conjur, the application authenticates to Follower A. Follower B receives the next request to retrieve the credential.

What happens next?

Options:

A.

The Coniur Token is stateless and Follower B is able to validate the Token and satisfy the request.


B.

The Coniur Token is stateful and Follower B is unable to validate the Token promptinq the application to re-authenticate.


C.

The Coryur Token is stateless and Follower B redirects the request to Follower A to satisfy the request.


D.

The Coniur Token is stateful and Follower B redirects the request to Follower A to satisfy the request.


Expert Solution
Questions # 8:

Arrange the steps to configure authenticators in the correct the sequence.

Question # 8


Expert Solution
Questions # 9:

You have a PowerShell script that is being used on 1000 workstations. It requires a Windows Domain credential that is currently hard coded in the script.

What is the simplest solution to remove that credential from the Script?

Options:

A.

Modify the script to use the CLI SDK to fetch the secret at runtime using Credential Providers installed on each workstation.


B.

Modify the script to make a SOAP call to retrieve the secret from the Central Credential Provider.


C.

Modify the script to run on WebSphere using the Application Server Credential Provider to retrieve the secret.


D.

Use Conjur Summon to invoke the script and inject the secret at run time.


Expert Solution
Questions # 10:

What is a possible Conjur node role change?

Options:

A.

A Standby may be promoted to a Leader.


B.

A Follower may be promoted to a Leader.


C.

A Standby may be promoted to a Follower.


D.

A Leader may be demoted to a Standby in the event of a failover.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions