Pass the HashiCorp HashiCorp Security Automation Certification HCVA0-003 Questions and answers with CertsForce

Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions
Questions # 51:

After issuing the command to delete a secret, you run a vault kv list command, but the path to the secret still seems to exist. What command would permanently delete the path from Vault?

Question # 51

Options:

A.

vault kv delete -force kv/applications/app01


B.

vault kv destroy -versions=1 kv/applications/app01


C.

vault kv metadata delete kv/applications/app01


D.

vault kv delete -all kv/applications/app01


Expert Solution
Questions # 52:

Your co-worker has asked you to perform certain operations in Vault and has provided you with a token accessor (not the token itself). What Vault operations would you be allowed to perform using only the provided accessor? (Select three)

Options:

A.

Renew the token to extend the TTL


B.

Revoke the token in Vault to make it invalid


C.

Create child tokens associated with the same policies as the related token


D.

Lookup properties of the token, such as the TTL, policies, and metadata


Expert Solution
Questions # 53:

By default, what methods of authentication does Vault support? (Select four)

Options:

A.

SSH


B.

Kubernetes


C.

VMware


D.

LDAP


E.

AppRole


F.

JWT


Expert Solution
Questions # 54:

How does the instance updates feature work when using the Vault Secrets Operator?

Options:

A.

By monitoring the Vault audit logs to watch for changes to the target path


B.

By constantly validating the current secret stored in Vault


C.

By continuously launching an init container to check for updates


D.

By subscribing to event notifications from Vault


Expert Solution
Questions # 55:

You are planning the deployment of your first Vault cluster and have decided to use Integrated Storage as the storage backend. Where do you configure the storage backend to be used by Vault?

Options:

A.

In the systemd service file


B.

Inside the Vault service once Vault is up and running


C.

In the Vault configuration file


D.

In the Vault Agent sink file


Expert Solution
Questions # 56:

You need to write a new policy for Vault for a group of users on the automation team. The requirements stipulate that each user (and all future users) get access to their own private section of a KV secrets engine at the path kv/team/ and be able to manage their own secrets. Which policy below meets these requirements while minimizing the administrative effort and following the principle of least privilege?

Options:

A.

path "secret/data/groups/{{identity.groups.ids.2f62-9503-42aa7A869741.name}}/" { capabilities = ["list"] }


B.

path "kv/team/frank/" { capabilities = ["create", "update", "read", "delete"] } path "kv/team/steve/" { capabilities = ["create", "update", "read", "delete"] } path "kv/team/bryan/" { capabilities = ["create", "update", "read", "delete"] }


C.

path "kv/team/" { capabilities = ["create", "update", "read", "delete"] }


D.

path "kv/team/{{identity.entity.id}}/" { capabilities = ["create", "update", "read", "delete"] } path "kv/team/{{identity.entity.id}}" { capabilities = ["create", "update", "read", "delete"] }


Expert Solution
Questions # 57:

Your organization uses a CI/CD pipeline to deploy its applications on Azure. During testing, you generate new credentials to validate Vault can create new credentials. The result of this command is below:

text

CollapseWrapCopy

$ vault read azure/creds/bryan-krausen

Key Value

--- -----

lease_id azure/creds/bryan-krausen/9eed0373-ca92-99b6-b914-779b7bb0e1d9

lease_duration 60m

lease_renewable true

client_id 532bf678-ee4e-6be1-116b-4e4221e445dd

client_secret be60395b-4e6b-2b7e-a4b3-c449a5c00973

What commands can be used to revoke this secret after you have finished testing? (Select three)

Options:

A.

vault lease revoke azure/


B.

vault lease revoke -prefix azure/


C.

vault lease revoke azure/creds/bryan-krausen/9eed0373-ca92-99b6-b914-779b7bb0e1d9


D.

vault lease revoke azure/creds/bryan-krausen


E.

vault lease revoke -prefix azure/creds/bryan-krausen


Expert Solution
Questions # 58:

Your organization has enabled the LDAP auth method on the path of corp-auth/. When you access the Vault UI, you cannot log in despite providing the correct credentials. Based on the screenshot below, what action should you take to log in?

Question # 58

Options:

A.

Select corp-auth from the dropdown list


B.

Enter the username as corp-auth/bryan.krausen


C.

Select More Options and enter the Mount path that LDAP was enabled on (corp-auth/)


D.

Change to the Namespace of corp-auth before trying to authenticate


Expert Solution
Questions # 59:

What is the primary role of the Vault Security Operator (VSO) in a Kubernetes environment?

Options:

A.

Managing Vault server deployments and auto-scaling Vault instances in Kubernetes


B.

Enforcing Kubernetes network policies for Vault communication


C.

Automating the injection and lifecycle management of Vault secrets for Kubernetes workloads


D.

Replacing Kubernetes Secrets with a built-in alternative that does not require Vault


Expert Solution
Questions # 60:

A MySQL server has been deployed on Google Cloud Platform (GCP) to support a legacy application. You want to generate dynamic credentials against this MySQL server rather than use static credentials. What Vault secrets engine would you use to accomplish this?

Options:

A.

The GCP secrets engine


B.

The Identity secrets engine


C.

The database secrets engine


D.

The Cubbyhole secrets engine


Expert Solution
Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions