Pass the HashiCorp HashiCorp Security Automation Certification HCVA0-003 Questions and answers with CertsForce

Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions
Questions # 61:

Your team uses the Transit secrets engine to encrypt all data before writing it to a MySQL database server. During testing, you manually retrieve ciphertext from the database and decrypt it to ensure the data can be read. After decrypting the data, you are worried something is wrong because the plaintext data isn’t legible. Why can you not read the original plaintext data after decrypting the ciphertext?

    $ vault write transit/decrypt/krausen-key ciphertext=vault:v1:8SDd3WHDOjf7mq69C.....

    Key Value

    --- -----

    plaintext Zml2ZSBzdGFyIHByYWN0aWNlIGV4YW1zIGJ5IGJyeWFuIGtyYXVzZW4=

Options:

A.

The incorrect key was selected when decrypting the ciphertext. Use the correct key to successfully read the data


B.

The incorrect key version was used to decrypt the data. Update the ciphertext and change the v1 to v3 to use the latest key version


C.

The plaintext is Base64 encoded. Decode the plaintext to see the original data


D.

The data was also encrypted on the database. Therefore Vault cannot decrypt the original data


Expert Solution
Questions # 62:

You are using the Vault API to test authentication before modifying your CI/CD pipeline to properly authenticate to Vault. You manually authenticate to Vault and receive the response below. Based on the provided options, which of the following are true? (Select four)

    $ curl \

    --request POST \

    --data @payload.json \

    https://vault.krausen.com:8200/v1/auth/userpass/login/bryan.krausen | jq

     

    *******************************************************************************

    ******* RESPONSE BELOW ********************************************************

    *******************************************************************************

     

    {

    "request_id": "f758e8da-11b6-8341-d404-56f0c370a7fa",

    "lease_id": "",

    "renewable": false,

    "lease_duration": 0,

    "data": null,

    "wrap_info": null,

    "warnings": null,

    "auth": {

    "client_token": "hvs.CbzCNJCVWt63jyzyaJakgDwz",

    "accessor": "rffwXzKFcxvaQi6Vgo8tY4Lt",

    "policies": [

    "training",

    "default"

    ],

    "token_policies": [

    "training",

    "default"

    ],

    "metadata": {

    "username": "bryan.krausen"

    },

    "lease_duration": 84600,

    "renewable": true,

    "entity_id": "f1795f6a-c576-d619-b2d5-74c0aee08edb",

    "token_type": "service",

    "orphan": true

    }

    }

Options:

A.

The token required to retrieve a secret is hvs.CbzCNJCVWt63jyzyaJakgDwz


B.

The returned token is a batch token


C.

The user needs to retrieve .auth.client_token in order to perform other actions


D.

The accessor will be used to authenticate to Vault to retrieve secrets


E.

The user is using the userpass auth method


F.

The user’s password is stored in a file named payload.json


Expert Solution
Questions # 63:

Which of the following is true about the token authentication method in Vault? (Select three)

Options:

A.

The token auth method is automatically enabled in Vault and cannot be disabled


B.

External authentication mechanisms, such as GitHub, are used to dynamically create tokens


C.

The token auth method is used as the first method of authentication for Vault for a newly initialized Vault node/cluster


D.

Tokens cannot be used directly; they must be used in conjunction with one of Vault’s many auth methods


Expert Solution
Questions # 64:

Over a few years, you have a lot of data that has been encrypted by older versions of a Transit encryption key. Due to compliance regulations, you have to re-encrypt the data using the newest version of the encryption key. What is the easiest way to complete this task without putting the data at risk?

Options:

A.

Rotate the encryption key used to encrypt the data


B.

Decrypt the data manually and encrypt it with the latest version


C.

Use the transit rewrap feature


D.

Create a new master key used by Vault


Expert Solution
Questions # 65:

True or False? After rotating a transit encryption key, all data encrypted with the previous version must be rewrapped or re-encrypted with the new key.

Options:

A.

True


B.

False


Expert Solution
Questions # 66:

True or False? Performing a rekey operation using the vault operator rekey command creates new unseal/recovery keys as well as a new root key?

Options:

A.

True


B.

False


Expert Solution
Questions # 67:

You are using Vault to generate dynamic credentials for a Microsoft SQL server to perform queries for a month-end report. The report seems to be taking much longer than expected due to degradation on the underlying server, and you are afraid that Vault might automatically revoke the credentials. How can you extend the time the credentials are valid to ensure your month-end query is successful?

Options:

A.

Renew the lease


B.

Generate a new lease


C.

Create a new role within the secrets engine for the database


D.

Revoke the lease


Expert Solution
Questions # 68:

Your organization is integrating its legacy application with Vault to improve its security. However, you have discovered that the application has issues when the token changes for authentication during testing. What type of token could be used to help alleviate this issue without compromising security?

Options:

A.

Periodic Service Token


B.

Root Token


C.

Orphan Service Token


D.

Batch Token


Expert Solution
Questions # 69:

You have TBs of data encrypted by Vault stored in a database and are worried about Vault becoming unavailable and not being able to decrypt the data. Is it possible to export the encryption key to store it somewhere else in the event Vault becomes unavailable?

Options:

A.

Yes, as long as the key was configured to be exportable when it was created


B.

No, you cannot export the encryption key from Vault


Expert Solution
Questions # 70:

Which of the following actions can be performed if you only had access to a token’s accessor? (Select four)

Options:

A.

Look up a token’s properties


B.

Renew the token


C.

Retrieve the actual token ID


D.

Revoke the token


E.

Look up a token’s capabilities on a path


Expert Solution
Viewing page 7 out of 9 pages
Viewing questions 61-70 out of questions