Pass the HashiCorp HashiCorp Security Automation Certification VA-002-P Questions and answers with CertsForce

Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions
Questions # 41:

Select two answers to complete the following sentence:

Before a new provider can be used, it must be ______ and _______.

Options:

A.

approved by HashiCorp


B.

declared in the configuration


C.

initialized


D.

uploaded to source control


Expert Solution
Questions # 42:

You've decided to use AWS KMS to automatically unseal Vault on private EC2 instances. After deploying your Vault cluster, and running vault operator init, Vault responds with an error and cannot be unsealed.

You've determined that the subnet you've deployed Vault into doesn't have internet access. What can you do to enable Vault to communicate with AWS KMS in the most secure way?

Options:

A.

ask the networking team to provide Vault with inbound access from the internet


B.

deploy Vault in a public subnet and provide the Vault nodes with public IP addresses


C.

add a VPC endpoint


D.

change the permissions on the Internet Gateway to allow the Vault nodes to communicate over the Internet


Expert Solution
Questions # 43:

Which of the following is not a valid Terraform string function?

Options:

A.

tostring


B.

replace


C.

format


D.

join


Expert Solution
Questions # 44:

After logging into the Vault UI, a user complains that they cannot enable Replication. Why would the replication configuration be missing?

Options:

A.

replication wasn't configured in the Vault configuration file


B.

replication hasn't been enabled


C.

Vault is running an open-source version


D.

replication configuration isn't available in the UI


Expert Solution
Questions # 45:

In the following code snippet, the block type is identified by which string?

1. resource "aws_instance" "db" {

2. ami = "ami-123456"

3. instance_type = "t2.micro"

4. }

Options:

A.

"db"


B.

resource


C.

"aws_instance"


D.

instance_type


Expert Solution
Questions # 46:

After running into issues with Terraform, you need to enable verbose logging to assist with troubleshooting the error. Which of the following values provides the MOST verbose logging?

Options:

A.

ERROR


B.

INFO


C.

DEBUG


D.

WARN


E.

TRACE


Expert Solution
Questions # 47:

Which auth method is ideal for machine to machine authentication?

Options:

A.

GitHub


B.

UserPass


C.

AppRole


D.

Okta


Expert Solution
Questions # 48:

Which three interfaces can be used to access Vault? (select three)

Options:

A.

JSON


B.

CLI


C.

RPC


D.

UI


E.

API


F.

Consul


Expert Solution
Questions # 49:

Which of the following best describes a token accessor?

Options:

A.

a value that acts as a reference to a token which can be used to perform limited actions against the token


B.

a token used for Consul to access Vault auth methods


C.

describes the value associated with the tokens TTL


D.

a value that describes which clients have access to the attached token


Expert Solution
Questions # 50:

After issuing the command to delete a secret, you run a vault kv list command but the secret still exists. What command would permanently delete this secret from Vault?

1. $ vault kv delete kv/applications/app01

2. Success! Data deleted (if it existed) at: kv/applications/app01

3. $ vault kv list kv/applications

4. Keys

5. ----

6. app01

Options:

A.

vault kv metadata delete kv/applications/app01


B.

vault kv delete -all kv/applications/app01


C.

vault kv delete -force kv/applications/app01


D.

vault kv destroy -versions=1 kv/applications/app01


Expert Solution
Viewing page 5 out of 6 pages
Viewing questions 41-50 out of questions