Select two answers to complete the following sentence:
Before a new provider can be used, it must be ______ and _______.
You've decided to use AWS KMS to automatically unseal Vault on private EC2 instances. After deploying your Vault cluster, and running vault operator init, Vault responds with an error and cannot be unsealed.
You've determined that the subnet you've deployed Vault into doesn't have internet access. What can you do to enable Vault to communicate with AWS KMS in the most secure way?
Which of the following is not a valid Terraform string function?
After logging into the Vault UI, a user complains that they cannot enable Replication. Why would the replication configuration be missing?
In the following code snippet, the block type is identified by which string?
1. resource "aws_instance" "db" {
2. ami = "ami-123456"
3. instance_type = "t2.micro"
4. }
After running into issues with Terraform, you need to enable verbose logging to assist with troubleshooting the error. Which of the following values provides the MOST verbose logging?
Which auth method is ideal for machine to machine authentication?
Which three interfaces can be used to access Vault? (select three)
Which of the following best describes a token accessor?
After issuing the command to delete a secret, you run a vault kv list command but the secret still exists. What command would permanently delete this secret from Vault?
1. $ vault kv delete kv/applications/app01
2. Success! Data deleted (if it existed) at: kv/applications/app01
3. $ vault kv list kv/applications
4. Keys
5. ----
6. app01