Pass the HashiCorp HashiCorp Security Automation Certification Vault-Associate Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Your DevOps team would like to provision VMs in GCP via a CICD pipeline. They would like to integrate Vault to protect the credentials used by the tool. Which secrets engine would you recommend?

Options:

A.

Google Cloud Secrets Engine


B.

Identity secrets engine


C.

Key/Value secrets engine version 2


D.

SSH secrets engine


Expert Solution
Questions # 12:

The Vault encryption key is stored in Vault's backend storage.

Options:

A.

True


B.

False


Expert Solution
Questions # 13:

An authentication method should be selected for a use case based on:

Options:

A.

The auth method that best establishes the identity of the client


B.

The cloud provider for which the client is located on


C.

The strongest available cryptographic hash for the use case


D.

Compatibility with the secret engine which is to be used


Expert Solution
Questions # 14:

How would you describe the value of using the Vault transit secrets engine?

Options:

A.

Vault has an API that can be programmatically consumed by applications


B.

The transit secrets engine ensures encryption in-transit and at-rest is enforced enterprise wide


C.

Encryption for application data is best handled by a storage system or database engine, while storing encryption keys in Vault


D.

The transit secrets engine relieves the burden of proper encryption/decryption from application developers and pushes the burden onto the operators of Vault


Expert Solution
Questions # 15:

What environment variable overrides the CLI's default Vault server address?

Options:

A.

VAULT_ADDR


B.

VAULT_HTTP_ADORESS


C.

VAULT_ADDRESS


D.

VAULT _HTTPS_ ADDRESS


Expert Solution
Questions # 16:

Which of the following statements describe the secrets engine in Vault? Choose three correct answers.

Options:

A.

Some secrets engines simply store and read data


B.

Once enabled, you cannot disable the secrets engine


C.

You can build your own custom secrets engine


D.

Each secrets engine is isolated to its path


E.

A secrets engine cannot be enabled at multiple paths


Expert Solution
Questions # 17:

When using Integrated Storage, which of the following should you do to recover from possible data loss?

Options:

A.

Failover to a standby node


B.

Use snapshot


C.

Use audit logs


D.

Use server logs


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions