Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CyberArk Sentry - Secrets Manager Question and Answers

CyberArk Sentry - Secrets Manager

Last Update May 18, 2024
Total Questions : 60

We are offering FREE SECRET-SEN CyberArk exam questions. All you do is to just go and sign up. Give your details, prepare SECRET-SEN free exam questions and then go for complete pool of CyberArk Sentry - Secrets Manager test questions that will help you more.

SECRET-SEN pdf

SECRET-SEN PDF

$35  $99.99
SECRET-SEN Engine

SECRET-SEN Testing Engine

$42  $119.99
SECRET-SEN PDF + Engine

SECRET-SEN PDF + Testing Engine

$56  $159.99
Questions 1

When working with Summon, what is the purpose of the secrets.yml file?

Options:

A.  

It is where Summon outputs the secret value after retrieval.

B.  

It is where you define which secrets to retrieve.

C.  

It is where you store the Conjur URL and host API key.

D.  

It is the log file for Summon.

Discussion 0
Questions 2

Arrange the steps of a Conjur authentication flow in the correct sequence.

Options:

Discussion 0
Questions 3

An application owner reports that their application is suddenly receiving an incorrect password. CPM logs show the password was recently changed, but the value currently being retrieved by the application is a different value. The Vault Conjur Synchronizer service is running.

What is the most likely cause of this issue?

Options:

A.  

The Vault Conjur Synchronizer is not configured with the DR Vault IP address and there has been a failover event.

B.  

Dual Accounts are in use, but after the CPM changed the password for the Inactive account, it accidentally updated the password for the Active account instead.

C.  

The CPM is writing password changes to the Primary Vault while the Vault Conjur Synchronizer is configured to replicate from the DR Vault.

D.  

The application has been configured to retrieve the wrong password.

Discussion 0
Questions 4

A customer has 100 .NET applications and wants to use Summon to invoke the application and inject secrets at run time.

Which change to the NET application code might be necessary to enable this?

Options:

A.  

It must be changed to include the REST API calls necessary to retrieve the needed secrets from the CCP.

B.  

It must be changed to access secrets from a configuration file or environment variable.

C.  

No changes are needed as Summon brokers the connection between the application and the backend data source through impersonation.

D.  

It must be changed to include the host API key necessary for Summon to retrieve the needed secrets from a Follower

Discussion 0
Questions 5

A Kubernetes application attempting to authenticate to the Follower load balancer receives this error:

ERROR: 2024/10/30 06:07:08 authenticator.go:139: CAKC029E Received invalid response to certificate signing request. Reason: status code 401

When checking the logs, you see this message:

authn-k8s/prd-cluster-01 is not enabled

How do you remediate the issue?

Options:

A.  

Check the info endpoint on each Follower behind the load balancer and enable the authenticator on the Follower.

B.  

Modify conjur.conf in /opt/conjur/etc/authenticators addinqthe authenticator webservice.

C.  

A network issue is preventing the application from reaching the Follower; correct the issue and verity that it is resolved.

D.  

Enable the authenticator in the Ul > Webservices > Authenticators > Enable and enable the appropriate authenticator webservice.

Discussion 0
Questions 6

When using the Seed Fetcher to deploy Kubernetes Followers, an error occurs in the Seed Fetcher container. You check the logs and discover that although the Seed Fetcher was able to authenticate, it shows a 500 error in the log and does not successfully retrieve a seed file. What is the cause?

Options:

A.  

The certificate based on the Follower DNS name is not present on the Leader.

B.  

The host you configured does not have access to see the certificates.

C.  

The synchronizer service crashed and needs to be restarted.

D.  

The Leader does not have the authenticator webservice enabled.

Discussion 0
Questions 7

While retrieving a secret through REST, the secret retrieval fails to find a matching secret. You know the secret onboarding process was completed, the secret is in the expected safe with the expected object name, and the CCP is able to provide secrets to other applications.

What is the most likely cause for this issue?

Options:

A.  

The application ID or Application Provider does not have the correct permissions on the safe.

B.  

The client certificate fingerprint is not trusted.

C.  

The service account running the application does not have the correct permissions on the safe.

D.  

The OS user does not have the correct permissions on the safe

Discussion 0
Questions 8

When installing the Vault Conjur Synchronizer, you see this error:

Forbidden

Logon Token is Empty – Cannot logon

Unauthorized

What must you ensure to remediate the issue?

Options:

A.  

This admin user must not be logged in to other sessions during the Vault Conjur Synchronizer installation process.

B.  

You specified the correct url for Conjur and it is listed as a SAN on that url’s certificate.

C.  

You correctly URI encoded the url in the installation script.

D.  

You ran powershell as Administrator and there is sufficient space on the server on which you are running the installation.

Discussion 0
Questions 9

Arrange the manual failover configuration steps in the correct sequence.

Options:

Discussion 0
Questions 10

Which statement is true for the Conjur Command Line Interface (CLI)?

Options:

A.  

It is supported on Windows, Red Hat Enterprise Linux, and macOS.

B.  

It can only be run from the Conjur Leader node.

C.  

It is required for working with the Conjur REST API.

D.  

It does not implement the Conjur REST API for managing Conjur resources.

Discussion 0
Questions 11

When attempting to retrieve a credential, you receive an error 401 – Malformed Authorization Token.

What is the cause of the issue?

Options:

A.  

The token is not correctly encoded.

B.  

The token you are trying to retrieve does not exist.

C.  

The host does not have access to the credential with the current token.

D.  

The credential has not been initialized.

Discussion 0
Questions 12

You are diagnosing this log entry:

From Conjur logs:

Given these errors, which problem is causing the breakdown?

Options:

A.  

The Jenkins certificate chain is not trusted by Conjur.

B.  

The Conjur certificate chain is not trusted by Jenkins.

C.  

The JWT sent by Jenkins does not match the Conjur host annotations.

D.  

The Jenkins certificate is malformed and will not be trusted by Conjur.

Discussion 0
Questions 13

What does “Line of business (LOB)” represent?

Options:

A.  

a business group requiring access to secrets from the Vault/Privilege Claud to facilitate syncing accounts to Conjur

B.  

the services that Conjur offers and typically refers to a group of application identities in Conjur

C.  

a business group that meets a certain set of Conjur policies for entitlements and policy management

D.  

the services that Conjur offers and typically refers to the list of configured and enabled authenticators in Conjur

Discussion 0
Questions 14

A customer requires high availability in its AWS cloud infrastructure.

What is the minimally viable Conjur deployment architecture to achieve this?

Options:

A.  

one Follower in each AZ. load balancer for the region

B.  

two Followers in each region, load balanced for the region

C.  

two Followers in each AZ. load balanced for the region

D.  

two Followers in each region, load balanced across all regions

Discussion 0
Questions 15

You are setting up a Kubernetes integration with Conjur. With performance as the key deciding factor, namespace and service account will be used as identity characteristics.

Which authentication method should you choose?

Options:

A.  

JWT-based authentication

B.  

Certificate-based authentication

C.  

API key authentication

D.  

Connect (OIDC) authentication

Discussion 0
Questions 16

You want to allow retrieval of a secret with the CCP. The safe and the required secrets already exist.

Assuming the CCP is installed, arrange the steps in the correct sequence.

Options:

Discussion 0
Questions 17

You are upgrading an HA Conjur cluster consisting of 1x Leader, 2x Standbys & 1x Follower. You stopped replication on the Standbys and Followers and took a backup of the Leader.

Arrange the steps to accomplish this in the correct sequence.

Options:

Discussion 0
Questions 18

What is a main advantage of using dual accounts in password management?

Options:

A.  

Since passwords are cached for both rotation accounts, it ensures the password for an application will not be changed, reducing the amount of blackout dates when a password expires.

B.  

It ensures passwords are rotated every 90 days, which respects the expected downtime for a system, database, or application

C.  

It ensures no delays are incurred when the application needs credentials because a password that is currently used by an application will never be changed

D.  

Since there are two active accounts, it doubles the probability that a system, database, or application will successfully authenticate.

Discussion 0