Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

HashiCorp Certified: Vault Associate (002) Question and Answers

HashiCorp Certified: Vault Associate (002)

Last Update May 18, 2024
Total Questions : 57

We are offering FREE Vault-Associate HashiCorp exam questions. All you do is to just go and sign up. Give your details, prepare Vault-Associate free exam questions and then go for complete pool of HashiCorp Certified: Vault Associate (002) test questions that will help you more.

Vault-Associate pdf

Vault-Associate PDF

$35  $99.99
Vault-Associate Engine

Vault-Associate Testing Engine

$42  $119.99
Vault-Associate PDF + Engine

Vault-Associate PDF + Testing Engine

$56  $159.99
Questions 1

Where does the Vault Agent store its cache?

Options:

A.  

In a file encrypted using the Vault transit secret engine

B.  

In the Vault key/value store

C.  

In an unencrypted file

D.  

In memory

Discussion 0
Questions 2

You are using the Vault userpass auth method mounted at auth/userpass. How do you create a new user named "sally" with password "h0wN0wB4r0wnC0w"? This new user will need the power-users policy.

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 3

A developer mistakenly committed code that contained AWS S3 credentials into a public repository. You have been tasked with revoking the AWS S3 credential that was in the code. This credential was created using Vault's AWS secrets engine and the developer received the following output when requesting a credential from Vault.

Which Vault command will revoke the lease and remove the credential from AWS?

Options:

A.  

vault lease revoke aws/creds/s3-access/f3e92392-7d9c-99c8-c921-57Sd62fe89d8

B.  

vault lease revoke AKIAI0WQXTLW36DV7IEA

C.  

vault lease revoke f3e92392-7d9c-O9c8-c921-575d62fe80d8

D.  

vault lease revoke access_key-AKIAI0WQXTLW36DV7IEA

Discussion 0
Questions 4

Which of the following are replication methods available in Vault Enterprise? Choose two correct answers.

Options:

A.  

Cluster sharding

B.  

Namespaces

C.  

Performance Replication

D.  

Disaster Recovery Replication

Discussion 0
Questions 5

Which of the following cannot define the maximum time-to-live (TTL) for a token?

Options:

A.  

By the authentication method t natively provide a method of expiring credentials

B.  

By the client system f credentials leaking

C.  

By the mount endpoint configurationvery password used

D.  

A parent token TTL e password rotation tools and practices

E.  

System max TTL

Discussion 0
Questions 6

You are using Vault's Transit secrets engine to encrypt your data. You want to reduce the amount of content encrypted with a single key in case the key gets compromised. How would you do this?

Options:

A.  

Use 4096-bit RSA key to encrypt the data

B.  

Upgrade to Vault Enterprise and integrate with HSM

C.  

Periodically re-key the Vault's unseal keys

D.  

Periodically rotate the encryption key

Discussion 0
Questions 7

When using Integrated Storage, which of the following should you do to recover from possible data loss?

Options:

A.  

Failover to a standby node

B.  

Use snapshot

C.  

Use audit logs

D.  

Use server logs

Discussion 0
Questions 8

Which of the following statements describe the CLI command below?

S vault login -method-1dap username-mitche11h

Options:

A.  

Generates a token which is response wrapped

B.  

You will be prompted to enter the password

C.  

By default the generated token is valid for 24 hours

D.  

Fails because the password is not provided

Discussion 0
Questions 9

Which of the following describes the Vault's auth method component?

Options:

A.  

It verifies a client against an internal or external system, and generates a token with the appropriate policies attached

B.  

It verifies a client against an internal or external system, and generates a token with root policy

C.  

It is responsible for durable storage of client tokens

D.  

It dynamically generates a unique set of secrets with appropriate permissions attached

Discussion 0
Questions 10

As a best practice, the root token should be stored in which of the following ways?

Options:

A.  

Should be revoked and never stored after initial setup

B.  

Should be stored in configuration automation tooling

C.  

Should be stored in another password safe

D.  

Should be stored in Vault

Discussion 0
Questions 11

What does the following policy do?

Options:

A.  

Grants access for each user to a KV folder which shares their id

B.  

Grants access to a special system entity folder

C.  

Allows a user to read data about the secret endpoint identity

D.  

Nothing, this is not a valid policy

Discussion 0
Questions 12

The following three policies exist in Vault. What do these policies allow an organization to do?

Options:

A.  

Separates permissions allowed on actions associated with the transit secret engine

B.  

Nothing, as the minimum permissions to perform useful tasks are not present

C.  

Encrypt, decrypt, and rewrap data using the transit engine all in one policy

D.  

Create a transit encryption key for encrypting, decrypting, and rewrapping encrypted data

Discussion 0
Questions 13

You have a 2GB Base64 binary large object (blob) that needs to be encrypted. Which of the following best describes the transit secrets engine?

Options:

A.  

A data key encrypts the blob locally, and the same key decrypts the blob locally.

B.  

To process such a large blob. Vault will temporarily store it in the storage backend.

C.  

Vault will store the blob permanently. Be sure to run Vault on a compute optimized machine

D.  

The transit engine is not a good solution for binaries of this size.

Discussion 0
Questions 14

Examine the command below. Output has been trimmed.

Which of the following statements describe the command and its output?

Options:

A.  

Missing a default token policy

B.  

Generated token's TTL is 60 hours

C.  

Generated token is an orphan token which can be renewed indefinitely

D.  

Configures the AppRole auth method with user specified role ID and secret ID

Discussion 0
Questions 15

Where do you define the Namespace to log into using the Vault Ul?

To answer this question

Use your mouse to click on the screenshot in the location described above. An arrow indicator will mark where you have clicked. Click the "Answer" button once you have positioned the arrow to answer the question. You may need to scroll down to see the entire screenshot.

Options:

Discussion 0
Questions 16

A user issues the following cURL command to encrypt data using the transit engine and the Vault AP:

Which payload.json file has the correct contents?

Options:

A.  

B.  

C.  

D.  

Discussion 0
Questions 17

Which statement describes the results of this command: $ vault secrets enable transit

Options:

A.  

Enables the transit secrets engine at transit path

B.  

Requires a root token to execute the command successfully

C.  

Enables the transit secrets engine at secret path

D.  

Fails due to missing -path parameter

E.  

Fails because the transit secrets engine is enabled by default

Discussion 0