Vault Associate Certification Q31-Q40

  1. Vault Associate Certification Q1-Q10
  2. Vault Associate Certification Q11-Q20
  3. Vault Associate Certification Q21-Q30
  4. Vault Associate Certification Q31-Q40
  5. Vault Associate Certification Q41-Q50
  6. Vault Associate Certification Q51-Q60
  7. Vault Associate Certification Q61-Q70
  8. Vault Associate Certification Q71-Q80
  9. Vault Associate Certification Q81-Q84

Please Subscribe to Access the Premium Content

The remaining premium contents are locked. Please subscribe to the monthly newsletter to unlock the content for free.

Loading...

Q31. Which of the following statements are true about the default policy? (Choose two.)

A. It is one of the built-in policies
B. Provides a common set of permissions and is included on all tokens by default
C. Can not be modified or deleted
D. Gives a super admin permissions, similar to a root user on a Linux machine
E. Vault upgrade will overwrite any update you made to the default policy

Answer

A, B


Q32. You are performing a high number of authentications in a short amount of time. You’re experiencing slow throughput for token generation. How would you solve this problem?

A. Increase the time-to-live on service tokens
B. Implement batch tokens
C. Establish a rate limit quota
D. Reduce the number of policies attached to the tokens

Answer

B


Q33. When looking at Vault token details, which key helps you find the paths the token is able to access?

A. Meta
B. Path
C. Policies
D. Accessor

Answer

C


Q34. A developer mistakenly committed code that contained AWS S3 credentials into a public repository. You have been tasked with revoking the AWS S3 credential that was in the code. This credential was created using Vault’s AWS secrets engine and the developer received the following output when requesting a credential from Vault.

KeyValue
lease_idaws/creds/s3-access/f3e92392-7d9c-09c8-c921-575d62fe80d8
lease_duration768h
lease_renewabletrue
access_keyAKIAIOWQXTLW36DV7IEA
secret_keyiASuXNKcWKFtbO8Ef0vOcgtiL6knR20EJkJTH8WI

Which Vault command will revoke the lease and remove the credential from AWS?

A. vault lease revoke aws/creds/s3-access/f3e92392-7d9c-09c8-c921-575d62fe80d8
B. vault lease revoke AKIAIOMQXTLW36DV7IEA
C. vault lease revoke f3e92392-7d9c-09c8-c921-575d62fe80d8
D. vault lease revoke access_key=AKIAIOWQXTLW36DV7IEA

Answer

A


Q35. When an auth method is disabled, all users authenticated via that method lose access.

A. True
B. False

Answer

A


Q36. An authentication method should be selected for a use case based on:

A. The auth method that best establishes the identity of the client
B. The cloud provider for which the client is located on
C. The strongest available cryptographic hash for the use case
D. Compatibility with the secret engine which is to be used

Answer

A


Q37. A web application uses Vault’s transit secrets engine to encrypt data in-transit. If an attacker intercepts the data in transit, which of the following statements are true? (Choose two.)

A. You can rotate the encryption key so that the attacker won’t be able to decrypt the data
B. The keys can be rotated and min_decryption_version moved forward to ensure this data cannot be decrypted
B. The Vault administrator would need to seal the Vault server immediately
C. Even if the attacker was able to access the raw data, they would only have encrypted bits (TLS in transit)

Answer

B, C


Q38. The Vault encryption key is stored in Vault’s backend storage.

A. True
B. False

Answer

A


Q39. Which of the following statements describe the secrets engine in Vault? (Choose three.)

A. Some secrets engines simply store and read data
B. Once enabled, you cannot disable the secrets engine
C. You can build your own custom secrets engine
D. Each secrets engine is isolated to its path
E. A secrets engine cannot be enabled at multiple paths

Answer

A, C, D


Q40. What is a benefit of response wrapping?

A. Log every use of a secret
B. Load balance secret generation across a Vault cluster
C. Provide error recovery to a secret so it is not corrupted in transit
D. Ensure that only a single party can ever unwrap the token and see what’s inside

Answer

D


Leave a Comment

Your email address will not be published. Required fields are marked *


Scroll to Top