The vault lease renew command increments the lease time from:
A. The current time
B. The end of the lease
A. The current time
You have a 2GB Base64 binary large object (blob) that needs to be encrypted. Which of the following best describes the transit secrets engine?
A. A data key encrypts the blob locally, and the same key decrypts the blob locally.
B. To process such a large blob. Vault will temporarily store it in the storage backend.
C. Vault will store the blob permanently. Be sure to run Vault on a compute optimized machine.
D. The transit engine is not a good solution for binaries of this size.
A. A data key encrypts the blob locally, and the same key decrypts the blob locally.
How would you describe the value of using the Vault transit secrets engine?
A. Vault has an API that can be programmatically consumed by applications
B. The transit secrets engine ensures encryption in-transit and at-rest is enforced enterprise wide
C. Encryption for application data is best handled by a storage system or database engine, while storing encryption keys in Vault
D. The transit secrets engine relieves the burden of proper encryption/decryption from application developers and pushes the burden onto the operators of Vault
D. The transit secrets engine relieves the burden of proper encryption/decryption from application developers and pushes the burden onto the operators of Vault
What is the Vault CLI command to query information about the token the client is currently using?
A. vault lookup token
B. vault token lookup
C. vault lookup self
D. vault self lookup
B. vault token lookup
Which of the following is a machine-oriented Vault authentication backend?
A. Okta
B. AppRole
C. Transit
D. GitHub
B. AppRole
Security requirements demand that no secrets appear in the shell history. Which command does not meet this requirement?
A. generate-password | vault kv put secret/password value=
B. vault kv put secret/password value=itsasecret
C. vault kv put secret/password value=@data.txt
D. vault kv put secret/password value=$SECRET_VALUE
B. vault kv put secret/password value=itsasecret
You can build a high availability Vault cluster with any storage backend.
A. True
B. False
B. False
What command creates a secret with the key “my-password” and the value “53cr3t” at path “my-secrets” within the KV secrets engine mounted at “secret”?
A. vault kv put secret/my-secrets/my-password 53cr3t
B. vault kv write secret/my-secrets/my-password 53cr3t
C. vault kv write 53cr3t my-secrets/my-password
D. vault kv put secret/my-secrets my-password-53cr3t
D. vault kv put secret/my-secrets my-password-53cr3t
What can be used to limit the scope of a credential breach?
A. Storage of secrets in a distributed ledger
B. Enable audit logging
C. Use of a short-lived dynamic secrets
D. Sharing credentials between applications
C. Use of a short-lived dynamic secrets
What environment variable overrides the CLI’s default Vault server address?
A. VAULT_ADDR
B. VAULT_HTTP_ADDRESS
C. VAULT_ADDRESS
D. VAULT_HTTPS_ADDRESS
A. VAULT_ADDR
Which of the following statements describe the CLI command below?
$ vault login -method=ldap username=mitchellh
A. Generates a token which is response wrapped
B. You will be prompted to enter the password
C. By default, the generated token is valid for 24 hours
D. Fails because the password is not provided
B. You will be prompted to enter the password
Your DevOps team would like to provision VMs in GCP via a CICD pipeline. They would like to integrate Vault to protect the credentials used by the tool. Which secrets engine would you recommend?
A. Google Cloud Secrets Engine
B. Identity secrets engine
C. Key/Value secrets engine version 2
D. SSH secrets engine
A. Google Cloud Secrets Engine
Which of these is not a benefit of dynamic secrets?
A. Supports systems which do not natively provide a method of expiring credentials
B. Minimizes damage of credentials leaking
C. Ensures that administrators can see every password used
D. Replaces cumbersome password rotation tools and practices
C. Ensures that administrators can see every password used
Which of the following cannot define the maximum time-to-live (TTL) for a token?
A. By the authentication method
B. By the client system
C. By the mount endpoint configuration
D. A parent token TTL
E. System max TTL
B. By the client system
What are orphan tokens?
A. Orphan tokens are tokens with a use limit so you can set the number of uses when you create them
B. Orphan tokens are not children of their parent; therefore, orphan tokens do not expire when their parent does
C. Orphan tokens are tokens with no policies attached
D. Orphan tokens do not expire when their own max TTL is reached
B. Orphan tokens are not children of their parent; therefore, orphan tokens do not expire when their parent does
To give a role the ability to display or output all of the end points under the /secrets/apps/* end point it would need to have which capability set?
A. update
B. read
C. sudo
D. list
E. None of the above
D. list
When using Integrated Storage, which of the following should you do to recover from possible data loss?
A. Failover to a standby node
B. Use snapshot
C. Use audit logs
D. Use server logs
B. Use snapshot
Which of these are a benefit of using the Vault Agent?
A. Vault Agent allows for centralized configuration of application secrets engines
B. Vault Agent will auto-discover which authentication mechanism to use
C. Vault Agent will enforce minimum levels of encryption an application can use
D. Vault Agent will manage the lifecycle of cached tokens and leases automatically
D. Vault Agent will manage the lifecycle of cached tokens and leases automatically
How many Shamir’s key shares are required to unseal a Vault instance?
A. All key shares
B. A quorum of key shares
C. One or more keys
D. The threshold number of key shares
D. The threshold number of key shares
Which of the following describes usage of an identity group?
A. Limit the policies that would otherwise apply to an entity in the group
B. When they want to revoke the credentials for a whole set of entities simultaneously
C. Audit token usage
D. Consistently apply the same set of policies to a collection of entities
D. Consistently apply the same set of policies to a collection of entities
Vault supports which type of configuration for source limited token?
A. Cloud-bound tokens
B. Domain-bound tokens
C. CIDR-bound tokens
D. Certificate-bound tokens
C. CIDR-bound tokens
Where does the Vault Agent store its cache?
A. In a file encrypted using the Vault transit secret engine
B. In the Vault key/value store
C. In an unencrypted file
D. In memory
D. In memory
Your organization has an initiative to reduce and ultimately remove the use of long lived X.509 certificates. Which secrets engine will best support this use case?
A. PKI
B. Key/Value secrets engine version 2, with TTL defined
C. Cloud KMS
D. Transit
A. PKI
As a best practice, the root token should be stored in which of the following ways?
A. Should be revoked and never stored after initial setup
B. Should be stored in configuration automation tooling
C. Should be stored in another password safe
D. Should be stored in Vault
A. Should be revoked and never stored after initial setup