New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CyberArk SECRET-SEN CyberArk Sentry Secrets Manager Exam Practice Test

Page: 1 / 6
Total 60 questions

CyberArk Sentry Secrets Manager Questions and Answers

Question 1

You are enabling synchronous replication on Conjur cluster.

What should you do?

Options:

A.

Execute this command on the Leader:

docker exec sh –c”

evoke replication sync that

*

B.

Execute this command on each Standby:

docker exec sh –c”

evoke replication sync that

*

C.

In Conjur web UI, click the Tools icon in the top right corner of the main window.

Choose Conjur Cluster and click “Enable synchronous replication” in the entry for Leader.

D.

In Conjur web UI, click the Tools icon in the top right corner of the main window.

Choose Conjur Cluster and click “Enable synchronous replication” in the entry for Standbys.

Question 2

Which statement is true for the Conjur Command Line Interface (CLI)?

Options:

A.

It is supported on Windows, Red Hat Enterprise Linux, and macOS.

B.

It can only be run from the Conjur Leader node.

C.

It is required for working with the Conjur REST API.

D.

It does not implement the Conjur REST API for managing Conjur resources.

Question 3

A customer has 100 .NET applications and wants to use Summon to invoke the application and inject secrets at run time.

Which change to the NET application code might be necessary to enable this?

Options:

A.

It must be changed to include the REST API calls necessary to retrieve the needed secrets from the CCP.

B.

It must be changed to access secrets from a configuration file or environment variable.

C.

No changes are needed as Summon brokers the connection between the application and the backend data source through impersonation.

D.

It must be changed to include the host API key necessary for Summon to retrieve the needed secrets from a Follower

Question 4

You are setting up the Secrets Provider for Kubernetes to support rotation with Push-to-File mode.

Which deployment option should be used?

Options:

A.

Init container

B.

Application container

C.

Sidecar

D.

Service Broker

Question 5

You are deploying Kubernetes resources/objects as Conjur identities.

In addition to Namespace and Deployment, from which options can you choose? (Choose two.)

Options:

A.

ServiceAccount

B.

Replica sets

C.

Secrets

D.

Tokenreviews

E.

StatefulSet

Question 6

Findings were obtained after cataloging pending Secrets Manager use cases.

Arrange the findings in the correct order for prioritization.

Question # 6

Options:

Question 7

When loading policy, you receive a 422 Response from Conjur with a message.

What could cause this issue?

Options:

A.

malformed Policy file

B.

incorrect Leader URL

C.

misconfigured Load Balancer health check

D.

incorrect Vault Conjur Synchronizer URL

Question 8

A customer requires high availability in its AWS cloud infrastructure.

What is the minimally viable Conjur deployment architecture to achieve this?

Options:

A.

one Follower in each AZ. load balancer for the region

B.

two Followers in each region, load balanced for the region

C.

two Followers in each AZ. load balanced for the region

D.

two Followers in each region, load balanced across all regions

Question 9

Match the correct network port to its function in Conjur.

Question # 9

Options:

Question 10

You are installing a Credential Provider on a Linux host. Arrange the installation steps in the correct sequence.

Question # 10

Options:

Question 11

Refer to the exhibit.

In which example will auto-failover occur?

Question # 11

A)

Question # 11

B)

Question # 11

C)

Question # 11

D)

Question # 11

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 12

Match each scenario to the appropriate Secrets Manager solution.

Question # 12

Options:

Question 13

Match each use case to the appropriate Secrets Manager Solution.

Question # 13

Options:

Question 14

An application is having authentication issues when trying to securely retrieve credential’s from the Vault using the CCP webservices RESTAPI. CyberArk Support advised that further debugging should be enabled on the CCP server to output a trace file to review detailed logs to help isolate the problem.

What best describes how to enable debug for CCP?

Options:

A.

Edit web.config. change the “AIMWebServiceTrace” value, restart Windows Web Server (IIS)

B.

In the PVWA, go to the Applications tab, select the Application in question, go to Options > Logging and choose Debug.

C.

From the command line, run appprvmgr.exe update_config logging=debug.

D.

Edit the basic_appprovider.conf, change the “AIMWebServiceTrace" value, and restart the provider.

Question 15

Arrange the steps of a Conjur authentication flow in the correct sequence.

Question # 15

Options:

Question 16

Followers are replications of the Leader configured for which purpose?

Options:

A.

synchronous replication to ensure that there is always an up-to-date database

B.

asynchronous replication from the Leader which allows secret reads at scale

C.

asynchronous replication from the Leader with read/write operations capability

D.

synchronous replication to ensure high availability

Question 17

You are setting up a Kubernetes integration with Conjur. With performance as the key deciding factor, namespace and service account will be used as identity characteristics.

Which authentication method should you choose?

Options:

A.

JWT-based authentication

B.

Certificate-based authentication

C.

API key authentication

D.

Connect (OIDC) authentication

Question 18

You are diagnosing this log entry:

From Conjur logs:

Question # 18

Given these errors, which problem is causing the breakdown?

Options:

A.

The Jenkins certificate chain is not trusted by Conjur.

B.

The Conjur certificate chain is not trusted by Jenkins.

C.

The JWT sent by Jenkins does not match the Conjur host annotations.

D.

The Jenkins certificate is malformed and will not be trusted by Conjur.

Page: 1 / 6
Total 60 questions