What does the following API request return?
1. $ curl \
2. --header "X-Vault-Token: ..." \
3. --request POST \
4. --data @payload.json \
5. http://127.0.0.1:8200/v1/sys/tools/random/164
A user has created a module called "my_test_module" and committed it to GitHub. Over time, several commits have been made with updates to the module, each tagged in GitHub with an incremental version number. Which of the following lines would be required in a module configuration block in terraform to select tagged version v1.0.4?
Which of the following is an invalid variable name?
True or False:
Multiple providers can be declared within a single Terraform configuration file.
You want to use terraform import to start managing infrastructure that was not originally provisioned through infrastructure as code. Before you can import the resource's current state, what must you do in order to prepare to manage these resources using Terraform?
True or False:
State is a requirement for Terraform to function.
Terraform Cloud is more powerful when you integrate it with your version control system (VCS) provider. Select all the supported VCS providers from the answers below. (select four)
Your organization has moved to AWS and has manually deployed infrastructure using the console. Recently, a decision has been made to standardize on Terraform for all deployments moving forward.
What can you do to ensure that all existing is managed by Terraform moving forward without interruption to existing services?
In a Consul cluster, participating nodes can be only one of two types. Select the valid types. (select two)
After running into issues with Terraform, you need to enable verbose logging to assist with troubleshooting the error. Which of the following values provides the MOST verbose logging?
Which of the following commands will remove all secrets at a specific path?
An administrator wants to create a new KV mount for individual users to maintain their own secrets but needs a way to simplify the policy so they don't need to write a new one for each new user? With the requirements listed below, what would such a policy look like?
Requirement: Each user can perform all operations on their allocated key/value secret path
Vault policies are deny by default
What happens when a terraform apply command is executed?
The security barrier protects all of the following Vault components except ___.
Which of the following connection types are supported by the remote-exec provisioner? (select two)
Which auth method is ideal for machine to machine authentication?
You have been given requirements to create a security group for a new application. Since your organization standardizes on Terraform, you want to add this new security group with the fewest number of lines
of code. What feature could you use to iterate over a list of required tcp ports to add to the new security group?
What are the primary benefits of running Vault in a production deployment over dev server mode? (select two)
When multiple arguments with single-line values appear on consecutive lines at the same nesting level, HashiCorp recommends that you:
Which of the following commands will launch the Interactive console for Terraform interpolations?
Select all features which are exclusive to Terraform Enterprise. (select three)
What is a downside to using a Terraform provider, such as the Vault provider, to interact with sensitive data, such as reading secrets from Vault?
What type of token does not have a TTL (time to live)?
True or False: When encrypting data with the transit secrets engine, Vault always stores the ciphertext in a dedicated KV store along with the associated encryption key.
What does the command terraform fmt do?
Why is it a good idea to declare the required version of a provider in a Terraform configuration file?
1. terraform {
2. required_providers {
3. aws = "~> 1.0"
4. }
5. }
Environment variables can be used to set variables. The environment variables must be in the format "____"_
In regards to Terraform state file, select all the statements below which are correct: (select four)
Given the following screenshot, how many secrets engines have been enabled?