New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HashiCorp HCVA0-003 - HashiCorp Certified: Vault Associate (003)Exam

Page: 2 / 9
Total 285 questions

You are configuring your application to retrieve a new PKI certificate upon provisioning. The Vault admins have given you an AppRole role-id and secret-id to inject into the CI/CD pipeline job that provisions your app. The application uses the credentials to successfully authenticate to Vault using the API. Which of the following is true about the step next required after authenticating to Vault?

A.

The client token needs to be retrieved from the API response before requesting the new PKI certificate

B.

The initial API response should include the new PKI certificate and no further action is required

C.

The app still needs to use the role-id and secret-id to request the new PKI certificate via API

D.

Now that the app is authenticated, it can simply make another API request for the PKI certificate

True or False? Performing a rekey operation using the vault operator rekey command creates new unseal/recovery keys as well as a new root key?

A.

True

B.

False

Sara uses the Vault CLI for administrative tasks on the production cluster. However, she encounters permission-denied errors when making changes and needs to check which policies are attached to her token to view and adjust permissions. What command can she run on the Vault node to see the attached policies?

A.

vault operator diagnose

B.

vault policy list

C.

vault token capabilities

D.

vault token lookup

A security architect is designing a solution to address the "Secret Zero" problem for a Kubernetes-based application that needs to authenticate to HashiCorp Vault. Which approach correctly leverages Vault features to solve this challenge?

A.

Store the Vault root token in a ConfigMap and mount it to all containers that require access to sensitive information

B.

Generate a long-lived token during deployment and store it as an environment variable within each container that needs to access Vault

C.

Configure the Kubernetes auth method in Vault and enable applications to authenticate without pre-shared secrets

D.

Implement a custom sidecar container that uses AppRole role-id and secret-id each time the application needs to access Vault

To protect the sensitive data stored in Vault, what key is used to encrypt the data before it is written to the storage backend?

A.

Recovery key

B.

Encryption key

C.

Unseal key

D.

Root key

By default, what methods of authentication does Vault support? (Select four)

A.

SSH

B.

Kubernetes

C.

VMware

D.

LDAP

E.

AppRole

F.

JWT

A developer has requested access to manage secrets at the path kv/apps/webapp01. You create the policy below which gives them the proper access:

path "kv/apps/webapp01" {

capabilities = ["read", "create", "update", "list"]

}

However, when the developer logs in to the Vault UI, they see the following screenshot and cannot access the desired secret. Why can’t the developer see the secrets they need?

A.

The Vault UI isn’t enabled for the developer, therefore they will only see the default options

B.

The key/value secrets engine isn’t available in the Vault UI, therefore the developer should use a different Vault interface instead

C.

The policy doesn’t permit list access to the paths prior to the secret so the Vault UI doesn’t display the mount path

D.

The secrets are stored under the cubbyhole secrets engine, so the developer should browse to that secrets engine

Running the second command in the GUI CLI will succeed.

A.

True

B.

False

Where does the Vault Agent store its cache?

A.

In a file encrypted using the Vault transit secret engine

B.

In the Vault key/value store

C.

In an unencrypted file

D.

In memory

Which of the following describes usage of an identity group?

A.

Limit the policies that would otherwise apply to an entity in the group

B.

When they want to revoke the credentials for a whole set of entities simultaneously

C.

Audit token usage

D.

Consistently apply the same set of policies to a collection of entities