New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HashiCorp HCVA0-003 - HashiCorp Certified: Vault Associate (003)Exam

Page: 6 / 9
Total 285 questions

When generating dynamic credentials, Vault also creates associated metadata, including information like time duration, renewability, and more, and links it to the credentials. What is this referred to as?

A.

Secret

B.

Token

C.

Lease

D.

Secrets engine

True or False? The userpass auth method has the ability to access external services in order to provide authentication to Vault.

A.

True

B.

False

Beyond encryption and decryption of data, which of the following is not a function of the Transit secrets engine?

A.

Generate hashes and HMACs of data

B.

Sign and verify data

C.

Store the encrypted data securely in Vault for retrieval

D.

Act as a source of random bytes

Based on the following output, what command can Steve use to determine if the KV store is configured for versioning?

text

CollapseWrapCopy

$ vault secrets list

Path Type Accessor Description

---- ---- -------- -----------

automation/ kv kv_56f991b9 Automation team for CI/CD

cloud/ kv kv_4426c541 Cloud team for static secrets

cubbyhole/ cubbyhole cubbyhole_9bd538e per-token priv secret storage

data_team/ kv kv_96d57692 Data warehouse KV for certs

identity/ identity identity_0042595e identity store

network/ kv kv_3e53aaab Network team secret storage

secret/ kv kv_d66e2adc key/value secret storage

sys/ system system_d6f218a9 system endpoints

A.

vault secrets list -all

B.

vault kv get automation

C.

vault secrets list -detailed

D.

vault kv list

Which of the following best describes a token accessor?

A.

A value that describes which clients have access to the attached token

B.

Describes the value associated with the token’s TTL

C.

A token used for clients to access Vault secrets engines

D.

A value that acts as a reference to a token which can be used to perform limited actions against the token

Which two characters can be used when writing a policy to reflect a wildcard or path segment? (Select two)

A.

The ampersand &

B.

The at symbol @

C.

The splat character *

D.

A dollar sign $

E.

The pound symbol #

F.

The plus symbol +

Which statement best explains how Vault handles data encryption?

A.

Vault uses encryption to secure data at rest and in transit, using an encryption key protected by the root key.

B.

Vault encrypts data using a root key stored in plain text on the server’s filesystem.

C.

Vault stores data in plaintext on disk but encrypts it only when transmitting it over the network.

D.

Vault offloads all encryption to third-party services, so no secret data is ever processed by Vault.

What is the result of the following Vault command?

$ vault auth enable kubernetes

A.

Allows Vault to access usernames and passwords stored in a Kubernetes cluster

B.

Mounts the Kubernetes auth method to the default path of kubernetes/

C.

Imports Kubernetes secrets to the local KV database

D.

Enables Vault to host an IdP for Kubernetes workloads

Which statement best describes the process of sealing a Vault instance?

A.

Disable the TLS certificates on the Vault server by running vault secrets disable pki, blocking all requests.

B.

Run vault operator rotate to rotate the Vault tokens for all clients, causing them to reauthenticate with the Vault.

C.

Run the vault operator seal command, which securely discards the master key from memory and prevents further operations until unsealed.

D.

Revoke all leases so no secrets can be accessed using vault lease revoke, but keep the master key in memory for quick recovery.

Which of the following best describes the function of the Vault Secrets Operator in a Kubernetes environment?

A.

It replaces the Kubernetes secrets API entirely and operates purely as a certificate authority for all workloads.

B.

It is a standalone Vault server that automatically applies security policies and rotates root tokens.

C.

It continuously reconciles and synchronizes secrets from Vault to Kubernetes, ensuring secrets are always updated

D.

It provides an interface to dynamically provision Kubernetes clusters through Vault’s infrastructure secrets.