Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HashiCorp HCVA0-003 - HashiCorp Certified: Vault Associate (003)Exam

Page: 1 / 9
Total 285 questions

You have enabled the Transit secrets engine and want to start encrypting data to store in Azure Blob storage. What is the next step that needs to be completed before you can encrypt data? (Select two)

A.

Export the encryption key and upload it to the application server

B.

Enable the Transit secrets engine API

C.

Create an encryption key for the application to use

D.

Write a policy that permits the application to use the encryption key

You are planning to deploy a new Vault cluster for your organization and notice that Vault supports a wide variety of storage backends. You need high availability since you will have multiple applications relying on the Vault service. When building your cluster, can you choose any of the available storage backends?

A.

Yes, because all backends provide similar functionality

B.

No, because not all storage backends provide similar functionality

Your Azure Subscription ID is stored in Vault and you need to retrieve it via Vault API for an automated job. The Subscription ID is stored at secret/cloud/azure/subscription. The secret is stored on a KV Version 2 secrets engine. What curl command below would successfully retrieve the latest version of the secret?

A.

curl https://vault.krausen.com:8200/v1/secret/data/cloud/azure/subscription

B.

curl --header "X-Vault-Token: hvs.CbzCNJCVWt63jyzyaJakgDwz" https://vault.krausen.com:8200/v1/secret/cloud/azure/subscription

C.

curl --header "X-Vault-Token: hvs.CbzCNJCVWt63jyzyaJakgDwz"https://vault.krausen.com:8200/v1/secret/data/cloud/azure/subscription

D.

curl --header "X-Vault-Token: hvs.CbzCNJCVWt63jyzyaJakgDwz" https://vault.krausen.com:8200/secret/data/cloud/azure/subscription/latest

You are the primary Vault operator. During a routine audit, an auditor requested the ability to display all secrets under a specific path in Vault without seeing the actual stored data. Which policy permits the auditor to display the stored secrets without revealing their contents?

A.

path "kv/apps/production/" { capabilities = ["list"] }

B.

path "kv/apps/+/" { capabilities = ["list"] }

C.

path "kv/+/production" { capabilities = ["list"] }

D.

path "kv/apps/*" { capabilities = ["list", "read"] }

A large organization uses Vault for various use cases with multiple auth methods enabled. A user can authenticate via LDAP, OIDC, or a local userpass account, but they receive different policies for each method and often need to log out and back in for different actions. What can be configured in Vault to ensure users have consistent policies regardless of their authentication method?

A.

Enable the SSH secrets engine and instruct the user to obtain credentials using the new secrets engine

B.

Create a new entity and map the aliases from each of the available auth methods

C.

Assign the default policy to the user's policy used by each auth method

D.

Provide the user with an AppRole role-id and secret-id for authentication

To secure your applications, your organization uses certificates generated by a public CA. However, this strategy has proven expensive and you have to revoke certificates even though they have additional time left. What Vault plugin can be used to quickly generate X.509 certificates to secure your internal applications?

A.

Identity secrets engine

B.

PKI secrets engine

C.

SSH secrets engine

D.

Transit secrets engine

You have multiple Vault clusters in your environment, one for test and one for production. You have the CLI installed on your local machine and need to target the production cluster to make configuration changes. What environment variable can you set to target the production cluster?

A.

VAULT_REDIRECT_ADDR

B.

VAULT_CLUSTER_ADDR

C.

VAULT_ADDR

D.

VAULT_CAPATH

Over a few years, you have a lot of data that has been encrypted by older versions of a Transit encryption key. Due to compliance regulations, you have to re-encrypt the data using the newest version of the encryption key. What is the easiest way to complete this task without putting the data at risk?

A.

Rotate the encryption key used to encrypt the data

B.

Decrypt the data manually and encrypt it with the latest version

C.

Use the transit rewrap feature

D.

Create a new master key used by Vault

Your organization has applications in a primary data center and a secondary warm-standby site. You want to configure Vault replication between the primary and secondary clusters. If the primary fails over to the secondary, the applications must interact with Vault without re-authenticating. What type of Vault replication would you use?

A.

Performance Replication

B.

Integrated Storage

C.

Disaster Recovery Replication

D.

Vault Secrets Operator

You are planning the deployment of your first Vault cluster and have decided to use Integrated Storage as the storage backend. Where do you configure the storage backend to be used by Vault?

A.

In the systemd service file

B.

Inside the Vault service once Vault is up and running

C.

In the Vault configuration file

D.

In the Vault Agent sink file