Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CyberArk SECRET-SEN - CyberArk Sentry Secrets Manager

Page: 2 / 2
Total 60 questions

While retrieving a secret through REST, the secret retrieval fails to find a matching secret. You know the secret onboarding process was completed, the secret is in the expected safe with the expected object name, and the CCP is able to provide secrets to other applications.

What is the most likely cause for this issue?

A.

The application ID or Application Provider does not have the correct permissions on the safe.

B.

The client certificate fingerprint is not trusted.

C.

The service account running the application does not have the correct permissions on the safe.

D.

The OS user does not have the correct permissions on the safe

You are setting up a Kubernetes integration with Conjur. With performance as the key deciding factor, namespace and service account will be used as identity characteristics.

Which authentication method should you choose?

A.

JWT-based authentication

B.

Certificate-based authentication

C.

API key authentication

D.

Connect (OIDC) authentication

Arrange the steps to configure authenticators in the correct the sequence.

What is a main advantage of using dual accounts in password management?

A.

Since passwords are cached for both rotation accounts, it ensures the password for an application will not be changed, reducing the amount of blackout dates when a password expires.

B.

It ensures passwords are rotated every 90 days, which respects the expected downtime for a system, database, or application

C.

It ensures no delays are incurred when the application needs credentials because a password that is currently used by an application will never be changed

D.

Since there are two active accounts, it doubles the probability that a system, database, or application will successfully authenticate.

While installing the first CP in an environment, errors that occurred when the environment was created are displayed; however, the installation procedure continued and finished successfully.

What should you do?

A.

Continue configuring the application to use the CP. No further action is needed since the successful installation makes the error message benign.

B.

Review the lag file 'CreateEnv.loq' and investigate any error messages it contains.

C.

Run setup.exe again and select 'Recreate Vault Environment'. Provide the details of a user with more privileges when prompted by the installer.

D.

Review the PV WA lags to determine which REST API call used during the installation failed.

When using the Seed Fetcher to deploy Kubernetes Followers, an error occurs in the Seed Fetcher container. You check the logs and discover that although the Seed Fetcher was able to authenticate, it shows a 500 error in the log and does not successfully retrieve a seed file. What is the cause?

A.

The certificate based on the Follower DNS name is not present on the Leader.

B.

The host you configured does not have access to see the certificates.

C.

The synchronizer service crashed and needs to be restarted.

D.

The Leader does not have the authenticator webservice enabled.

What is the most maintenance-free way to ensure a Conjur host’s access reflects any changes made to accounts in a safe in the CyberArk vault?

A.

Write an automation script to update and load the host’s policy using PATCH/update.

B.

Use yami anchor [&] and wildcard (*) syntax to maintain its list of permission grants.

C.

Grant the consumers group/role created by the Synchronizer for the Safe to the host.

D.

Use PVWA to add the Conjur host ID as a member of the Safe.

You modified a Conjur host policy to change its annotations for authentication.

How should you load the policy to make those changes?

A.

Use the default “append” method (e.g. conjur policy load ).

B.

Use the “replace” method (e.g. conjur policy load – –replace ).

C.

Use the “delete” method (e.g. conjur policy load – –delete ).

D.

Use the “update” method (e.g. conjur policy load – –update ).