New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HashiCorp VA-002-P - HashiCorp Certified: Vault Associate

Page: 2 / 6
Total 200 questions

What are some of the problems of how infrastructure was traditionally managed before Infrastructure as Code? (select three)

A.

Requests for infrastructure or hardware required a ticket, increasing the time required to deploy applications

B.

Traditional deployment methods are not able to meet the demands of the modern business where resources tend to live days to weeks, rather than months to years

C.

Traditionally managed infrastructure can't keep up with cyclic or elastic applications

D.

Pointing and clicking in a management console is a scalable approach and reduces human error as businesses are moving to a multi-cloud deployment model

What type of policy is shown below?

1. key_prefix "vault/" {

2. policy = "write"

3. }

4. node_prefix "" {

5. policy = "write"

6. }

7. service "vault" {

8. policy = "write"

9. }

10. agent_prefix "" {

11. policy = "write"

12. }

13. session_prefix "" {

14. policy = "write"

15. }

A.

Vault policy allowing access to certain paths

B.

Consul ACL policy for a Vault node

C.

Consul configuration policy to enable Consul features

D.

Vault token policy is written for a user

Which of the following is an invalid variable name?

A.

instance_name

B.

web

C.

var1

D.

count

In a Consul cluster, participating nodes can be only one of two types. Select the valid types. (select two)

A.

follower

B.

secondary

C.

active

D.

primary

E.

leader

F.

passive

By default, where does Terraform store its state file?

A.

shared directory

B.

current working directory

C.

Amazon S3 bucket

D.

remotely using Terraform Cloud

In regards to Terraform state file, select all the statements below which are correct: (select four)

A.

storing state remotely can provide better security

B.

the Terraform state can contain sensitive data, therefore the state file should be protected from unauthorized access

C.

Terraform Cloud always encrypts state at rest

D.

using the mask feature, you can instruct Terraform to mask sensitive data in the state file

E.

when using local state, the state file is stored in plain-text

F.

the state file is always encrypted at rest

During a terraform apply, a resource is successfully created but eventually fails during provisioning. What happens to the resource?

A.

Terraform attempts to provide the resource up to three times before exiting with an error

B.

the terraform plan is rolled back and all provisioned resources are removed

C.

it is automatically deleted

D.

the resource is marked as tainted

What is the result of the following terraform function call?

zipmap(["a", "b"], [1, 2])

A.

{

"a",

"b",

"1",

"2",

}

B.

[

"a",

"b",

"1",

"2",

]

C.

{

"a" = 1

"b" = 2

}

D.

[

"a" = 1

"b" = 2

]

When architecting a Vault replication configuration, why should you never terminate TLS on a front-end load balancer?

A.

If Vault detects that the traffic has been unencrypted and re-encrypted, due to the load balancer, it will automatically drop the traffic as it is no longer trusted.

B.

Vault generates self-signed mutual TLS for replication. If the LB is performing TLS termination, this will break the mutual TLS between nodes.

C.

Vault requires that only Consul service discovery can be used to direct traffic to an active Vault node.

D.

Vault replication won't work with the type of certificates that a traditional load balancer uses.

An application is trying to use a secret in which the lease has expired. What can be done in order for the application to successfully request data from Vault?

A.

request a new secret and associated lease

B.

try the expired secret in hopes it hasn't been deleted yet

C.

request the TTL be extended for the secret

D.

perform a lease renewal