Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CyberArk SECRET-SEN CyberArk Sentry - Secrets Manager Exam Practice Test

Page: 1 / 6
Total 60 questions

CyberArk Sentry - Secrets Manager Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

When using the Seed Fetcher to deploy Kubernetes Followers, an error occurs in the Seed Fetcher container. You check the logs and discover that although the Seed Fetcher was able to authenticate, it shows a 500 error in the log and does not successfully retrieve a seed file. What is the cause?

Options:

A.

The certificate based on the Follower DNS name is not present on the Leader.

B.

The host you configured does not have access to see the certificates.

C.

The synchronizer service crashed and needs to be restarted.

D.

The Leader does not have the authenticator webservice enabled.

Question 2

When loading policy, you receive a 422 Response from Conjur with a message.

What could cause this issue?

Options:

A.

malformed Policy file

B.

incorrect Leader URL

C.

misconfigured Load Balancer health check

D.

incorrect Vault Conjur Synchronizer URL

Question 3

Match each scenario to the appropriate Secrets Manager solution.

Options:

Question 4

While troubleshooting an issue with accounts not syncing to Conjur, you see this in the log file:

What could be the issue?

Options:

A.

Connection timed out to the Vault.

B.

Safe permissions for the LOB user are incorrect.

C.

Connection timed out during loading policy through SDK.

D.

At first Vault Conjur Synchronizer start up, the number of LOBs is exceeded.

Question 5

During the configuration of Conjur, what is a possible deployment scenario?

Options:

A.

The Leader and Followers are deployed outside of a Kubernetes environment; Slandbys can run inside a Kubernetes environment.

B.

The Conjur Leader cluster is deployed outside of a Kubernetes environment; Followers can run inside or outside the environment.

C.

The Leader cluster is deployed outside a Kubernetes environment; Followers and Standbys can run inside or outside the environment.

D.

The Conjur Leader cluster and Followers are deployed inside a Kubernetes environment.

Question 6

When installing the Vault Conjur Synchronizer, you see this error:

Forbidden

Logon Token is Empty – Cannot logon

Unauthorized

What must you ensure to remediate the issue?

Options:

A.

This admin user must not be logged in to other sessions during the Vault Conjur Synchronizer installation process.

B.

You specified the correct url for Conjur and it is listed as a SAN on that url’s certificate.

C.

You correctly URI encoded the url in the installation script.

D.

You ran powershell as Administrator and there is sufficient space on the server on which you are running the installation.

Question 7

What is a possible Conjur node role change?

Options:

A.

A Standby may be promoted to a Leader.

B.

A Follower may be promoted to a Leader.

C.

A Standby may be promoted to a Follower.

D.

A Leader may be demoted to a Standby in the event of a failover.

Question 8

When working with Credential Providers in a Privileged Cloud setting, what is a special consideration?

Options:

A.

If there are installation issues, troubleshooting may need to involve the Privileged Cloud support team.

B.

Credential Providers are not supported in a Privileged Cloud setting.

C.

The AWS Cloud account number must be defined in the file main appprovider.conf. . found in the AppProviderConf Safe.

D.

Debug logging for Credential Providers deployed in a Privileged Cloud setting can inadvertently exhaust available disk space.

Question 9

A customer wants to ensure applications can retrieve secrets from Conjur in three different data centers if the Conjur Leader becomes unavailable. Conjur Followers are already deployed in each of these data centers.

How should you architect the solution to support this requirement?

Options:

A.

No changes are required.

B.

Deploy a Standby in each data center that can be promoted to the role of Leader.

C.

Extend the auto failover cluster to include Standby© in each data center and allow for automatic recovery should the Leader become unavailable.

D.

Deploy a CP provider on the Follower server to provide offline caching capabilities for the Follower.

Question 10

In a 3-node auto-failover cluster, the Leader has been brought down for patching that lasts longer than the configured TTL. A Standby has been promoted.

Which steps are required to repair the cluster when the old Leader is brought back online?

Options:

A.

On the new Leader, generate a Standby seed for the old Leader node and add it to the cluster member list.

Rebuild the old Leader as a new Standby and then re-enroll the node to the cluster.

B.

Generate a Standby seed for the newly promoted Leader.

Stop and remove the container on the new Leader, then rebuild it as a new Standby.

Re-enroll the Standby to the cluster and re-base replication of the 3rd Standby back to the old Leader.

C.

Generate standby seeds for the newly-promoted Leader and the 3rd Standby

Stop and remove the containers and then rebuild them as new Standbys.

On both new Standbys, re-enroll the node to the cluster.

D.

On the new Leader, generate a Standby seed for the old Leader node and re-upload the auto-failover policy in “replace” mode.

Rebuild the old Leader as a new Standby, then re-enroll the node to the cluster.

Question 11

A customer wants to minimize the Kubernetes application code developers must change to adopt Conjur for secrets access.

Which solutions can meet this requirement? (Choose two.)

Options:

A.

CPM Push-to-File

B.

Secrets Provider

C.

authn-Azure

D.

Secretless

E.

Application Server Credential Provider

Question 12

You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential.

How do you configure the Vault Conjur Synchronizer to properly sync all properties?

Options:

A.

Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true.

B.

Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true.

C.

Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true.

D.

In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

Question 13

What is the correct process to upgrade the CCP Web Service?

Options:

A.

Run “sudo yum update aimprv” from the CLI.

B.

Double-click the Credential Provider installer executable and select upgrade.

C.

Double-click the AimWebService.msi and select upgrade.

D.

Uninstall and reinstall the CCP Web Service.

Question 14

You have a PowerShell script that is being used on 1000 workstations. It requires a Windows Domain credential that is currently hard coded in the script.

What is the simplest solution to remove that credential from the Script?

Options:

A.

Modify the script to use the CLI SDK to fetch the secret at runtime using Credential Providers installed on each workstation.

B.

Modify the script to make a SOAP call to retrieve the secret from the Central Credential Provider.

C.

Modify the script to run on WebSphere using the Application Server Credential Provider to retrieve the secret.

D.

Use Conjur Summon to invoke the script and inject the secret at run time.

Question 15

You are diagnosing this log entry:

From Conjur logs:

Given these errors, which problem is causing the breakdown?

Options:

A.

The Jenkins certificate chain is not trusted by Conjur.

B.

The Conjur certificate chain is not trusted by Jenkins.

C.

The JWT sent by Jenkins does not match the Conjur host annotations.

D.

The Jenkins certificate is malformed and will not be trusted by Conjur.

Question 16

What is the correct command to import the root CA certificate into Conjur?

Options:

A.

docker exec evoke ca import – –no-restart – –root

B.

docker exec evoke import – –no-restart – –root

C.

docker exec evoke ca import – –no-restart

D.

docker exec ca import

Question 17

Match each cloud platform to the correct Conjur authenticator.

Options:

Question 18

A Kubernetes application attempting to authenticate to the Follower load balancer receives this error:

ERROR: 2024/10/30 06:07:08 authenticator.go:139: CAKC029E Received invalid response to certificate signing request. Reason: status code 401

When checking the logs, you see this message:

authn-k8s/prd-cluster-01 is not enabled

How do you remediate the issue?

Options:

A.

Check the info endpoint on each Follower behind the load balancer and enable the authenticator on the Follower.

B.

Modify conjur.conf in /opt/conjur/etc/authenticators addinqthe authenticator webservice.

C.

A network issue is preventing the application from reaching the Follower; correct the issue and verity that it is resolved.

D.

Enable the authenticator in the Ul > Webservices > Authenticators > Enable and enable the appropriate authenticator webservice.

Page: 1 / 6
Total 60 questions