Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CyberArk SECRET-SEN CyberArk Sentry - Secrets Manager Exam Practice Test

Demo: 18 questions
Total 60 questions

CyberArk Sentry - Secrets Manager Questions and Answers

Question 1

If you rename an account or Safe, the Vault Conjur Synchronizer recreates these accounts and safes with their new name and deletes the old accounts or safes.

What does this mean?

Options:

A.

Their permissions in Coniur must also be recreated to access them.

B.

Their permissions in Coniur remain the same.

C.

You can not rename an account or safe.

D.

The Vault-Conjur Synchronizer will recreate these accounts and safes with their exact same names.

Question 2

After manually failing over to your disaster recovery site (Site B) for testing purposes, you need to failback to your primary site (Site A).

Which step is required?

Options:

A.

Contact CyberArk for a new license file.

B.

Reconfigure the Vault Conjur Synchronizer to point to the new Conjur Leader.

C.

Generate a seed for the new Leader to be deployed in Site A.

D.

Trigger autofailover to promote the Standby in Site A to Leader.

Question 3

When working with Credential Providers in a Privileged Cloud setting, what is a special consideration?

Options:

A.

If there are installation issues, troubleshooting may need to involve the Privileged Cloud support team.

B.

Credential Providers are not supported in a Privileged Cloud setting.

C.

The AWS Cloud account number must be defined in the file main appprovider.conf. . found in the AppProviderConf Safe.

D.

Debug logging for Credential Providers deployed in a Privileged Cloud setting can inadvertently exhaust available disk space.

Question 4

When working with Summon, what is the purpose of the secrets.yml file?

Options:

A.

It is where Summon outputs the secret value after retrieval.

B.

It is where you define which secrets to retrieve.

C.

It is where you store the Conjur URL and host API key.

D.

It is the log file for Summon.

Question 5

Match the correct network port to its function in Conjur.

Options:

Question 6

What is the correct command to import the root CA certificate into Conjur?

Options:

A.

docker exec evoke ca import – –no-restart – –root

B.

docker exec evoke import – –no-restart – –root

C.

docker exec evoke ca import – –no-restart

D.

docker exec ca import

Question 7

You want to allow retrieval of a secret with the CCP. The safe and the required secrets already exist.

Assuming the CCP is installed, arrange the steps in the correct sequence.

Options:

Question 8

Arrange the steps of a Conjur authentication flow in the correct sequence.

Options:

Question 9

While troubleshooting an issue with accounts not syncing to Conjur, you see this in the log file:

What could be the issue?

Options:

A.

Connection timed out to the Vault.

B.

Safe permissions for the LOB user are incorrect.

C.

Connection timed out during loading policy through SDK.

D.

At first Vault Conjur Synchronizer start up, the number of LOBs is exceeded.

Question 10

Arrange the steps to configure authenticators in the correct the sequence.

Options:

Question 11

What is a possible Conjur node role change?

Options:

A.

A Standby may be promoted to a Leader.

B.

A Follower may be promoted to a Leader.

C.

A Standby may be promoted to a Follower.

D.

A Leader may be demoted to a Standby in the event of a failover.

Question 12

While retrieving a secret through REST, the secret retrieval fails to find a matching secret. You know the secret onboarding process was completed, the secret is in the expected safe with the expected object name, and the CCP is able to provide secrets to other applications.

What is the most likely cause for this issue?

Options:

A.

The application ID or Application Provider does not have the correct permissions on the safe.

B.

The client certificate fingerprint is not trusted.

C.

The service account running the application does not have the correct permissions on the safe.

D.

The OS user does not have the correct permissions on the safe

Question 13

During the configuration of Conjur, what is a possible deployment scenario?

Options:

A.

The Leader and Followers are deployed outside of a Kubernetes environment; Slandbys can run inside a Kubernetes environment.

B.

The Conjur Leader cluster is deployed outside of a Kubernetes environment; Followers can run inside or outside the environment.

C.

The Leader cluster is deployed outside a Kubernetes environment; Followers and Standbys can run inside or outside the environment.

D.

The Conjur Leader cluster and Followers are deployed inside a Kubernetes environment.

Question 14

You are upgrading an HA Conjur cluster consisting of 1x Leader, 2x Standbys & 1x Follower. You stopped replication on the Standbys and Followers and took a backup of the Leader.

Arrange the steps to accomplish this in the correct sequence.

Options:

Question 15

Which API endpoint can be used to discover secrets inside of Conjur?

Options:

A.

Resources

B.

Roles

C.

Policies

D.

WhoAmi

Question 16

When loading policy, you receive a 422 Response from Conjur with a message.

What could cause this issue?

Options:

A.

malformed Policy file

B.

incorrect Leader URL

C.

misconfigured Load Balancer health check

D.

incorrect Vault Conjur Synchronizer URL

Question 17

Findings were obtained after cataloging pending Secrets Manager use cases.

Arrange the findings in the correct order for prioritization.

Options:

Question 18

Match each use case to the appropriate Secrets Manager Solution.

Options:

Demo: 18 questions
Total 60 questions