An authentication method should be selected for a use case based on:
Which of the following statements describe the secrets engine in Vault? Choose three correct answers.
Which of the following describes usage of an identity group?
What can be used to limit the scope of a credential breach?
A developer mistakenly committed code that contained AWS S3 credentials into a public repository. You have been tasked with revoking the AWS S3 credential that was in the code. This credential was created using Vault's AWS secrets engine and the developer received the following output when requesting a credential from Vault.
Which Vault command will revoke the lease and remove the credential from AWS?
A web application uses Vault's transit secrets engine to encrypt data in-transit. If an attacker intercepts the data in transit which of the following statements are true? Choose two correct answers.
Which Vault secret engine may be used to build your own internal certificate authority?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
HashiCorp Free Exams |
---|
![]() |