Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SECRET-SEN Exam Dumps - CyberArk Sentry - Secrets Manager

Question # 4

When attempting to retrieve a credential managed by the Synchronizer, you receive this error:

What is the cause of the issue?

A.

The Conjur Leader has lost upstream connectivity to the Vault Conjur Synchronizer.

B.

The host does not have access to the credential.

C.

The path to the credential was not properly encoded.

D.

The Vault Conjur Synchronizer has crashed and needs to be restarted.

Full Access
Question # 5

After manually failing over to your disaster recovery site (Site B) for testing purposes, you need to failback to your primary site (Site A).

Which step is required?

A.

Contact CyberArk for a new license file.

B.

Reconfigure the Vault Conjur Synchronizer to point to the new Conjur Leader.

C.

Generate a seed for the new Leader to be deployed in Site A.

D.

Trigger autofailover to promote the Standby in Site A to Leader.

Full Access
Question # 6

A customer requires high availability in its AWS cloud infrastructure.

What is the minimally viable Conjur deployment architecture to achieve this?

A.

one Follower in each AZ. load balancer for the region

B.

two Followers in each region, load balanced for the region

C.

two Followers in each AZ. load balanced for the region

D.

two Followers in each region, load balanced across all regions

Full Access
Question # 7

An application owner reports that their application is suddenly receiving an incorrect password. CPM logs show the password was recently changed, but the value currently being retrieved by the application is a different value. The Vault Conjur Synchronizer service is running.

What is the most likely cause of this issue?

A.

The Vault Conjur Synchronizer is not configured with the DR Vault IP address and there has been a failover event.

B.

Dual Accounts are in use, but after the CPM changed the password for the Inactive account, it accidentally updated the password for the Active account instead.

C.

The CPM is writing password changes to the Primary Vault while the Vault Conjur Synchronizer is configured to replicate from the DR Vault.

D.

The application has been configured to retrieve the wrong password.

Full Access
Question # 8

You are deploying Kubernetes resources/objects as Conjur identities.

In addition to Namespace and Deployment, from which options can you choose? (Choose two.)

A.

ServiceAccount

B.

Replica sets

C.

Secrets

D.

Tokenreviews

E.

StatefulSet

Full Access
Question # 9

You modified a Conjur host policy to change its annotations for authentication.

How should you load the policy to make those changes?

A.

Use the default “append” method (e.g. conjur policy load ).

B.

Use the “replace” method (e.g. conjur policy load – –replace ).

C.

Use the “delete” method (e.g. conjur policy load – –delete ).

D.

Use the “update” method (e.g. conjur policy load – –update ).

Full Access
Question # 10

Findings were obtained after cataloging pending Secrets Manager use cases.

Arrange the findings in the correct order for prioritization.

Full Access
Question # 11

You have a PowerShell script that is being used on 1000 workstations. It requires a Windows Domain credential that is currently hard coded in the script.

What is the simplest solution to remove that credential from the Script?

A.

Modify the script to use the CLI SDK to fetch the secret at runtime using Credential Providers installed on each workstation.

B.

Modify the script to make a SOAP call to retrieve the secret from the Central Credential Provider.

C.

Modify the script to run on WebSphere using the Application Server Credential Provider to retrieve the secret.

D.

Use Conjur Summon to invoke the script and inject the secret at run time.

Full Access
Question # 12

Which API endpoint can be used to discover secrets inside of Conjur?

A.

Resources

B.

Roles

C.

Policies

D.

WhoAmi

Full Access
Question # 13

When working with Summon, what is the purpose of the secrets.yml file?

A.

It is where Summon outputs the secret value after retrieval.

B.

It is where you define which secrets to retrieve.

C.

It is where you store the Conjur URL and host API key.

D.

It is the log file for Summon.

Full Access
Question # 14

When loading policy, you receive a 422 Response from Conjur with a message.

What could cause this issue?

A.

malformed Policy file

B.

incorrect Leader URL

C.

misconfigured Load Balancer health check

D.

incorrect Vault Conjur Synchronizer URL

Full Access
Question # 15

Where can all the self-signed/imported certificates be found in Conjur?

A.

/opt/conjur/etc/ssl from the Conjur containers

B.

/opt/conjur/certificates from the Conjur containers

C.

/opt/cyberark/dap/certs from the Conjur containers

D.

Log in to the Conjur UI > Conjur Cluster > Certificates > view.

Full Access
Question # 16

Arrange the steps of a Conjur authentication flow in the correct sequence.

Full Access
Question # 17

You are diagnosing this log entry:

From Conjur logs:

Given these errors, which problem is causing the breakdown?

A.

The Jenkins certificate chain is not trusted by Conjur.

B.

The Conjur certificate chain is not trusted by Jenkins.

C.

The JWT sent by Jenkins does not match the Conjur host annotations.

D.

The Jenkins certificate is malformed and will not be trusted by Conjur.

Full Access
Question # 18

Which statement is correct about this message?

Message: “[number-of-deleted-rows] rows has successfully deleted “CEADBR009D Finished vacuum”?

A.

It notes the number of records deleted from the database and does not require any action.

B.

The user specified for Conjur does not have the appropriate permissions to retrieve the audit database (audit .db).

C.

When audit retention was performed, the query on the Ul audit database (audit.db) generated an error.

D.

The Vault Conjur Synchronizer successfully deleted the password objects that were marked for deletion in the PVWA.

Full Access