Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

SECRET-SEN Sample Questions Answers

Questions 4

Match the correct network port to its function in Conjur.

Options:

Buy Now
Questions 5

During the configuration of Conjur, what is a possible deployment scenario?

Options:

A.

The Leader and Followers are deployed outside of a Kubernetes environment; Slandbys can run inside a Kubernetes environment.

B.

The Conjur Leader cluster is deployed outside of a Kubernetes environment; Followers can run inside or outside the environment.

C.

The Leader cluster is deployed outside a Kubernetes environment; Followers and Standbys can run inside or outside the environment.

D.

The Conjur Leader cluster and Followers are deployed inside a Kubernetes environment.

Buy Now
Questions 6

An application owner reports that their application is suddenly receiving an incorrect password. CPM logs show the password was recently changed, but the value currently being retrieved by the application is a different value. The Vault Conjur Synchronizer service is running.

What is the most likely cause of this issue?

Options:

A.

The Vault Conjur Synchronizer is not configured with the DR Vault IP address and there has been a failover event.

B.

Dual Accounts are in use, but after the CPM changed the password for the Inactive account, it accidentally updated the password for the Active account instead.

C.

The CPM is writing password changes to the Primary Vault while the Vault Conjur Synchronizer is configured to replicate from the DR Vault.

D.

The application has been configured to retrieve the wrong password.

Buy Now
Questions 7

If you rename an account or Safe, the Vault Conjur Synchronizer recreates these accounts and safes with their new name and deletes the old accounts or safes.

What does this mean?

Options:

A.

Their permissions in Coniur must also be recreated to access them.

B.

Their permissions in Coniur remain the same.

C.

You can not rename an account or safe.

D.

The Vault-Conjur Synchronizer will recreate these accounts and safes with their exact same names.

Buy Now
Questions 8

What does “Line of business (LOB)” represent?

Options:

A.

a business group requiring access to secrets from the Vault/Privilege Claud to facilitate syncing accounts to Conjur

B.

the services that Conjur offers and typically refers to a group of application identities in Conjur

C.

a business group that meets a certain set of Conjur policies for entitlements and policy management

D.

the services that Conjur offers and typically refers to the list of configured and enabled authenticators in Conjur

Buy Now
Questions 9

You are setting up the Secrets Provider for Kubernetes to support rotation with Push-to-File mode.

Which deployment option should be used?

Options:

A.

Init container

B.

Application container

C.

Sidecar

D.

Service Broker

Buy Now
Questions 10

You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential.

How do you configure the Vault Conjur Synchronizer to properly sync all properties?

Options:

A.

Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true.

B.

Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true.

C.

Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true.

D.

In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

Buy Now
Questions 11

You are upgrading an HA Conjur cluster consisting of 1x Leader, 2x Standbys & 1x Follower. You stopped replication on the Standbys and Followers and took a backup of the Leader.

Arrange the steps to accomplish this in the correct sequence.

Options:

Buy Now
Questions 12

You are installing a Credential Provider on a Linux host. Arrange the installation steps in the correct sequence.

Options:

Buy Now
Questions 13

You are diagnosing this log entry:

From Conjur logs:

Given these errors, which problem is causing the breakdown?

Options:

A.

The Jenkins certificate chain is not trusted by Conjur.

B.

The Conjur certificate chain is not trusted by Jenkins.

C.

The JWT sent by Jenkins does not match the Conjur host annotations.

D.

The Jenkins certificate is malformed and will not be trusted by Conjur.

Buy Now
Questions 14

Refer to the exhibit.

In which example will auto-failover occur?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 15

Match each scenario to the appropriate Secrets Manager solution.

Options:

Buy Now
Questions 16

You have a PowerShell script that is being used on 1000 workstations. It requires a Windows Domain credential that is currently hard coded in the script.

What is the simplest solution to remove that credential from the Script?

Options:

A.

Modify the script to use the CLI SDK to fetch the secret at runtime using Credential Providers installed on each workstation.

B.

Modify the script to make a SOAP call to retrieve the secret from the Central Credential Provider.

C.

Modify the script to run on WebSphere using the Application Server Credential Provider to retrieve the secret.

D.

Use Conjur Summon to invoke the script and inject the secret at run time.

Buy Now
Questions 17

What is a possible Conjur node role change?

Options:

A.

A Standby may be promoted to a Leader.

B.

A Follower may be promoted to a Leader.

C.

A Standby may be promoted to a Follower.

D.

A Leader may be demoted to a Standby in the event of a failover.

Buy Now
Questions 18

What is the most maintenance-free way to ensure a Conjur host’s access reflects any changes made to accounts in a safe in the CyberArk vault?

Options:

A.

Write an automation script to update and load the host’s policy using PATCH/update.

B.

Use yami anchor [&] and wildcard (*) syntax to maintain its list of permission grants.

C.

Grant the consumers group/role created by the Synchronizer for the Safe to the host.

D.

Use PVWA to add the Conjur host ID as a member of the Safe.

Buy Now
Exam Code: SECRET-SEN
Exam Name: CyberArk Sentry Secrets Manager
Last Update: Nov 15, 2024
Questions: 60
$64  $159.99
$48  $119.99
$40  $99.99
buy now SECRET-SEN