HashiCorp
Vault-Associate
Q1:
Which Vault secret engine may be used to build your own internal certificate authority?
○
A
Transit○
B
PKI○
C
PostgreSQL○
D
Generic
HashiCorp
Vault-Associate
Q2:
What is a benefit of response wrapping?
○
A
Log every use of a secret○
B
Load balanc secret generation across a Vault cluster○
C
Provide error recovery to a secret so it is not corrupted in transit○
D
Ensure that only a single party can ever unwrap the token and see what's inside
HashiCorp
Vault-Associate
Q3:
Which of the following statements describe the secrets engine in Vault? Choose three correct answers.
☐
A
Some secrets engines simply store and read data☐
B
Once enabled, you cannot disable the secrets engine☐
C
You can build your own custom secrets engine☐
D
Each secrets engine is isolated to its path☐
E
A secrets engine cannot be enabled at multiple paths
HashiCorp
Vault-Associate
Q4:
The Vault encryption key is stored in Vault's backend storage.
○
A
True○
B
False
HashiCorp
Vault-Associate
Q5:
A web application uses Vault's transit secrets engine to encrypt data in-transit. If an attacker intercepts the data in transit which of the following statements are true? Choose two correct answers.
☐
A
You can rotate the encryption key so that the attacker won't be able to decrypt the data☐
B
The keys can be rotated and min_decryption_version moved forward to ensure this data cannot be decrypted☐
C
The Vault administrator would need to seal the Vault server immediately☐
D
Even if the attacker was able to access the raw data, they would only have encrypted bits (TLS in transit)