- (Topic 1)
What are the primary benefits of running Vault in a production deployment over dev server mode (select two)?
Correct Answer:
BD
- (Topic 5)
Your organization has an initiative to reduce and ultimately remove the use of long lived X.509 certificates. Which secrets engine will best support this use case?
Correct Answer:
A
- (Topic 1)
You are using an orchestrator to deploy a new application. Even though the orchestrator creates anew AppRole secret ID, security requires that only the new application has the combination of the role ID and secret ID. What feature can you use to meet these requirements?
Correct Answer:
B
- (Topic 2)
An application has authenticated to Vault and has obtained dynamic database credentials with a lease of 4 hours. Four hours later, the credentials expire, and the application can no longer communicate with the backend database, so the application goes down. What should the developers instruct the application to do to prevent this from happening again while maintaining the same level of security?
Correct Answer:
B
- (Topic 5)
What can be used to limit the scope of a credential breach?
Correct Answer:
C