- (Topic 5)
You have been tasked with writing a policy that will allow read permissions for all secrets at path secret/bar. The users that are assigned this policy should also be able to list the secrets.What should this policy look like?
Correct Answer:C
- (Topic 4)
You are planning the deployment of your first Vault cluster and have decided to use Integrated Storage as the storage backend. Where do you configure the storage backend to be used by Vault?
Correct Answer:C
- (Topic 1)
You??ve set up multiple Vault clusters, one on-premises intended to be the primary cluster, and the second cluster in AWS, which was deployed for performance replication. After enabling replication, developers complain that all the data they??ve stored in the AWS Vault cluster is missing. What happened?
Correct Answer:B
- (Topic 4)
What of the following features are true about batch tokens in Vault? (Select two)
Correct Answer:AC
- (Topic 4)
Your co-worker has asked you to perform certain operations in Vault and has provided you with a token accessor (not the token itself). What Vault operations would you be allowed to perform using only the provided accessor? (Select three)
Correct Answer:ABD
- (Topic 2)
Compared to service tokens, batch tokens are ideal for what type of action?
Correct Answer:D