Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

SECRET-SEN CyberArk Sentry - Secrets Manager Questions and Answers

Questions 4

What is a main advantage of using dual accounts in password management?

Options:

A.

Since passwords are cached for both rotation accounts, it ensures the password for an application will not be changed, reducing the amount of blackout dates when a password expires.

B.

It ensures passwords are rotated every 90 days, which respects the expected downtime for a system, database, or application

C.

It ensures no delays are incurred when the application needs credentials because a password that is currently used by an application will never be changed

D.

Since there are two active accounts, it doubles the probability that a system, database, or application will successfully authenticate.

Buy Now
Questions 5

When installing the CCP and configuring it for use behind a load balancer, which authentication methods may be affected? (Choose two.)

Options:

A.

Allowed Machines authentication

B.

[Client Certificate authentication

C.

OS User

D.

Path

E.

Hash

Buy Now
Questions 6

When using the Seed Fetcher to deploy Kubernetes Followers, an error occurs in the Seed Fetcher container. You check the logs and discover that although the Seed Fetcher was able to authenticate, it shows a 500 error in the log and does not successfully retrieve a seed file. What is the cause?

Options:

A.

The certificate based on the Follower DNS name is not present on the Leader.

B.

The host you configured does not have access to see the certificates.

C.

The synchronizer service crashed and needs to be restarted.

D.

The Leader does not have the authenticator webservice enabled.

Buy Now
Questions 7

Match each use case to the appropriate Secrets Manager Solution.

Options:

Buy Now
Questions 8

An application owner reports that their application is suddenly receiving an incorrect password. CPM logs show the password was recently changed, but the value currently being retrieved by the application is a different value. The Vault Conjur Synchronizer service is running.

What is the most likely cause of this issue?

Options:

A.

The Vault Conjur Synchronizer is not configured with the DR Vault IP address and there has been a failover event.

B.

Dual Accounts are in use, but after the CPM changed the password for the Inactive account, it accidentally updated the password for the Active account instead.

C.

The CPM is writing password changes to the Primary Vault while the Vault Conjur Synchronizer is configured to replicate from the DR Vault.

D.

The application has been configured to retrieve the wrong password.

Buy Now
Questions 9

When working with Summon, what is the purpose of the secrets.yml file?

Options:

A.

It is where Summon outputs the secret value after retrieval.

B.

It is where you define which secrets to retrieve.

C.

It is where you store the Conjur URL and host API key.

D.

It is the log file for Summon.

Buy Now
Questions 10

Where can all the self-signed/imported certificates be found in Conjur?

Options:

A.

/opt/conjur/etc/ssl from the Conjur containers

B.

/opt/conjur/certificates from the Conjur containers

C.

/opt/cyberark/dap/certs from the Conjur containers

D.

Log in to the Conjur UI > Conjur Cluster > Certificates > view.

Buy Now
Questions 11

What is the correct process to upgrade the CCP Web Service?

Options:

A.

Run “sudo yum update aimprv” from the CLI.

B.

Double-click the Credential Provider installer executable and select upgrade.

C.

Double-click the AimWebService.msi and select upgrade.

D.

Uninstall and reinstall the CCP Web Service.

Buy Now
Questions 12

Arrange the manual failover configuration steps in the correct sequence.

Options:

Buy Now
Questions 13

An application is having authentication issues when trying to securely retrieve credential’s from the Vault using the CCP webservices RESTAPI. CyberArk Support advised that further debugging should be enabled on the CCP server to output a trace file to review detailed logs to help isolate the problem.

What best describes how to enable debug for CCP?

Options:

A.

Edit web.config. change the “AIMWebServiceTrace” value, restart Windows Web Server (IIS)

B.

In the PVWA, go to the Applications tab, select the Application in question, go to Options > Logging and choose Debug.

C.

From the command line, run appprvmgr.exe update_config logging=debug.

D.

Edit the basic_appprovider.conf, change the “AIMWebServiceTrace" value, and restart the provider.

Buy Now
Questions 14

Which API endpoint can be used to discover secrets inside of Conjur?

Options:

A.

Resources

B.

Roles

C.

Policies

D.

WhoAmi

Buy Now
Questions 15

After manually failing over to your disaster recovery site (Site B) for testing purposes, you need to failback to your primary site (Site A).

Which step is required?

Options:

A.

Contact CyberArk for a new license file.

B.

Reconfigure the Vault Conjur Synchronizer to point to the new Conjur Leader.

C.

Generate a seed for the new Leader to be deployed in Site A.

D.

Trigger autofailover to promote the Standby in Site A to Leader.

Buy Now
Questions 16

Which statement is true for the Conjur Command Line Interface (CLI)?

Options:

A.

It is supported on Windows, Red Hat Enterprise Linux, and macOS.

B.

It can only be run from the Conjur Leader node.

C.

It is required for working with the Conjur REST API.

D.

It does not implement the Conjur REST API for managing Conjur resources.

Buy Now
Questions 17

When installing the Vault Conjur Synchronizer, you see this error:

Forbidden

Logon Token is Empty – Cannot logon

Unauthorized

What must you ensure to remediate the issue?

Options:

A.

This admin user must not be logged in to other sessions during the Vault Conjur Synchronizer installation process.

B.

You specified the correct url for Conjur and it is listed as a SAN on that url’s certificate.

C.

You correctly URI encoded the url in the installation script.

D.

You ran powershell as Administrator and there is sufficient space on the server on which you are running the installation.

Buy Now
Questions 18

Refer to the exhibit.

How can you confirm that the Follower has a current copy of the database?

Options:

A.

Compare the pgcurrentxlog_locationlocation from the Leader to the Follower you need to validate against.

B.

Count the number of components in pgstartreplication and compare this to the total number of Followers in the deployment.

C.

Validate that the Follower container ID matches the node in the info endpoint on the Leader.

D.

Retrieve the credential from a test application on the Leader cluster; then retrieve against the Follower and compare if they are accurate.

Buy Now
Exam Code: SECRET-SEN
Exam Name: CyberArk Sentry - Secrets Manager
Last Update: May 4, 2024
Questions: 60
SECRET-SEN pdf

SECRET-SEN PDF

$28  $80
SECRET-SEN Engine

SECRET-SEN Testing Engine

$33.25  $95
SECRET-SEN PDF + Engine

SECRET-SEN PDF + Testing Engine

$45.5  $130