A DevOps engineer has set up LDAP and GitHub auth methods. The engineer must ensure user Sarah, who authenticates via either method, has consistent access permissions. Which approach correctly describes how to achieve this in Vault?
Elijah manages a legacy application that requires strict control over when its service account credentials change. Which type of credential should be used for this legacy application?
Which of the following auth methods are intended for machine-to-machine authentication, and not necessarily human (operator) authentication? (Select four)
You have TBs of data encrypted by Vault stored in a database and are worried about Vault becoming unavailable and not being able to decrypt the data. Is it possible to export the encryption key to store it somewhere else in the event Vault becomes unavailable?
True or False? The following policy permits a user to read secrets contained in the path secrets/cloud/apps/jenkins?
text
CollapseWrapCopy
path "secrets/cloud/apps/jenkins/*" {
capabilities = ["create", "read", "update", "delete", "list"]
}
You have multiple Kubernetes pods that need frequent access to Vault to retrieve credentials for establishing connectivity to a backend database. You enable the Kubernetes auth method in Vault. What resource do you need to create within Kubernetes to complete this configuration?
In Vault, there are two main types of tokens, batch and service. Which of the following is true about the renewable capabilities of each?
Vault operators can create two types of groups in Vault. What are the two types?
Which of the following features in Vault will replicate service tokens between clusters?
Which of the following actions can be performed if you only had access to a token’s accessor? (Select four)