Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CyberArk Sentry Secrets Manager

Last Update 2 days ago Total Questions : 60

The CyberArk Sentry Secrets Manager content is now fully updated, with all current exam questions added 2 days ago. Deciding to include SECRET-SEN practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SECRET-SEN exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SECRET-SEN sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CyberArk Sentry Secrets Manager practice test comfortably within the allotted time.

Question # 4

While installing the first CP in an environment, errors that occurred when the environment was created are displayed; however, the installation procedure continued and finished successfully.

What should you do?

A.

Continue configuring the application to use the CP. No further action is needed since the successful installation makes the error message benign.

B.

Review the lag file 'CreateEnv.loq' and investigate any error messages it contains.

C.

Run setup.exe again and select 'Recreate Vault Environment'. Provide the details of a user with more privileges when prompted by the installer.

D.

Review the PV WA lags to determine which REST API call used during the installation failed.

Question # 5

When an application is retrieving a credential from Conjur, the application authenticates to Follower A. Follower B receives the next request to retrieve the credential.

What happens next?

A.

The Coniur Token is stateless and Follower B is able to validate the Token and satisfy the request.

B.

The Coniur Token is stateful and Follower B is unable to validate the Token promptinq the application to re-authenticate.

C.

The Coryur Token is stateless and Follower B redirects the request to Follower A to satisfy the request.

D.

The Coniur Token is stateful and Follower B redirects the request to Follower A to satisfy the request.

Question # 6

A customer wants to ensure applications can retrieve secrets from Conjur in three different data centers if the Conjur Leader becomes unavailable. Conjur Followers are already deployed in each of these data centers.

How should you architect the solution to support this requirement?

A.

No changes are required.

B.

Deploy a Standby in each data center that can be promoted to the role of Leader.

C.

Extend the auto failover cluster to include Standby© in each data center and allow for automatic recovery should the Leader become unavailable.

D.

Deploy a CP provider on the Follower server to provide offline caching capabilities for the Follower.

Question # 7

In a 3-node auto-failover cluster, the Leader has been brought down for patching that lasts longer than the configured TTL. A Standby has been promoted.

Which steps are required to repair the cluster when the old Leader is brought back online?

A.

On the new Leader, generate a Standby seed for the old Leader node and add it to the cluster member list.

Rebuild the old Leader as a new Standby and then re-enroll the node to the cluster.

B.

Generate a Standby seed for the newly promoted Leader.

Stop and remove the container on the new Leader, then rebuild it as a new Standby.

Re-enroll the Standby to the cluster and re-base replication of the 3rd Standby back to the old Leader.

C.

Generate standby seeds for the newly-promoted Leader and the 3rd Standby

Stop and remove the containers and then rebuild them as new Standbys.

On both new Standbys, re-enroll the node to the cluster.

D.

On the new Leader, generate a Standby seed for the old Leader node and re-upload the auto-failover policy in “replace” mode.

Rebuild the old Leader as a new Standby, then re-enroll the node to the cluster.

Question # 8

A customer requires high availability in its AWS cloud infrastructure.

What is the minimally viable Conjur deployment architecture to achieve this?

A.

one Follower in each AZ. load balancer for the region

B.

two Followers in each region, load balanced for the region

C.

two Followers in each AZ. load balanced for the region

D.

two Followers in each region, load balanced across all regions

Question # 9

When attempting to retrieve a credential, you receive an error 401 – Malformed Authorization Token.

What is the cause of the issue?

A.

The token is not correctly encoded.

B.

The token you are trying to retrieve does not exist.

C.

The host does not have access to the credential with the current token.

D.

The credential has not been initialized.

Question # 10

You are diagnosing this log entry:

From Conjur logs:

Given these errors, which problem is causing the breakdown?

A.

The Jenkins certificate chain is not trusted by Conjur.

B.

The Conjur certificate chain is not trusted by Jenkins.

C.

The JWT sent by Jenkins does not match the Conjur host annotations.

D.

The Jenkins certificate is malformed and will not be trusted by Conjur.

Go to page: