New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

SECRET-SEN CyberArk Sentry Secrets Manager Questions and Answers

Questions 4

When installing the Vault Conjur Synchronizer, you see this error:

Forbidden

Logon Token is Empty – Cannot logon

Unauthorized

What must you ensure to remediate the issue?

Options:

A.

This admin user must not be logged in to other sessions during the Vault Conjur Synchronizer installation process.

B.

You specified the correct url for Conjur and it is listed as a SAN on that url’s certificate.

C.

You correctly URI encoded the url in the installation script.

D.

You ran powershell as Administrator and there is sufficient space on the server on which you are running the installation.

Buy Now
Questions 5

During the configuration of Conjur, what is a possible deployment scenario?

Options:

A.

The Leader and Followers are deployed outside of a Kubernetes environment; Slandbys can run inside a Kubernetes environment.

B.

The Conjur Leader cluster is deployed outside of a Kubernetes environment; Followers can run inside or outside the environment.

C.

The Leader cluster is deployed outside a Kubernetes environment; Followers and Standbys can run inside or outside the environment.

D.

The Conjur Leader cluster and Followers are deployed inside a Kubernetes environment.

Buy Now
Questions 6

You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential.

How do you configure the Vault Conjur Synchronizer to properly sync all properties?

Options:

A.

Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true.

B.

Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true.

C.

Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true.

D.

In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

Buy Now
Questions 7

A customer wants to ensure applications can retrieve secrets from Conjur in three different data centers if the Conjur Leader becomes unavailable. Conjur Followers are already deployed in each of these data centers.

How should you architect the solution to support this requirement?

Options:

A.

No changes are required.

B.

Deploy a Standby in each data center that can be promoted to the role of Leader.

C.

Extend the auto failover cluster to include Standby© in each data center and allow for automatic recovery should the Leader become unavailable.

D.

Deploy a CP provider on the Follower server to provide offline caching capabilities for the Follower.

Buy Now
Questions 8

Arrange the steps of a Conjur authentication flow in the correct sequence.

Options:

Buy Now
Questions 9

You are enabling synchronous replication on Conjur cluster.

What should you do?

Options:

A.

Execute this command on the Leader:

docker exec sh –c”

evoke replication sync that

*

B.

Execute this command on each Standby:

docker exec sh –c”

evoke replication sync that

*

C.

In Conjur web UI, click the Tools icon in the top right corner of the main window.

Choose Conjur Cluster and click “Enable synchronous replication” in the entry for Leader.

D.

In Conjur web UI, click the Tools icon in the top right corner of the main window.

Choose Conjur Cluster and click “Enable synchronous replication” in the entry for Standbys.

Buy Now
Questions 10

You are diagnosing this log entry:

From Conjur logs:

Given these errors, which problem is causing the breakdown?

Options:

A.

The Jenkins certificate chain is not trusted by Conjur.

B.

The Conjur certificate chain is not trusted by Jenkins.

C.

The JWT sent by Jenkins does not match the Conjur host annotations.

D.

The Jenkins certificate is malformed and will not be trusted by Conjur.

Buy Now
Questions 11

Followers are replications of the Leader configured for which purpose?

Options:

A.

synchronous replication to ensure that there is always an up-to-date database

B.

asynchronous replication from the Leader which allows secret reads at scale

C.

asynchronous replication from the Leader with read/write operations capability

D.

synchronous replication to ensure high availability

Buy Now
Questions 12

Which statement is correct about this message?

Message: “[number-of-deleted-rows] rows has successfully deleted “CEADBR009D Finished vacuum”?

Options:

A.

It notes the number of records deleted from the database and does not require any action.

B.

The user specified for Conjur does not have the appropriate permissions to retrieve the audit database (audit .db).

C.

When audit retention was performed, the query on the Ul audit database (audit.db) generated an error.

D.

The Vault Conjur Synchronizer successfully deleted the password objects that were marked for deletion in the PVWA.

Buy Now
Questions 13

When loading policy, you receive a 422 Response from Conjur with a message.

What could cause this issue?

Options:

A.

malformed Policy file

B.

incorrect Leader URL

C.

misconfigured Load Balancer health check

D.

incorrect Vault Conjur Synchronizer URL

Buy Now
Questions 14

A customer requires high availability in its AWS cloud infrastructure.

What is the minimally viable Conjur deployment architecture to achieve this?

Options:

A.

one Follower in each AZ. load balancer for the region

B.

two Followers in each region, load balanced for the region

C.

two Followers in each AZ. load balanced for the region

D.

two Followers in each region, load balanced across all regions

Buy Now
Questions 15

What is the correct command to import the root CA certificate into Conjur?

Options:

A.

docker exec evoke ca import – –no-restart – –root

B.

docker exec evoke import – –no-restart – –root

C.

docker exec evoke ca import – –no-restart

D.

docker exec ca import

Buy Now
Questions 16

Arrange the manual failover configuration steps in the correct sequence.

Options:

Buy Now
Questions 17

You are deploying Kubernetes resources/objects as Conjur identities.

In addition to Namespace and Deployment, from which options can you choose? (Choose two.)

Options:

A.

ServiceAccount

B.

Replica sets

C.

Secrets

D.

Tokenreviews

E.

StatefulSet

Buy Now
Questions 18

Where can all the self-signed/imported certificates be found in Conjur?

Options:

A.

/opt/conjur/etc/ssl from the Conjur containers

B.

/opt/conjur/certificates from the Conjur containers

C.

/opt/cyberark/dap/certs from the Conjur containers

D.

Log in to the Conjur UI > Conjur Cluster > Certificates > view.

Buy Now
Exam Code: SECRET-SEN
Exam Name: CyberArk Sentry Secrets Manager
Last Update: Dec 26, 2024
Questions: 60
SECRET-SEN pdf

SECRET-SEN PDF

$25.5  $84.99
SECRET-SEN Engine

SECRET-SEN Testing Engine

$30  $99.99
SECRET-SEN PDF + Engine

SECRET-SEN PDF + Testing Engine

$40.5  $134.99