- (Topic 3)
Which of the following actions can be performed if you only had access to a token??s accessor? (Select four)
Correct Answer:ABDE
- (Topic 5)
When looking at Vault token details, which key helps you find the paths the token is able to access?
Correct Answer:C
- (Topic 3)
Tom is authenticating to Vault using the CLI. Which of the following commands allows Tom to authenticate using the userpass method WITHOUT logging his password to the shell history?
Correct Answer:B
- (Topic 4)
Which of the following capabilities can be used when writing a Vault policy? (Select four)
Correct Answer:ABEF
- (Topic 3)
Tanner manages a data processing application and needs to be sure the data being processed is encrypted so it is securely stored post-processing. Which secrets engines can encrypt data? (Select three)
Correct Answer:ABD