- (Topic 3)
Elijah manages a legacy application that requires strict control over when its service account credentials change. Which type of credential should be used for this legacy application?
Correct Answer:A
- (Topic 4)
Your co-worker has asked you to perform certain operations in Vault and has provided you with a token accessor (not the token itself). What Vault operations would you be allowed to perform using only the provided accessor? (Select three)
Correct Answer:ABD
- (Topic 2)
Which auth method is ideal for machine-to-machine authentication?
Correct Answer:D
- (Topic 5)
To give a role the ability to display or output all of the end points under the /secrets/apps/* end point it would need to have which capability set?
Correct Answer:C
- (Topic 4)
Over a few years, you have a lot of data that has been encrypted by older versions of a Transit encryption key. Due to compliance regulations, you have to re-encrypt the data using the newest version of the encryption key. What is the easiest way to complete this task without putting the data at risk?
Correct Answer:C