Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

SECRET-SEN PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

SECRET-SEN PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CyberArk Sentry Secrets Manager
  • Last Update: May 2, 2024
  • Questions and Answers: 60
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

SECRET-SEN Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

SECRET-SEN Practice Exam Questions with Answers CyberArk Sentry Secrets Manager Certification

Question # 6

Arrange the manual failover configuration steps in the correct sequence.

SECRET-SEN question answer

Full Access
Question # 7

What is the correct process to upgrade the CCP Web Service?

A.

Run “sudo yum update aimprv” from the CLI.

B.

Double-click the Credential Provider installer executable and select upgrade.

C.

Double-click the AimWebService.msi and select upgrade.

D.

Uninstall and reinstall the CCP Web Service.

Full Access
Question # 8

In the event of a failover of the Vault server from the primary to the DR, which configuration option ensures that a CP will continue being able to refresh its cache?

A.

Add the DR Vault IP address to the “Address” parameter in the file main_appprovider.conf. . found in the AppProviderConf safe.

B.

Add the IP address of the DR vault to the “Address” parameter in the file Vault.ini.file on the machine on which the CP is installed.

C.

In the Password Vault Web Access UI, add the IP address of the DR Vault in the Disaster Recovery section under Applications > Options.

D.

In the Conjur UI, add the IP address of the DR Vault in the Disaster Recovery section under Cluster Config > Credential Provider > Options.

Full Access
Question # 9

When attempting to configure a Follower, you receive the error:

SECRET-SEN question answer

Which port is the problem?

A.

5432

B.

1999

C.

443

D.

1858

Full Access
Question # 10

An application is having authentication issues when trying to securely retrieve credential’s from the Vault using the CCP webservices RESTAPI. CyberArk Support advised that further debugging should be enabled on the CCP server to output a trace file to review detailed logs to help isolate the problem.

What best describes how to enable debug for CCP?

A.

Edit web.config. change the “AIMWebServiceTrace” value, restart Windows Web Server (IIS)

B.

In the PVWA, go to the Applications tab, select the Application in question, go to Options > Logging and choose Debug.

C.

From the command line, run appprvmgr.exe update_config logging=debug.

D.

Edit the basic_appprovider.conf, change the “AIMWebServiceTrace" value, and restart the provider.

Full Access
Question # 11

Which API endpoint can be used to discover secrets inside of Conjur?

A.

Resources

B.

Roles

C.

Policies

D.

WhoAmi

Full Access
Question # 12

Match the correct network port to its function in Conjur.

SECRET-SEN question answer

Full Access
Question # 13

How many Windows and Linux servers are required for a minimal Conjur deployment that integrates with an existing CyberArk PAM Vault environment, supports high availability, and is redundant across two geographically disparate regions?

A.

5 Linux servers, 2 Windows servers

B.

9 Linux servers, 2 Windows servers

C.

3 Linux servers, 1 Windows server

D.

10 Linux servers, 2 Windows server

Full Access
Question # 14

You have a PowerShell script that is being used on 1000 workstations. It requires a Windows Domain credential that is currently hard coded in the script.

What is the simplest solution to remove that credential from the Script?

A.

Modify the script to use the CLI SDK to fetch the secret at runtime using Credential Providers installed on each workstation.

B.

Modify the script to make a SOAP call to retrieve the secret from the Central Credential Provider.

C.

Modify the script to run on WebSphere using the Application Server Credential Provider to retrieve the secret.

D.

Use Conjur Summon to invoke the script and inject the secret at run time.

Full Access
Question # 15

You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential.

How do you configure the Vault Conjur Synchronizer to properly sync all properties?

A.

Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true.

B.

Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true.

C.

Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true.

D.

In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

Full Access
Question # 16

When attempting to retrieve a credential, you receive an error 401 – Malformed Authorization Token.

What is the cause of the issue?

A.

The token is not correctly encoded.

B.

The token you are trying to retrieve does not exist.

C.

The host does not have access to the credential with the current token.

D.

The credential has not been initialized.

Full Access
Question # 17

When installing the CCP and configuring it for use behind a load balancer, which authentication methods may be affected? (Choose two.)

A.

Allowed Machines authentication

B.

[Client Certificate authentication

C.

OS User

D.

Path

E.

Hash

Full Access
Question # 18

Followers are replications of the Leader configured for which purpose?

A.

synchronous replication to ensure that there is always an up-to-date database

B.

asynchronous replication from the Leader which allows secret reads at scale

C.

asynchronous replication from the Leader with read/write operations capability

D.

synchronous replication to ensure high availability

Full Access