Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

VA-002-P PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

VA-002-P PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HashiCorp Certified: Vault Associate
  • Last Update: May 3, 2024
  • Questions and Answers: 200
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

VA-002-P Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

VA-002-P Practice Exam Questions with Answers HashiCorp Certified: Vault Associate Certification

Question # 6

What happens when a terraform apply command is executed?

A.

applies the changes required in the target infrastructure in order to reach the desired configuration

B.

creates the execution plan for the deployment of resources

C.

reconciles the state Terraform knows about with the real-world infrastructure

D.

the backend is initialized and the working directory is prepped

Full Access
Question # 7

What does the following API request return?

1. $ curl \

2. --header "X-Vault-Token: ..." \

3. --request POST \

4. --data @payload.json \

5. http://127.0.0.1:8200/v1/sys/tools/random/164

A.

a random string of 164 characters

B.

a random token valid for 164 uses

C.

None

D.

a secured secret based on 164 bytes of data

Full Access
Question # 8

What is the purpose of using the local-exec provisioner? (select two)

A.

ensures that the resource is only executed in the local infrastructure where Terraform is deployed

B.

to execute one or more commands on the machine running Terraform

C.

to invoke a local executable

D.

executes a command on the resource to invoke an update to the Terraform state

Full Access
Question # 9

A "backend" in Terraform determines how the state is loaded and how an operation such as apply is executed. Which of the following is not a supported backend type?

A.

terraform enterprise

B.

s3

C.

github

D.

consul

E.

artifactory

Full Access
Question # 10

Select the feature below that best completes the sentence:

The following list represents the different types of __________ available in Terraform.

1. max

2. min

3. join

4. replace

5. list

6. length

7. range

A.

named values

B.

backends

C.

functions

D.

data sources

Full Access
Question # 11

What is a downside to using a Terraform provider, such as the Vault provider, to interact with sensitive data, such as reading secrets from Vault?

A.

Terraform and Vault must be running on the same physical host

B.

Terraform and Vault must be running on the same version

C.

Terraform requires a unique auth method to work with Vault

D.

Secrets are persisted to the state file and plans

Full Access
Question # 12

Which flag would be used within a Terraform configuration block to identify the specific version of a provider required?

A.

required-provider

B.

required_versions

C.

required_providers

D.

required-version

Full Access
Question # 13

What is the Consul Agent?

A.

a process that registers services with Consul

B.

an agent that runs in the background to provide additional features for Consul

C.

the core process of Consul which maintains membership information, manages services, runs checks, responds to queries, and more.

D.

a daemon that Vault uses to register auth methods across all of its clusters to ensure consistency among the data written to disk

Full Access
Question # 14

Which of the following terraform subcommands could be used to remove the lock on the state for the current configuration?

A.

unlock

B.

Removing the lock on a state file is not possible

C.

force-unlock

D.

state-unlock

Full Access
Question # 15

Which two interfaces automatically assume the token for subsequent requests after successfully authenticating? (select two)

A.

UI

B.

API

C.

CLI

D.

Consul

Full Access
Question # 16

Which Terraform command will check and report errors within modules, attribute names, and value types to make sure they are syntactically valid and internally consistent?

A.

terraform format

B.

terraform validate

C.

terraform fmt

D.

terraform show

Full Access
Question # 17

Vault does not trust the storage backend.

A.

False

B.

True

Full Access
Question # 18

Which of the following actions are performed during a terraform init? (select three)

A.

provisions the declared resources in your configuration

B.

download the declared providers which are supported by HashiCorp

C.

initializes the backend configuration

D.

initializes downloaded and/or installed providers

Full Access
Question # 19

After issuing the command to delete a secret, you run a vault kv list command but the secret still exists. What command would permanently delete this secret from Vault?

1. $ vault kv delete kv/applications/app01

2. Success! Data deleted (if it existed) at: kv/applications/app01

3. $ vault kv list kv/applications

4. Keys

5. ----

6. app01

A.

vault kv metadata delete kv/applications/app01

B.

vault kv delete -all kv/applications/app01

C.

vault kv delete -force kv/applications/app01

D.

vault kv destroy -versions=1 kv/applications/app01

Full Access
Question # 20

Vault has failed to start. You inspect the log and find the error below. What needs to be changed in order to successfully start Vault?

"Error parsing config.hcl: At 1:12: illegal char"

A.

the " character cannot be used in the config file

B.

fix the syntax error in the Vault configuration file

C.

you must use single quotes vs double quotes in the config file

D.

line 1 on the config file is blank

Full Access
Question # 21

A user has created three workspaces using the command line - prod, dev, and test. The user wants to create a fourth workspace named stage. Which command will the user execute to accomplish this?

A.

terraform workspace -new stage

B.

terraform workspace -create stage

C.

terraform workspace create stage

D.

terraform workspace new stage

Full Access
Question # 22

After creating a dynamic credential on a database, the DBA accidentally deletes the credentials on the database itself. When attempting to remove the lease, Vault returns an error stating that the credential cannot be found. What command can be run to coerce Vault to remove the secret?

A.

vault lease -renew

B.

vault lease revoke -force -prefix

C.

vault revoke -apply

D.

vault lease revoke -enforce

Full Access
Question # 23

From the unseal options listed below, select the options you can use if you're deploying Vault on-premises. (select four)

A.

transit

B.

AWS KMS

C.

certificates

D.

key shards

E.

HSM PKCS11

Full Access
Question # 24

Provider dependencies are created in several different ways. Select the valid provider dependencies from the following list: (select three)

A.

Use of any resource belonging to a particular provider in a resource or data block in the configuration.

B.

Existence of any provider plugins found locally in the working directory.

C.

Explicit use of a provider block in configuration, optionally including a version constraint.

D.

Existence of any resource instance belonging to a particular provider in the current state.

Full Access
Question # 25

In order to extend Vault beyond a data center or cloud regional boundary, what feature should be used?

A.

plugins

B.

secrets engine

C.

replication

D.

seal/unseal

E.

snapshots

Full Access
Question # 26

Which of the following represents a feature of Terraform Cloud that is NOT free to customers?

A.

private module registry

B.

VCS integration

C.

roles and team management

D.

workspace management

Full Access
Question # 27

Which of the following statements best describes the Terraform list(...) type?

A.

a collection of unique values that do not have any secondary identifiers or ordering.

B.

a collection of values where each is identified by a string label.

C.

a sequence of values identified by consecutive whole numbers starting with zero.

D.

a collection of named attributes that each have their own type.

Full Access
Question # 28

What command is used to renew a token, if permitted?

A.

vault operator token renew

B.

vault token update

C.

vault new

D.

vault update token

E.

vault token renew

F.

vault renew token

Full Access
Question # 29

You want to encrypt a credit card number using the transit secrets engine. You enter the following command and receive an error. What can you do to ensure that the credit card number is properly encrypted and the ciphertext is returned?

1. $ vault write -format=json transit/encrypt/creditcards plaintext="1234 5678 9101 1121"

2. Error writing data to transit/encrypt/orders: Error making API request.

3.

4. URL: PUT http://10.25.16.165:8200/v1/transit/encrypt/creditcards

5. Code: 400. Errors:

6.

7. * illegal base64 data at input byte 4

A.

credit card numbers are not supported using the transit secrets engine since it is considered sensitive data

B.

the token used to issue the encryption request does not have the appropriate permissions

C.

the plain text data needs to be encoded to base64

D.

the credit card number should not include spaces

Full Access
Question # 30

If a client is currently assigned the following policy, what additional policy can be added to ensure they cannot access the data stored at secret/apps/confidential but still, read all other secrets?

A.

path "secret/apps/confidential/*" {

capabilities = ["deny"]

}

B.

path "secret/apps/*" {

capabilities = ["deny"]

}

C.

path "secret/apps/confidential" {

capabilities = ["deny"]

}

D.

path "secret/apps/*" {

capabilities = ["create", "read", "update", "delete", "list"]

}

path "secret/*" {

capabilities = ["read", "deny"]

}

Full Access