Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

VA-002-P PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

VA-002-P PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: HashiCorp Certified: Vault Associate
  • Last Update: Sep 12, 2025
  • Questions and Answers: 200
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

VA-002-P Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

VA-002-P Practice Exam Questions with Answers HashiCorp Certified: Vault Associate Certification

Question # 6

From the answers below, select the advantages of using Infrastructure as Code. (select four)

A.

Easily integrate with application workflows (GitLab Actions, Azure DevOps, CI/CD tools)

B.

Safely test modifications using a "dry run" before applying any actual changes

C.

Provide reusable modules for easy sharing and collaboration

D.

Easily change and update existing infrastructure

E.

Provide a codified workflow to develop customer-facing applications

Full Access
Question # 7

When using parent/child modules to deploy infrastructure, how would you export value from one module to import into another module?

For example, a module dynamically deploys an application instance or virtual machine, and you need the IP address in another module to configure a related DNS record in order to reach the newly deployed application.

A.

configure an output value in the application module in order to use that value for the DNS module

B.

preconfigure the IP address as a parameter in the DNS module

C.

configure the pertinent provider's configuration with a list of possible IP addresses to use

D.

export the value using terraform export and input the value using terraform input

Full Access
Question # 8

Which TCP port does Vault replication use?

A.

8200

B.

8201

C.

8300

D.

8301

Full Access
Question # 9

Select the most accurate statement to describe the Terraform language from the following list.

A.

Terraform is an immutable, declarative, Infrastructure as Code provisioning language based on Hashicorp Configuration Language, or optionally JSON.

B.

Terraform is a mutable, declarative, Infrastructure as Code configuration management language based on Hashicorp Configuration Language, or optionally JSON.

C.

Terraform is an immutable, procedural, Infrastructure as Code configuration management language based on Hashicorp Configuration Language, or optionally JSON.

D.

Terraform is a mutable, procedural, Infrastructure as Code provisioning language based on Hashicorp Configuration Language, or optionally YAML.

Full Access
Question # 10

What is the result of the following terraform function call?

index(["a", "b", "c"], "c")

A.

1

B.

true

C.

2

D.

0

Full Access
Question # 11

What is the Consul Agent?

A.

a process that registers services with Consul

B.

an agent that runs in the background to provide additional features for Consul

C.

the core process of Consul which maintains membership information, manages services, runs checks, responds to queries, and more.

D.

a daemon that Vault uses to register auth methods across all of its clusters to ensure consistency among the data written to disk

Full Access
Question # 12

In the following code snippet, the block type is identified by which string?

1. resource "aws_instance" "db" {

2. ami = "ami-123456"

3. instance_type = "t2.micro"

4. }

A.

"db"

B.

resource

C.

"aws_instance"

D.

instance_type

Full Access
Question # 13

Given the following screenshot, how many secrets engines have been enabled?

VA-002-P question answer

A.

4

B.

3

C.

5

D.

2

Full Access
Question # 14

Which Terraform command will check and report errors within modules, attribute names, and value types to make sure they are syntactically valid and internally consistent?

A.

terraform format

B.

terraform validate

C.

terraform fmt

D.

terraform show

Full Access
Question # 15

Your organization has moved to AWS and has manually deployed infrastructure using the console. Recently, a decision has been made to standardize on Terraform for all deployments moving forward.

What can you do to ensure that all existing is managed by Terraform moving forward without interruption to existing services?

A.

resources that are manually deployed in the AWS console cannot be imported by Terraform

B.

using terraform import, import the existing infrastructure into your Terraform state

C.

delete the existing resources and recreate them using new a Terraform configuration so Terraform can manage them moving forward

D.

submit a ticket to AWS and ask them to export the state of all existing resources and use terraform import to import them into the state file

Full Access
Question # 16

Given the Terraform configuration below, in which order will the resources be created?

1. resource "aws_instance" "web_server" {

2. ami = "i-abdce12345"

3. instance_type = "t2.micro"

4. }

5. resource "aws_eip" "web_server_ip" {

6. vpc = true

7. instance = aws_instance.web_server.id

8. }

A.

aws_eip will be created first

aws_instance will be created second

B.

no resources will be created

C.

aws_instance will be created first

aws_eip will be created second

D.

resources will be created simultaneously

Full Access
Question # 17

From the options below, select the benefits of using the PKI (certificates) secrets engine: (select three)

A.

TTLs on Vault certs are longer to ensure certificates are valid for a longer period of time

B.

Vault can act as an intermediate CA

C.

reducing, or eliminating certificate revocations

D.

reduces time to get a certificate by eliminating the need to generate a private key and CSR

Full Access
Question # 18

Which type of Vault replication copies all data from Vault, including K/V data, policies, and client tokens?

A.

DR replication

B.

performance replication

C.

failover replication

D.

online replication

Full Access
Question # 19

You've set up multiple Vault clusters, one on-premises which is intended to be the primary cluster, and the second cluster in AWS, which was deployed to be used for performance replication. After enabling replication, developers complain that all the data they've stored in the AWS Vault cluster is missing. What happened?

A.

the data was moved to a recovery path after replication was enabled. Use the vault secrets move command to move the data back to its intended location

B.

there is a certificate mismatch after replication was enabled since Vault replication generates its own TLS certificates to ensure nodes are trusted entities

C.

the data was automatically copied to the primary cluster after replication was enabled since all writes are always forwarded to the primary cluster

D.

all of the data on the secondary cluster was deleted after replication was enabled

Full Access
Question # 20

Which statements best describes what the local variable assignment is doing in the following code snippet:

1. variable "subnet_details" {

2. type = list(object({

3. cidr = string

4. subnet_name = string

5. route_table_name = string

6. aznum = number

7. }))

8. }

9. locals {

10. route_tables_all = distinct([for s in var.subnet_details : s.route_table_name ])

11. }

A.

Create a distinct list of route table name objects

B.

Create a map of route table names to subnet names

C.

Create a map of route table names from a list of subnet names

D.

Create a list of route table names eliminating duplicates

Full Access
Question # 21

Which of the following commands will launch the Interactive console for Terraform interpolations?

A.

terraform

B.

terraform console

C.

terraform cmdline

D.

terraform cli

Full Access
Question # 22

In order to reduce the time it takes to provision resources, Terraform uses parallelism. By default, how many resources will Terraform provision concurrently?

A.

20

B.

50

C.

5

D.

10

Full Access
Question # 23

What feature of Vault would allow you to architect a "Vault within a Vault"?

A.

sentinel

B.

secrets engines

C.

control groups

D.

namespaces

Full Access
Question # 24

Which Terraform command will force a marked resource to be destroyed and recreated on the next apply?

A.

terraform fmt

B.

terraform destroy

C.

terraform taint

D.

terraform refresh

Full Access
Question # 25

Why might a user opt to include the following snippet in their configuration file?

1. terraform {

2. required_version = ">= 0.12"

3. }

A.

this ensures that all Terraform providers are above a certain version to match the application being deployed

B.

the user wants to ensure that the application being deployed is a minimum version of 0.12

C.

versions before Terraform 0.12 were not approved by HashiCorp to be used in production

D.

Terraform 0.12 introduced substantial changes to the syntax used to write Terraform configuration

Full Access
Question # 26

The Terraform language supports a number of different syntaxes for comments. Select all that are supported. (select three)

A.

#

B.

/* and */

C.

<* and *>

D.

//

Full Access
Question # 27

After enabling the vault to autocomplete feature, you type vault and press the tab button, but nothing happens. Why doesn't vault display the available completions?

1. $ vault -autocomplete-install

2. $ vault

A.

your SSH client doesn't support autocompletion

B.

the SSH session needs to be restarted upon installation

C.

you don't have the permissions to use autocomplete

D.

you didn't use -force when enabling the feature

Full Access
Question # 28

Which of the following commands will remove all secrets at a specific path?

A.

vault lease revoke -prefix

B.

vault delete lease -all

C.

vault lease revoke -all

D.

vault revoke -all

Full Access
Question # 29

Vault configuration files can be written in what languages? (select two)

A.

XML

B.

JSON

C.

YAML

D.

HCL

Full Access
Question # 30

A user creates three workspaces from the command line - prod, dev, and test. Which of the following commands will the user run to switch to the dev workspace?

A.

terraform workspace select dev

B.

terraform workspace -switch dev

C.

terraform workspace dev

D.

terraform workspace switch dev

Full Access
Question # 31

What is the proper command to enable the AWS secrets engine at the default path?

A.

vault enable secrets aws

B.

vault secrets aws enable

C.

vault secrets enable aws

D.

vault enable aws secrets engine

Full Access
Question # 32

In order to extend a Consul storage backend, Consul nodes should be provisioned across multiple data centers or cloud regions.

A.

True

B.

False

Full Access
Question # 33

Select all features which are exclusive to Terraform Enterprise. (select three)

A.

Audit Logs

B.

Cost Estimation

C.

Sentinel

D.

Clustering

E.

SAML/SSO

Full Access
Question # 34

You've decided to use AWS KMS to automatically unseal Vault on private EC2 instances. After deploying your Vault cluster, and running vault operator init, Vault responds with an error and cannot be unsealed.

You've determined that the subnet you've deployed Vault into doesn't have internet access. What can you do to enable Vault to communicate with AWS KMS in the most secure way?

A.

ask the networking team to provide Vault with inbound access from the internet

B.

deploy Vault in a public subnet and provide the Vault nodes with public IP addresses

C.

add a VPC endpoint

D.

change the permissions on the Internet Gateway to allow the Vault nodes to communicate over the Internet

Full Access
Question # 35

While Terraform is generally written using the HashiCorp Configuration Language (HCL), what another syntax can Terraform be expressed in?

A.

JSON

B.

XML

C.

TypeScript

D.

YAML

Full Access
Question # 36

After logging into the Vault UI, a user complains that they cannot enable Replication. Why would the replication configuration be missing?

A.

replication wasn't configured in the Vault configuration file

B.

replication hasn't been enabled

C.

Vault is running an open-source version

D.

replication configuration isn't available in the UI

Full Access
Question # 37

True or False:

State is a requirement for Terraform to function.

A.

True

B.

False

Full Access
Question # 38

True or False:

Once you create a KV v1 secrets engine and place data in it, there is no way to modify the mount to include the features of a KV v2 secrets engine.

A.

True

B.

False

Full Access
Question # 39

After decrypting data using the transit secrets engine, the plaintext output does not match the plaintext credit card number that you encrypted. Which of the following answers provides a solution?

1. $ vault write transit/decrypt/creditcard\ ciphertext="vault:v1:cZNHVx+sxdMErXRSuDa1q/pz49fXTn1PScKfhf+PIZPvy8xKfkytpwKcbC0fF2U=" \

2.

3. Key Value

4. --- -----

5. plaintext Y3JlZGl0LWNhcmQtbnVtYmVyCg==

A.

The resulting plaintext data is base64-encoded. To reveal the original plaintext, use the base64 --decode command.

B.

The data is corrupted. Execute the encryption command again using a different data key

C.

the user doesn't have permission to decrypt the data, therefore Vault returns false data so as not to reveal if the data was actually encrypted by Vault

D.

Vault is sealed, therefore the data cannot be decrypted. Unseal Vault to properly decrypt the data

Full Access
Question # 40

Which of the following is an invalid variable name?

A.

instance_name

B.

web

C.

var1

D.

count

Full Access
Question # 41

What are some of the problems of how infrastructure was traditionally managed before Infrastructure as Code? (select three)

A.

Requests for infrastructure or hardware required a ticket, increasing the time required to deploy applications

B.

Traditional deployment methods are not able to meet the demands of the modern business where resources tend to live days to weeks, rather than months to years

C.

Traditionally managed infrastructure can't keep up with cyclic or elastic applications

D.

Pointing and clicking in a management console is a scalable approach and reduces human error as businesses are moving to a multi-cloud deployment model

Full Access
Question # 42

How can Vault be used to programmatically obtain a generated code for MFA, somewhat similar to Google Authenticator?

A.

cubbyhole

B.

the identity secrets engine

C.

TOTP secrets engine

D.

the random byte generator

Full Access
Question # 43

In terraform, most resource dependencies are handled automatically. Which of the following statements describes best how terraform resource dependencies are handled?

A.

The terraform binary contains a built-in reference map of all defined Terraform resource dependencies. Updates to this dependency map are reflected in terraform versions. To ensure you are working with the latest resource dependency map you much be running the latest version of Terraform.

B.

Terraform analyses any expressions within a resource block to find references to other objects and treats those references as implicit ordering requirements when creating, updating, or destroying resources.

C.

Resource dependencies are identified and maintained in a file called resource. dependencies. Each terraform provider is required to maintain a list of all resource dependencies for the provider and it's included with the plugin during initialization when terraform init is executed. The file is located in the terraform.d folder.

D.

Resource dependencies are handled automatically by the depends_on meta_argument, which is set to true by default.

Full Access
Question # 44

Terraform Enterprise (also referred to as pTFE) requires what type of backend database for a clustered deployment?

A.

Cassandra

B.

MSSQL

C.

PostgreSQL

D.

MySQL

Full Access
Question # 45

Which of the following unseal options can automatically unseal Vault upon the start of the Vault service? (select four)

A.

Transit

B.

HSM

C.

AWS KMS

D.

Key Shards

E.

Azure KMS

Full Access
Question # 46

HashiCorp offers multiple versions of Terraform, including Terraform open-source, Terraform Cloud, and Terraform Enterprise. Which of the following Terraform features are only available in the Enterprise edition? (select four)

A.

Sentinel

B.

SAML/SSO

C.

Audit Logs

D.

Private Network Connectivity

E.

Private Module Registry

F.

Clustering

Full Access
Question # 47

Which of the following variable declarations is going to result in an error?

A.

variable "example" {

type = object({})

}

B.

variable "example" {}

C.

variable "example" {

description = "This is a test"

type = map

default = {"one" = 1, "two" = 2, "Three" = "3"}

}

D.

variable "example" {

description = "This is a variable description"

type = list(string)

default = {}

}

Full Access
Question # 48

When architecting a Vault replication configuration, why should you never terminate TLS on a front-end load balancer?

A.

If Vault detects that the traffic has been unencrypted and re-encrypted, due to the load balancer, it will automatically drop the traffic as it is no longer trusted.

B.

Vault generates self-signed mutual TLS for replication. If the LB is performing TLS termination, this will break the mutual TLS between nodes.

C.

Vault requires that only Consul service discovery can be used to direct traffic to an active Vault node.

D.

Vault replication won't work with the type of certificates that a traditional load balancer uses.

Full Access
Question # 49

Which of the following actions are performed during a terraform init? (select three)

A.

provisions the declared resources in your configuration

B.

download the declared providers which are supported by HashiCorp

C.

initializes the backend configuration

D.

initializes downloaded and/or installed providers

Full Access
Question # 50

What command is used to renew a token, if permitted?

A.

vault operator token renew

B.

vault token update

C.

vault new

D.

vault update token

E.

vault token renew

F.

vault renew token

Full Access
Question # 51

True or False:

The terraform refresh command is used to reconcile the state Terraform knows about (via its state file) with the real-world infrastructure. If the drift is detected between the real-world infrastructure and the last known-state, it will modify the infrastructure to correct the drift.

A.

False

B.

True

Full Access
Question # 52

Which TCP port does Vault use, by default, for its API and UI?

A.

8600

B.

8201

C.

8500

D.

8301

E.

8300

F.

8200

Full Access
Question # 53

A user runs terraform init on their RHEL based server and per the output, two provider plugins are downloaded:

1. $ terraform init

2.

3. Initializing the backend...

4.

5. Initializing provider plugins...

6. - Checking for available provider plugins...

7. - Downloading plugin for provider "aws" (hashicorp/aws) 2.44.0...

8. - Downloading plugin for provider "random" (hashicorp/random) 2.2.1...

9.

10. Terraform has been successfully initialized!

Where are these plugins downloaded to?

A.

/etc/terraform/plugins

B.

The .terraform.plugins directory in the directory terraform init was executed in.

C.

The .terraform.d directory in the directory terraform init was executed in.

D.

The .terraform/plugins directory in the directory terraform init was executed in.

Full Access
Question # 54

From the options below, select the benefits of using a batch token over a service token. (select three)

A.

no storage cost for token creation

B.

lightweight and scalable

C.

can be a root token

D.

used for ephemeral, high-performance workloads

E.

has accessors

Full Access
Question # 55

Which of the following Vault features is available only in the Enterprise version? (select three)

A.

MFA

B.

dynamic credentials

C.

cloud auto unseal

D.

replication

E.

auto unseal with HSM

Full Access
Question # 56

What happens when a terraform apply command is executed?

A.

applies the changes required in the target infrastructure in order to reach the desired configuration

B.

creates the execution plan for the deployment of resources

C.

reconciles the state Terraform knows about with the real-world infrastructure

D.

the backend is initialized and the working directory is prepped

Full Access
Question # 57

When Vault is sealed, which are the only two options available to a Vault administrator? (select two)

A.

rotate the encryption key

B.

unseal Vault

C.

view the status of Vault

D.

configure policies

E.

author security policies

F.

view data stored in the key/value store

Full Access
Question # 58

As opposed to service tokens, batch tokens are ideal for what type of action?

A.

generating dynamic credentials

B.

configuring Vault features

C.

renewing tokens

D.

issuing snapshots

E.

encrypting data

F.

writing secrets

Full Access
Question # 59

You've hit the URL for the Vault UI, but you're presented with this screen. Why doesn't Vault present you with a way to log in?

VA-002-P question answer

A.

a vault policy is preventing you from logging in

B.

the vault configuration file has an incorrect configuration

C.

the consul storage backend was not configured correctly

D.

vault needs to be initialized before it can be used

Full Access
Question # 60

What Terraform feature is shown in the example below?

1. resource "aws_security_group" "example" {

2. name = "sg-app-web-01"

3. dynamic "ingress" {

4. for_each = var.service_ports

5. content {

6. from_port = ingress.value

7. to_port = ingress.value

8. protocol = "tcp"

9. }

10. }

11. }

A.

data source

B.

dynamic block

C.

local values

D.

conditional expression

Full Access