Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CyberArk Secrets Manager SECRET-SEN Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam SECRET-SEN Premium Access

View all detail and faqs for the SECRET-SEN exam


340 Students Passed

93% Average Score

93% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which statement is correct about this message?

Message: “[number-of-deleted-rows] rows has successfully deleted “CEADBR009D Finished vacuum”?

Options:

A.

It notes the number of records deleted from the database and does not require any action.

B.

The user specified for Conjur does not have the appropriate permissions to retrieve the audit database (audit .db).

C.

When audit retention was performed, the query on the Ul audit database (audit.db) generated an error.

D.

The Vault Conjur Synchronizer successfully deleted the password objects that were marked for deletion in the PVWA.

Questions # 2:

You are deploying Kubernetes resources/objects as Conjur identities.

In addition to Namespace and Deployment, from which options can you choose? (Choose two.)

Options:

A.

ServiceAccount

B.

Replica sets

C.

Secrets

D.

Tokenreviews

E.

StatefulSet

Questions # 3:

What does “Line of business (LOB)” represent?

Options:

A.

a business group requiring access to secrets from the Vault/Privilege Claud to facilitate syncing accounts to Conjur

B.

the services that Conjur offers and typically refers to a group of application identities in Conjur

C.

a business group that meets a certain set of Conjur policies for entitlements and policy management

D.

the services that Conjur offers and typically refers to the list of configured and enabled authenticators in Conjur

Questions # 4:

When attempting to configure a Follower, you receive the error:

Question # 4

Which port is the problem?

Options:

A.

5432

B.

1999

C.

443

D.

1858

Questions # 5:

Match each scenario to the appropriate Secrets Manager solution.

Question # 5

Options:

Questions # 6:

Refer to the exhibit.

Question # 6

How can you confirm that the Follower has a current copy of the database?

Options:

A.

Compare the pgcurrentxlog_locationlocation from the Leader to the Follower you need to validate against.

B.

Count the number of components in pgstartreplication and compare this to the total number of Followers in the deployment.

C.

Validate that the Follower container ID matches the node in the info endpoint on the Leader.

D.

Retrieve the credential from a test application on the Leader cluster; then retrieve against the Follower and compare if they are accurate.

Questions # 7:

How many Windows and Linux servers are required for a minimal Conjur deployment that integrates with an existing CyberArk PAM Vault environment, supports high availability, and is redundant across two geographically disparate regions?

Options:

A.

5 Linux servers, 2 Windows servers

B.

9 Linux servers, 2 Windows servers

C.

3 Linux servers, 1 Windows server

D.

10 Linux servers, 2 Windows server

Questions # 8:

A customer wants to ensure applications can retrieve secrets from Conjur in three different data centers if the Conjur Leader becomes unavailable. Conjur Followers are already deployed in each of these data centers.

How should you architect the solution to support this requirement?

Options:

A.

No changes are required.

B.

Deploy a Standby in each data center that can be promoted to the role of Leader.

C.

Extend the auto failover cluster to include Standby© in each data center and allow for automatic recovery should the Leader become unavailable.

D.

Deploy a CP provider on the Follower server to provide offline caching capabilities for the Follower.

Questions # 9:

You are installing a Credential Provider on a Linux host. Arrange the installation steps in the correct sequence.

Question # 9

Options:

Questions # 10:

When using the Seed Fetcher to deploy Kubernetes Followers, an error occurs in the Seed Fetcher container. You check the logs and discover that although the Seed Fetcher was able to authenticate, it shows a 500 error in the log and does not successfully retrieve a seed file. What is the cause?

Options:

A.

The certificate based on the Follower DNS name is not present on the Leader.

B.

The host you configured does not have access to see the certificates.

C.

The synchronizer service crashed and needs to be restarted.

D.

The Leader does not have the authenticator webservice enabled.

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.