Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SECRET-SEN Exam Dumps - CyberArk Certification Questions and Answers

Question # 4

When using the Seed Fetcher to deploy Kubernetes Followers, an error occurs in the Seed Fetcher container. You check the logs and discover that although the Seed Fetcher was able to authenticate, it shows a 500 error in the log and does not successfully retrieve a seed file. What is the cause?

Options:

A.

The certificate based on the Follower DNS name is not present on the Leader.

B.

The host you configured does not have access to see the certificates.

C.

The synchronizer service crashed and needs to be restarted.

D.

The Leader does not have the authenticator webservice enabled.

Buy Now
Question # 5

Which statement is true for the Conjur Command Line Interface (CLI)?

Options:

A.

It is supported on Windows, Red Hat Enterprise Linux, and macOS.

B.

It can only be run from the Conjur Leader node.

C.

It is required for working with the Conjur REST API.

D.

It does not implement the Conjur REST API for managing Conjur resources.

Buy Now
Question # 6

You are setting up a Kubernetes integration with Conjur. With performance as the key deciding factor, namespace and service account will be used as identity characteristics.

Which authentication method should you choose?

Options:

A.

JWT-based authentication

B.

Certificate-based authentication

C.

API key authentication

D.

Connect (OIDC) authentication

Buy Now
Question # 7

When attempting to retrieve a credential managed by the Synchronizer, you receive this error:

What is the cause of the issue?

Options:

A.

The Conjur Leader has lost upstream connectivity to the Vault Conjur Synchronizer.

B.

The host does not have access to the credential.

C.

The path to the credential was not properly encoded.

D.

The Vault Conjur Synchronizer has crashed and needs to be restarted.

Buy Now
Question # 8

What is the correct command to import the root CA certificate into Conjur?

Options:

A.

docker exec evoke ca import – –no-restart – –root

B.

docker exec evoke import – –no-restart – –root

C.

docker exec evoke ca import – –no-restart

D.

docker exec ca import

Buy Now
Question # 9

When working with Summon, what is the purpose of the secrets.yml file?

Options:

A.

It is where Summon outputs the secret value after retrieval.

B.

It is where you define which secrets to retrieve.

C.

It is where you store the Conjur URL and host API key.

D.

It is the log file for Summon.

Buy Now
Question # 10

A Kubernetes application attempting to authenticate to the Follower load balancer receives this error:

ERROR: 2024/10/30 06:07:08 authenticator.go:139: CAKC029E Received invalid response to certificate signing request. Reason: status code 401

When checking the logs, you see this message:

authn-k8s/prd-cluster-01 is not enabled

How do you remediate the issue?

Options:

A.

Check the info endpoint on each Follower behind the load balancer and enable the authenticator on the Follower.

B.

Modify conjur.conf in /opt/conjur/etc/authenticators addinqthe authenticator webservice.

C.

A network issue is preventing the application from reaching the Follower; correct the issue and verity that it is resolved.

D.

Enable the authenticator in the Ul > Webservices > Authenticators > Enable and enable the appropriate authenticator webservice.

Buy Now
Question # 11

You are setting up the Secrets Provider for Kubernetes to support rotation with Push-to-File mode.

Which deployment option should be used?

Options:

A.

Init container

B.

Application container

C.

Sidecar

D.

Service Broker

Buy Now
Question # 12

A customer requires high availability in its AWS cloud infrastructure.

What is the minimally viable Conjur deployment architecture to achieve this?

Options:

A.

one Follower in each AZ. load balancer for the region

B.

two Followers in each region, load balanced for the region

C.

two Followers in each AZ. load balanced for the region

D.

two Followers in each region, load balanced across all regions

Buy Now
Question # 13

How many Windows and Linux servers are required for a minimal Conjur deployment that integrates with an existing CyberArk PAM Vault environment, supports high availability, and is redundant across two geographically disparate regions?

Options:

A.

5 Linux servers, 2 Windows servers

B.

9 Linux servers, 2 Windows servers

C.

3 Linux servers, 1 Windows server

D.

10 Linux servers, 2 Windows server

Buy Now
Exam Code: SECRET-SEN
Exam Name: CyberArk Sentry Secrets Manager
Last Update: Feb 22, 2025
Questions: 60
SECRET-SEN pdf

SECRET-SEN PDF

$25.5  $84.99
SECRET-SEN Engine

SECRET-SEN Testing Engine

$28.5  $94.99
SECRET-SEN PDF + Engine

SECRET-SEN PDF + Testing Engine

$40.5  $134.99