option
Questions
ayuda
daypo
search.php

nes-terces

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
nes-terces

Description:
nes-terces nes-terces nes-terces

Creation Date: 2025/07/14

Category: Others

Number of questions: 47

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

When working with Summon, what is the purpose of the secrets.yml file?. It is where Summon outputs the secret value after retrieval. It is where you define which secrets to retrieve. It is where you store the Conjur URL and host API key. It is the log file for Summon.

You are deploying Kubernetes resources/objects as Conjur identities. In addition to Namespace and Deployment, from which options can you choose? (Choose two). ServiceAccount. Replicasets. Secrets. Tokenreviews. StatefulSet.

You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential. How do you configure the Vault Conjur Synchronizer to properly sync all properties?. Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true. Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true. Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true. In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

When installing the Vault Conjur Synchronizer, you see this error: Forbidden - Logon Token is Empty – Cannot logon Unauthorized - What must you ensure to remediate the issue ?. This admin user must not be logged in to other sessions during the Vault Conjur Synchronizer installation process. You specified the correct url for Conjur and it is listed as a SAN on that url’s certificate. You correctly URI encoded the url in the installation script. You ran powershell as Administrator and there is suficient space on the server on which you are running the installation.

Refer to the exhibit. In which example will auto-failover occur?. Leader Unavailable , Leader Not in Quorum (all Standby are in Quorum and load balanced). Leader Available, Leader In Quorum (But Standby are not in the Quorum). Leader Unavvailable, Leader In Quorum. Leader Unavailable , No Quorum.

You are setting up a Kubernetes integration with Conjur. With performance as the key deciding factor, namespace and serviceaccount will be used as identity characteristics. Which authentication method should you choose?. JWT-based authentication. Certificate-based authentication. API key authentication. OpenID Connect (O|DC) authentication.

When attempting to retrieve a credential, you receive an error 401 – Malformed Authorization Token. What is the cause of the issue?. The token is not correctly encoded. The token you are trying to retrieve does not exist. The host does not have access to the credential with the current token. The credential has not been initialized.

What is the correct command to import the root CA certificate into Conjur?. docker exec <ContainerName> evoke ca import - -no-restart - -root <rootCA.cer>. docker exec <ContainerName> evoke import - -no-restart - -root <rootCA.cer>. docker exec <ContainerName> evoke ca import - -no-restart <rootCA.cer>. docker exec <ContainerName> ca import <rootCA.cer>.

You modified a Conjur host policy to change its annotations for authentication. How should you load the policy to make those changes?. Use the default "append" method (e.g. conjur policy load <branch> <policy-file>). Use the "replace" method (e.g. conjur policy load - -replace <branch> <policy-file>). Use the "delete" method (e.g. conjur policy load - -delete <branch> <policy-file>). Use the "update" method (e.g. conjur policy load - -update <branch> <policy-file>).

What is the correct process to upgrade the CCP Web Service?. Run “sudo yum update aimprv” from the CLI. Double-click the Credential Provider installer executable and select upgrade. Double-click the AimWebService.msi and select upgrade. Uninstall and reinstall the CCP Web Service.

You are deploying Kubernetes resources/objects as Conjur identities. In addition to Namespace and Deployment, from which options can you choose? (Choose two.). ServiceAccount. Replica sets. Secrets. Tokenreviews. StatefulSet.

What is the most maintenance-free way to ensure a Conjur host's access reflects any changes made to accounts in a safe in the CyberArk vault?. Write an automation script to update and load the host's policy using PATCH/update. Use yami anchor [&] and wildcard (*) syntax to maintain its list of permission grants. Grant the consumers group/role created by the Synchronizer for the Safe to the host. Use PVWA to add the Conjur host ID as a member of the Safe.

What is the correct command to import the root CA certificate into Conjur?. docker exec <ContainerName> evoke ca import – –no-restart – –root <rootCA.cer>. docker exec <ContainerName> evoke import – –no-restart – –root <rootCA.cer>. docker exec <ContainerName> evoke ca import – –no-restart <rootCA.cer>. docker exec <ContainerName> ca import <rootCA.cer>.

You start up a Follower and try to connect to it with a REST call using the server certificate, but you get an SSL connection refused error. What could be the problem and how should you fix it?. The certificate does not contain the Follower hostname as a Subject Alternative Name (SAN). Generate a new certificate for the Follower. One of the PostgreSQL ports (5432. 1999) is blocked by the firewall Open those ports. Port 443 is blocked; open that port. The certificate is unnecessary. Use the command option to suppress SSL certificate checking.

When loading policy, you receive a 422 Response from Conjur with a message. What could cause this issue?. malformed Policy file. incorrect Leader URL. misconfigured Load Balancer health check. incorrect Vault Conjur Synchronizer URL.

After manually failing over to your disaster recovery site (Site B) for testing purposes, you need to failback to your primary site (Site A). Which step is required?. Contact CyberArk for a new license file. Reconfigure the Vault Conjur Synchronizer to point to the new Conjur Leader. Generate a seed for the new Leader to be deployed in Site A. Trigger autofailover to promote the Standby in Site A to Leader.

What is the most maintenance-free way to ensure a Conjur host’s access reflects any changes made to accounts in a safe in the CyberArk vault?. Write an automation script to update and load the host’s policy using PATCH/update. Use yami anchor [&] and wildcard (*) syntax to maintain its list of permission grants. Grant the consumers group/role created by the Synchronizer for the Safe to the host. Use PVWA to add the Conjur host ID as a member of the Safe.

What is a possible Conjur node role change?. A Standby may be promoted to a Leader. A Follower may be promoted to a Leader. A Standby may be promoted to a Follower. A Leader may be demoted to a Standby in the event of a failover.

How many Windows and Linux servers are required for a minimal Conjur deployment that integrates with an existing CyberArk PAM Vault environment, supports high availability, and is redundant across two geographically disparate regions?. 5 Linux servers, 2 Windows servers. 9 Linux servers, 2 Windows server. 3 Linux servers, 1 Windows server. 10 Linux servers, 2 Windows server.

Where can all the self-signed/imported certificates be found in Conjur. /opt/conjur/etc/ssl from the Conjur containers. /opt/conjur/certificates from the Conjur containers. /opt/cyberark/dap/certs from the Conjur containers. Log in to the Conjur UI > Conjur Cluster > Certificates > view.

Which API endpoint can be used to discover secrets inside of Conjur?. Resources. Roles. Policies. WhoAmi.

A Kubernetes application attempting to authenticate to the Follower load balancer receives this error: ERROR: 2024/10/30 06:07:08 authenticator.go:139: CAKC029E Received invalid response to certificate signing request. Reason: status code 401 When checking the logs, you see this message: authn-k8s/prd-cluster-01 is not enabled How do you remediate the issue?. Check the info endpoint on each Follower behind the load balancer and enable the authenticator on the Follower. Modify conjur.conf in /opt/conjur/etc/authenticators adding the authenticator webservice. A network issue is preventing the application from reaching the Follower; correct the issue and verify that it is resolved. Enable the authenticator in the UI > Webservices > Authenticators > Enable and enable the appropriate authenticator webservice.

When an application is retrieving a credential from Conjur, the application authenticates to Follower A. Follower B receives the next request to retrieve the credential. What happens next?. The Conjur Token is stateless and Follower B is able to validate the Token and satisfy the request. The Conjur Token is stateful and Follower B is unable to validate the Token prompting the application to re-authenticate. The Conjur Token is stateless and Follower B redirects the request to Follower A to satisfy the request. The Conjur Token is stateful and Follower B redirects the request to Follower A to satisfy the request.

You have a PowerShell script that is being used on 1000 workstations. It requires a Windows Domain credential that is currently hard coded in the script. What is the simplest solution to remove that credential from the Script?. Modify the script to use the CLI SDK to fetch the secret at runtime using Credential Providers installed on each workstation. Modify the script to make a SOAP call to retrieve the secret from the Central Credential Provider. Modify the script to run on WebSphere using the Application Server Credential Provider to retrieve the secret. Use Conjur Summon to invoke the script and inject the secret at run time.

You are diagnosing this log entry: From Conjur logs: Given these errors, which problem is causing the breakdown?. The Jenkins certificate chain is not trusted by Conjur. The Conjur certificate chain is not trusted by Jenkins. The JWT sent by Jenkins does not match the Conjur host annotations. The Jenkins certificate is malformed and will not be trusted by Conjur.

Followers are replications of the Leader configured for which purpose?. synchronous replication to ensure that there is always an up-to-date database. asynchronous replication from the Leader which allows secret reads at scale. asynchronous replication from the Leader with read/write operations capability. synchronous replication to ensure high availability.

In the event of a failover of the Vault server from the primary to the DR, which configuration option ensures that a CP will continue being able to refresh its cache?. Add the DR Vault IP address to the “Address” parameter in the file main_appprovider.conf. <platform>.<version> found in the AppProviderConf safe. Add the IP address of the DR vault to the “Address” parameter in the file Vault.ini.file on the machine on which the CP is installed. In the Password Vault Web Access UI, add the IP address of the DR Vault in the Disaster Recovery section under Applications > Options. In the Conjur UI, add the IP address of the DR Vault in the Disaster Recovery section under Cluster Config > Credential Provider > Options.

Refer to the exhibit. How can you confirm that the Follower has a current copy of the database?. Compare the pgcurrentxlog_location from the Leader to the Follower you need to validate against. Count the number of components in pgstartreplication and compare this to the total number of Followers in the deployment. Validate that the Follower container ID matches the node in the info endpoint on the Leader. Retrieve the credential from a test application on the Leader cluster; then retrieve against the Follower and compare if they are accurate.

When attempting to configure a Follower, you receive the error : Which port is the problem?. 5432. 1999. 443. 1858.

When installing the CCP and configuring it for use behind a load balancer, which authentication methods may be affected? (Choose two.). Allowed Machines authentication. Client Certificate authentication. OS User. Path. Hash.

A customer has 100 .NET applications and wants to use Summon to invoke the application and inject secrets at run time. Which change to the NET application code might be necessary to enable this?. It must be changed to include the REST API calls necessary to retrieve the needed secrets from the CCP. It must be changed to access secrets from a configuration file or environment variable. No changes are needed as Summon brokers the connection between the application and the backend data source through impersonation. It must be changed to include the host API key necessary for Summon to retrieve the needed secrets from a Follower.

You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential. How do you configure the Vault Conjur Synchronizer to properly sync all properties?. Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true. Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true. Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true. In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

During the configuration of Conjur, what is a possible deployment scenario?. The Leader and Followers are deployed outside of a Kubernetes environment; Slandbys can run inside a Kubernetes environment. The Conjur Leader cluster is deployed outside of a Kubernetes environment; Followers can run inside or outside the environment,. The Leader cluster is deployed outside a Kubernetes environment; Followers and Standbys can run inside or outside the environment. The Conjur Leader cluster and Followers are deployed inside a Kubernetes environment.

If you rename an account or Safe, the Vault Conjur Synchronizer recreates these accounts and safes with their new name and deletes the old accounts or safes. What does this mean?. Their permissions in Conjur must also be recreated to access them. Their permissions in Conjur remain the same. You can not rename an account or safe. The Vault-Conjur Synchronizer will recreate these accounts and safes with their exact same names.

Which statement is true for the Conjur Command Line Interface (CLI)?. It is supported on Windows, Red Hat Enterprise Linux, and macOS. It can only be run from the Conjur Leader node. It is required for working with the Conjur REST API. It does not implement the Conjur REST API for managing Conjur resources.

When attempting to retrieve a credential managed by the Synchronizer, you receive this error: What is the cause of the issue?. The Conjur Leader has lost upstream connectivity to the Vault Conjur Synchronizer. The host does not have access to the credential. The path to the credential was not properly encoded. The Vault Conjur Synchronizer has crashed and needs to be restarted.

What is a main advantage of using dual accounts in password management?. Since passwords are cached for both rotation accounts, it ensures the password for an application will not be changed, reducing the amount of blackout dates when a password expires. It ensures passwords are rotated every 90 days, which respects the expected downtime for a system, database, or application. It ensures no delays are incurred when the application needs credentials because a password that is currently used by an application will never be changed. Since there are two active accounts, it doubles the probability that a system, database, or application will successfully authenticate.

While troubleshooting an issue with accounts not syncing to Conjur, you see this in the log file: What could be the issue?. Connection timed out to the Vault. Safe permissions for the LOB user are incorrect. Connection timed out during loading policy through SDK. At first Vault Conjur Synchronizer start up, the number of LOBs is exceeded.

A customer wants to minimize the Kubernetes application code developers must change to adopt Conjur for secrets access. Which solutions can meet this requirement? (Choose two.). CPM Push-to-File. Secrets Provider. authn-Azure. Secretless. Application Server Credential Provider.

DRAG DROP - You are configuring the Conjur Cluster with 3rd-party certificates. Arrange the steps to accomplish this in the correct sequence. Import_3rd_party_Certificate Configure_the_Leader Verify_the_conjur_leader_configuration Configure_Standby.

DRAG DROP - Match the correct network port to its function in Conjur. Required For SSH Access. TLS Endpoint For Conjur UI and API. HTTP Health Endpoint : Simplifies load balancer setup. Audit event are streamed from the follewer to the leader(using syslog). Required for data replication from the leader to standbys and follower.

DRAG DROP - Arrange the manual failover configuration steps in the correct sequence. suspended_replication_for_all_standbys_and_followers_and_identity_the_best_failover_candidate restore_replication Promote_the_failover_candidate_to_be_new_leader.

DRAG DROP - You are upgrading an HA Conjur cluster consisting of 1x Leader, 2x Standbys & 1x Follower. You stopped replication on the Standbys and Followers and took a backup of the Leader. Arrange the steps to accomplish this in the correct sequence. Stop_and_rename_the_conjur_leader_container_and_then_start_the_new_leader redeploy_the_standbys restore_the_leader_from_backup endroll_the_leader_and_standbys_into_the_auto-failover_cluster.

DRAG DROP - You want to allow retrieval of a secret with the CCP. The safe and the required secrets already exist. Assuming the CCP is installed, arrange the steps in the correct sequence. Add_the_application_id_and_application_provider_id_to_the_safe_with_appropriate_permission configure_application__to_call__the_appropriate_REST_API_to_retrieve_the_secret_and_test Define_the_Application_with_desired_authentication_details.

DRAG DROP - Findings were obtained after cataloging pending Secrets Manager use cases. Arrange the findings in the correct order for prioritization. a_large,_high_peformance_application_under_PCI_DSS_regulation_will_require_many_CPs._this_will_require_a_license_purchase._the_procurement_can_take_6_to_12_month._the_development_team_is_eager_to_work_with_security_on_this_project a_small,_internally_developed_Application_under_HIPPA_regulation_needs_updates_to_the_application_code_to_retrieve_secrets_from_a_secrets_from_a_secrets_manager_solution._the_developer_team_stated_they_cannot_accomodate_this_work_before_next_quarter a_new_vulnerability_scanner_project_is_nearing_completion_and_is_expected_to_go_into_production_soon_.this_scanner_is_owned_by_security_team_that_owns_cyberark.

DRAG DROP - Match each scenario to the appropriate Secrets Manager solution. token based retrieval of secrets, such as OIDC or JWT. workloads requiring the fastest secrets delivery performance possible. agentless workload authentication that relies on OS Use.

You are enabling synchronous replication on Conjur cluster. What should you do?. Execute this command on the Leader: docker exec <container-name> sh –c” evoke replication sync that *. Execute this command on each Standby: docker exec <container-name> sh –c” evoke replication sync that *. In Conjur web UI, click the Tools icon in the top right corner of the main window. Choose Conjur Cluster and click “Enable synchronous replication” in the entry for Leader. In Conjur web UI, click the Tools icon in the top right corner of the main window. Choose Conjur Cluster and click “Enable synchronous replication” in the entry for Standbys.

Report abuse