- (Topic 2)
Which auth method is ideal for machine-to-machine authentication?
Correct Answer:
D
- (Topic 5)
What can be used to limit the scope of a credential breach?
Correct Answer:
C
- (Topic 3)
Tom needs to set the proper environment variable so he doesn??t need to first authenticate to Vault toretrieve dynamically generated credentials for a database server. What environment variable does Tom need to set first before running commands?
Correct Answer:
B
- (Topic 2)
An application has authenticated to Vault and has obtained dynamic database credentials with a lease of 4 hours. Four hours later, the credentials expire, and the application can no longer communicate with the backend database, so the application goes down. What should the developers instruct the application to do to prevent this from happening again while maintaining the same level of security?
Correct Answer:
B
- (Topic 1)
You??ve hit the URL for the Vault UI, but you??re presented with this screen. Why doesn??t Vault present you with a way to log in?
Correct Answer:
B
