CyberArk SECRET-SEN - CyberArk Sentry - Secrets Manager Exam

Page:    1 / 12   
Total 60 questions

When working with Summon, what is the purpose of the secrets.yml file?

  • A. It is where Summon outputs the secret value after retrieval.
  • B. It is where you define which secrets to retrieve.
  • C. It is where you store the Conjur URL and host API key.
  • D. It is the log file for Summon.


Answer : B

You are deploying Kubernetes resources/objects as Conjur identities.
In addition to Namespace and Deployment, from which options can you choose? (Choose two.)

  • A. ServiceAccount
  • B. Replicasets
  • C. Secrets
  • D. Tokenreviews
  • E. StatefulSet


Answer : AE

You modified a Conjur host policy to change its annotations for authentication.
How should you load the policy to make those changes?

  • A. Use the default “append” method (e.g. conjur policy load <branch> <policy-file>).
  • B. Use the “replace” method (e.g. conjur policy load – –replace <branch> <policy-file>).
  • C. Use the “delete” method (e.g. conjur policy load – –delete <branch> <policy-file>).
  • D. Use the “update” method (e.g. conjur policy load – –update <branch> <policy-file>).


Answer : B

When installing the Vault Conjur Synchronizer, you see this error:

Forbidden -
Logon Token is Empty – Cannot logon

Unauthorized -
What must you ensure to remediate the issue?

  • A. This admin user must not be logged in to other sessions during the Vault Conjur Synchronizer installation process.
  • B. You specified the correct url for Conjur and it is listed as a SAN on that url’s certificate.
  • C. You correctly URI encoded the url in the installation script.
  • D. You ran powershell as Administrator and there is sufficient space on the server on which you are running the installation.


Answer : B

Refer to the exhibit.
In which example will auto-failover occur?

  • A.
  • B.
  • C.
  • D.


Answer : B

Page:    1 / 12   
Total 60 questions