Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

VA-002-P HashiCorp Certified: Vault Associate Free Practice Exam Questions (2025 Updated)

Prepare effectively for your HashiCorp VA-002-P HashiCorp Certified: Vault Associate certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 3
Total 200 questions

From the answers below, select the advantages of using Infrastructure as Code. (select four)

A.

Easily integrate with application workflows (GitLab Actions, Azure DevOps, CI/CD tools)

B.

Safely test modifications using a "dry run" before applying any actual changes

C.

Provide reusable modules for easy sharing and collaboration

D.

Easily change and update existing infrastructure

E.

Provide a codified workflow to develop customer-facing applications

Which of the following Terraform files should be ignored by Git when committing code to a repo? (select two)

A.

output.tf

B.

terraform.tfstate

C.

terraform.tfvars

D.

variables.tf

You want to encrypt a credit card number using the transit secrets engine. You enter the following command and receive an error. What can you do to ensure that the credit card number is properly encrypted and the ciphertext is returned?

1. $ vault write -format=json transit/encrypt/creditcards plaintext="1234 5678 9101 1121"

2. Error writing data to transit/encrypt/orders: Error making API request.

3.

4. URL: PUT http://10.25.16.165:8200/v1/transit/encrypt/creditcards

5. Code: 400. Errors:

6.

7. * illegal base64 data at input byte 4

A.

credit card numbers are not supported using the transit secrets engine since it is considered sensitive data

B.

the token used to issue the encryption request does not have the appropriate permissions

C.

the plain text data needs to be encoded to base64

D.

the credit card number should not include spaces

You are deploying Vault in a local data center, but want to be sure you have a secondary cluster in the event the primary cluster goes offline. In the secondary data center, you have applications that are running, as they are architected to run active/active. Which type of replication would be best in this scenario?

A.

disaster recovery replication

B.

single-node replication

C.

performance replication

D.

end-to-end replication

Environment variables can be used to set variables. The environment variables must be in the format "____"_. Select the correct prefix string from the following list.

A.

TF_VAR

B.

TF_VAR_NAME

C.

TF_ENV

D.

TF_ENV_VAR

An application requires a specific key/value to be updated in order to process a batch job. The value should be either "true" or "false". However, when developers have been updating the value, sometimes they mistype the value or capitalize on the value, causing the batch job not to run. What feature of a Vault policy can be used in order to restrict the entry to the required values?

A.

added an allowed_parameters value to the policy

B.

use a * wildcard at the end of the policy

C.

change the policy to include the list capability

D.

add a deny statement for all possible misspellings of the value

Which of the following best describes a Terraform provider?

A.

describes an infrastructure object, such as a virtual network, compute instance, or other components

B.

a container for multiple resources that are used together

C.

serves as a parameter for a Terraform module that allows a module to be customized

D.

a plugin that Terraform uses to translate the API interactions with the service or provider

What are the primary benefits of running Vault in a production deployment over dev server mode? (select two)

A.

ability to enable auth methods

B.

persistent storage

C.

encryption via TLS

D.

faster deployment

E.

access to all of the secret engines

While Vault provides businesses tons of functionality out of the box, what feature allows you to extend its functionality with solutions written by third-party providers?

A.

vault agent

B.

namespaces

C.

plugin backend

D.

control groups

Vault secrets engines are used to do what with data? (select three)

A.

copy

B.

generate

C.

store

D.

transmit

E.

encrypt

You have been given requirements to create a security group for a new application. Since your organization standardizes on Terraform, you want to add this new security group with the fewest number of lines

of code. What feature could you use to iterate over a list of required tcp ports to add to the new security group?

A.

terraform import

B.

splat expression

C.

dynamic block

D.

dynamic backend

Vault configuration files can be written in what languages? (select two)

A.

XML

B.

JSON

C.

YAML

D.

HCL

Terraform Enterprise (also referred to as pTFE) requires what type of backend database for a clustered deployment?

A.

Cassandra

B.

MSSQL

C.

PostgreSQL

D.

MySQL

After executing a terraform apply, you notice that a resource has a tilde (~) next to it. What does this infer?

A.

the resource will be destroyed and recreated

B.

the resource will be created

C.

Terraform can't determine how to proceed due to a problem with the state file

D.

the resource will be updated in place

Which statements best describes what the local variable assignment is doing in the following code snippet:

1. variable "subnet_details" {

2. type = list(object({

3. cidr = string

4. subnet_name = string

5. route_table_name = string

6. aznum = number

7. }))

8. }

9. locals {

10. route_tables_all = distinct([for s in var.subnet_details : s.route_table_name ])

11. }

A.

Create a distinct list of route table name objects

B.

Create a map of route table names to subnet names

C.

Create a map of route table names from a list of subnet names

D.

Create a list of route table names eliminating duplicates

The following is a snippet from a Terraform configuration file:

1. provider "aws" {

2. region = "us-east-1"

3. }

4. provider "aws" {

5. region = "us-west-1"

6. }

which, when validated, results in the following error:-

1. Error: Duplicate provider configuration

2.

3. on main.tf line 5:

4. 5: provider "aws" {

5.

6. A default provider configuration for "aws" was already given at

7. main.tf:1,1-15. If multiple configurations are required, set the "______"

8. argument for alternative configurations.

Fill in the blank in the error message with the correct string from the list below.

A.

label

B.

version

C.

alias

D.

multi

The command vault lease revoke -prefix aws/ will revoke all leases associated with the secret engine mounted at aws/

A.

False

B.

True

After a client has authenticated, what security feature is used to make subsequent calls?

A.

key shard

B.

ldap

C.

pgp

D.

token

E.

listener

F.

path

A user creates three workspaces from the command line - prod, dev, and test. Which of the following commands will the user run to switch to the dev workspace?

A.

terraform workspace select dev

B.

terraform workspace -switch dev

C.

terraform workspace dev

D.

terraform workspace switch dev

In order to reduce the time it takes to provision resources, Terraform uses parallelism. By default, how many resources will Terraform provision concurrently?

A.

20

B.

50

C.

5

D.

10

Page: 3 / 3
Total 200 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved