Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

Vault-Associate HashiCorp Certified: Vault Associate (002) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your HashiCorp Vault-Associate HashiCorp Certified: Vault Associate (002) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 57 questions

You have been tasked with writing a policy that will allow read permissions for all secrets at path secret/bar. The users that are assigned this policy should also be able to list the secrets. What should this policy look like?

A.

B.

C.

D.

What environment variable overrides the CLI's default Vault server address?

A.

VAULT_ADDR

B.

VAULT_HTTP_ADORESS

C.

VAULT_ADDRESS

D.

VAULT _HTTPS_ ADDRESS

What are orphan tokens?

A.

Orphan tokens are tokens with a use limit so you can set the number of uses when you create them

B.

Orphan tokens are not children of their parent; therefore, orphan tokens do not expire when their parent does

C.

Orphan tokens are tokens with no policies attached

D.

Orphan tokens do not expire when their own max TTL is reached

Your DevOps team would like to provision VMs in GCP via a CICD pipeline. They would like to integrate Vault to protect the credentials used by the tool. Which secrets engine would you recommend?

A.

Google Cloud Secrets Engine

B.

Identity secrets engine

C.

Key/Value secrets engine version 2

D.

SSH secrets engine

How many Shamir's key shares are required to unseal a Vault instance?

A.

All key shares

B.

A quorum of key shares

C.

One or more keys

D.

The threshold number of key shares

Examine the command below. Output has been trimmed.

Which of the following statements describe the command and its output?

A.

Missing a default token policy

B.

Generated token's TTL is 60 hours

C.

Generated token is an orphan token which can be renewed indefinitely

D.

Configures the AppRole auth method with user specified role ID and secret ID

Which of the following statements describe the secrets engine in Vault? Choose three correct answers.

A.

Some secrets engines simply store and read data

B.

Once enabled, you cannot disable the secrets engine

C.

You can build your own custom secrets engine

D.

Each secrets engine is isolated to its path

E.

A secrets engine cannot be enabled at multiple paths

When an auth method is disabled all users authenticated via that method lose access.

A.

True

B.

False

Which of the following describes the Vault's auth method component?

A.

It verifies a client against an internal or external system, and generates a token with the appropriate policies attached

B.

It verifies a client against an internal or external system, and generates a token with root policy

C.

It is responsible for durable storage of client tokens

D.

It dynamically generates a unique set of secrets with appropriate permissions attached

Security requirements demand that no secrets appear in the shell history. Which command does not meet this requirement?

A.

generate-password | vault kv put secret/password value

B.

vault kv put secret/password value-itsasecret

C.

vault kv put secret/password value=@data.txt

D.

vault kv put secret/password value-SSECRET_VALUE

Where do you define the Namespace to log into using the Vault Ul?

To answer this question

Use your mouse to click on the screenshot in the location described above. An arrow indicator will mark where you have clicked. Click the "Answer" button once you have positioned the arrow to answer the question. You may need to scroll down to see the entire screenshot.

Where does the Vault Agent store its cache?

A.

In a file encrypted using the Vault transit secret engine

B.

In the Vault key/value store

C.

In an unencrypted file

D.

In memory

Which Vault secret engine may be used to build your own internal certificate authority?

A.

Transit

B.

PKI

C.

PostgreSQL

D.

Generic

You are performing a high number of authentications in a short amount of time. You're experiencing slow throughput for token generation. How would you solve this problem?

A.

Increase the time-to-live on service tokens

B.

Implement batch tokens

C.

Establish a rate limit quota

D.

Reduce the number of policies attached to the tokens

A web application uses Vault's transit secrets engine to encrypt data in-transit. If an attacker intercepts the data in transit which of the following statements are true? Choose two correct answers.

A.

You can rotate the encryption key so that the attacker won’t be able to decrypt the data

B.

The keys can be rotated and min_decryption_version moved forward to ensure this data cannot be decrypted

C.

The Vault administrator would need to seal the Vault server immediately

D.

Even if the attacker was able to access the raw data, they would only have encrypted bits (TLS in transit)

The Vault encryption key is stored in Vault's backend storage.

A.

True

B.

False

An authentication method should be selected for a use case based on:

A.

The auth method that best establishes the identity of the client

B.

The cloud provider for which the client is located on

C.

The strongest available cryptographic hash for the use case

D.

Compatibility with the secret engine which is to be used

Page: 1 / 1
Total 57 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved