Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

HCVA0-003 HashiCorp Certified: Vault Associate (003)Exam Questions and Answers

Questions 4

Which of the following are replication methods available in Vault Enterprise? Choose two correct answers.

Options:

A.

Cluster sharding

B.

Namespaces

C.

Performance Replication

D.

Disaster Recovery Replication

Buy Now
Questions 5

What can be used to limit the scope of a credential breach?

Options:

A.

Storage of secrets in a distributed ledger

B.

Enable audit logging

C.

Use of a short-lived dynamic secrets

D.

Sharing credentials between applications

Buy Now
Questions 6

You have been tasked with writing a policy that will allow read permissions for all secrets at path secret/bar. The users that are assigned this policy should also be able to list the secrets. What should this policy look like?

Options:

A.

HCVA0-003 Question 6 Option 1 A white background with black text AI-generated content may be incorrect.

B.

6 A screenshot of a computer code AI-generated content may be incorrect.

C.

6 A screenshot of a computer code AI-generated content may be incorrect.

D.

6 A white rectangular object with black text AI-generated content may be incorrect.

Buy Now
Questions 7

When looking at Vault token details, which key helps you find the paths the token is able to access?

Options:

A.

Meta

B.

Path

C.

Policies

D.

Accessor

Buy Now
Questions 8

Which of the following cannot define the maximum time-to-live (TTL) for a token?

Options:

A.

By the authentication method t natively provide a method of expiring credentials

B.

By the client system f credentials leaking

C.

By the mount endpoint configuration very password used

D.

A parent token TTL e password rotation tools and practices

E.

System max TTL

Buy Now
Questions 9

A user issues the following cURL command to encrypt data using the transit engine and the Vault AP:

HCVA0-003 Question 9

Which payload.json file has the correct contents?

Options:

A.

HCVA0-003 Question 9 Option 1 A white background with black text AI-generated content may be incorrect.

B.

9 A white background with black text AI-generated content may be incorrect.

C.

9 A white background with black text AI-generated content may be incorrect.

D.

9 A computer code with black text AI-generated content may be incorrect.

Buy Now
Questions 10

You are performing a high number of authentications in a short amount of time. You're experiencing slow throughput for token generation. How would you solve this problem?

Options:

A.

Increase the time-to-live on service tokens

B.

Implement batch tokens

C.

Establish a rate limit quota

D.

Reduce the number of policies attached to the tokens

Buy Now
Questions 11

Examine the command below. Output has been trimmed.

HCVA0-003 Question 11

Which of the following statements describe the command and its output?

Options:

A.

Missing a default token policy

B.

Generated token's TTL is 60 hours

C.

Generated token is an orphan token which can be renewed indefinitely

D.

Configures the AppRole auth method with user specified role ID and secret ID

Buy Now
Questions 12

What is the difference between the TTL and the Max TTL (select two)?

Options:

A.

The TTL defines when the token will expire and be revoked

B.

The TTL defines when another token will be generated

C.

The Max TTL defines the timeframe for which a token cannot be used

D.

The Max TTL defines the maximum timeframe for which a token can be renewed

Buy Now
Questions 13

True or False? The Vault Secrets Operator does NOT encrypt client cache, such as Vault tokens and leases, by default in Kubernetes Secrets.

Options:

A.

True

B.

False

Buy Now
Questions 14

Which statement describes the results of this command: $ vault secrets enable transit

Options:

A.

Enables the transit secrets engine at transit path

B.

Requires a root token to execute the command successfully

C.

Enables the transit secrets engine at secret path

D.

Fails due to missing -path parameter

E.

Fails because the transit secrets engine is enabled by default

Buy Now
Questions 15

Which of the following describes usage of an identity group?

Options:

A.

Limit the policies that would otherwise apply to an entity in the group

B.

When they want to revoke the credentials for a whole set of entities simultaneously

C.

Audit token usage

D.

Consistently apply the same set of policies to a collection of entities

Buy Now
Questions 16

A developer team requests integration of their legacy application with Vault to encrypt and decrypt data for a backend database. They cannot modify the application for Vault authentication. What is the best way to achieve this integration?

Options:

A.

Enable the Transit secrets engine and configure the secrets engine to send data directly to the legacy app

B.

Have the app team call the Vault API to encrypt and decrypt the required data

C.

Enable and configure the Kubernetes auth method to allow the application to authenticate to Vault using a JWT

D.

Run the Vault Agent on the application server(s) and use the Auto Auth feature to manage the tokens

Buy Now
Questions 17

You are using the Vault API to test authentication before modifying your CI/CD pipeline to properly authenticate to Vault. You manually authenticate to Vault and receive the response below. Based on the provided options, which of the following are true? (Select four)

    $ curl \

    --request POST \

    --data @payload.json \

    https://vault.krausen.com:8200/v1/auth/userpass/login/bryan.krausen | jq

     

    *******************************************************************************

    ******* RESPONSE BELOW ********************************************************

    *******************************************************************************

     

    {

    "request_id": "f758e8da-11b6-8341-d404-56f0c370a7fa",

    "lease_id": "",

    "renewable": false,

    "lease_duration": 0,

    "data": null,

    "wrap_info": null,

    "warnings": null,

    "auth": {

    "client_token": "hvs.CbzCNJCVWt63jyzyaJakgDwz",

    "accessor": "rffwXzKFcxvaQi6Vgo8tY4Lt",

    "policies": [

    "training",

    "default"

    ],

    "token_policies": [

    "training",

    "default"

    ],

    "metadata": {

    "username": "bryan.krausen"

    },

    "lease_duration": 84600,

    "renewable": true,

    "entity_id": "f1795f6a-c576-d619-b2d5-74c0aee08edb",

    "token_type": "service",

    "orphan": true

    }

    }

Options:

A.

The token required to retrieve a secret is hvs.CbzCNJCVWt63jyzyaJakgDwz

B.

The returned token is a batch token

C.

The user needs to retrieve .auth.client_token in order to perform other actions

D.

The accessor will be used to authenticate to Vault to retrieve secrets

E.

The user is using the userpass auth method

F.

The user’s password is stored in a file named payload.json

Buy Now
Questions 18

Use this screenshot to answer the question below:

HCVA0-003 Question 18

Where on this page would you click to view a secret located at secret/my-secret?

Options:

A.

A

B.

B

C.

C

D.

D

E.

E

Buy Now
Questions 19

Your DevOps team would like to provision VMs in GCP via a CICD pipeline. They would like to integrate Vault to protect the credentials used by the tool. Which secrets engine would you recommend?

Options:

A.

Google Cloud Secrets Engine

B.

Identity secrets engine

C.

Key/Value secrets engine version 2

D.

SSH secrets engine

Buy Now
Questions 20

Your co-worker has asked you to perform certain operations in Vault and has provided you with a token accessor (not the token itself). What Vault operations would you be allowed to perform using only the provided accessor? (Select three)

Options:

A.

Renew the token to extend the TTL

B.

Revoke the token in Vault to make it invalid

C.

Create child tokens associated with the same policies as the related token

D.

Lookup properties of the token, such as the TTL, policies, and metadata

Buy Now
Questions 21

Which of the following is true about the token authentication method in Vault? (Select three)

Options:

A.

The token auth method is automatically enabled in Vault and cannot be disabled

B.

External authentication mechanisms, such as GitHub, are used to dynamically create tokens

C.

The token auth method is used as the first method of authentication for Vault for a newly initialized Vault node/cluster

D.

Tokens cannot be used directly; they must be used in conjunction with one of Vault’s many auth methods

Buy Now
Questions 22

Your organization has enabled the LDAP auth method on the path of corp-auth/. When you access the Vault UI, you cannot log in despite providing the correct credentials. Based on the screenshot below, what action should you take to log in?

HCVA0-003 Question 22

Options:

A.

Select corp-auth from the dropdown list

B.

Enter the username as corp-auth/bryan.krausen

C.

Select More Options and enter the Mount path that LDAP was enabled on (corp-auth/)

D.

Change to the Namespace of corp-auth before trying to authenticate

Buy Now
Questions 23

Your Azure Subscription ID is stored in Vault and you need to retrieve it via Vault API for an automated job. The Subscription ID is stored at secret/cloud/azure/subscription. The secret is stored on a KV Version 2 secrets engine. What curl command below would successfully retrieve the latest version of the secret?

Options:

A.

curl https://vault.krausen.com:8200/v1/secret/data/cloud/azure/subscription

B.

curl --header "X-Vault-Token: hvs.CbzCNJCVWt63jyzyaJakgDwz" https://vault.krausen.com:8200/v1/secret/cloud/azure/subscription

C.

curl --header "X-Vault-Token: hvs.CbzCNJCVWt63jyzyaJakgDwz" https://vault.krausen.com:8200/v1/secret/data/cloud/azure/subscription

D.

curl --header "X-Vault-Token: hvs.CbzCNJCVWt63jyzyaJakgDwz" https://vault.krausen.com:8200/secret/data/cloud/azure/subscription/latest

Buy Now
Questions 24

A developer has requested access to manage secrets at the path kv/apps/webapp01. You create the policy below which gives them the proper access:

path "kv/apps/webapp01" {

capabilities = ["read", "create", "update", "list"]

}

However, when the developer logs in to the Vault UI, they see the following screenshot and cannot access the desired secret. Why can’t the developer see the secrets they need?

HCVA0-003 Question 24

Options:

A.

The Vault UI isn’t enabled for the developer, therefore they will only see the default options

B.

The key/value secrets engine isn’t available in the Vault UI, therefore the developer should use a different Vault interface instead

C.

The policy doesn’t permit list access to the paths prior to the secret so the Vault UI doesn’t display the mount path

D.

The secrets are stored under the cubbyhole secrets engine, so the developer should browse to that secrets engine

Buy Now
Questions 25

Your organization is integrating its legacy application with Vault to improve its security. However, you have discovered that the application has issues when the token changes for authentication during testing. What type of token could be used to help alleviate this issue without compromising security?

Options:

A.

Periodic Service Token

B.

Root Token

C.

Orphan Service Token

D.

Batch Token

Buy Now
Questions 26

Before data is written to the storage backend, the data is encrypted by which Vault feature?

Options:

A.

TLS certificate

B.

Cryptographic barrier

C.

Unseal keys

D.

Transit secrets engine

Buy Now
Questions 27

You are using Vault to generate dynamic credentials for a Microsoft SQL server to perform queries for a month-end report. The report seems to be taking much longer than expected due to degradation on the underlying server, and you are afraid that Vault might automatically revoke the credentials. How can you extend the time the credentials are valid to ensure your month-end query is successful?

Options:

A.

Renew the lease

B.

Generate a new lease

C.

Create a new role within the secrets engine for the database

D.

Revoke the lease

Buy Now
Questions 28

True or False? Performing a rekey operation using the vault operator rekey command creates new unseal/recovery keys as well as a new root key?

Options:

A.

True

B.

False

Buy Now
Questions 29

You are using Vault CLI and enable the database secrets engine on the default path of database/. However, the DevOps team wants to enable another database secrets engine for testing but receives an error stating the path is already in use. How can you enable a second database secrets engine using the CLI?

Options:

A.

vault secrets enable database database2/

B.

vault secrets enable -force database

C.

vault secrets enable -path=database2 database

D.

vault secrets enable database2/

Buy Now
Questions 30

To secure your applications, your organization uses certificates generated by a public CA. However, this strategy has proven expensive and you have to revoke certificates even though they have additional time left. What Vault plugin can be used to quickly generate X.509 certificates to secure your internal applications?

Options:

A.

Identity secrets engine

B.

PKI secrets engine

C.

SSH secrets engine

D.

Transit secrets engine

Buy Now
Questions 31

Your organization recently suffered a security breach on a specific application, and the security response team believes that MySQL database credentials were likely obtained during the event. The application generated the credentials using the database secrets engine in Vault mounted at the path database/. How can you quickly revoke all of the secrets generated by this secrets engine?

Options:

A.

vault token revoke database/*

B.

vault secrets disable mysql

C.

vault lease renew database/creds/mysql

D.

vault lease revoke -prefix database/

Buy Now
Questions 32

Security requirements demand that no secrets appear in the shell history. Which command does not meet this requirement?

Options:

A.

generate-password | vault kv put secret/password value

B.

vault kv put secret/password value-itsasecret

C.

vault kv put secret/password value=@data.txt

D.

vault kv put secret/password value-SSECRET_VALUE

Buy Now
Questions 33

The following three policies exist in Vault. What do these policies allow an organization to do?

HCVA0-003 Question 33

Options:

A.

Separates permissions allowed on actions associated with the transit secret engine

B.

Nothing, as the minimum permissions to perform useful tasks are not present

C.

Encrypt, decrypt, and rewrap data using the transit engine all in one policy

D.

Create a transit encryption key for encrypting, decrypting, and rewrapping encrypted data

Buy Now
Questions 34

How many Shamir's key shares are required to unseal a Vault instance?

Options:

A.

All key shares

B.

A quorum of key shares

C.

One or more keys

D.

The threshold number of key shares

Buy Now
Questions 35

You are using Vault's Transit secrets engine to encrypt your data. You want to reduce the amount of content encrypted with a single key in case the key gets compromised. How would you do this?

Options:

A.

Use 4096-bit RSA key to encrypt the data

B.

Upgrade to Vault Enterprise and integrate with HSM

C.

Periodically re-key the Vault's unseal keys

D.

Periodically rotate the encryption key

Buy Now
Questions 36

Which of the following statements describe the CLI command below?

S vault login -method-1dap username-mitche11h

Options:

A.

Generates a token which is response wrapped

B.

You will be prompted to enter the password

C.

By default the generated token is valid for 24 hours

D.

Fails because the password is not provided

Buy Now
Questions 37

An application requires a specific key/value pair to be updated in order to process a batch job. The value should be either "true" or "false." However, when developers have been updating the value, sometimes they mistype the value or capitalize the value, causing the batch job not to run. What feature of a Vault policy can be used to restrict entry to the required values?

Options:

A.

Add a deny statement for all possible misspellings of the value

B.

Add an allowed_parameters value to the policy

C.

Change the policy to include the list capability

D.

Use a * wildcard at the end of the policy

Buy Now
Questions 38

True or False? After initializing Vault or restarting the Vault service, each individual node in the cluster needs to be unsealed.

Options:

A.

True

B.

False

Buy Now
Questions 39

You have deployed an application that needs to encrypt data before writing to a database. What secrets engine should you use?

Options:

A.

Transit

B.

SSH

C.

PKI

D.

TOTP

Buy Now
Questions 40

A new Vault administrator is writing a CURL command (shown below) to retrieve a secret stored in a KV v2 secrets engine at secret/audio/soundbooth but is receiving an error. What could be the cause of the error?

$ curl \

--header "X-Vault-Token: hvs.rffHw0iXqkRo19b2cjf93DM39WjpbN3J" \

https://vault.unlimited.com:8200/v1/secret/audio/soundbooth

Options:

A.

The VAULT_ADDR environment variable wasn’t set, so it should be configured: export VAULT_ADDR="https://vault.unlimited.com:8200"

B.

The request is being made on the incorrect endpoint and should be:

$ curl \

--header "X-Vault-Token: hvs.rffHw0iXqkRo19b2cjf93DM39WjpbN3J" \

https://vault.unlimited.com:8200/v1/secret/data/audio/soundbooth

C.

The user’s token doesn’t permit access to the Vault API, only the UI

D.

The endpoint should point to v2 since this is a KV v2 secrets engine:

$ curl \

--header "X-Vault-Token: hvs.rffHw0iXqkRo19b2cjf93DM39WjpbN3J" \

https://vault.unlimited.com:8200/v2/secret/audio/soundbooth

Buy Now
Questions 41

Your application cannot manage authentication with Vault, but it can communicate with a local service to retrieve secrets. What solution can enable your app to generate dynamic credentials from Vault?

Options:

A.

Vault Proxy with caching feature enabled

B.

Vault Agent with environment variable secret injection

C.

Vault Proxy with Auto-Auth feature enabled

D.

Vault Agent with the templating feature configured

Buy Now
Questions 42

What is the result of the following Vault command?

$ vault auth enable kubernetes

Options:

A.

Allows Vault to access usernames and passwords stored in a Kubernetes cluster

B.

Mounts the Kubernetes auth method to the default path of kubernetes/

C.

Imports Kubernetes secrets to the local KV database

D.

Enables Vault to host an IdP for Kubernetes workloads

Buy Now
Questions 43

Which of the following best describes the function of the Vault Secrets Operator in a Kubernetes environment?

Options:

A.

It replaces the Kubernetes secrets API entirely and operates purely as a certificate authority for all workloads.

B.

It is a standalone Vault server that automatically applies security policies and rotates root tokens.

C.

It continuously reconciles and synchronizes secrets from Vault to Kubernetes, ensuring secrets are always updated

D.

It provides an interface to dynamically provision Kubernetes clusters through Vault’s infrastructure secrets.

Buy Now
Questions 44

Without logging into another interface, what feature can Chad use to execute a simple CLI command to enable a new secrets engine?

HCVA0-003 Question 44

Options:

A.

CLI emulation in the Vault UI (Feature 1)

B.

User information button (Feature 2)

C.

Client count details (Feature 3)

D.

Access management link (Feature 4)

Buy Now
Questions 45

When Vault is sealed, which are the only two operations available to a Vault administrator? (Select two)

Options:

A.

View the status of Vault

B.

Configure policies

C.

View data stored in the key/value store

D.

Rotate the encryption key

E.

Unseal Vault

F.

Author security policies

Buy Now
Questions 46

Before the following command can be run to encrypt data, what (three) commands must be run to enable and configure the transit secrets engine in Vault? (Select three)

text

CollapseWrapCopy

$ vault write transit/encrypt/vendor \

plaintext="aGFzaGljb3JwIGNlcnRpZmllZA=="

Options:

A.

base64 < < < "hashicorp certified"

B.

vault write transit/encrypt/vendor

C.

vault secrets list

D.

vault secrets enable transit

E.

vault write -f transit/keys/vendor

Buy Now
Questions 47

You have a long-running app that cannot handle a regeneration of a token or secret. What type of token should be created for this application in order to authenticate and interact with Vault?

Options:

A.

Service Token with Use Limit

B.

Periodic Service Token

C.

Batch Token

D.

Orphan Token

Buy Now
Questions 48

Which statement most accurately describes how the response wrapping feature functions in Vault?

Options:

A.

Vault takes the response it would have sent to an HTTP client and instead inserts it into the cubbyhole of a single-use token, returning that single-use token instead.

B.

Vault encrypts the response with a dedicated key and sends it directly to the client, never storing it on the server or using single-use tokens for additional security.

C.

Vault divides the response into separate parts and stores each part in different tokens, requiring all tokens to be combined before disclosing the secret to the requesting client.

D.

Vault duplicates the response within a persistent token and allows multiple unwraps, ensuring that any user with the correct token can retrieve the secret repeatedly without time restrictions.

Buy Now
Questions 49

Which auth method is ideal for machine-to-machine authentication?

Options:

A.

Okta

B.

UserPass

C.

GitHub

D.

AppRole

Buy Now
Questions 50

You are trying to create a new orphan token but receiving a Permission Denied error. What capabilities are required to create this token without using a root token?

Options:

A.

write privileges on the path auth/token

B.

write privileges on the path sys/mounts

C.

sudo privileges on the path auth/token/create

D.

sudo privileges on the path sys/mounts/token

Buy Now
Questions 51

Based on the following output, what command can Steve use to determine if the KV store is configured for versioning?

text

CollapseWrapCopy

$ vault secrets list

Path Type Accessor Description

---- ---- -------- -----------

automation/ kv kv_56f991b9 Automation team for CI/CD

cloud/ kv kv_4426c541 Cloud team for static secrets

cubbyhole/ cubbyhole cubbyhole_9bd538e per-token priv secret storage

data_team/ kv kv_96d57692 Data warehouse KV for certs

identity/ identity identity_0042595e identity store

network/ kv kv_3e53aaab Network team secret storage

secret/ kv kv_d66e2adc key/value secret storage

sys/ system system_d6f218a9 system endpoints

Options:

A.

vault secrets list -all

B.

vault kv get automation

C.

vault secrets list -detailed

D.

vault kv list

Buy Now
Questions 52

Which of the following auth methods is the best choice for human interaction with Vault (as opposed to machine/system authentication)?

Options:

A.

Kubernetes

B.

AppRole

C.

TLS

D.

OIDC

Buy Now
Questions 53

Which statement best explains the role and usage of storage backends in HashiCorp Vault?

Options:

A.

They store Vault’s persistent data, affecting the scalability and performance of managing Vault.

B.

They handle the encryption of all secrets so that Vault remains completely stateless.

C.

They store only ephemeral tokens, ensuring no persistent data is ever saved.

D.

They store only unseal keys, while all secret data remains in Vault’s memory.

Buy Now
Questions 54

What header must be included in an API request in order to provide authentication validation?

Options:

A.

X-Token-Vault

B.

X-Vault-Token

C.

X-Token-Creds

D.

X-Vault-Creds

Buy Now
Questions 55

What is the default TTL for tokens in Vault if one is not specified?

Options:

A.

24 hours (1 day)

B.

15 minutes

C.

768 hours (32 days)

D.

60 minutes (1 hour)

Buy Now
Questions 56

You need to decrypt customer data to provide it to an application. When you run the decryption command, you get the output below. Why does the response not directly reveal the cleartext data?

$ vault write transit/decrypt/phone_number ciphertext="vault:v1:tgx2vsxtlQRfyLSKvem..."

Key Value

--- -----

plaintext aGFzaGljb3JwIGNlcnRpZmllZDogdmF1bHQgYXNzb2NpYXRl

Options:

A.

The user does not have permission to view the cleartext data

B.

The output is base64 encoded

C.

The output is actually a response wrapped token that needs to be unwrapped

D.

The original data must have been encrypted

Buy Now
Questions 57

When a lease is created, what actions can be performed by using only the lease ID? (Choose two)

Options:

A.

Renew the lease

B.

Revoke the lease

C.

Extend the max TTL for the lease

D.

Authenticate using the lease ID

Buy Now
Questions 58

Kyle enabled the database secrets engine for dynamic credentials. Amy, the senior DBA, accidentally deleted the database users created by Vault, disrupting client applications. How can Kyle manually remove the leases in Vault?

Options:

A.

No action is required since the leases will eventually expire and be revoked

B.

Obtain the individual lease IDs from the application logs and remove them using the vault lease revoke command

C.

Use the command vault lease revoke -force flag to delete the leases

D.

Revoke all of the leases associated with the entire database secrets engine to be sure they are all removed

Buy Now
Questions 59

You are enabling a secrets engine in Vault using the CLI. What subcommands are available when using the vault secrets command? (Select five)

Options:

A.

update

B.

migrate

C.

tune

D.

enable

E.

move

F.

disable

G.

list

Buy Now
Questions 60

Elijah manages a legacy application that requires strict control over when its service account credentials change. Which type of credential should be used for this legacy application?

Options:

A.

static

B.

dynamic

Buy Now
Questions 61

What command would you use to enable the Kubernetes secrets engine at the path of /k8s-cluster?

Options:

A.

vault secrets enable -path=k8s-cluster kubernetes

B.

vault kv put k8s-cluster type=kubernetes

C.

vault write sys/mounts/k8s-cluster

D.

vault secrets enable kubernetes -path=k8s-cluster

Buy Now
Questions 62

Hanna is working with Vault and has been assigned a namespace called integration, where she stores all her secrets. Hanna configured her application to use the following API request, but the request is failing. What changes below will help Hanna correctly retrieve the secret? (Select two)

$ curl \

--header "X-Vault-Token:hvs.lzrmRe5Y3LMcDRmOttEjWoag" \

--request GET \

https://vault.example.com:8200/v1/secret/data/my-secret

Options:

A.

$ curl --header "X-Vault-Token:hvs.lzrmRe5Y3LMcDRmOttEjWoag" --request GET\integration https://vault.example.com:8200/v1/secret/data/my-secret

B.

$ curl --header "X-Vault-Token:hvs.lzrmRe5Y3LMcDRmOttEjWoag" --request GET --namespace "integration" https://vault.example.com:8200/v1/secret/data/my-secret

C.

$ curl --header "X-Vault-Token:hvs.lzrmRe5Y3LMcDRmOttEjWoag" --request GET https://vault.example.com:8200/v1/integration/secret/data/my-secret

D.

$ curl --header "X-Vault-Token:hvs.lzrmRe5Y3LMcDRmOttEjWoag" --header "X-Vault-Namespace:integration" --request GET https://vault.example.com:8200/v1/secret/data/my-secret

Buy Now
Questions 63

Your organization operates active/active applications across multiple data centers for high availability. Which Vault feature should be used in the secondary data centers to provide local access to secrets?

Options:

A.

Performance standby nodes

B.

Customized plugins for the Vault cluster

C.

Disaster recovery cluster

D.

Performance replication cluster

Buy Now
Questions 64

Although batch and service tokens share many characteristics, which of the following are true only about batch tokens? (Select three)

Options:

A.

Can create child tokens

B.

Are renewable up until the max TTL

C.

Maintain a single fixed TTL

D.

They are valid for either the primary or any secondary clusters

E.

They are not persisted to disk

Buy Now
Questions 65

Jarrad is an AWS engineer and has provisioned a new EC2 instance running MySQL since his application requires a specific MySQL version. He wants to integrate Vault into his workflow but is new to Vault. What secrets engine should Jarrad use to integrate this new database running in AWS?

Options:

A.

azure

B.

database

C.

kv

D.

aws

Buy Now
Questions 66

Which of the following auth methods are intended for machine-to-machine authentication, and not necessarily human (operator) authentication? (Select four)

Options:

A.

Okta

B.

Tokens

C.

TLS Certificates

D.

Cloud-based Auth methods (AWS, Azure, GCP)

E.

LDAP

F.

AppRole

Buy Now
Questions 67

A DevOps engineer has set up LDAP and GitHub auth methods. The engineer must ensure user Sarah, who authenticates via either method, has consistent access permissions. Which approach correctly describes how to achieve this in Vault?

Options:

A.

Create an entity for Sarah and map both her LDAP and GitHub identities as entity aliases to this single entity

B.

Create an external group and add the LDAP and GitHub providers as members of the group

C.

Create separate policies for each auth method and manually ensure they remain synchronized

D.

Configure a trust relationship between the LDAP and GitHub providers to ensure Sarah’s account is synced

Buy Now
Questions 68

True or False? Although AppRole is designed for machines, humans can use it to authenticate to Vault if you wish.

Options:

A.

True

B.

False

Buy Now
Questions 69

You have TBs of data encrypted by Vault stored in a database and are worried about Vault becoming unavailable and not being able to decrypt the data. Is it possible to export the encryption key to store it somewhere else in the event Vault becomes unavailable?

Options:

A.

Yes, as long as the key was configured to be exportable when it was created

B.

No, you cannot export the encryption key from Vault

Buy Now
Questions 70

True or False? You can create and update Vault policies using the UI.

Options:

A.

True

B.

False

Buy Now
Questions 71

When configuring Vault replication and monitoring its status, you keep seeing something called 'WALs'. What are WALs?

Options:

A.

Warning of allocated logs

B.

Write along logging

C.

Write-ahead logs

D.

Wake after LAN

Buy Now
Questions 72

After encrypting data using the Transit secrets engine, you’ve received the following output. Which of the following is true based on the output displayed below?

Key: ciphertext Value: vault:v2:45f9zW6cglbrzCjI0yCyC6DBYtSBSxnMgUn9B5aHcGEit71xefPEmmjMbrk3

Options:

A.

The original encryption key has been rotated at least once

B.

The data is stored in Vault using a KV v2 secrets engine

C.

This is the second version of the encrypted data

D.

Similar to the KV secrets engine, the Transit secrets engine was enabled using the transit v2 option

Buy Now
Questions 73

According to the screenshot below, what auth method did this client use to log in to Vault?

(Screenshot shows a lease path: auth/userpass/login/student01)

Options:

A.

Userpass

B.

Auth

C.

Root token

D.

Child token

Buy Now
Questions 74

By default, what TCP port does Vault replication use?

Options:

A.

tcp/8200

B.

tcp/8300

C.

tcp/8201

D.

tcp/8301

Buy Now
Questions 75

What is true about the output of the following command (select three)?

Options:

A.

The admin never sees all the unseal keys and cannot unseal Vault by themselves

B.

All three users, Jane/John/Student01, will receive all unseal keys and can unseal Vault

C.

The admin will receive the unseal keys and be able to unseal Vault themselves

D.

The keys will be returned encrypted

E.

Each individual can only decrypt their own unseal key using their private PGP key

Buy Now
Questions 76

Which of the following is NOT a valid way in which a lease can be revoked in Vault?

Options:

A.

Using the user interface (UI)

B.

Automatically when the TTL or Max-TTL expires

C.

Using the API to call the /v1/sys/leases endpoint

D.

Via the CLI using the vault token command

Buy Now
Questions 77

You’ve hit the URL for the Vault UI, but you’re presented with this screen. Why doesn’t Vault present you with a way to log in?

HCVA0-003 Question 77

Options:

A.

The Consul storage backend was not configured correctly

B.

Vault needs to be initialized before it can be used

C.

A Vault policy is preventing you from logging in

D.

The Vault configuration file has an incorrect configuration

Buy Now
Questions 78

What could you do with the feature found in the screenshot below (select two)?

HCVA0-003 Question 78

Options:

A.

Using a short TTL, you could encrypt data in order to place only the encrypted data in Vault

B.

Encrypt the Vault master key that is stored in memory

C.

Encrypt sensitive data to send to a colleague over email

D.

Use response-wrapping to protect data

Buy Now
Questions 79

You are deploying Vault in a local data center, but want to be sure you have a secondary Vault cluster in the event the primary cluster goes offline. In the secondary data center, you have applications that are running, as they are architected to run active/active. Which type of replication would be best in this scenario?

Options:

A.

Disaster Recovery replication

B.

Performance replication

Buy Now
Questions 80

What command would have created the token displayed below?

$ vault token lookup hvs.nNeZ2I64ALCxuO7dqQEJGPrO

Key: policies Value: [default dev], num_uses: 5, ttl: 767h59m49s

    Key Value

    --- -----

    accessor mfvaVMFgOcXHIeqlRasroSOn

    creation_time 1604610457

    creation_ttl 768h

    display_name token

    entity_id n/a

    expire_time 2024-12-07T16:07:37.7540672-05:00

    explicit_max_ttl 0s

    id hvs.nNeZ2I64ALCxuO7dqQEJGPrO

    issue_time 2024-11-05T16:07:37.7540672-05:00

    meta < nil >

    num_uses 5

    orphan false

    path auth/token/create

    policies [default dev]

    renewable true

    ttl 767h59m49s

    type service

Options:

A.

vault token create -policy=dev -use-limit=5

B.

vault token create -policy=dev -ttl=768h

C.

vault token create -policy=dev -policy=default -ttl=768h

D.

vault token create -policy=dev

Buy Now
Questions 81

How long does the Transit secrets engine store the resulting ciphertext by default?

Options:

A.

24 hours

B.

30 days

C.

32 days

D.

Transit does not store data

Buy Now
Questions 82

True or False? When encrypting data with the Transit secrets engine, Vault always stores the ciphertext in a dedicated KV store along with the associated encryption key.

Options:

A.

True

B.

False

Buy Now
Questions 83

You logged into the Vault CLI and attempted to enable an auth method, but you received this error message. What can you do to resolve the error and configure Vault?

(Error: dial tcp 127.0.0.1:8200: connect: connection refused)

HCVA0-003 Question 83

Options:

A.

Restart the Vault service on this node

B.

Ask an admin to grant you permission to enable the userpass auth method

C.

Change 'userpass' to 'username and password'

D.

Set the VAULT_ADDR environment variable to HTTP

Buy Now
Questions 84

Tommy has written an AWS Lambda function that will perform certain tasks for the organization when data has been uploaded to an S3 bucket. Security policies for the organization do not allow Tommy to hardcode any type of credential within the Lambda code or environment variables. However, Tommy needs to retrieve a credential from Vault to write data to an on-premises database. What auth method should Tommy use in Vault to meet the requirements while not violating security policies?

Options:

A.

AWS

B.

Userpass

C.

Token

D.

AppRole

Buy Now
Questions 85

True or False? All dynamic secrets in Vault are required to have a lease.

Options:

A.

True

B.

False

Buy Now
Exam Code: HCVA0-003
Exam Name: HashiCorp Certified: Vault Associate (003)Exam
Last Update: Apr 30, 2026
Questions: 285

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now HCVA0-003 testing engine

PDF (Q&A)

$43.57  $124.49
buy now HCVA0-003 pdf