Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

SECRET-SEN CyberArk Sentry Secrets Manager Questions and Answers

Questions 4

A Kubernetes application attempting to authenticate to the Follower load balancer receives this error:

ERROR: 2024/10/30 06:07:08 authenticator.go:139: CAKC029E Received invalid response to certificate signing request. Reason: status code 401

When checking the logs, you see this message:

authn-k8s/prd-cluster-01 is not enabled

How do you remediate the issue?

Options:

A.

Check the info endpoint on each Follower behind the load balancer and enable the authenticator on the Follower.

B.

Modify conjur.conf in /opt/conjur/etc/authenticators addinqthe authenticator webservice.

C.

A network issue is preventing the application from reaching the Follower; correct the issue and verity that it is resolved.

D.

Enable the authenticator in the Ul > Webservices > Authenticators > Enable and enable the appropriate authenticator webservice.

Buy Now
Questions 5

Followers are replications of the Leader configured for which purpose?

Options:

A.

synchronous replication to ensure that there is always an up-to-date database

B.

asynchronous replication from the Leader which allows secret reads at scale

C.

asynchronous replication from the Leader with read/write operations capability

D.

synchronous replication to ensure high availability

Buy Now
Questions 6

You are setting up a Kubernetes integration with Conjur. With performance as the key deciding factor, namespace and service account will be used as identity characteristics.

Which authentication method should you choose?

Options:

A.

JWT-based authentication

B.

Certificate-based authentication

C.

API key authentication

D.

Connect (OIDC) authentication

Buy Now
Questions 7

What is the most maintenance-free way to ensure a Conjur host’s access reflects any changes made to accounts in a safe in the CyberArk vault?

Options:

A.

Write an automation script to update and load the host’s policy using PATCH/update.

B.

Use yami anchor [ & ] and wildcard (*) syntax to maintain its list of permission grants.

C.

Grant the consumers group/role created by the Synchronizer for the Safe to the host.

D.

Use PVWA to add the Conjur host ID as a member of the Safe.

Buy Now
Questions 8

Match the correct network port to its function in Conjur.

SECRET-SEN Question 8

Options:

Buy Now
Questions 9

You modified a Conjur host policy to change its annotations for authentication.

How should you load the policy to make those changes?

Options:

A.

Use the default “append” method (e.g. conjur policy load < branch > < policy-file > ).

B.

Use the “replace” method (e.g. conjur policy load – –replace < branch > < policy-file > ).

C.

Use the “delete” method (e.g. conjur policy load – –delete < branch > < policy-file > ).

D.

Use the “update” method (e.g. conjur policy load – –update < branch > < policy-file > ).

Buy Now
Questions 10

When working with Summon, what is the purpose of the secrets.yml file?

Options:

A.

It is where Summon outputs the secret value after retrieval.

B.

It is where you define which secrets to retrieve.

C.

It is where you store the Conjur URL and host API key.

D.

It is the log file for Summon.

Buy Now
Questions 11

When an application is retrieving a credential from Conjur, the application authenticates to Follower A. Follower B receives the next request to retrieve the credential.

What happens next?

Options:

A.

The Coniur Token is stateless and Follower B is able to validate the Token and satisfy the request.

B.

The Coniur Token is stateful and Follower B is unable to validate the Token promptinq the application to re-authenticate.

C.

The Coryur Token is stateless and Follower B redirects the request to Follower A to satisfy the request.

D.

The Coniur Token is stateful and Follower B redirects the request to Follower A to satisfy the request.

Buy Now
Questions 12

When attempting to retrieve a credential, you receive an error 401 – Malformed Authorization Token.

What is the cause of the issue?

Options:

A.

The token is not correctly encoded.

B.

The token you are trying to retrieve does not exist.

C.

The host does not have access to the credential with the current token.

D.

The credential has not been initialized.

Buy Now
Questions 13

While retrieving a secret through REST, the secret retrieval fails to find a matching secret. You know the secret onboarding process was completed, the secret is in the expected safe with the expected object name, and the CCP is able to provide secrets to other applications.

What is the most likely cause for this issue?

Options:

A.

The application ID or Application Provider does not have the correct permissions on the safe.

B.

The client certificate fingerprint is not trusted.

C.

The service account running the application does not have the correct permissions on the safe.

D.

The OS user does not have the correct permissions on the safe

Buy Now
Questions 14

A customer wants to ensure applications can retrieve secrets from Conjur in three different data centers if the Conjur Leader becomes unavailable. Conjur Followers are already deployed in each of these data centers.

How should you architect the solution to support this requirement?

Options:

A.

No changes are required.

B.

Deploy a Standby in each data center that can be promoted to the role of Leader.

C.

Extend the auto failover cluster to include Standby© in each data center and allow for automatic recovery should the Leader become unavailable.

D.

Deploy a CP provider on the Follower server to provide offline caching capabilities for the Follower.

Buy Now
Questions 15

You are deploying Kubernetes resources/objects as Conjur identities.

In addition to Namespace and Deployment, from which options can you choose? (Choose two.)

Options:

A.

ServiceAccount

B.

Replica sets

C.

Secrets

D.

Tokenreviews

E.

StatefulSet

Buy Now
Questions 16

A customer has 100 .NET applications and wants to use Summon to invoke the application and inject secrets at run time.

Which change to the NET application code might be necessary to enable this?

Options:

A.

It must be changed to include the REST API calls necessary to retrieve the needed secrets from the CCP.

B.

It must be changed to access secrets from a configuration file or environment variable.

C.

No changes are needed as Summon brokers the connection between the application and the backend data source through impersonation.

D.

It must be changed to include the host API key necessary for Summon to retrieve the needed secrets from a Follower

Buy Now
Questions 17

A customer wants to minimize the Kubernetes application code developers must change to adopt Conjur for secrets access.

Which solutions can meet this requirement? (Choose two.)

Options:

A.

CPM Push-to-File

B.

Secrets Provider

C.

authn-Azure

D.

Secretless

E.

Application Server Credential Provider

Buy Now
Questions 18

Findings were obtained after cataloging pending Secrets Manager use cases.

Arrange the findings in the correct order for prioritization.

SECRET-SEN Question 18

Options:

Buy Now
Exam Code: SECRET-SEN
Exam Name: CyberArk Sentry Secrets Manager
Last Update: Apr 30, 2026
Questions: 60

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now SECRET-SEN testing engine

PDF (Q&A)

$43.57  $124.49
buy now SECRET-SEN pdf