Loading questions...
Updated
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Create a free account to unlock all questions for this exam.
Log In / Sign UpWhen installing the Vault Conjur Synchronizer, you see this error:
Forbidden -
Logon Token is Empty – Cannot logon
Unauthorized -
What must you ensure to remediate the issue?
Refer to the exhibit.
In which example will auto-failover occur?





You are setting up the Secrets Provider for Kubernetes to support rotation with Push-to-File mode.
Which deployment option should be used?
What is the correct command to import the root CA certificate into Conjur?
During the configuration of Conjur, what is a possible deployment scenario?
DRAG DROP -
Arrange the steps to configure authenticators in the correct the sequence.

DRAG DROP -
Match each scenario to the appropriate Secrets Manager solution.

When working with Summon, what is the purpose of the secrets.yml file?
You are deploying Kubernetes resources/objects as Conjur identities.
In addition to Namespace and Deployment, from which options can you choose? (Choose two.)
You are diagnosing this log entry:
From Conjur logs:

Given these errors, which problem is causing the breakdown?
You are enabling synchronous replication on Conjur cluster.
What should you do?
An application is having authentication issues when trying to securely retrieve credential’s from the Vault using the CCP webservices RESTAPI. CyberArk Support advised that further debugging should be enabled on the CCP server to output a trace file to review detailed logs to help isolate the problem.
What best describes how to enable debug for CCP?