Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

SECRET-SEN CyberArk Sentry Secrets Manager Questions and Answers

Questions 4

A customer wants to ensure applications can retrieve secrets from Conjur in three different data centers if the Conjur Leader becomes unavailable. Conjur Followers are already deployed in each of these data centers.

How should you architect the solution to support this requirement?

Options:

A.

No changes are required.

B.

Deploy a Standby in each data center that can be promoted to the role of Leader.

C.

Extend the auto failover cluster to include Standby© in each data center and allow for automatic recovery should the Leader become unavailable.

D.

Deploy a CP provider on the Follower server to provide offline caching capabilities for the Follower.

Buy Now
Questions 5

An application is having authentication issues when trying to securely retrieve credential’s from the Vault using the CCP webservices RESTAPI. CyberArk Support advised that further debugging should be enabled on the CCP server to output a trace file to review detailed logs to help isolate the problem.

What best describes how to enable debug for CCP?

Options:

A.

Edit web.config. change the “AIMWebServiceTrace” value, restart Windows Web Server (IIS)

B.

In the PVWA, go to the Applications tab, select the Application in question, go to Options > Logging and choose Debug.

C.

From the command line, run appprvmgr.exe update_config logging=debug.

D.

Edit the basic_appprovider.conf, change the “AIMWebServiceTrace" value, and restart the provider.

Buy Now
Questions 6

Arrange the steps to configure authenticators in the correct the sequence.

SECRET-SEN Question 6

Options:

Buy Now
Questions 7

What does “Line of business (LOB)” represent?

Options:

A.

a business group requiring access to secrets from the Vault/Privilege Claud to facilitate syncing accounts to Conjur

B.

the services that Conjur offers and typically refers to a group of application identities in Conjur

C.

a business group that meets a certain set of Conjur policies for entitlements and policy management

D.

the services that Conjur offers and typically refers to the list of configured and enabled authenticators in Conjur

Buy Now
Questions 8

Which statement is true for the Conjur Command Line Interface (CLI)?

Options:

A.

It is supported on Windows, Red Hat Enterprise Linux, and macOS.

B.

It can only be run from the Conjur Leader node.

C.

It is required for working with the Conjur REST API.

D.

It does not implement the Conjur REST API for managing Conjur resources.

Buy Now
Questions 9

What is a main advantage of using dual accounts in password management?

Options:

A.

Since passwords are cached for both rotation accounts, it ensures the password for an application will not be changed, reducing the amount of blackout dates when a password expires.

B.

It ensures passwords are rotated every 90 days, which respects the expected downtime for a system, database, or application

C.

It ensures no delays are incurred when the application needs credentials because a password that is currently used by an application will never be changed

D.

Since there are two active accounts, it doubles the probability that a system, database, or application will successfully authenticate.

Buy Now
Questions 10

Which API endpoint can be used to discover secrets inside of Conjur?

Options:

A.

Resources

B.

Roles

C.

Policies

D.

WhoAmi

Buy Now
Questions 11

You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential.

How do you configure the Vault Conjur Synchronizer to properly sync all properties?

Options:

A.

Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true.

B.

Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true.

C.

Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true.

D.

In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

Buy Now
Questions 12

A Kubernetes application attempting to authenticate to the Follower load balancer receives this error:

ERROR: 2024/10/30 06:07:08 authenticator.go:139: CAKC029E Received invalid response to certificate signing request. Reason: status code 401

When checking the logs, you see this message:

authn-k8s/prd-cluster-01 is not enabled

How do you remediate the issue?

Options:

A.

Check the info endpoint on each Follower behind the load balancer and enable the authenticator on the Follower.

B.

Modify conjur.conf in /opt/conjur/etc/authenticators addinqthe authenticator webservice.

C.

A network issue is preventing the application from reaching the Follower; correct the issue and verity that it is resolved.

D.

Enable the authenticator in the Ul > Webservices > Authenticators > Enable and enable the appropriate authenticator webservice.

Buy Now
Questions 13

While retrieving a secret through REST, the secret retrieval fails to find a matching secret. You know the secret onboarding process was completed, the secret is in the expected safe with the expected object name, and the CCP is able to provide secrets to other applications.

What is the most likely cause for this issue?

Options:

A.

The application ID or Application Provider does not have the correct permissions on the safe.

B.

The client certificate fingerprint is not trusted.

C.

The service account running the application does not have the correct permissions on the safe.

D.

The OS user does not have the correct permissions on the safe

Buy Now
Questions 14

In the event of a failover of the Vault server from the primary to the DR, which configuration option ensures that a CP will continue being able to refresh its cache?

Options:

A.

Add the DR Vault IP address to the “Address” parameter in the file main_appprovider.conf. . found in the AppProviderConf safe.

B.

Add the IP address of the DR vault to the “Address” parameter in the file Vault.ini.file on the machine on which the CP is installed.

C.

In the Password Vault Web Access UI, add the IP address of the DR Vault in the Disaster Recovery section under Applications > Options.

D.

In the Conjur UI, add the IP address of the DR Vault in the Disaster Recovery section under Cluster Config > Credential Provider > Options.

Buy Now
Questions 15

While installing the first CP in an environment, errors that occurred when the environment was created are displayed; however, the installation procedure continued and finished successfully.

What should you do?

Options:

A.

Continue configuring the application to use the CP. No further action is needed since the successful installation makes the error message benign.

B.

Review the lag file 'CreateEnv.loq' and investigate any error messages it contains.

C.

Run setup.exe again and select 'Recreate Vault Environment'. Provide the details of a user with more privileges when prompted by the installer.

D.

Review the PV WA lags to determine which REST API call used during the installation failed.

Buy Now
Questions 16

After manually failing over to your disaster recovery site (Site B) for testing purposes, you need to failback to your primary site (Site A).

Which step is required?

Options:

A.

Contact CyberArk for a new license file.

B.

Reconfigure the Vault Conjur Synchronizer to point to the new Conjur Leader.

C.

Generate a seed for the new Leader to be deployed in Site A.

D.

Trigger autofailover to promote the Standby in Site A to Leader.

Buy Now
Questions 17

You start up a Follower and try to connect to it with a REST call using the server certificate, but you get an SSL connection refused error.

What could be the problem and how should you fix it?

Options:

A.

The certificate does not contain the Follower hostname as a Subject Alternative Name (SAN). Generate a new certificate for the Follower.

B.

One of the PostgreSQL ports (5432. 1999) is blocked by the firewall Open those ports.

C.

Port 443 is blocked; open that port.

D.

The certificate is unnecessary. Use the command option to suppress SSL certificate checking.

Buy Now
Questions 18

You are upgrading an HA Conjur cluster consisting of 1x Leader, 2x Standbys & 1x Follower. You stopped replication on the Standbys and Followers and took a backup of the Leader.

Arrange the steps to accomplish this in the correct sequence.

SECRET-SEN Question 18

Options:

Buy Now
Exam Code: SECRET-SEN
Exam Name: CyberArk Sentry Secrets Manager
Last Update: Oct 14, 2025
Questions: 60

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99