ExamGecko
Question list
Search
Search

Question 447 - 200-901 discussion

Report
Export

An engineer must review and clean up a code repository. During the review, the engineer finds a file named config.json that contains API URLs, shared keys, and other application configurations. Which two methods, according to best practice, must be used to protect secrets? (Choose two.)

A.

Store in plaintext if they are not stored in a code repository.

Answers
A.

Store in plaintext if they are not stored in a code repository.

B.

Store as plaintext when the server is secured physically.

Answers
B.

Store as plaintext when the server is secured physically.

C.

Never appear in plaintext at rest or in transit.

Answers
C.

Never appear in plaintext at rest or in transit.

D.

Make them long, secure strings that include numbers with special characters.

Answers
D.

Make them long, secure strings that include numbers with special characters.

E.

Always store in a secure vault.

Answers
E.

Always store in a secure vault.

Suggested answer: C, E

Explanation:

To protect secrets such as API URLs, shared keys, and other application configurations, it is best practice to: C. Ensure they never appear in plaintext at rest or in transit. Encrypt sensitive data both when it is stored (at rest) and when it is transmitted over the network (in transit). This prevents unauthorized access and exposure. E. Always store secrets in a secure vault. Use dedicated secret management tools like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault to store and manage sensitive information securely. These tools provide mechanisms for access control, audit logging, and automatic rotation of secrets.

Securing Secrets

HashiCorp Vault

AWS Secrets Manager

asked 07/10/2024
Ali Diaz
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first