ExamGecko
Question list
Search
Search

Question 43 - Vault Associate 002 discussion

Report
Export

Which of the following statements describe the secrets engine in Vault? Choose three correct answers.

A.
Some secrets engines simply store and read data
Answers
A.
Some secrets engines simply store and read data
B.
Once enabled, you cannot disable the secrets engine
Answers
B.
Once enabled, you cannot disable the secrets engine
C.
You can build your own custom secrets engine
Answers
C.
You can build your own custom secrets engine
D.
Each secrets engine is isolated to its path
Answers
D.
Each secrets engine is isolated to its path
E.
A secrets engine cannot be enabled at multiple paths
Answers
E.
A secrets engine cannot be enabled at multiple paths
Suggested answer: A, C, D

Explanation:

Secrets engines are components that store, generate, or encrypt data in Vault. They are enabled at a specific path in Vault and have their own API and configuration. Some of the statements that describe the secrets engines in Vault are:

Some secrets engines simply store and read data, such as the key/value secrets engine, which acts like an encrypted Redis or Memcached.Other secrets engines perform more complex operations, such as generating dynamic credentials, encrypting data, issuing certificates, etc1.

You can build your own custom secrets engine by using the plugin system, which allows you to write and run your own secrets engine as a separate process that communicates with Vault over gRPC.You can also use the SDK to create your own secrets engine in Go and compile it into Vault2.

Each secrets engine is isolated to its path, which means that the secrets engine cannot access or interact with other secrets engines or data outside its path. The path where the secrets engine is enabled can be customized and can have multiple segments.For example, you can enable the AWS secrets engine at aws/ or aws/prod/ or aws/dev/3.

The statements that are not true about the secrets engines in Vault are:

You can disable an existing secrets engine by using the vault secrets disable command or the sys/mounts API endpoint.When a secrets engine is disabled, all of its secrets are revoked and all of its data is deleted from the storage backend4.

A secrets engine can be enabled at multiple paths, with a few exceptions, such as the system and identity secrets engines. Each secrets engine enabled at a different path is independent and isolated from others.For example, you can enable the KV secrets engine at kv/ and secret/ and they will not share any data3.

asked 18/09/2024
Christian Gyssels
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first