Exam Details

  • Exam Code
    :SECRET-SEN
  • Exam Name
    :CyberArk Sentry - Secrets Manager
  • Certification
    :CyberArk Certifications
  • Vendor
    :CyberArk
  • Total Questions
    :60 Q&As
  • Last Updated
    :May 21, 2025

CyberArk CyberArk Certifications SECRET-SEN Questions & Answers

  • Question 1:

    You start up a Follower and try to connect to it with a REST call using the server certificate, but you get an SSL connection refused error.

    What could be the problem and how should you fix it?

    A. The certificate does not contain the Follower hostname as a Subject Alternative Name (SAN). Generate a new certificate for the Follower.

    B. One of the PostgreSQL ports (5432. 1999) is blocked by the firewall Open those ports.

    C. Port 443 is blocked; open that port.

    D. The certificate is unnecessary. Use the command option to suppress SSL certificate checking.

  • Question 2:

    How many Windows and Linux servers are required for a minimal Conjur deployment that integrates with an existing CyberArk PAM Vault environment, supports high availability, and is redundant across two geographically disparate regions?

    A. 5 Linux servers, 2 Windows servers

    B. 9 Linux servers, 2 Windows servers

    C. 3 Linux servers, 1 Windows server

    D. 10 Linux servers, 2 Windows server

  • Question 3:

    Where can all the self-signed/imported certificates be found in Conjur?

    A. /opt/conjur/etc/ssl from the Conjur containers

    B. /opt/conjur/certificates from the Conjur containers

    C. /opt/cyberark/dap/certs from the Conjur containers

    D. Log in to the Conjur UI > Conjur Cluster > Certificates > view.

  • Question 4:

    What is a main advantage of using dual accounts in password management?

    A. Since passwords are cached for both rotation accounts, it ensures the password for an application will not be changed, reducing the amount of blackout dates when a password expires.

    B. It ensures passwords are rotated every 90 days, which respects the expected downtime for a system, database, or application

    C. It ensures no delays are incurred when the application needs credentials because a password that is currently used by an application will never be changed

    D. Since there are two active accounts, it doubles the probability that a system, database, or application will successfully authenticate.

  • Question 5:

    An application is having authentication issues when trying to securely retrieve credential's from the Vault using the CCP webservices RESTAPI. CyberArk Support advised that further debugging should be enabled on the CCP server to output a trace file to review detailed logs to help isolate the problem.

    What best describes how to enable debug for CCP?

    A. Edit web.config. change the "AIMWebServiceTrace" value, restart Windows Web Server (IIS)

    B. In the PVWA, go to the Applications tab, select the Application in question, go to Options > Logging and choose Debug.

    C. From the command line, run appprvmgr.exe update_config logging=debug.

    D. Edit the basic_appprovider.conf, change the "AIMWebServiceTrace" value, and restart the provider.

  • Question 6:

    You have a PowerShell script that is being used on 1000 workstations. It requires a Windows Domain credential that is currently hard coded in the script.

    What is the simplest solution to remove that credential from the Script?

    A. Modify the script to use the CLI SDK to fetch the secret at runtime using Credential Providers installed on each workstation.

    B. Modify the script to make a SOAP call to retrieve the secret from the Central Credential Provider.

    C. Modify the script to run on WebSphere using the Application Server Credential Provider to retrieve the secret.

    D. Use Conjur Summon to invoke the script and inject the secret at run time.

  • Question 7:

    When attempting to configure a Follower, you receive the error:

    Which port is the problem?

    A. 5432

    B. 1999

    C. 443

    D. 1858

  • Question 8:

    When loading policy, you receive a 422 Response from Conjur with a message.

    What could cause this issue?

    A. malformed Policy file

    B. incorrect Leader URL

    C. misconfigured Load Balancer health check

    D. incorrect Vault Conjur Synchronizer URL

  • Question 9:

    You have a request to protect all the properties around a credential object. When configuring the credential in the Vault, you specified the address, user and password for the credential.

    How do you configure the Vault Conjur Synchronizer to properly sync all properties?

    A. Modify VaultConjurSynchronizer.exe.config, uncomment SYNCALLPROPERTIES and update its value to true.

    B. Modify SynchronizerReplication.config, uncomment SYNCALLPROPERTIES and update its value to true.

    C. Modify Vault.ini, uncomment SYNCALLPROPERTIES and update its value to true.

    D. In the Conjur UI under Cluster > Synchronizer > Config, change SYNCALLPROPERTIES and update its value to true.

  • Question 10:

    You are setting up the Secrets Provider for Kubernetes to support rotation with Push-to-File mode.

    Which deployment option should be used?

    A. Init container

    B. Application container

    C. Sidecar

    D. Service Broker

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SECRET-SEN exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.