Exam Details

  • Exam Code
    :SECRET-SEN
  • Exam Name
    :CyberArk Sentry - Secrets Manager
  • Certification
    :CyberArk Certifications
  • Vendor
    :CyberArk
  • Total Questions
    :60 Q&As
  • Last Updated
    :May 29, 2025

CyberArk CyberArk Certifications SECRET-SEN Questions & Answers

  • Question 21:

    Which statement is correct about this message?

    Message: "[number-of-deleted-rows] rows has successfully deleted "CEADBR009D Finished vacuum"?

    A. It notes the number of records deleted from the database and does not require any action.

    B. The user specified for Conjur does not have the appropriate permissions to retrieve the audit database (audit .db).

    C. When audit retention was performed, the query on the Ul audit database (audit.db) generated an error.

    D. The Vault Conjur Synchronizer successfully deleted the password objects that were marked for deletion in the PVWA.

  • Question 22:

    What is the most maintenance-free way to ensure a Conjur host's access reflects any changes made to accounts in a safe in the CyberArk vault?

    A. Write an automation script to update and load the host's policy using PATCH/update.

    B. Use yami anchor [and] and wildcard (*) syntax to maintain its list of permission grants.

    C. Grant the consumers group/role created by the Synchronizer for the Safe to the host.

    D. Use PVWA to add the Conjur host ID as a member of the Safe.

  • Question 23:

    When installing the CCP and configuring it for use behind a load balancer, which authentication methods may be affected? (Choose two.)

    A. Allowed Machines authentication

    B. [Client Certificate authentication

    C. OS User

    D. Path

    E. Hash

  • Question 24:

    Which statement is true for the Conjur Command Line Interface (CLI)?

    A. It is supported on Windows, Red Hat Enterprise Linux, and macOS.

    B. It can only be run from the Conjur Leader node.

    C. It is required for working with the Conjur REST API.

    D. It does not implement the Conjur REST API for managing Conjur resources.

  • Question 25:

    When using the Seed Fetcher to deploy Kubernetes Followers, an error occurs in the Seed Fetcher container. You check the logs and discover that although the Seed Fetcher was able to authenticate, it shows a 500 error in the log and does not successfully retrieve a seed file. What is the cause?

    A. The certificate based on the Follower DNS name is not present on the Leader.

    B. The host you configured does not have access to see the certificates.

    C. The synchronizer service crashed and needs to be restarted.

    D. The Leader does not have the authenticator webservice enabled.

  • Question 26:

    In a 3-node auto-failover cluster, the Leader has been brought down for patching that lasts longer than the configured TTL. A Standby has been promoted.

    Which steps are required to repair the cluster when the old Leader is brought back online?

    A. On the new Leader, generate a Standby seed for the old Leader node and add it to the cluster member list. Rebuild the old Leader as a new Standby and then re-enroll the node to the cluster.

    B. Generate a Standby seed for the newly promoted Leader. Stop and remove the container on the new Leader, then rebuild it as a new Standby. Re-enroll the Standby to the cluster and re-base replication of the 3rd Standby back to the old Leader.

    C. Generate standby seeds for the newly-promoted Leader and the 3rd Standby Stop and remove the containers and then rebuild them as new Standbys. On both new Standbys, re-enroll the node to the cluster.

    D. On the new Leader, generate a Standby seed for the old Leader node and re-upload the auto-failover policy in "replace" mode. Rebuild the old Leader as a new Standby, then re-enroll the node to the cluster.

  • Question 27:

    An application owner reports that their application is suddenly receiving an incorrect password. CPM logs show the password was recently changed, but the value currently being retrieved by the application is a different value. The Vault Conjur Synchronizer service is running.

    What is the most likely cause of this issue?

    A. The Vault Conjur Synchronizer is not configured with the DR Vault IP address and there has been a failover event.

    B. Dual Accounts are in use, but after the CPM changed the password for the Inactive account, it accidentally updated the password for the Active account instead.

    C. The CPM is writing password changes to the Primary Vault while the Vault Conjur Synchronizer is configured to replicate from the DR Vault.

    D. The application has been configured to retrieve the wrong password.

  • Question 28:

    Refer to the exhibit.

    How can you confirm that the Follower has a current copy of the database?

    A. Compare the pgcurrentxlog_locationlocation from the Leader to the Follower you need to validate against.

    B. Count the number of components in pgstartreplication and compare this to the total number of Followers in the deployment.

    C. Validate that the Follower container ID matches the node in the info endpoint on the Leader.

    D. Retrieve the credential from a test application on the Leader cluster; then retrieve against the Follower and compare if they are accurate.

  • Question 29:

    A customer wants to minimize the Kubernetes application code developers must change to adopt Conjur for secrets access.

    Which solutions can meet this requirement? (Choose two.)

    A. CPM Push-to-File

    B. Secrets Provider

    C. authn-Azure

    D. Secretless

    E. Application Server Credential Provider

  • Question 30:

    When attempting to retrieve a credential managed by the Synchronizer, you receive this error:

    What is the cause of the issue?

    A. The Conjur Leader has lost upstream connectivity to the Vault Conjur Synchronizer.

    B. The host does not have access to the credential.

    C. The path to the credential was not properly encoded.

    D. The Vault Conjur Synchronizer has crashed and needs to be restarted.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SECRET-SEN exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.