Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HashiCorp Exam Terraform-Associate-003 Topic 3 Question 31 Discussion

Actual exam question for HashiCorp's Terraform-Associate-003 exam
Question #: 31
Topic #: 3
[All Terraform-Associate-003 Questions]

You want to use API tokens and other secrets within your team's Terraform workspaces. Where does HashiCorp recommend you store these sensitive values? (Pick the 3 correct responses)

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

Sensitive values such as API tokens should be stored in a secure way, either in Terraform Cloud variables marked as sensitive or in HashiCorp Vault. Storing secrets in version control systems or plaintext files is not recommended.

References:

Terraform Cloud Environment Variables


Contribute your Thoughts:

Malcom
5 days ago
Definitely A and B! Those are the best practices.
upvoted 0 times
...
Allene
11 days ago
I’m pretty sure that checking sensitive values into version control is a big no-no, but I can't recall if the other options are all correct.
upvoted 0 times
...
Tomoko
16 days ago
I practiced a question similar to this, and I feel like storing secrets in a terraform.tfvars file isn't safe unless it's managed properly.
upvoted 0 times
...
Lonny
22 days ago
I think HashiCorp Vault is definitely one of the right answers, but I'm not sure about the others.
upvoted 0 times
...
Ettie
28 days ago
I remember that using HCP Terraform variables with the sensitive option checked is a secure way to store secrets.
upvoted 0 times
...
Trinidad
28 days ago
Okay, let's see here. Definitely don't want to just put sensitive info in a plaintext document or check it into version control. That's a big no-no. I think the Terraform Cloud variables and HashiCorp Vault are the way to go, but I'll double-check the other options to be sure.
upvoted 0 times
...
Jettie
28 days ago
Ah, this is a good one! I remember discussing this in our Terraform training. HashiCorp is pretty clear that you should use their own tools like Terraform Cloud variables or HashiCorp Vault to securely store secrets. I'll make sure to select those options.
upvoted 0 times
...
Noah
28 days ago
Hmm, I'm a bit unsure about this one. I know we need to store sensitive values securely, but I'm not totally familiar with all the HashiCorp tools and recommendations. I'll have to read through the options closely and try to remember what we covered in class.
upvoted 0 times
...
Laila
1 months ago
This is a tricky one, but I think the key is to focus on the security recommendations from HashiCorp. I'll need to carefully review the options and eliminate the ones that don't align with their best practices.
upvoted 0 times
...
Meghan
9 months ago
I don't know, putting secrets in a shared drive sounds like a great way to get them stolen. What could go wrong? *chuckles*
upvoted 0 times
Lawrence
8 months ago
C) In a terraform.tfvars file, securely managed and shared with your team.
upvoted 0 times
...
Ressie
8 months ago
B) In HashiCorp Vault.
upvoted 0 times
...
Deandrea
8 months ago
A) In an HCP Terraform/Terraform Cloud variable, with the sensitive option checked.
upvoted 0 times
...
...
Alverta
9 months ago
What is this, amateur hour? Clearly the correct answers are A, B, and C. Who even considers checking secrets into version control? *facepalm*
upvoted 0 times
...
Raymon
9 months ago
Hmm, I'd avoid the shared drive option (E) - that's just asking for trouble. Gotta keep those secrets locked down tight!
upvoted 0 times
...
Callie
9 months ago
I agree, D and E are definitely not recommended. Vault and Terraform Cloud variables are the way to go for maximum security.
upvoted 0 times
Hana
9 months ago
C) In a terraform.tfvars file, securely managed and shared with your team.
upvoted 0 times
...
Micah
9 months ago
B) In HashiCorp Vault.
upvoted 0 times
...
Trina
9 months ago
A) In an HCP Terraform/Terraform Cloud variable, with the sensitive option checked.
upvoted 0 times
...
...
Alpha
10 months ago
A, B, and C seem like the most secure options. Putting sensitive info in a version control system is a big no-no!
upvoted 0 times
Jerry
8 months ago
C) In a terraform.tfvars file, securely managed and shared with your team.
upvoted 0 times
...
Roosevelt
9 months ago
B) In HashiCorp Vault.
upvoted 0 times
...
Junita
9 months ago
A) In an HCP Terraform/Terraform Cloud variable, with the sensitive option checked.
upvoted 0 times
...
...
Kathrine
10 months ago
I also think using HCP Terraform/Terraform Cloud variables with the sensitive option checked is a good option.
upvoted 0 times
...
Hortencia
10 months ago
I agree with Teri, storing sensitive values in a secure vault is the best practice.
upvoted 0 times
...
Teri
10 months ago
I think we should store them in HashiCorp Vault.
upvoted 0 times
...

Save Cancel