New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HashiCorp Vault-Associate Exam - Topic 7 Question 34 Discussion

Contribute your Thoughts:

0/2000 characters
Joseph
3 months ago
I thought you could delete secrets too, but I guess not!
upvoted 0 times
...
Avery
3 months ago
B is definitely not permitted, just checked the policy.
upvoted 0 times
...
Lovetta
3 months ago
Wait, can you really do a metadata get on that? Seems off.
upvoted 0 times
...
Nickolas
4 months ago
Totally agree, those are the only ones allowed!
upvoted 0 times
...
Honey
4 months ago
A and C are the correct answers.
upvoted 0 times
...
Amira
4 months ago
I’m confused about option E; I thought listing secrets was allowed, but I can't recall if it was specifically mentioned in the policy we studied.
upvoted 0 times
...
Dana
4 months ago
I feel like option D is definitely not allowed because it mentions deleting a secret, which seems too risky for this policy.
upvoted 0 times
...
Benedict
4 months ago
I'm not entirely sure, but I remember a practice question where we had to identify allowed operations. I think C could be a possibility too.
upvoted 0 times
...
Marvel
5 months ago
I think options A and B might be correct since they involve getting and putting secrets, which seems to align with the policy.
upvoted 0 times
...
Candida
5 months ago
Alright, time to put on my thinking cap. Based on the policy, I believe A and B are the correct answers, as they involve operations on the `secret/webapp1` path, which is explicitly allowed.
upvoted 0 times
...
Kate
5 months ago
I think I've got it! The policy allows read and write access to `secret/webapp1`, so A and B are the correct answers. The other options don't seem to be permitted by this policy.
upvoted 0 times
...
Delmy
5 months ago
I'm a bit confused by the metadata and delete operations. Do those fall under the permissions granted in this policy? I'll need to double-check the documentation to be sure.
upvoted 0 times
...
Ezekiel
5 months ago
Okay, let me see here. The policy seems to grant read and write access to the `secret/webapp1` path, so I'm guessing A and B are the correct answers.
upvoted 0 times
...
Tamekia
5 months ago
Hmm, this looks like a tricky one. I'll need to carefully read through the policy and think about which operations are allowed based on the permissions granted.
upvoted 0 times
...
Peggy
9 months ago
Hey, I heard the Vault team is hiring a new Peggy to write their test questions. Looks like they nailed it with this one! Bet they're sitting back, sipping their lattes, and waiting for the chaos to unfold. I wonder if they'll accept 'D and E' as the right answers... just to see who's brave enough to try it.
upvoted 0 times
...
Louvenia
9 months ago
Well, well, well, look at that fancy policy. Let me guess, A and C are the winners here. No putting or deleting, but you can get and check the metadata. Though I'm pretty sure the devs who wrote this policy were just messing with us. They're probably laughing their butts off right now, watching us struggle with this one.
upvoted 0 times
Valentine
8 months ago
Haha, those devs sure know how to make things interesting. They're probably having a good laugh at our expense.
upvoted 0 times
...
Rasheeda
8 months ago
Yeah, A and C are the correct answers. No putting or deleting allowed.
upvoted 0 times
...
Hailey
9 months ago
C) vault kv metadata get secret/webapp1
upvoted 0 times
...
Deonna
9 months ago
A) vault kv get secret/webapp1
upvoted 0 times
...
...
Selma
10 months ago
Ha! D and E, huh? Not a chance, buddy. The policy clearly states you can't delete or list that 'super-secret' folder. Looks like A and C are the way to go. Though I'm tempted to try B just to see what happens... Might as well go out with a bang, right?
upvoted 0 times
Micheal
8 months ago
C) vault kv metadata get secret/webapp1
upvoted 0 times
...
Vonda
8 months ago
B) vault kv put secret/webapp1 apikey-\'ABCDEFGHI] K123M\'
upvoted 0 times
...
Hollis
9 months ago
A) vault kv get secret/webapp1
upvoted 0 times
...
...
Eliz
10 months ago
Whoa, hold up! B and D? No way, that policy ain't gonna let you do that. Gotta stick to A and C, my friend. Though I'm kind of curious what's in that 'super-secret' folder... Bet it's juicy!
upvoted 0 times
Huey
9 months ago
Whoa, hold up! B and D? No way, that policy ain't gonna let you do that. Gotta stick to A and C, my friend. Though I'm kind of curious what's in that 'super-secret' folder... Bet it's juicy!
upvoted 0 times
...
Malcom
9 months ago
B) vault kv put secret/webapp1 apikey-\'ABCDEFGHI] K123M\'
upvoted 0 times
...
Marya
9 months ago
A) vault kv get secret/webapp1
upvoted 0 times
...
...
Melvin
11 months ago
Alright, let's see here. Based on the policy, I'm guessing A and C are the correct answers. Get and metadata operations seem to be allowed, but no putting or deleting. Though I wonder if that means I can't update anything either... Hmm, tricky one.
upvoted 0 times
Aleta
9 months ago
Exactly, it's important to understand the limitations of the policy.
upvoted 0 times
...
Aracelis
9 months ago
So we can view and get metadata for secrets, but can't make any changes.
upvoted 0 times
...
Brigette
9 months ago
Yeah, I agree. Get and metadata operations are permitted, but not put or delete.
upvoted 0 times
...
Clay
10 months ago
I think you're right, A and C are the correct answers. No putting or deleting allowed.
upvoted 0 times
...
...
Billi
11 months ago
I'm not sure, I think C and E might also be permitted.
upvoted 0 times
...
Ryann
11 months ago
I agree with Whitley, A and B make sense based on the policy.
upvoted 0 times
...
Whitley
11 months ago
I think A and B are permitted.
upvoted 0 times
...

Save Cancel