What can be used to limit the scope of a credential breach?

What can be used to limit the scope of a credential breach?
A . Storage of secrets in a distributed ledger
B . Enable audit logging
C . Use of a short-lived dynamic secrets
D . Sharing credentials between applications

Answer: C

Explanation:

Using a short-lived dynamic secrets can help limit the scope of a credential breach by reducing the

exposure time of the secrets. Dynamic secrets are generated on-demand by Vault and automatically revoked when they are no longer needed. This way, the credentials are not stored in plain text or in a static database, and they can be rotated frequently to prevent unauthorized access. Dynamic secrets also provide encryption as a service, which means that they perform cryptographic operations on data in-transit without storing any data. This adds an extra layer of security and reduces the risk of data leakage or tampering.

Reference: Dynamic secrets | Vault | HashiCorp Developer, What are dynamic secrets and why do I need them? – HashiCorp

Latest VA-002-P Dumps Valid Version with 200 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments