Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk Exam SECRET-SEN Topic 5 Question 26 Discussion

Actual exam question for CyberArk's SECRET-SEN exam
Question #: 26
Topic #: 5
[All SECRET-SEN Questions]

A customer has 100 .NET applications and wants to use Summon to invoke the application and inject secrets at run time.

Which change to the NET application code might be necessary to enable this?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Desmond
2 months ago
Hmm, I wonder if the developers used a secret handshake to retrieve the secrets in the first place... B is probably the safest bet.
upvoted 0 times
Rodney
25 days ago
That's true, it's important to follow best practices when handling sensitive information in applications.
upvoted 0 times
...
Tamesha
1 months ago
I agree, using a configuration file or environment variable is a common practice for storing secrets securely.
upvoted 0 times
...
Tayna
1 months ago
B) It must be changed to access secrets from a configuration file or environment variable.
upvoted 0 times
...
...
Helaine
2 months ago
As a .NET developer, I can say with confidence that B is the correct answer. Summon can't just magically retrieve secrets without the app being set up for it.
upvoted 0 times
...
Daniela
2 months ago
This is a no-brainer - the app needs to be changed to use environment variables or a config file. B all the way!
upvoted 0 times
...
Cory
2 months ago
D seems a bit too specific - I doubt the exam is looking for that level of detail. B is the practical choice here.
upvoted 0 times
Ciara
1 months ago
B seems like the most practical option for this scenario.
upvoted 0 times
...
Annamae
1 months ago
C) No changes are needed as Summon brokers the connection between the application and the backend data source through impersonation.
upvoted 0 times
...
Alonzo
1 months ago
B) It must be changed to access secrets from a configuration file or environment variable.
upvoted 0 times
...
...
Shannan
2 months ago
That's a good point, security is definitely important when dealing with sensitive information like secrets. I see your rationale now.
upvoted 0 times
...
Shaun
2 months ago
Haha, I bet the developers who wrote these applications really wish they had just used environment variables from the start! B is the way to go.
upvoted 0 times
Eulah
1 months ago
User 4: That sounds like the most secure option for managing secrets in the applications.
upvoted 0 times
...
Chantell
1 months ago
User 3: B) It must be changed to access secrets from a configuration file or environment variable.
upvoted 0 times
...
Felicidad
2 months ago
Definitely, it's always best to keep sensitive information separate from the code.
upvoted 0 times
...
Haydee
2 months ago
I agree, using environment variables would have made things much simpler.
upvoted 0 times
...
...
Trina
3 months ago
I disagree, I believe the answer is D because including the host API key for Summon to retrieve the secrets from a Follower seems more secure.
upvoted 0 times
...
Shannan
3 months ago
I think the answer is B because accessing secrets from a configuration file or environment variable seems like the most straightforward solution.
upvoted 0 times
...
Ashlyn
3 months ago
C looks interesting, but I'm not sure Summon can handle the impersonation without any code changes in the application. I'd go with B to be on the safe side.
upvoted 0 times
Lashawna
1 months ago
Kasandra: Hmm, you might be right. B does sound like a safer choice.
upvoted 0 times
...
Gertude
2 months ago
I agree with Gertude, accessing secrets from a configuration file seems like a more reliable option.
upvoted 0 times
...
Kasandra
2 months ago
I'm not so sure about that, I would choose B just to be safe.
upvoted 0 times
...
Mari
2 months ago
I think C is the way to go, Summon handles the impersonation for us.
upvoted 0 times
...
...
Crista
3 months ago
I think the answer is B. The application needs to be changed to access secrets from a configuration file or environment variable so that Summon can inject the secrets at runtime.
upvoted 0 times
Loreen
2 months ago
That makes sense. It's important for Summon to be able to inject the secrets at runtime.
upvoted 0 times
...
Peggie
2 months ago
B) It must be changed to access secrets from a configuration file or environment variable.
upvoted 0 times
...
...

Save Cancel