Try 12 CyberArk Sentry Secrets Manager sample questions on machine identities, API credentials, secret rotation, integrations, policy, and monitoring.
CyberArk Sentry Secrets Manager is a route for candidates who work with machine identities, application secrets, API credentials, secret rotation, integrations, policy controls, auditability, and operational monitoring.
Use this page to preview the kind of secrets-management decisions a practice route should test. The questions below are original IT Mastery sample questions, not official CyberArk exam questions.
Practice option: Sample preview available
Start with the 12 sample questions on this page. Dedicated practice for CyberArk Sentry Secrets Manager is not live in the web app yet; enter your email if this route should be prioritized.
Need a supported route now? See currently available IT Mastery exam pages.
Topic: secret storage
Why should application secrets not be hardcoded in source code?
Best answer: D
Explanation: Hardcoded secrets create leakage and rotation risk. Secrets should be stored, retrieved, audited, and rotated through controlled mechanisms.
Topic: machine identity
What is a machine identity in a secrets-management context?
Best answer: A
Explanation: Machine identities belong to automated workloads. They need protection, rotation, policy, and audit controls just like human credentials.
Topic: rotation
What is the goal of secret rotation?
Best answer: B
Explanation: Rotation limits the useful life of exposed or stale credentials. It must be coordinated with applications and dependencies.
Topic: application integration
An application fails after a secret rotation. What should be checked first?
Best answer: C
Explanation: Rotation failures often involve retrieval, cache, version, permissions, dependency settings, or timing. Those factors determine whether the app can use the new secret.
Topic: least privilege
What is the safest access model for secrets?
Best answer: C
Explanation: Least privilege applies to workload identities. Access should be scoped to required secrets and recorded for accountability.
Topic: audit
Why audit secret retrieval?
Best answer: D
Explanation: Retrieval audit logs help investigate misuse, detect abnormal patterns, and support compliance. They do not replace all monitoring or prevent every error.
Topic: CI/CD
What is a better CI/CD practice than placing a long-lived deployment key in a pipeline file?
Best answer: B
Explanation: Pipeline secrets should be retrieved through controlled identity and policy mechanisms. Long-lived embedded keys are harder to protect and rotate.
Topic: certificates
Why should certificates be part of secrets-management planning?
Best answer: C
Explanation: Certificates are machine-identity material. They require lifecycle management, protection, renewal, and monitoring.
Topic: incident response
A secret is accidentally published in a repository. What should happen first?
Best answer: D
Explanation: Once exposed, a secret should be treated as compromised. Rotation or revocation, investigation, cleanup, and log review are needed.
Topic: monitoring
Which signal may indicate suspicious secret use?
Best answer: B
Explanation: Abnormal retrieval behavior can indicate misuse or compromise. Monitoring should focus on identity, timing, source, and volume patterns.
Topic: ownership
Why assign owners to secrets?
Best answer: C
Explanation: Ownership supports governance and response. Someone needs to approve use, understand dependencies, and coordinate changes or incidents.
Topic: migration
What should be prioritized when migrating hardcoded secrets into a secrets manager?
Best answer: D
Explanation: Migration should prioritize risk and impact. Privileged, exposed, reused, or hard-to-rotate secrets create the greatest security concern.
| If you miss… | Drill this next |
|---|---|
| secret-lifecycle questions | storage, retrieval, rotation, revocation, ownership, certificates, and migration priority |
| integration questions | workload identity, CI/CD, application cache, permissions, versions, and dependency timing |
| detection questions | audit logs, abnormal retrieval, incident response, and exposed-secret handling |
Use this page to preview Sentry Secrets Manager sample questions and confirm the exam fit. If you want IT Mastery practice updates for this route, use the Notify me form above.