and Conceptual Actual Frequently Tested
Exam Questions With Reviewed 100% Correct
Detailed Answers
Guaranteed Pass!!Current Update!!
1. What can you use to avoid writing 42 different nested ingress config blocks by
hand?
A. A count loop
B. A for block
C. A for each block
D. A dynamic block - ANSWER D
2. Which of the following is the safest way to inject sensitive values into a
Terraform Cloud workspace?
A. Write the value to a file and specify the file with the -var-file flag
B. Set a value for the variable in the UI and check the "Sensitive" check box
C. Edit the state file directly just before running terraform apply
D. Set the variable value on the command line with the -var flag - ANSWER B
3. Terraform apply will fail if you have not am terraform plan first to update the
plan output.
,A. True
B. False - ANSWER B
4. How would you reference the attribute "name" of this fictitious resource in
HCL?
resource "kubernetes_namespace" "example" {
name = "test"
}
A. resource.kubernetes_namespace.example.name
B. kubernetes_namespace.test.name
C. kubernetes_namespace.example.name
D. data.kubernetes_namespace.name E. None of the above - ANSWER C
5. A Terraform output that sets the "sensitive" argument to true will not store
that value in the state file.
A. True
B. False - ANSWER B
6. Which are forbidden actions when the Terraform state file is locked? (Choose
three.)
A. terraform destroy
B. terraform fmt
C. terraform state list
D. terraform apply
, E. terraform plan
F. terraform validate - ANSWER ADE
7. Terraform installs its providers during which phase?
A. Plan
B. Init
C. Refresh
D. All of the above - ANSWER B
8. When does Sentinel enforce policy logic during a Terraform Enterprise run?
A. Before the plan phase
B. During the plan phase
C. Before the apply phase
D. After the apply phase - ANSWER C
9. What is the purpose of a Terraform workspace in either open source or
enterprise?
A. Workspaces allow you to manage collections of infrastructure in state files
B. A logical separation of business units
C. A method of grouping multiple infrastructure security policies
D. Provides limited access to a cloud environment - ANSWER A