hardmulti selectObjective-mapped

Exhibit

Deployment notes:
- service.key is copied into the image layer
- the same key is reused across several nodes
- certificate renewal is manual and yearly
- services authenticate to each other with TLS

A microservices team stores service private keys inside container images and renews certificates manually once a year. Security wants to reduce damage if a node is compromised and keep certificate trust manageable at scale. Which two changes are the best fit? Select two.

Question 1hardmulti select
Full question →

A microservices team stores service private keys inside container images and renews certificates manually once a year. Security wants to reduce damage if a node is compromised and keep certificate trust manageable at scale. Which two changes are the best fit? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Store private keys in an HSM-backed secrets manager or equivalent key vault.

Keeping private keys out of the image and out of the filesystem reduces the chance that a node compromise exposes long-term secrets. A managed key vault or HSM-backed store is much harder to copy than a baked-in file.

B

Distractor review

Embed private keys in the container image so redeployments are simpler.

Embedding keys in images makes scaling convenient, but it also makes secrets easy to extract from the image layers. That increases the blast radius if one image or node is compromised.

C

Best answer

Use an internal CA and automate short-lived certificate renewal.

An internal CA with automated renewal supports scalable trust management and reduces the impact of compromise. Short-lived certificates narrow the window in which stolen credentials or keys remain useful.

D

Distractor review

Replace the CA with a self-signed certificate on every node.

Self-signed certificates increase operational burden and weaken trust validation between services. They do not provide a practical way to manage identities or renew certificates consistently across many nodes.

E

Distractor review

Convert the key file to base64 before storing it in the image.

Base64 encoding is not encryption and offers no real protection. It only changes the text representation of the key, so anyone with the image can still recover the secret easily.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Store private keys in an HSM-backed secrets manager or equivalent key vault. — The strongest changes are to move private keys into protected key management and to automate short-lived certificate issuance through an internal CA. The first reduces exposure if a container or node is compromised, because the key is not sitting in the image. The second improves lifecycle management, limits the usefulness of stolen certificates, and makes the trust model easier to operate at scale. Why others are wrong: Baking keys into images and using self-signed certificates both create avoidable operational and security problems. Base64 is only encoding, not protection. The goal is to protect the private key itself and to manage certificate issuance in a controlled, short-lived, and scalable way.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.