After decrypting data using the transit secrets engine, the plaintext output does not match the plaintext credit card number that you encrypted. Which of the following answers provides a solution?
1. $ vault write transit/decrypt/creditcard\
ciphertext="vault:v1:cZNHVx+sxdMErXRSuDa1q/pz49fXTn1PScKfhf+PIZPvy8xKfkytpwKcbC0fF2U=" \ 2.
3. Key Value
4. --- -----
5. plaintext Y3JlZGl0LWNhcmQtbnVtYmVyCg==
- The resulting plaintext data is base64-encoded. To reveal the original plaintext, use the base64 -- decode command.
- The data is corrupted. Execute the encryption command again using a different data key
- the user doesn't have permission to decrypt the data, therefore Vault returns false data so as not to reveal if the data was actually encrypted by Vault
- Vault is sealed, therefore the data cannot be decrypted. Unseal Vault to properly decrypt the data
Answer(s): A
Explanation:
All plaintext data must be base64-encoded. The reason for this requirement is that Vault does not require that the plaintext is "text". It could be a binary file such as a PDF or image. The easiest safe transport mechanism for this data as part of a JSON payload is to base64-encode it.
Reference:
https://learn.hashicorp.com/vault/encryption-as-a-service/eaas-transit
Reveal Solution Next Question