This visual execution shows how Jenkins handles credentials. First, you create credentials by choosing a type like secret text or username/password. Jenkins stores these securely and encrypts them. When you use them in a pipeline, Jenkins injects them as environment variables but masks their values in logs to keep them secret. This prevents accidental exposure. Choosing the right credential type is important for proper usage and security. The execution table traces creation and usage steps, while the variable tracker shows how credentials change state from creation to usage. Key moments clarify why secrets are hidden and the importance of correct types. The quiz tests understanding of credential types, usage steps, and security risks.