MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Hadoop knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Internal authentication stores usernames and bcrypt-hashed passwords in the ____________ table. |
| A. | system_auth.creds |
| B. | system_auth.credentials |
| C. | system.credentials |
| D. | sys_auth.credentials |
| Answer» C. system.credentials | |
| 2. |
Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time. |
| A. | qlshrc |
| B. | cqshrc |
| C. | cqlshrc |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 3. |
Client-to-node encryption protects data in flight from client machines to a database cluster using ___________ |
| A. | SSL |
| B. | SSH |
| C. | SSN |
| D. | All of the mentioned |
| Answer» B. SSH | |
| 4. |
A __________ determines which data centers and racks nodes belong to it. |
| A. | Client requests |
| B. | Snitch |
| C. | Partitioner |
| D. | None of the mentioned |
| Answer» C. Partitioner | |
| 5. |
Cassandra uses a protocol called _______ to discover location and state information. |
| A. | gossip |
| B. | intergos |
| C. | goss |
| D. | all of the mentioned |
| Answer» B. intergos | |
| 6. |
Apache Cassandra is a massively scalable open source _______ database. |
| A. | SQL |
| B. | NoSQL |
| C. | NewSQL |
| D. | All of the mentioned |
| Answer» C. NewSQL | |
| 7. |
INTERNAL_AUTHENTICATION_STORES_USERNAMES_AND_BCRYPT-HASHED_PASSWORDS_IN_THE______________TABLE.?$ |
| A. | system_auth.creds |
| B. | system_auth.credentials |
| C. | system.credentials |
| D. | sys_auth.credentials |
| Answer» C. system.credentials | |
| 8. |
Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time?# |
| A. | qlshrc |
| B. | cqshrc |
| C. | cqlshrc |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 9. |
Client-to-node encryption protects data in flight from client machines to a database cluster using : |
| A. | SSL |
| B. | SSH |
| C. | SSN |
| D. | All of the mentioned |
| Answer» B. SSH | |
| 10. |
Authorization capabilities for Cassandra use the familiar _________ security paradigm to manage object permissions. |
| A. | COMMIT |
| B. | GRANT |
| C. | ROLLBACK |
| D. | None of the mentioned |
| Answer» C. ROLLBACK | |
| 11. |
User accounts may be altered and dropped using the __________ Query Language. |
| A. | Hive |
| B. | Cassandra |
| C. | Sqoop |
| D. | None of the mentioned |
| Answer» C. Sqoop | |
| 12. |
A __________ determines which data centers and racks nodes belong to. |
| A. | Client requests |
| B. | Snitch |
| C. | Partitioner |
| D. | None of the mentioned |
| Answer» C. Partitioner | |
| 13. |
Cassandra uses a protocol called _______ to discover location and state information |
| A. | gossip |
| B. | intergos |
| C. | goss |
| D. | all of the mentioned |
| Answer» B. intergos | |
| 14. |
Apache Cassandra‚Ñ¢ is a massively scalable open source _______ database. |
| A. | SQL |
| B. | NoSQL |
| C. | NewSQL |
| D. | All of the mentioned |
| Answer» C. NewSQL | |