

MCQOPTIONS
Saved Bookmarks
This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Hadoop knowledge and support exam preparation. Choose a topic below to get started.
1. |
Internal authentication stores usernames and bcrypt-hashed passwords in the ____________ table. |
A. | system_auth.creds |
B. | system_auth.credentials |
C. | system.credentials |
D. | sys_auth.credentials |
Answer» C. system.credentials | |
2. |
Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time. |
A. | qlshrc |
B. | cqshrc |
C. | cqlshrc |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
3. |
Client-to-node encryption protects data in flight from client machines to a database cluster using ___________ |
A. | SSL |
B. | SSH |
C. | SSN |
D. | All of the mentioned |
Answer» B. SSH | |
4. |
A __________ determines which data centers and racks nodes belong to it. |
A. | Client requests |
B. | Snitch |
C. | Partitioner |
D. | None of the mentioned |
Answer» C. Partitioner | |
5. |
Cassandra uses a protocol called _______ to discover location and state information. |
A. | gossip |
B. | intergos |
C. | goss |
D. | all of the mentioned |
Answer» B. intergos | |
6. |
Apache Cassandra is a massively scalable open source _______ database. |
A. | SQL |
B. | NoSQL |
C. | NewSQL |
D. | All of the mentioned |
Answer» C. NewSQL | |
7. |
INTERNAL_AUTHENTICATION_STORES_USERNAMES_AND_BCRYPT-HASHED_PASSWORDS_IN_THE______________TABLE.?$ |
A. | system_auth.creds |
B. | system_auth.credentials |
C. | system.credentials |
D. | sys_auth.credentials |
Answer» C. system.credentials | |
8. |
Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time?# |
A. | qlshrc |
B. | cqshrc |
C. | cqlshrc |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
9. |
Client-to-node encryption protects data in flight from client machines to a database cluster using : |
A. | SSL |
B. | SSH |
C. | SSN |
D. | All of the mentioned |
Answer» B. SSH | |
10. |
Authorization capabilities for Cassandra use the familiar _________ security paradigm to manage object permissions. |
A. | COMMIT |
B. | GRANT |
C. | ROLLBACK |
D. | None of the mentioned |
Answer» C. ROLLBACK | |
11. |
User accounts may be altered and dropped using the __________ Query Language. |
A. | Hive |
B. | Cassandra |
C. | Sqoop |
D. | None of the mentioned |
Answer» C. Sqoop | |
12. |
A __________ determines which data centers and racks nodes belong to. |
A. | Client requests |
B. | Snitch |
C. | Partitioner |
D. | None of the mentioned |
Answer» C. Partitioner | |
13. |
Cassandra uses a protocol called _______ to discover location and state information |
A. | gossip |
B. | intergos |
C. | goss |
D. | all of the mentioned |
Answer» B. intergos | |
14. |
Apache Cassandra‚Ñ¢ is a massively scalable open source _______ database. |
A. | SQL |
B. | NoSQL |
C. | NewSQL |
D. | All of the mentioned |
Answer» C. NewSQL | |