Explore topic-wise MCQs in Hadoop.

This section includes 14 Mcqs, each offering curated multiple-choice questions to sharpen your Hadoop knowledge and support exam preparation. Choose a topic below to get started.

1.

Internal authentication stores usernames and bcrypt-hashed passwords in the ____________ table.

A. system_auth.creds
B. system_auth.credentials
C. system.credentials
D. sys_auth.credentials
Answer» C. system.credentials
2.

Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time.

A. qlshrc
B. cqshrc
C. cqlshrc
D. none of the mentioned
Answer» D. none of the mentioned
3.

Client-to-node encryption protects data in flight from client machines to a database cluster using ___________

A. SSL
B. SSH
C. SSN
D. All of the mentioned
Answer» B. SSH
4.

A __________ determines which data centers and racks nodes belong to it.

A. Client requests
B. Snitch
C. Partitioner
D. None of the mentioned
Answer» C. Partitioner
5.

Cassandra uses a protocol called _______ to discover location and state information.

A. gossip
B. intergos
C. goss
D. all of the mentioned
Answer» B. intergos
6.

Apache Cassandra is a massively scalable open source _______ database.

A. SQL
B. NoSQL
C. NewSQL
D. All of the mentioned
Answer» C. NewSQL
7.

INTERNAL_AUTHENTICATION_STORES_USERNAMES_AND_BCRYPT-HASHED_PASSWORDS_IN_THE______________TABLE.?$

A. system_auth.creds
B. system_auth.credentials
C. system.credentials
D. sys_auth.credentials
Answer» C. system.credentials
8.

Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time?#

A. qlshrc
B. cqshrc
C. cqlshrc
D. none of the mentioned
Answer» D. none of the mentioned
9.

Client-to-node encryption protects data in flight from client machines to a database cluster using :

A. SSL
B. SSH
C. SSN
D. All of the mentioned
Answer» B. SSH
10.

Authorization capabilities for Cassandra use the familiar _________ security paradigm to manage object permissions.

A. COMMIT
B. GRANT
C. ROLLBACK
D. None of the mentioned
Answer» C. ROLLBACK
11.

User accounts may be altered and dropped using the __________ Query Language.

A. Hive
B. Cassandra
C. Sqoop
D. None of the mentioned
Answer» C. Sqoop
12.

A __________ determines which data centers and racks nodes belong to.

A. Client requests
B. Snitch
C. Partitioner
D. None of the mentioned
Answer» C. Partitioner
13.

Cassandra uses a protocol called _______ to discover location and state information

A. gossip
B. intergos
C. goss
D. all of the mentioned
Answer» B. intergos
14.

Apache Cassandra‚Ñ¢ is a massively scalable open source _______ database.

A. SQL
B. NoSQL
C. NewSQL
D. All of the mentioned
Answer» C. NewSQL