1.

When a user wants to access a Hive table, _______ protection can be used to secure the channel of communication. This mechanism is called ________.

Answer»

When a USER wants to access a Hive table, _______ protection can be used to secure the channel of COMMUNICATION. This mechanism is called ________.
Please choose the CORRECT option from below list
(1)JDBC, Wire Encryption
(2)RPC, Wire Encryption
(3)RPC, Ranger
(4)JDBC, Ranger

Answer:-(2)RPC, Wire Encryption



Discussion

No Comment Found