Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What are the three main functions involved within Ranger KMS ?

Answer»

What are the three main functions involved within Ranger KMS ?
PLEASE choose the correct option from below list
(1)Audit, Access Control POLICIES, Encryption
(2)Key management, Audit, Access Control Policies
(3)Access control policies, Key Management, Auditing
(4)Key management, Audit, Fault Tolerance

Answer:-(2)Key management, Audit, Access Control Policies

2.

Which of the following is not part of Hadoop Security ?

Answer»

Which of the FOLLOWING is not part of HADOOP Security ?
PLEASE choose the correct option from below list
(1)MapReduce
(2)SENTRY
(3)Rhino
(4)Ranger

Answer:-(1)MapReduce

3.

The Name Node provides a client the address of the first Data Node to read or write a block. The actual data transfer between a client and a Data Node

Answer»

The Name Node provides a client the address of the first DATA Node to read or write a block. The actual data transfer between a client and a Data Node uses ________ protocol.
Please choose the correct option from below LIST
(1)HTTPS
(2)Data Transfer Protocol
(3)RPC
(4)HTTP

Answer:-(2)Data Transfer Protocol

4.

What is the process of keeping track of a user's activity?

Answer»

What is the process of keeping track of a USER's activity?
PLEASE CHOOSE the correct option from below list
(1)Authentication
(2)Auditing
(3)Authorization
(4)Access Controls Lists (ACLs)

Answer:-(2)Auditing

5.

Which component enforces a common set of policies across multiple data access paths in Hadoop?

Answer»

Which component enforces a common SET of policies across multiple data access PATHS in Hadoop?
Please CHOOSE the correct option from below LIST
(1)None of the options
(2)RANGER
(3)Sentry
(4)Ranger KMS

Answer:-(3)Sentry

6.

Authorization aims to determine who a user is, and authentication aims to restrict what operations/data the user can access?

Answer»

Authorization AIMS to determine who a user is, and authentication aims to restrict what operations/data the user can access?
Please CHOOSE the correct OPTION from below list
(1)False
(2)True

Answer:-(1)False

7.

Windows 2000, and later versions internally use what security as their default authentication method?

Answer» WINDOWS 2000, and later versions INTERNALLY use what SECURITY as their DEFAULT authentication method?
Please choose the correct option from below list
(1)Ranger
(2)ACL
(3)Kerberos
(4)Password

Answer:-(3)Kerberos
8.

In which file can the realm name be set in Kerberos?

Answer»

In which file can the REALM NAME be set in Kerberos?
Please CHOOSE the correct option from below LIST
(1)krb5.conf
(2)kdc.conf
(3)krb5kdc.conf
(4)kadmin.conf

Answer:-(1)krb5.conf

9.

What do the different security-level Rings of Defense define?

Answer»

What do the different security-level Rings of Defense DEFINE?
Please choose the correct option from below list
(1)Authentication (Kerberos)
(2)Authorization (RANGER, Sentry)
(3)Data protection
(4)PERIMETER level security (Gateways)
(5)All the OPTIONS
(6)OS Security

Answer:-(5)All the options

10.

When a user tries to access HDFS to read a file, how can the communication with HDFS be secured?

Answer»

When a user tries to access HDFS to read a file, how can the communication with HDFS be secured?
Please choose the correct option from below list
(1)RPC in WIRE Encryption
(2)Data Transfer Protocol (DTP) in Wire Encryption
(3)JDBC - Encryption
(4)NONE of the options

Answer:-(1)RPC in Wire Encryption

11.

Wire Encryption deals with securing data while it is at rest.

Answer» WIRE Encryption DEALS with securing data while it is at rest.
Please choose the CORRECT option from below list
(1)FALSE
(2)True

Answer:-(1)False
12.

What do the three heads of Kerberos represent?

Answer»

What do the three heads of KERBEROS represent?
Please CHOOSE the correct OPTION from below list
(1)Key Distribution SERVER, Ticket Granting Server, Authentication Server
(2)Ticket Granting Server, Session Key, KDC
(3)Key Distribution Server, Session Key, Authentication Server
(4)Key Distribution Server, Ticket Granting Server, AUTHORIZATION Server

Answer:-(1)Key Distribution Server, Ticket Granting Server, Authentication Server

13.

Securing data at rest can be implemented by ______, and securing data in motion can be implemented by _______?

Answer»

Securing data at rest can be IMPLEMENTED by ______, and securing data in motion can be implemented by _______?
Please choose the correct option from below list
(1)RangerKMS, Wire Encryption
(2)Ranger, RangerKMS
(3)Ranger & RangerKMS, Wire Encryption
(4)Ranger, Wire Encryption

Answer:-(3)Ranger & RangerKMS, Wire Encryption

14.

There is directory in HDFS which should not be accessible to normal users, and should be accessed by admins only. What security mechanism should be us

Answer»

There is DIRECTORY in HDFS which should not be accessible to normal users, and should be accessed by admins only. What security MECHANISM should be used?
Please choose the correct option from below list
(1)Wire Encryption
(2)Ranger KMS
(3)Kerberos
(4)Ranger

Answer:-(2)Ranger KMS

15.

Which of the following is not a part of Hadoop Security?

Answer»

Which of the following is not a part of Hadoop SECURITY?
PLEASE choose the correct OPTION from below LIST
(1)Sentry
(2)Knox
(3)Tez
(4)Rhino

Answer:-(3)Tez

16.

What is the most preferred way of authentication in Hadoop?

Answer»

What is the most preferred way of authentication in Hadoop?
Please choose the correct option from below list
(1)LDAP
(2)Kerberos
(3)Proxy
(4)Ranger

Answer:-(2)Kerberos

17.

Data transfer between web-console and clients are protected by using?

Answer»

Data transfer between web-console and clients are PROTECTED by using?
Please CHOOSE the correct option from below list
(1)SSL
(2)SSH
(3)None of the options
(4)Kerberos

Answer:-(1)SSL

18.

Apache Ranger plugin must be implemented in each Data Node.

Answer»

Apache Ranger plugin must be IMPLEMENTED in each Data Node.
Please choose the CORRECT OPTION from below list
(1)FALSE
(2)True

Answer:-(1)False

19.

Knox provides _________ for Hadoop clusters.

Answer»

Knox provides _________ for Hadoop clusters.
Please CHOOSE the CORRECT option from below list
(1)RELIABILITY
(2)Flexibility
(3)Fault TOLERANCE
(4)Perimeter Security

Answer:-(4)Perimeter Security

20.

Which of the following limit the ingress and egress of data and connections in a network?

Answer»

Which of the following limit the INGRESS and egress of data and connections in a network?
Please choose the correct OPTION from below list
(1)ENCRYPTION
(2)Kerberos
(3)Access Control Lists (ACLS)
(4)Firewalls

Answer:-(4)Firewalls

21.

What is the most common form of authentication?

Answer»

What is the most common FORM of authentication?
Please choose the CORRECT option from below list
(1)PASSWORD
(2)PIN
(3)Smart Cards
(4)DIGITAL Certificate

Answer:-(1)Password

22.

In CDH, what is used for authorization?

Answer»

In CDH, what is USED for authorization?
Please choose the correct option from below list
(1)SENTRY Server
(2)DATA Engine
(3)None of the options
(4)Sentry Plugin

Answer:-(1)Sentry Server

23.

What is the process of identifying an individual?

Answer»

What is the process of IDENTIFYING an INDIVIDUAL?
Please choose the CORRECT option from below list
(1)AUTHENTICATION
(2)AUTHORIZATION
(3)Auditing
(4)Accounting

Answer:-(1)Authentication

24.

Tools which can provide Security at Data level in Hadoop ?

Answer»

Tools which can provide Security at Data LEVEL in Hadoop ?
Please choose the correct option from below LIST
(1)Knox
(2)Encryption
(3)Ranger KMS
(4)Kerberos

Answer:-(3)Ranger KMS

25.

What is the process of giving individual access to a system or resource?

Answer»

What is the process of GIVING INDIVIDUAL access to a system or resource?
Please choose the correct option from below LIST
(1)Authorization
(2)AUTHENTICATION
(3)Auditing
(4)Accounting

Answer:-(1)Authorization

26.

When a user wants to access a Hive table, _______ protection can be used to secure the channel of communication. This mechanism is called ________.

Answer»

When a USER wants to access a Hive table, _______ protection can be used to secure the channel of COMMUNICATION. This mechanism is called ________.
Please choose the CORRECT option from below list
(1)JDBC, Wire Encryption
(2)RPC, Wire Encryption
(3)RPC, Ranger
(4)JDBC, Ranger

Answer:-(2)RPC, Wire Encryption

27.

What are four key pillars of Hadoop Security ?

Answer»

What are four KEY pillars of Hadoop Security ?
Please choose the correct option from below list
(1)Accountability, Token DELEGATION, Data masking and ACCESS Control
(2)Authentication, Authorization, Accountability and SENSITIVITY
(3)Authentication, Authorization, Accountability and Data protection
(4)Real TIME Access, Token Delegation, Data masking and Access Control

Answer:-(3)Authentication, Authorization, Accountability and Data protection

28.

What are the three A's of security and data protection in the Hadoop ecosystem?

Answer»

What are the three A's of security and data protection in the HADOOP ecosystem?
Please CHOOSE the correct option from below list
(1)Abstraction, Authentication, AUDITING
(2)Access Control List, Authorization, Auditing
(3)NONE of the options
(4)Authentication , Authorization, Auditing

Answer:-(4)Authentication , Authorization, Auditing

29.

How to enable RPC Encryption for all the interactions via Name Node?

Answer»

How to enable RPC Encryption for all the INTERACTIONS via Name NODE?
PLEASE choose the correct option from below list
(1)hadoop.security.authentication=simple
(2)hadoop.rpc.protection=privacy
(3)hadoop.rpc.protection=authentication
(4)hadoop.security.authentication=kerberos

Answer:-(2)hadoop.rpc.protection=privacy

30.

Assume there is a table in Hive with 20 columns. The first 15 columns can be seen by everyone, but 5 columns can be seen by admins only. What security

Answer»

Assume there is a table in Hive with 20 columns. The first 15 columns can be seen by everyone, but 5 columns can be seen by ADMINS only. What security concept should be applied?
Please choose the correct OPTION from below LIST
(1)Encryption
(2)Sentry
(3)Ranger
(4)Kerberos

Answer:-(3)Ranger

31.

What are the different types of communication channels between Hadoop components?

Answer»

What are the different types of communication channels between HADOOP components?
Please choose the correct OPTION from below list
(1)Encryption during Shuffle
(2)Remote Procedure Call (RPC)
(3)JDBC
(4)All the options
(5)HTTP
(6)Data Transfer Protocol

Answer:-(4)All the options

32.

What are the key factors for driving security in Hadoop?

Answer»

What are the key factors for driving security in HADOOP?
Please choose the correct option from below list
(1)Ensuring that data access history for all USERS are recorded in accordance with compliance REGULATIONS, and for other important purposes.
(2)Ensuring that only AUTHORIZED Hadoop users access the data that they are entitled to access.
(3)All the options
(4)Ensuring proper authentication of users who access Hadoop.
(5)Ensuring the protection of data, both at rest and in transit, through enterprise-grade encryption.

Answer:-(3)All the options

33.

A person wants to buy a flight ticket. On finding a flight at an ideal price, the person enters their credit card details and personal information whi

Answer»

A person wants to BUY a flight ticket. On finding a flight at an ideal price, the person enters their credit card details and personal information which is sent over the internet to the airline. The airline should protect the customer s data so that it is SAFE from interception in transit. What is the security MECHANISM used?
Please choose the correct option from below LIST
(1)Confidentiality
(2)SSL
(3)Encryption
(4)Digital certificates

Answer:-(3)Encryption

34.

What are the Hadoop UIs supported by Knox?

Answer»

What are the Hadoop UIs supported by Knox?
Please CHOOSE the CORRECT option from below list
(1)SPARK UI
(2)Job HISTORY UI
(3)Yarn UI
(4)All the OPTIONS
(5)Name Node UI

Answer:-(4)All the options