InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What are the three main functions involved within Ranger KMS ? |
|
Answer» What are the three main functions involved within Ranger KMS ? |
|
| 2. |
Which of the following is not part of Hadoop Security ? |
|
Answer» Which of the FOLLOWING is not part of HADOOP Security ? |
|
| 3. |
The Name Node provides a client the address of the first Data Node to read or write a block. The actual data transfer between a client and a Data Node |
|
Answer» The Name Node provides a client the address of the first DATA Node to read or write a block. The actual data transfer between a client and a Data Node uses ________ protocol. |
|
| 4. |
What is the process of keeping track of a user's activity? |
|
Answer» What is the process of keeping track of a USER's activity? |
|
| 5. |
Which component enforces a common set of policies across multiple data access paths in Hadoop? |
|
Answer» Which component enforces a common SET of policies across multiple data access PATHS in Hadoop? |
|
| 6. |
Authorization aims to determine who a user is, and authentication aims to restrict what operations/data the user can access? |
|
Answer» Authorization AIMS to determine who a user is, and authentication aims to restrict what operations/data the user can access? |
|
| 7. |
Windows 2000, and later versions internally use what security as their default authentication method? |
|
Answer» WINDOWS 2000, and later versions INTERNALLY use what SECURITY as their DEFAULT authentication method? Please choose the correct option from below list (1)Ranger (2)ACL (3)Kerberos (4)Password Answer:-(3)Kerberos |
|
| 8. |
In which file can the realm name be set in Kerberos? |
|
Answer» In which file can the REALM NAME be set in Kerberos? |
|
| 9. |
What do the different security-level Rings of Defense define? |
|
Answer» What do the different security-level Rings of Defense DEFINE? |
|
| 10. |
When a user tries to access HDFS to read a file, how can the communication with HDFS be secured? |
|
Answer» When a user tries to access HDFS to read a file, how can the communication with HDFS be secured? |
|
| 11. |
Wire Encryption deals with securing data while it is at rest. |
|
Answer» WIRE Encryption DEALS with securing data while it is at rest. Please choose the CORRECT option from below list (1)FALSE (2)True Answer:-(1)False |
|
| 12. |
What do the three heads of Kerberos represent? |
|
Answer» What do the three heads of KERBEROS represent? |
|
| 13. |
Securing data at rest can be implemented by ______, and securing data in motion can be implemented by _______? |
|
Answer» Securing data at rest can be IMPLEMENTED by ______, and securing data in motion can be implemented by _______? |
|
| 14. |
There is directory in HDFS which should not be accessible to normal users, and should be accessed by admins only. What security mechanism should be us |
|
Answer» There is DIRECTORY in HDFS which should not be accessible to normal users, and should be accessed by admins only. What security MECHANISM should be used? |
|
| 15. |
Which of the following is not a part of Hadoop Security? |
|
Answer» Which of the following is not a part of Hadoop SECURITY? |
|
| 16. |
What is the most preferred way of authentication in Hadoop? |
|
Answer» What is the most preferred way of authentication in Hadoop? |
|
| 17. |
Data transfer between web-console and clients are protected by using? |
|
Answer» Data transfer between web-console and clients are PROTECTED by using? |
|
| 18. |
Apache Ranger plugin must be implemented in each Data Node. |
|
Answer» Apache Ranger plugin must be IMPLEMENTED in each Data Node. |
|
| 19. |
Knox provides _________ for Hadoop clusters. |
|
Answer» Knox provides _________ for Hadoop clusters. |
|
| 20. |
Which of the following limit the ingress and egress of data and connections in a network? |
|
Answer» Which of the following limit the INGRESS and egress of data and connections in a network? |
|
| 21. |
What is the most common form of authentication? |
|
Answer» What is the most common FORM of authentication? |
|
| 22. |
In CDH, what is used for authorization? |
|
Answer» In CDH, what is USED for authorization? |
|
| 23. |
What is the process of identifying an individual? |
|
Answer» What is the process of IDENTIFYING an INDIVIDUAL? |
|
| 24. |
Tools which can provide Security at Data level in Hadoop ? |
|
Answer» Tools which can provide Security at Data LEVEL in Hadoop ? |
|
| 25. |
What is the process of giving individual access to a system or resource? |
|
Answer» What is the process of GIVING INDIVIDUAL access to a system or resource? |
|
| 26. |
When a user wants to access a Hive table, _______ protection can be used to secure the channel of communication. This mechanism is called ________. |
|
Answer» When a USER wants to access a Hive table, _______ protection can be used to secure the channel of COMMUNICATION. This mechanism is called ________. |
|
| 27. |
What are four key pillars of Hadoop Security ? |
|
Answer» What are four KEY pillars of Hadoop Security ? |
|
| 28. |
What are the three A's of security and data protection in the Hadoop ecosystem? |
|
Answer» What are the three A's of security and data protection in the HADOOP ecosystem? |
|
| 29. |
How to enable RPC Encryption for all the interactions via Name Node? |
|
Answer» How to enable RPC Encryption for all the INTERACTIONS via Name NODE? |
|
| 30. |
Assume there is a table in Hive with 20 columns. The first 15 columns can be seen by everyone, but 5 columns can be seen by admins only. What security |
|
Answer» Assume there is a table in Hive with 20 columns. The first 15 columns can be seen by everyone, but 5 columns can be seen by ADMINS only. What security concept should be applied? |
|
| 31. |
What are the different types of communication channels between Hadoop components? |
|
Answer» What are the different types of communication channels between HADOOP components? |
|
| 32. |
What are the key factors for driving security in Hadoop? |
|
Answer» What are the key factors for driving security in HADOOP? |
|
| 33. |
A person wants to buy a flight ticket. On finding a flight at an ideal price, the person enters their credit card details and personal information whi |
|
Answer» A person wants to BUY a flight ticket. On finding a flight at an ideal price, the person enters their credit card details and personal information which is sent over the internet to the airline. The airline should protect the customer s data so that it is SAFE from interception in transit. What is the security MECHANISM used? |
|