

InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
51. |
If a .mongorc.js file exists, the mongo shell will evaluate a __________ file before starting.(a) .mongorc.js(b) .mongo.js(c) .mongorc.jscript(d) all of the mentionedThis question was addressed to me by my school teacher while I was bunking the class.The origin of the question is Security and MongoDB API Interfaces topic in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The CORRECT OPTION is (a) .mongorc.js |
|
52. |
The mongo program can evaluate JavaScript expressions using the command line ________ option.(a) –opt(b) –js(c) –eval(d) None of the mentionedI have been asked this question by my school principal while I was bunking the class.My doubt stems from Security and MongoDB API Interfaces in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» RIGHT OPTION is (c) –eval The explanation is: The MONGO program can EVALUATE a JavaScript file (.js) passed directly to it (e.g. mongo someFile.js). |
|
53. |
Point out the correct statement.(a) The mongostat diagnostic tool, when running with the –mode need to be able to reach all components of a cluster(b) All shards in a cluster need to be able to communicate with all other shards to facilitate chunk and balancing operations(c) Authorization does not control or affect access to this interface(d) None of the mentionedThe question was asked in an online quiz.Origin of the question is Security and MongoDB API Interfaces in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The CORRECT CHOICE is (b) All shards in a cluster need to be able to communicate with all other shards to facilitate chunk and balancing operations |
|
54. |
By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.(a) Windows(b) Linux(c) Mac(d) None of the mentionedThis question was posed to me in semester exam.This key question is from Network Exposure and Security topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT option is (a) Windows The explanation: GIVEN the DEFAULT ports of all MongoDB processes, you must configure NETWORKING rules that permit only required communication between your application and the appropriate mongod.exe and mongos.exe instances. |
|
55. |
MongoDB users who use VPNs use ________ rather than IPSEC VPNs for performance issues.(a) TTS(b) SSL(c) LTS(d) None of the mentionedI got this question by my school principal while I was bunking the class.My question comes from Network Exposure and Security topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The CORRECT answer is (b) SSL |
|
56. |
On Windows systems _________ command line interface provides access to the underlying Windows Firewall.(a) netsh(b) netstat(c) netln(d) SelectIndexesI have been asked this question in an interview for internship.My query is from Network Exposure and Security topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Correct choice is (a) netsh |
|
57. |
On Linux systems, the ________ interface provides access to the underlying netfilter firewall.(a) ssip(b) iptables(c) dns(d) all of the mentionedI have been asked this question in an interview.My enquiry is from Network Exposure and Security in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct OPTION is (b) iptables |
|
58. |
The ________ setting for mongod and mongos instances changes the main port on which the mongod or mongos instance listens for connections.(a) portp(b) port(c) portIP(d) none of the mentionedI got this question in quiz.Question is from Network Exposure and Security topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right choice is (b) port |
|
59. |
Point out the wrong statement.(a) Changing the port does not meaningfully reduce risk or limit exposure(b) You can use the mongod –bind_ip and mongos –bind_ip option on the command line at run time to limit the network accessibility of a MongoDB program(c) The net.http.RESTInterfaceEnabled configuration makes the http status interface, which is read-only by default, fully interactive(d) None of the mentionedThis question was posed to me in an interview for job.My question is from Network Exposure and Security in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT answer is (d) NONE of the mentioned Explanation: If your SYSTEM has more than one network INTERFACE, BIND MongoDB programs to the private or internal network interface. |
|
60. |
The ________ setting for mongod and mongos instances limits the network interfaces on which MongoDB programs will listen for incoming connections.(a) bindIpmongo(b) bind(c) bindIp(d) revokeipI got this question during an internship interview.The query is from Network Exposure and Security topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» RIGHT option is (C) bindIp To elaborate: You can also specify a NUMBER of interfaces by passing bindIp a comma separated list of IP ADDRESSES. |
|
61. |
The net.http.RESTInterfaceEnabled setting for mongod enables a fully interactive administrative __________ interface, which is disabled by default.(a) Restful(b) Rest(c) WebService(d) All of the mentionedThe question was posed to me at a job interview.My doubt is from Network Exposure and Security topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Correct choice is (b) Rest |
|
62. |
Point out the correct statement.(a) The status interface is write-only by default(b) Default port for the status page is 28117(c) Authentication does not control or affect access to this interface(d) None of the mentionedThe question was asked in my homework.My query is from Network Exposure and Security in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct CHOICE is (c) Authentication does not control or AFFECT access to this interface |
|
63. |
__________ displays the cached query plans for the specified query shape.(a) CacheListPlans(b) displayCacheListPlans(c) planCacheListPlans(d) none of the mentionedI got this question in semester exam.I'm obligated to ask this question of Collection-Level Access Control topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Correct ANSWER is (b) displayCacheListPlans |
|
64. |
The enabled setting for mongod and mongos instances disables the __________ status page.(a) home(b) primary(c) secondary(d) none of the mentionedI got this question in exam.My question is based upon Network Exposure and Security in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT option is (a) home The explanation is: The MONGOD and MONGOS instances run with the HTTP INTERFACE disabled by default. |
|
65. |
Which of the following flushes user information from in-memory cache?(a) grantCache(b) invalidateUserCache(c) validateUserCache(d) none of the mentionedThis question was addressed to me in an online quiz.The doubt is from Collection-Level Access Control topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right option is (B) INVALIDATEUSERCACHE |
|
66. |
_________ deletes from a shard the orphaned documents whose shard key values fall into a single continuous range.(a) listallshards(b) cleanup(c) cleanupOrphaned(d) SelectIndexesThe question was asked during an interview.This interesting question is from Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT CHOICE is (c) cleanupOrphaned For EXPLANATION: If two contiguous ranges do not BELONG to the shard, the cleanupOrphaned examines both ranges for orphaned documents. |
|
67. |
Which of the following allows the user to view the information of any user in the given database?(a) createUser(b) viewUser(c) killCursors(d) all of the mentionedI have been asked this question during an interview.I'd like to ask this question from Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» RIGHT OPTION is (b) viewUser Easiest EXPLANATION: To provide user ADMINISTRATORS, MongoDB has USERADMIN and userAdminAnyDatabase roles. |
|
68. |
_________ terminates an operation as specified by the operation ID.(a) db.killOp()(b) db.kill()(c) db.remove()(d) none of the mentionedI have been asked this question in an interview for internship.My question is based upon Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct ANSWER is (a) db.killOp() |
|
69. |
User can remove any role from any user from any database in the system through _________(a) grantRole(b) viewRole(c) killCursors(d) revokeRoleThis question was addressed to me by my college professor while I was bunking the class.Question is from Collection-Level Access Control topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» RIGHT answer is (d) revokeRole Explanation: User can view INFORMATION about any role in the GIVEN database through VIEWROLE. |
|
70. |
Point out the wrong statement.(a) MongoDB uses the combination of the database name and the role name to uniquely define a role(b) A role consists of privileges that pair resources with not allowed operations(c) Roles grant users access to MongoDB resources(d) None of the mentionedThis question was posed to me by my college director while I was bunking the class.My enquiry is from Collection-Level Access Control topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right option is (d) NONE of the mentioned |
|
71. |
User can grant any role in the database to any user from any database in the system through _________ action.(a) grantRole(b) viewRole(c) killCursors(d) unlockI had been asked this question during an interview.My question is based upon Collection-Level Access Control topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT answer is (a) grantRole To EXPLAIN I would say: APPLY this ACTION to database resources. |
|
72. |
Point out the correct statement.(a) A rule consists of actions and the resources upon which the actions are permissible(b) Document-level access control allows developers to grant users privileges that are scoped to specific record(c) Each privilege action in a role can be scoped to a different record(d) None of the mentionedThis question was posed to me in a national level competition.The origin of the question is Collection-Level Access Control in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right OPTION is (b) Document-level ACCESS control ALLOWS developers to grant users privileges that are scoped to specific record |
|
73. |
Administrators can implement collection-level access control through user-defined __________(a) roles(b) replica sets(c) shards(d) none of the mentionedThis question was posed to me in unit test.This question is from Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct option is (a) ROLES |
|
74. |
Command listIndexes.ok returning value 1 indicates ______________(a) failure(b) success(c) abnormal exit(d) none of the mentionedThe question was asked in semester exam.I'd like to ask this question from Authorization in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right CHOICE is (B) success |
|
75. |
You must have the __________ action on a role’s database to grant the role to another user.(a) grantRole(b) grantRoleAdm(c) grantRolePrivilege(d) none of the mentionedI have been asked this question by my school teacher while I was bunking the class.I need to ask this question from Authorization in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» RIGHT answer is (a) grantRole Explanation: listIndexes returns information about the INDEXES on the SPECIFIED COLLECTION. |
|
76. |
Data of.system.indexes can be accessed using ____________(a) listallIndexes(b) listIndexes(c) ViewIndexes(d) SelectIndexesThis question was addressed to me in exam.Origin of the question is Authorization topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right OPTION is (B) listIndexes |
|
77. |
You must have the _______ action on a database to create a new user on that database.(a) createUser(b) createSuperUser(c) createSuUser(d) all of the mentionedI had been asked this question in homework.This key question is from Authorization topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The CORRECT ANSWER is (a) createUser |
|
78. |
MongoDB stores user credentials in the protected admin.system._________(a) user(b) capped(c) cappeduser(d) usersThe question was posed to me in an interview for job.The above asked question is from Authorization topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right choice is (d) users |
|
79. |
Point out the wrong statement.(a) When granted a role, a user receives all the privileges of that role(b) A role consists of privileges that pair resources with not allowed operations(c) User cannot have several roles in MongoDB(d) None of the mentionedThe question was asked in an internship interview.The question is from Authorization topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT choice is (c) USER cannot have SEVERAL roles in MongoDB The explanation is: A user can have several roles concurrently, in which case the user RECEIVES the union of all the PRIVILEGES of the respective roles. |
|
80. |
_________ provides all the privileges of the read role.(a) delete(b) update(c) readWrite(d) none of the mentionedThis question was addressed to me during an internship interview.Query is from Authorization topic in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right choice is (C) readWrite |
|
81. |
__________ consists of a specified resource and the actions permitted on the resource.(a) privilege(b) action(c) command(d) rightThe question was posed to me during an internship interview.I need to ask this question from Authorization topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Correct option is (a) privilege |
|
82. |
Point out the correct statement.(a) MongoDB provides built-in roles, each with a dedicated purpose for a common use case(b) MongoDB does not enable authorization by default(c) Administrators also can create new roles and privileges to cater to operational needs(d) All of the mentionedThis question was posed to me in examination.The doubt is from Authorization in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Correct answer is (b) MongoDB does not ENABLE AUTHORIZATION by default |
|
83. |
Every MongoDB mongod and mongos instance (or mongod.exe or mongos.exe on Windows) must have an associated ___________(a) service replica(b) service sets(c) service principal(d) service principleThe question was asked by my school principal while I was bunking the class.My enquiry is from Authentication in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct CHOICE is (C) service principal |
|
84. |
MongoDB employs _________ to govern access to a MongoDB system.(a) RBAS(b) RBAC(c) RBCC(d) None of the mentionedThe question was asked in class test.This key question is from Authorization in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct ANSWER is (b) RBAC |
|
85. |
MongoDB Enterprise supports proxy authentication through ___________(a) SCRAM-SHA-1(b) LDAP(c) MONGODB-CR(d) None of the mentionedI have been asked this question during an internship interview.My doubt is from Authentication topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT choice is (b) LDAP To EXPLAIN I would SAY: MongoDB does not support LDAP authentication in MIXED sharded cluster deployments that contain both version 2.4 and version 2.6 SHARDS. |
|
86. |
MongoDB __________ supports authentication using a Kerberos service.(a) Standard(b) Express(c) Enterprise(d) None of the mentionedThe question was asked in an interview for job.My question comes from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right OPTION is (C) Enterprise |
|
87. |
MongoDB supports _________ certificate authentication for use with a secure TLS/SSL connection.(a) x.590(b) x.509(c) x.950(d) All of the mentionedI got this question in a job interview.This interesting question is from Authentication in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT ANSWER is (b) x.509 Easy explanation: To authenticate to servers, clients can USE x.509 CERTIFICATES instead of usernames and passwords. |
|
88. |
_________ is a challenge-response mechanism that authenticates users through passwords.(a) SCRAM-SHA-1(b) LDAP(c) MONGODB-CR(d) None of the mentionedThe question was posed to me in final exam.Question is from Authentication topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct option is (C) MONGODB-CR |
|
89. |
Which of the following authentication method is used by default by MongoDB?(a) SCRAM-SHA-1(b) LDAP(c) MONGODB-CR(d) None of the mentionedThe question was asked in semester exam.Query is from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Correct option is (a) SCRAM-SHA-1 |
|
90. |
Point out the wrong statement.(a) Authorization determines the verified user’s access to resources and operations(b) MongoDB does not support authentication mechanisms(c) To authenticate a client in MongoDB, you must add a corresponding user to MongoDB(d) None of the mentionedThis question was posed to me in my homework.My question is based upon Authentication in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right CHOICE is (B) MONGODB does not support authentication mechanisms |
|
91. |
MongoDB stores user information in the _________ collection.(a) system.allusers(b) system.users(c) system.superusers(d) system.usersnoneThis question was posed to me by my college professor while I was bunking the class.Question is from Authentication topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Correct option is (b) system.users |
|
92. |
Which of the following method is used for managing user?(a) db.createUser()(b) db.User()(c) db.superuser()(d) none of the mentionedI have been asked this question during an interview for a job.My doubt stems from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The CORRECT OPTION is (a) db.createUser() |
|
93. |
Point out the correct statement.(a) Authentication is the process of verifying the identity of a client(b) When access control is enabled, MongoDB requires all clients to authenticate themselves first in order to determine the access for the client(c) Authentication and authorization are closely connected(d) All of the mentionedThe question was posed to me in an online quiz.The query is from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT OPTION is (d) All of the mentioned Easy EXPLANATION: Authentication is distinct from authorization. |
|
94. |
Which of the following document represents uncaught exception?(a) 45(b) 49(c) 47(d) 100This question was posed to me during an online interview.I need to ask this question from Exit Codes and Statuses in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The correct answer is (d) 100 |
|
95. |
49 code is returned by mongod from _________ Service control Manager.(a) Linux(b) Windows(c) Ubuntu(d) All of the mentionedThis question was addressed to me by my college director while I was bunking the class.Query is from Exit Codes and Statuses topic in portion Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» The CORRECT option is (a) Linux |
|
96. |
Which of the following code is returned when a MongoDB application cannot open a file?(a) 45(b) 20(c) 47(d) 100I had been asked this question at a job interview.My question is based upon Exit Codes and Statuses topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right answer is (a) 45 |
|
97. |
Which of the following code represents exit cleanly following a large clock skew (32768 milliseconds) event?(a) 45(b) 20(c) 47(d) 100I have been asked this question during an interview.Question is taken from Exit Codes and Statuses in chapter Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT OPTION is (C) 47 For explanation I would say: 100 is returned by mongod when the PROCESS throws an uncaught exception. |
|
98. |
Point out the correct statement.(a) Exit code 10 is for abnormal exit(b) 4 is returned when the version of the database is different from the version supported by the mongod (or mongod.exe) instance(c) The server socket is on port 27017 by default(d) None of the mentionedThe question was posed to me in an interview for job.I'm obligated to ask this question of Exit Codes and Statuses topic in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right ANSWER is (b) 4 is returned when the version of the database is different from the version supported by the mongod (or mongod.exe) instance |
|
99. |
Which of the following code is returned by mongod if a moveChunk operation fails to confirm a commit?(a) 5(b) 6(c) 7(d) 3The question was asked in semester exam.This question is from Exit Codes and Statuses in division Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» CORRECT answer is (a) 5 Explanation: Exit CODES 6 and 7 does not EXIST. |
|
100. |
Instance exits cleanly are represented by ___ exit code.(a) 4(b) 1(c) 2(d) 3I had been asked this question in exam.Question is taken from Exit Codes and Statuses topic in section Production Checklist, Security Concepts and Network Security of MongoDB |
Answer» Right option is (a) 4 |
|