Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

51.

If a .mongorc.js file exists, the mongo shell will evaluate a __________ file before starting.(a) .mongorc.js(b) .mongo.js(c) .mongorc.jscript(d) all of the mentionedThis question was addressed to me by my school teacher while I was bunking the class.The origin of the question is Security and MongoDB API Interfaces topic in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The CORRECT OPTION is (a) .mongorc.js

For explanation: You can DISABLE this behavior by PASSING the MONGO –norc option.

52.

The mongo program can evaluate JavaScript expressions using the command line ________ option.(a) –opt(b) –js(c) –eval(d) None of the mentionedI have been asked this question by my school principal while I was bunking the class.My doubt stems from Security and MongoDB API Interfaces in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer» RIGHT OPTION is (c) –eval

The explanation is: The MONGO program can EVALUATE a JavaScript file (.js) passed directly to it (e.g. mongo someFile.js).
53.

Point out the correct statement.(a) The mongostat diagnostic tool, when running with the –mode need to be able to reach all components of a cluster(b) All shards in a cluster need to be able to communicate with all other shards to facilitate chunk and balancing operations(c) Authorization does not control or affect access to this interface(d) None of the mentionedThe question was asked in an online quiz.Origin of the question is Security and MongoDB API Interfaces in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The CORRECT CHOICE is (b) All shards in a cluster need to be able to communicate with all other shards to facilitate chunk and balancing operations

The EXPLANATION is: You can also specify the shard server OPTION with the shardsvr VALUE for the clusterRole setting in the configuration file. Shard members are also often conventional replica sets using the default port.

54.

By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.(a) Windows(b) Linux(c) Mac(d) None of the mentionedThis question was posed to me in semester exam.This key question is from Network Exposure and Security topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT option is (a) Windows

The explanation: GIVEN the DEFAULT ports of all MongoDB processes, you must configure NETWORKING rules that permit only required communication between your application and the appropriate mongod.exe and mongos.exe instances.
55.

MongoDB users who use VPNs use ________ rather than IPSEC VPNs for performance issues.(a) TTS(b) SSL(c) LTS(d) None of the mentionedI got this question by my school principal while I was bunking the class.My question comes from Network Exposure and Security topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The CORRECT answer is (b) SSL

The explanation: VIRTUAL private NETWORKS, or VPNs, MAKE it possible to link two networks over an encrypted and limited-access trusted network.

56.

On Windows systems _________ command line interface provides access to the underlying Windows Firewall.(a) netsh(b) netstat(c) netln(d) SelectIndexesI have been asked this question in an interview for internship.My query is from Network Exposure and Security topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Correct choice is (a) netsh

To elaborate: To minimize overall EXPOSURE, ensure that only traffic from trusted sources can reach mongod and mongos instances and that the mongod and mongos instances can only CONNECT to trusted OUTPUTS.

57.

On Linux systems, the ________ interface provides access to the underlying netfilter firewall.(a) ssip(b) iptables(c) dns(d) all of the mentionedI have been asked this question in an interview.My enquiry is from Network Exposure and Security in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct OPTION is (b) iptables

To explain I would say: FIREWALLS allow administrators to FILTER and control access to a SYSTEM by providing granular control over what network communications.

58.

The ________ setting for mongod and mongos instances changes the main port on which the mongod or mongos instance listens for connections.(a) portp(b) port(c) portIP(d) none of the mentionedI got this question in quiz.Question is from Network Exposure and Security topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right choice is (b) port

Explanation: Setting port ALSO indirectly SETS the port for the HTTP status INTERFACE, which is always available on the port numbered 1000 greater than the primary mongod port.

59.

Point out the wrong statement.(a) Changing the port does not meaningfully reduce risk or limit exposure(b) You can use the mongod –bind_ip and mongos –bind_ip option on the command line at run time to limit the network accessibility of a MongoDB program(c) The net.http.RESTInterfaceEnabled configuration makes the http status interface, which is read-only by default, fully interactive(d) None of the mentionedThis question was posed to me in an interview for job.My question is from Network Exposure and Security in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT answer is (d) NONE of the mentioned

Explanation: If your SYSTEM has more than one network INTERFACE, BIND MongoDB programs to the private or internal network interface.
60.

The ________ setting for mongod and mongos instances limits the network interfaces on which MongoDB programs will listen for incoming connections.(a) bindIpmongo(b) bind(c) bindIp(d) revokeipI got this question during an internship interview.The query is from Network Exposure and Security topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer» RIGHT option is (C) bindIp

To elaborate: You can also specify a NUMBER of interfaces by passing bindIp a comma separated list of IP ADDRESSES.
61.

The net.http.RESTInterfaceEnabled setting for mongod enables a fully interactive administrative __________ interface, which is disabled by default.(a) Restful(b) Rest(c) WebService(d) All of the mentionedThe question was posed to me at a job interview.My doubt is from Network Exposure and Security topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Correct choice is (b) Rest

The explanation: The REST INTERFACE does not SUPPORT any authentication and you should always restrict access to this interface to only allow TRUSTED CLIENTS to CONNECT to this port.

62.

Point out the correct statement.(a) The status interface is write-only by default(b) Default port for the status page is 28117(c) Authentication does not control or affect access to this interface(d) None of the mentionedThe question was asked in my homework.My query is from Network Exposure and Security in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct CHOICE is (c) Authentication does not control or AFFECT access to this interface

For explanation: If you enable this interface, you should only allow TRUSTED clients to access this PORT.

63.

__________ displays the cached query plans for the specified query shape.(a) CacheListPlans(b) displayCacheListPlans(c) planCacheListPlans(d) none of the mentionedI got this question in semester exam.I'm obligated to ask this question of Collection-Level Access Control topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Correct ANSWER is (b) displayCacheListPlans

The explanation: The query OPTIMIZER only caches the PLANS for those query SHAPES that can have more than ONE viable plan.

64.

The enabled setting for mongod and mongos instances disables the __________ status page.(a) home(b) primary(c) secondary(d) none of the mentionedI got this question in exam.My question is based upon Network Exposure and Security in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT option is (a) home

The explanation is: The MONGOD and MONGOS instances run with the HTTP INTERFACE disabled by default.
65.

Which of the following flushes user information from in-memory cache?(a) grantCache(b) invalidateUserCache(c) validateUserCache(d) none of the mentionedThis question was addressed to me in an online quiz.The doubt is from Collection-Level Access Control topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right option is (B) INVALIDATEUSERCACHE

For EXPLANATION: invalidateUserCache ALLOWS you to purge the cache at any given moment, regardless of the interval set in the userCacheInvalidationIntervalSecs parameter.

66.

_________ deletes from a shard the orphaned documents whose shard key values fall into a single continuous range.(a) listallshards(b) cleanup(c) cleanupOrphaned(d) SelectIndexesThe question was asked during an interview.This interesting question is from Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT CHOICE is (c) cleanupOrphaned

For EXPLANATION: If two contiguous ranges do not BELONG to the shard, the cleanupOrphaned examines both ranges for orphaned documents.
67.

Which of the following allows the user to view the information of any user in the given database?(a) createUser(b) viewUser(c) killCursors(d) all of the mentionedI have been asked this question during an interview.I'd like to ask this question from Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer» RIGHT OPTION is (b) viewUser

Easiest EXPLANATION: To provide user ADMINISTRATORS, MongoDB has USERADMIN and userAdminAnyDatabase roles.
68.

_________ terminates an operation as specified by the operation ID.(a) db.killOp()(b) db.kill()(c) db.remove()(d) none of the mentionedI have been asked this question in an interview for internship.My question is based upon Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct ANSWER is (a) db.killOp()

The best explanation: Only use db.killOp() to terminate operations initiated by CLIENTS and do not terminate INTERNAL DATABASE operations.

69.

User can remove any role from any user from any database in the system through _________(a) grantRole(b) viewRole(c) killCursors(d) revokeRoleThis question was addressed to me by my college professor while I was bunking the class.Question is from Collection-Level Access Control topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer» RIGHT answer is (d) revokeRole

Explanation: User can view INFORMATION about any role in the GIVEN database through VIEWROLE.
70.

Point out the wrong statement.(a) MongoDB uses the combination of the database name and the role name to uniquely define a role(b) A role consists of privileges that pair resources with not allowed operations(c) Roles grant users access to MongoDB resources(d) None of the mentionedThis question was posed to me by my college director while I was bunking the class.My enquiry is from Collection-Level Access Control topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right option is (d) NONE of the mentioned

The explanation: EXCEPT for roles created in the admin database, a role can only INCLUDE privileges that APPLY to its database and can only inherit from other roles in its database.

71.

User can grant any role in the database to any user from any database in the system through _________ action.(a) grantRole(b) viewRole(c) killCursors(d) unlockI had been asked this question during an interview.My question is based upon Collection-Level Access Control topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT answer is (a) grantRole

To EXPLAIN I would say: APPLY this ACTION to database resources.
72.

Point out the correct statement.(a) A rule consists of actions and the resources upon which the actions are permissible(b) Document-level access control allows developers to grant users privileges that are scoped to specific record(c) Each privilege action in a role can be scoped to a different record(d) None of the mentionedThis question was posed to me in a national level competition.The origin of the question is Collection-Level Access Control in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right OPTION is (b) Document-level ACCESS control ALLOWS developers to grant users privileges that are scoped to specific record

The BEST I can EXPLAIN: Collection-level access control allows administrators to grant users privileges that are scoped to specific collections.

73.

Administrators can implement collection-level access control through user-defined __________(a) roles(b) replica sets(c) shards(d) none of the mentionedThis question was posed to me in unit test.This question is from Collection-Level Access Control in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct option is (a) ROLES

To elaborate: By creating a role with PRIVILEGES that are scoped to a specific COLLECTION in a PARTICULAR database, ADMINISTRATORS can provision users with roles that grant privileges on a collection level.

74.

Command listIndexes.ok returning value 1 indicates ______________(a) failure(b) success(c) abnormal exit(d) none of the mentionedThe question was asked in semester exam.I'd like to ask this question from Authorization in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right CHOICE is (B) success

For explanation I would SAY: A VALUE of 1 indicates success.

75.

You must have the __________ action on a role’s database to grant the role to another user.(a) grantRole(b) grantRoleAdm(c) grantRolePrivilege(d) none of the mentionedI have been asked this question by my school teacher while I was bunking the class.I need to ask this question from Authorization in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer» RIGHT answer is (a) grantRole

Explanation: listIndexes returns information about the INDEXES on the SPECIFIED COLLECTION.
76.

Data of.system.indexes can be accessed using ____________(a) listallIndexes(b) listIndexes(c) ViewIndexes(d) SelectIndexesThis question was addressed to me in exam.Origin of the question is Authorization topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right OPTION is (B) listIndexes

To elaborate: Kerberos is an industry standard AUTHENTICATION PROTOCOL for large client/server systems.

77.

You must have the _______ action on a database to create a new user on that database.(a) createUser(b) createSuperUser(c) createSuUser(d) all of the mentionedI had been asked this question in homework.This key question is from Authorization topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The CORRECT ANSWER is (a) createUser

Easiest explanation: To provide user administrators, MongoDB has userAdmin and USERADMINANYDATABASE ROLES.

78.

MongoDB stores user credentials in the protected admin.system._________(a) user(b) capped(c) cappeduser(d) usersThe question was posed to me in an interview for job.The above asked question is from Authorization topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right choice is (d) users

The best I can EXPLAIN: The admin.system.users COLLECTION STORES the user’s authentication credentials as well as any roles ASSIGNED to the user.

79.

Point out the wrong statement.(a) When granted a role, a user receives all the privileges of that role(b) A role consists of privileges that pair resources with not allowed operations(c) User cannot have several roles in MongoDB(d) None of the mentionedThe question was asked in an internship interview.The question is from Authorization topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT choice is (c) USER cannot have SEVERAL roles in MongoDB

The explanation is: A user can have several roles concurrently, in which case the user RECEIVES the union of all the PRIVILEGES of the respective roles.
80.

_________ provides all the privileges of the read role.(a) delete(b) update(c) readWrite(d) none of the mentionedThis question was addressed to me during an internship interview.Query is from Authorization topic in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right choice is (C) readWrite

Easy explanation: The ROLE provides the ability to modify DATA on all non-system collections and the system.js COLLECTION.

81.

__________ consists of a specified resource and the actions permitted on the resource.(a) privilege(b) action(c) command(d) rightThe question was posed to me during an internship interview.I need to ask this question from Authorization topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Correct option is (a) privilege

For explanation: A privilege RESOURCE is either a database, COLLECTION, SET of COLLECTIONS, or the cluster.

82.

Point out the correct statement.(a) MongoDB provides built-in roles, each with a dedicated purpose for a common use case(b) MongoDB does not enable authorization by default(c) Administrators also can create new roles and privileges to cater to operational needs(d) All of the mentionedThis question was posed to me in examination.The doubt is from Authorization in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Correct answer is (b) MongoDB does not ENABLE AUTHORIZATION by default

Explanation: You can enable authorization USING the –auth or the –keyFile options, or if using a configuration file, with the security.authorization or the security.keyFile SETTINGS.

83.

Every MongoDB mongod and mongos instance (or mongod.exe or mongos.exe on Windows) must have an associated ___________(a) service replica(b) service sets(c) service principal(d) service principleThe question was asked by my school principal while I was bunking the class.My enquiry is from Authentication in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct CHOICE is (C) service principal

Explanation: Service principal names MUST be REACHABLE over the network using the fully QUALIFIED domain name (FQDN) part of its service principal name.

84.

MongoDB employs _________ to govern access to a MongoDB system.(a) RBAS(b) RBAC(c) RBCC(d) None of the mentionedThe question was asked in class test.This key question is from Authorization in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct ANSWER is (b) RBAC

Easiest explanation: RBAC STANDS for Role-Based Access CONTROL.

85.

MongoDB Enterprise supports proxy authentication through ___________(a) SCRAM-SHA-1(b) LDAP(c) MONGODB-CR(d) None of the mentionedI have been asked this question during an internship interview.My doubt is from Authentication topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT choice is (b) LDAP

To EXPLAIN I would SAY: MongoDB does not support LDAP authentication in MIXED sharded cluster deployments that contain both version 2.4 and version 2.6 SHARDS.
86.

MongoDB __________ supports authentication using a Kerberos service.(a) Standard(b) Express(c) Enterprise(d) None of the mentionedThe question was asked in an interview for job.My question comes from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right OPTION is (C) Enterprise

To EXPLAIN I would say: Kerberos is an industry standard AUTHENTICATION protocol for large client/server systems.

87.

MongoDB supports _________ certificate authentication for use with a secure TLS/SSL connection.(a) x.590(b) x.509(c) x.950(d) All of the mentionedI got this question in a job interview.This interesting question is from Authentication in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT ANSWER is (b) x.509

Easy explanation: To authenticate to servers, clients can USE x.509 CERTIFICATES instead of usernames and passwords.
88.

_________ is a challenge-response mechanism that authenticates users through passwords.(a) SCRAM-SHA-1(b) LDAP(c) MONGODB-CR(d) None of the mentionedThe question was posed to me in final exam.Question is from Authentication topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct option is (C) MONGODB-CR

Easy explanation: Using key files, you can also use MONGODB-CR AUTHENTICATION for the internal member authentication of REPLICA set MEMBERS and SHARDED cluster members.

89.

Which of the following authentication method is used by default by MongoDB?(a) SCRAM-SHA-1(b) LDAP(c) MONGODB-CR(d) None of the mentionedThe question was asked in semester exam.Query is from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Correct option is (a) SCRAM-SHA-1

Explanation: SCRAM-SHA-1 verifies SUPPLIED USER credentials against the user’s name, PASSWORD and DATABASE.

90.

Point out the wrong statement.(a) Authorization determines the verified user’s access to resources and operations(b) MongoDB does not support authentication mechanisms(c) To authenticate a client in MongoDB, you must add a corresponding user to MongoDB(d) None of the mentionedThis question was posed to me in my homework.My question is based upon Authentication in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right CHOICE is (B) MONGODB does not support authentication mechanisms

Easiest explanation: In addition to VERIFYING the identity of a client, MongoDB can require members of replica sets and sharded clusters to authenticate their MEMBERSHIP.

91.

MongoDB stores user information in the _________ collection.(a) system.allusers(b) system.users(c) system.superusers(d) system.usersnoneThis question was posed to me by my college professor while I was bunking the class.Question is from Authentication topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Correct option is (b) system.users

To EXPLAIN I would say: MONGODB stores all user information, INCLUDING name, PASSWORD, and the user’s database, in the system.users collection in the admin database.

92.

Which of the following method is used for managing user?(a) db.createUser()(b) db.User()(c) db.superuser()(d) none of the mentionedI have been asked this question during an interview for a job.My doubt stems from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The CORRECT OPTION is (a) db.createUser()

Explanation: MongoDB provides the db.createUser() to ADD and manage user INFORMATION.

93.

Point out the correct statement.(a) Authentication is the process of verifying the identity of a client(b) When access control is enabled, MongoDB requires all clients to authenticate themselves first in order to determine the access for the client(c) Authentication and authorization are closely connected(d) All of the mentionedThe question was posed to me in an online quiz.The query is from Authentication in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT OPTION is (d) All of the mentioned

Easy EXPLANATION: Authentication is distinct from authorization.
94.

Which of the following document represents uncaught exception?(a) 45(b) 49(c) 47(d) 100This question was posed to me during an online interview.I need to ask this question from Exit Codes and Statuses in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The correct answer is (d) 100

To explain: 49 is RETURNED by mongod.exe or mongos.exe on Windows when EITHER RECEIVES a shutdown message from the Windows SERVICE Control MANAGER.

95.

49 code is returned by mongod from _________ Service control Manager.(a) Linux(b) Windows(c) Ubuntu(d) All of the mentionedThis question was addressed to me by my college director while I was bunking the class.Query is from Exit Codes and Statuses topic in portion Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

The CORRECT option is (a) Linux

The best I can explain: Custom read PREFERENCES and write CONCERNS evaluate tags sets in different ways.

96.

Which of the following code is returned when a MongoDB application cannot open a file?(a) 45(b) 20(c) 47(d) 100I had been asked this question at a job interview.My question is based upon Exit Codes and Statuses topic in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right answer is (a) 45

The BEST I can EXPLAIN: 45 is returned when a MongoDB application cannot open a FILE or cannot OBTAIN a lock on a file.

97.

Which of the following code represents exit cleanly following a large clock skew (32768 milliseconds) event?(a) 45(b) 20(c) 47(d) 100I have been asked this question during an interview.Question is taken from Exit Codes and Statuses in chapter Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT OPTION is (C) 47

For explanation I would say: 100 is returned by mongod when the PROCESS throws an uncaught exception.
98.

Point out the correct statement.(a) Exit code 10 is for abnormal exit(b) 4 is returned when the version of the database is different from the version supported by the mongod (or mongod.exe) instance(c) The server socket is on port 27017 by default(d) None of the mentionedThe question was posed to me in an interview for job.I'm obligated to ask this question of Exit Codes and Statuses topic in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right ANSWER is (b) 4 is returned when the version of the database is different from the version supported by the mongod (or mongod.exe) instance

To ELABORATE: EXIT code 10 is not in use.

99.

Which of the following code is returned by mongod if a moveChunk operation fails to confirm a commit?(a) 5(b) 6(c) 7(d) 3The question was asked in semester exam.This question is from Exit Codes and Statuses in division Production Checklist, Security Concepts and Network Security of MongoDB

Answer» CORRECT answer is (a) 5

Explanation: Exit CODES 6 and 7 does not EXIST.
100.

Instance exits cleanly are represented by ___ exit code.(a) 4(b) 1(c) 2(d) 3I had been asked this question in exam.Question is taken from Exit Codes and Statuses topic in section Production Checklist, Security Concepts and Network Security of MongoDB

Answer»

Right option is (a) 4

To ELABORATE: Restart MONGOD with the –UPGRADE option to upgrade the database to the VERSION supported by this mongod instance.