Production Checklist And Network Security(Engineering > Computer Science And Engineering > Mongodb ) Questions and Answers
Question 1. If you need to disable access control for any reason, restart the process with ______ setting.
KeyFile
Authentication
Authorization
All of the mentioned
Explanation:-
Answer: Option A. -> KeyFile
Login in with the user administrator's credentials and create additional users.
Question 2. Use the ____________ option to enable auditing and specify where to output the audit events.
"“auditLocation
"“auditOutput
"“auditDestination
None of the mentioned
Explanation:-
Answer: Option A. -> "“auditLocation
For sharded clusters, if you enable auditing on mongos instances, you must enable auditing on all mongod instances in the cluster, i.e. shards and config servers.
Question 3. _________ provides all the privileges of the read role.
delete
update
readWrite
None of the mentioned
Explanation:-
Answer: Option C. -> readWrite
The role provides ability to modify data on all non-system collections and the system.js collection.
Question 4. User can remove any role from any user from any database in the system through _________ .
grantRole
viewRole
revokeRole
killCursors
Explanation:-
Answer: Option C. -> revokeRole
User can view information about any role in the given database through viewRole.
Question 5. Which of the following authentication method is used by default by MongoDB ?
SCRAM-SHA-1
LDAP
MONGODB-CR
None of the mentioned
Explanation:-
Answer: Option A. -> SCRAM-SHA-1
SCRAM-SHA-1 verifies supplied user credentials against the user's name, password and database.
Question 6. How many types of locking modes exist in MongoDB ?
1
2
3
More than 3
Explanation:-
Answer: Option D. -> More than 3
There are four possible locking modes for the lock types.
Question 7. If a .mongorc.js file exists, the mongo shell will evaluate a __________ file before starting.
.mongorc.js
.mongo.js
.mongorc.jscript
All of the mentioned
Explanation:-
Answer: Option A. -> .mongorc.js
You can disable this behavior by passing the mongo “norc option.
Question 8. On Linux systems, the ________ interface provides access to the underlying netfilter firewall.
ssip
iptables
dns
All of the mentioned
Explanation:-
Answer: Option B. -> iptables
Firewalls allow administrators to filter and control access to a system by providing granular control over what network communications.
Question 9. Point out the wrong statement :
Authorization determines the verified user's access to resources and operations
MongoDB does not support authentication mechanisms
To authenticate a client in MongoDB, you must add a corresponding user to MongoDB
None of the mentioned
Explanation:-
Answer: Option B. -> MongoDB does not support authentication mechanisms
In addition to verifying the identity of a client, MongoDB can require members of replica sets and sharded clusters to authenticate their membership.
Question 10. Which of the following code is returned by mongod if a moveChunk operation fails to confirm a commit ?