R4RIN
Articles
Java 8
MCQS
MongoDB MCQ Quiz Hub
MongoDB Mcq Question Set 9
Choose a topic to test your knowledge and improve your MongoDB skills
1. Point out the wrong statement.
Authorization determines the verified user’s access to resources and operations
MongoDB does not support authentication mechanisms
To authenticate a client in MongoDB, you must add a corresponding user to MongoDB
none of the mentioned
2. _____ is a challenge-response mechanism that authenticates users through passwords.
SCRAM-SHA-1
LDAP
MONGODB-CR
none of the mentioned
3. MongoDB supports _________ certificate authentication for use with a secure TLS/SSL connection.
x.590
x.509
x.950
All of the Mentioned
4. MongoDB __________ supports authentication using a Kerberos service.
Standard
Express
Enterprise
none of the mentioned
5. MongoDB Enterprise supports proxy authentication through _____
SCRAM-SHA-1
LDAP
MONGODB-CR
None of the mentioned
6. Every MongoDB mongod and mongos instance (or mongod.exe or mongos.exe on Windows) must have an associated ______
service replica
service sets
service principal
service principle
7. MongoDB employs _________ to govern access to a MongoDB system.
RBAS
RBAC
RBCC
None of the mentioned
8. Point out the correct statement.
MongoDB provides built-in roles, each with a dedicated purpose for a common use case
MongoDB does not enable authorization by default
Administrators also can create new roles and privileges to cater to operational needs
All of the mentioned
9. ______ consists of a specified resource and the actions permitted on the resource.
privilege
action
command
right
10. ______ provides all the privileges of the read role.
delete
update
readWrite
None of the mentioned
11. Point out the wrong statement.
When granted a role, a user receives all the privileges of that role
A role consists of privileges that pair resources with not allowed operations
User cannot have several roles in MongoDB
None of the mentioned
12. MongoDB stores user credentials in the protected admin.system._____
user
capped
cappeduser
users
13. You must have the _______ action on a database to create a new user on that database.
createUser
createSuperUser
createSuUser
All of the Mentioned
14. Data of <database>.system.indexes can be accessed using _____
listallIndexes
listIndexes
ViewIndexes
SelectIndexes
15. You must have the __________ action on a role’s database to grant the role to another user.
grantRole
grantRoleAdm
grantRolePrivilege
None of the mentioned
16. Command listIndexes.ok returning value 1 indicates ______
failure
success
abnormal exit
None of the mentioned
17. Administrators can implement collection-level access control through user-defined _____
roles
replica sets
shards
None of the mentioned
18. Point out the correct statement.
A rule consists of actions and the resources upon which the actions are permissible
Document-level access control allows developers to grant users privileges that are scoped to specific record
Each privilege action in a role can be scoped to a different record
None of the mentioned
19. User can grant any role in the database to any user from any database in the system through _________ action.
grantRole
viewRole
killCursors
unlock
20. User can remove any role from any user from any database in the system through _____
grantRole
viewRole
killCursors
revokeRole
21. Point out the wrong statement.
MongoDB uses the combination of the database name and the role name to uniquely define a role
A role consists of privileges that pair resources with not allowed operations
Roles grant users access to MongoDB resources
None of the mentioned
22. ____ terminates an operation as specified by the operation ID.
db.killOp()
db.kill()
db.remove()
None of the mentioned
23. Which of the following allows the user to view the information of any user in the given database?
createUser
viewUser
killCursors
All of the Mentioned
24. ____ deletes from a shard the orphaned documents whose shard key values fall into a single continuous range.
listallshards
cleanup
cleanupOrphaned
SelectIndexes
25. Which of the following flushes user information from in-memory cache?
grantCache
invalidateUserCache
validateUserCache
none of the mentioned
26. ______ displays the cached query plans for the specified query shape.
CacheListPlans
displayCacheListPlans
planCacheListPlans
none of the mentioned
27. The enabled setting for mongod and mongos instances disables the ______ status page.
home
primary
secondary
None of the mentioned
28. Point out the correct statement.
The status interface is write-only by default
Default port for the status page is 28117
Authentication does not control or affect access to this interface
None of the mentioned
29. The net.http.RESTInterfaceEnabled setting for mongod enables a fully interactive administrative __________ interface, which is disabled by default.
Restful
Rest
WebService
All of the Mentioned
30. The ________ setting for mongod and mongos instances limits the network interfaces on which MongoDB programs will listen for incoming connections.
bindIpmongo
bind
bindIp
revokeip
31. Point out the wrong statement.
Changing the port does not meaningfully reduce risk or limit exposure
You can use the mongod –bind_ip and mongos –bind_ip option on the command line at run time to limit the network accessibility of a MongoDB program
The net.http.RESTInterfaceEnabled configuration makes the http status interface, which is read-only by default, fully interactive
none of the mentioned
32. The ________ setting for mongod and mongos instances changes the main port on which the mongod or mongos instance listens for connections.
portp
port
portIP
None of the mentioned
33. On Linux systems, the ________ interface provides access to the underlying netfilter firewall.
ssip
iptables
dns
All of the Mentioned
34. On Windows systems _________ command line interface provides access to the underlying Windows Firewall.
netsh
netstat
netln
SelectIndexes
35. MongoDB users who use VPNs use ________ rather than IPSEC VPNs for performance issues.
TTS
SSL
LTS
None of the mentioned
36. By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.
Windows
Linux
Mac
None of the mentioned
37. The mongo program can evaluate JavaScript expressions using the command line ________ option.
–opt
–js
–eval
none of the mentioned
38. Point out the correct statement.
The mongostat diagnostic tool, when running with the –mode need to be able to reach all components of a cluster
All shards in a cluster need to be able to communicate with all other shards to facilitate chunk and balancing operations
Authorization does not control or affect access to this interface
None of the mentioned
39. If a .mongorc.js file exists, the mongo shell will evaluate a __________ file before starting.
.mongorc.js
.mongo.js
.mongorc.jscript
All of the Mentioned
40. On _________ mongo.exe reads the .mongorc.js file from %HOME%.mongorc.js.
Windows
Linux
Mac
Solaris
41. Point out the wrong statement.
REST does provide administrative access, and its accessibility represents a vulnerability in a secure environment
REST API does provide any support for insert, update, or remove operations
The net.http.RESTInterfaceEnabled configuration makes the http status interface, which is read-only by default, fully interactive
none of the mentioned
42. The HTTP interface is always available on the port numbered _________ greater than the primary mongod port.
1000
2000
3000
None of the mentioned
43. The _______ API to MongoDB provides additional information and write access on top of the HTTP status interface.
Web
REST
RestFul
All of the mentioned
44. _____ instances provide query routing for sharded clusters.
mongod
mongos
netstats
SelectIndexes
45. Config servers, host the _______ database that stores metadata for sharded clusters.
head
master
config
none of the mentioned
46. Config servers listen for connections on port _____
27011
27019
27107
None of the mentioned
47. The auditing facility can write audit events to the console, the _________ a JSON file, or a BSON file.
oplog
syslog
evallog
None of the mentioned
48. Point out the correct statement.
When a process writes to a resource, it takes an exclusive write lock to prevent other processes from writing to or reading from that resource
As clients insert new documents into the capped collection, the tailable cursor continues to retrieve documents
Write concern allows your application to detect insertion errors or unavailable mongod instances
All of the mentioned
49. _____ contains the local ip address and the port number of the running instance.
ts
local
remote
users
50. Enabling _____________ degrades performance more than logging only the authorization failures.
auditAuthorizationFailure
auditAuthorizationSuccess
auditAuthorizationlog
none of the mentioned
51. Use the ______ option to enable auditing and specify where to output the audit events.
–auditLocation
–auditOutput
–auditDestination
None of the mentioned
52. The audit file rotates at the same time as the ________ log file.
Client
Server
Application
All of the Mentioned
53. To view the contents of the file, pass the file to the MongoDB utility _____
bsonlog
bsonout
bsondump
SelectIndexes
54. The _____________ option accepts either full path name or relative path name.
–auditPathLog
–logPath
–auditPath
none of the mentioned
55. The _________ message limit can result in the truncation of the audit messages.
oplog
syslog
evallog
None of the mentioned
Submit