adplus-dvertising
frame-decoration

Question

Authorization capabilities for Cassandra use the familiar _________ security paradigm to manage object permissions.

a.

COMMIT

b.

GRANT

c.

ROLLBACK

d.

None of the mentioned

Posted under Hadoop

Answer: (b).GRANT

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Authorization capabilities for Cassandra use the familiar _________ security paradigm to manage object permissions.

Similar Questions

Discover Related MCQs

Q. Client-to-node encryption protects data in flight from client machines to a database cluster using ___________

Q. Using ___________ file means you don’t have to override the SSL_CERTFILE environmental variables every time.

Q. Internal authentication stores usernames and bcrypt-hashed passwords in the ____________ table.

Q. A _________ grants initial permissions, and subsequently a user may or may not be given the permission to grant/revoke permissions.

Q. __________ is one of many possible IAuthorizer implementations and the one that stores permissions in the system_auth.permissions table to support all authorization-related CQL statements.

Q. Cassandra creates a ___________ for each table, which allows you to symlink a table to a chosen physical drive or data volume.

Q. When ___________ contents exceed a configurable threshold, the memtable data, which includes indexes, is put in a queue to be flushed to disk.

Q. Data in the commit log is purged after its corresponding data in the memtable is flushed to an _________

Q. For each SSTable, Cassandra creates _________ index.

Q. Cassandra marks data to be deleted using _________

Q. Tombstones exist for a configured time period defined by the _______ value set on the table.

Q. _________ is a Cassandra feature that optimizes the cluster consistency process.

Q. Cassandra searches the __________ to determine the approximate location on disk of the index entry.

Q. You configure sample frequency by changing the ________ property in the table definition.

Q. The compression offset map grows to ____ GB per terabyte compressed.

Q. The type of __________ strategy Cassandra performs on your data is configurable and can significantly affect read performance.

Q. There are _________ types of read requests that a coordinator can send to a replica.

Q. _________ can be configured per table for non-QUORUM consistency levels.

Q. If the table has been configured with the __________ property, the coordinator node for the read request will retry the request with another replica node.

Q. Point out the correct statement.