adplus-dvertising
frame-decoration

Question

By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.

a.

Windows

b.

Linux

c.

Mac

d.

None of the mentioned

Posted under MongoDB

Answer: (a).Windows

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. By default, the policy in ___________ Firewall allows all outbound connections and blocks all incoming connections.

Similar Questions

Discover Related MCQs

Q. The mongo program can evaluate JavaScript expressions using the command line ________ option.

Q. Point out the correct statement.

Q. If a .mongorc.js file exists, the mongo shell will evaluate a __________ file before starting.

Q. On _________ mongo.exe reads the .mongorc.js file from %HOME%.mongorc.js.

Q. Point out the wrong statement.

Q. The HTTP interface is always available on the port numbered _________ greater than the primary mongod port.

Q. The _______ API to MongoDB provides additional information and write access on top of the HTTP status interface.

Q. ________ instances provide query routing for sharded clusters.

Q. Config servers, host the _______ database that stores metadata for sharded clusters.

Q. Config servers listen for connections on port __________

Q. The auditing facility can write audit events to the console, the _________ a JSON file, or a BSON file.

Q. Point out the correct statement.

Q. _________ contains the local ip address and the port number of the running instance.

Q. Enabling _____________ degrades performance more than logging only the authorization failures.

Q. Use the ____________ option to enable auditing and specify where to output the audit events.

Q. The audit file rotates at the same time as the ________ log file.

Q. To view the contents of the file, pass the file to the MongoDB utility ___________

Q. The _____________ option accepts either full path name or relative path name.

Q. The _________ message limit can result in the truncation of the audit messages.

Q. For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.