adplus-dvertising
frame-decoration

Question

Enabling _____________ degrades performance more than logging only the authorization failures.

a.

auditAuthorizationFailure

b.

auditAuthorizationSuccess

c.

auditAuthorizationlog

d.

none of the mentioned

Answer: (b).auditAuthorizationSuccess

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Enabling _____________ degrades performance more than logging only the authorization failures.

Similar Questions

Discover Related MCQs

Q. Use the ____________ option to enable auditing and specify where to output the audit events.

Q. The audit file rotates at the same time as the ________ log file.

Q. To view the contents of the file, pass the file to the MongoDB utility ___________

Q. The _____________ option accepts either full path name or relative path name.

Q. The _________ message limit can result in the truncation of the audit messages.

Q. For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.

Q. Point out the correct statement.

Q. For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.

Q. To authenticate using Kerberos, you must add the Kerberos user principals to MongoDB to the _________ database.

Q. To specify a different value for <service>, use ________ during the start up of mongod.

Q. Linux systems can store Kerberos authentication keys for a service principal in ______ files.

Q. On Linux, MongoDB clients can use Kerberos’s _______ program to initialize a credential cache for authenticating the user principal to servers.

Q. The MongoDB _________ Console interface does not support Kerberos authentication.

Q. Use __________ to encrypt communication between mongod and mongos components of a MongoDB client as well as between all applications and MongoDB.

Q. With ___________ enabled, MongoDB forces all clients to identify themselves before granting access to the server.

Q. ___________ allows administrators to define and limit the resources and operations that a user can access.

Q. Point out the wrong statement.

Q. Use the __________ option to ensure that MongoDB listens for connections from applications on configured addresses.

Q. To generate pseudo-random data to use for a keyfile, issue the following __________ command.

Q. _____________ is used to initiate relica member set.