Question
a.
–auditLocation
b.
–auditOutput
c.
–auditDestination
d.
None of the mentioned
Posted under MongoDB
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Use the ____________ option to enable auditing and specify where to output the audit events.
Similar Questions
Discover Related MCQs
Q. The audit file rotates at the same time as the ________ log file.
View solution
Q. To view the contents of the file, pass the file to the MongoDB utility ___________
View solution
Q. The _____________ option accepts either full path name or relative path name.
View solution
Q. The _________ message limit can result in the truncation of the audit messages.
View solution
Q. For each _______ the Kerberos Key Distribution Center (KDC) maintains a database of the realm’s principal and the principal’s associated “secret keys”.
View solution
Q. Point out the correct statement.
View solution
Q. For a client-server authentication, the client requests from the KDC a ________ for access to a specific asset.
View solution
Q. To authenticate using Kerberos, you must add the Kerberos user principals to MongoDB to the _________ database.
View solution
Q. To specify a different value for <service>, use ________ during the start up of mongod.
View solution
Q. Linux systems can store Kerberos authentication keys for a service principal in ______ files.
View solution
Q. On Linux, MongoDB clients can use Kerberos’s _______ program to initialize a credential cache for authenticating the user principal to servers.
View solution
Q. The MongoDB _________ Console interface does not support Kerberos authentication.
View solution
Q. Use __________ to encrypt communication between mongod and mongos components of a MongoDB client as well as between all applications and MongoDB.
View solution
Q. With ___________ enabled, MongoDB forces all clients to identify themselves before granting access to the server.
View solution
Q. ___________ allows administrators to define and limit the resources and operations that a user can access.
View solution
Q. Point out the wrong statement.
View solution
Q. Use the __________ option to ensure that MongoDB listens for connections from applications on configured addresses.
View solution
Q. To generate pseudo-random data to use for a keyfile, issue the following __________ command.
View solution
Q. _____________ is used to initiate relica member set.
View solution
Q. Which of the following is used to display the replica set configuration object?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond MongoDB? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!