adplus-dvertising
frame-decoration

Question

Which of the following method is used to identify the privileges granted by the roles?

a.

rolesUser

b.

rolesInfo

c.

rolesView

d.

all of the mentioned

Posted under MongoDB

Answer: (c).rolesView

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following method is used to identify the privileges granted by the roles?

Similar Questions

Discover Related MCQs

Q. Grant the user the role using the ________ method.

Q. Point out the correct statement.

Q. To view a role’s information, you must be explicitly granted the role or must have the _________ action on the role’s database.

Q. ______________ enables a set of internal commands useful for internal testing operations.

Q. enableLocalhostAuthBypass is not available using _________ database command.

Q. The ________ client authentication allows clients to authenticate to servers with certificates rather than with a username and password.

Q. Point out the wrong statement.

Q. If you need to disable access control for any reason, restart the process with ______ setting.

Q. If you use the localhost exception when deploying a new MongoDB system, the first user you create must be in the ________ database.

Q. Point out the correct statement.

Q. If you create the user administrator before enabling access control, MongoDB disables the ________ exception.

Q. MongoDB supports the execution of JavaScript code for certain server-side operations like ____________

Q. Which of the following is used to display the replica set configuration object?

Q. _____________ is used to initiate relica member set.

Q. To generate pseudo-random data to use for a keyfile, issue the following __________ command.

Q. Use the __________ option to ensure that MongoDB listens for connections from applications on configured addresses.

Q. Point out the wrong statement.

Q. ___________ allows administrators to define and limit the resources and operations that a user can access.

Q. With ___________ enabled, MongoDB forces all clients to identify themselves before granting access to the server.

Q. Use __________ to encrypt communication between mongod and mongos components of a MongoDB client as well as between all applications and MongoDB.