adplus-dvertising
frame-decoration

Question

____________ removes a one or more roles from a user on the current database.

a.

db.revokeRolesUser()

b.

db.revokeRoles()

c.

db.revokeRolesFromUser()

d.

none of the mentioned

Posted under MongoDB

Answer: (c).db.revokeRolesFromUser()

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. ____________ removes a one or more roles from a user on the current database.

Similar Questions

Discover Related MCQs

Q. Point out the wrong statement.

Q. Which of the following method is used to identify the privileges granted by the roles?

Q. Grant the user the role using the ________ method.

Q. Point out the correct statement.

Q. To view a role’s information, you must be explicitly granted the role or must have the _________ action on the role’s database.

Q. ______________ enables a set of internal commands useful for internal testing operations.

Q. enableLocalhostAuthBypass is not available using _________ database command.

Q. The ________ client authentication allows clients to authenticate to servers with certificates rather than with a username and password.

Q. Point out the wrong statement.

Q. If you need to disable access control for any reason, restart the process with ______ setting.

Q. If you use the localhost exception when deploying a new MongoDB system, the first user you create must be in the ________ database.

Q. Point out the correct statement.

Q. If you create the user administrator before enabling access control, MongoDB disables the ________ exception.

Q. MongoDB supports the execution of JavaScript code for certain server-side operations like ____________

Q. Which of the following is used to display the replica set configuration object?

Q. _____________ is used to initiate relica member set.

Q. To generate pseudo-random data to use for a keyfile, issue the following __________ command.

Q. Use the __________ option to ensure that MongoDB listens for connections from applications on configured addresses.

Q. Point out the wrong statement.

Q. ___________ allows administrators to define and limit the resources and operations that a user can access.