1. If one has to define the 4 key pillars of Hadoop security, which one would you pick?
-
a. Authentication, Authorization, Accountability and Data protection
-
b. Authentication, Authorization, Accountability and Sensitivity
-
c. Real time Access, Token Delegation, Data masking and Access Control
-
d. Accountability, Token Delegation, Data masking and Access Control
1. If one has to define the 4 key pillars of Hadoop security, which one would you pick?
Answer: a.Authentication, Authorization, Accountability and Data protection
Explanation: 4 Security Pillars & Rings of Defense considered in today's Hadoop system include: Authentication, Authorization, Audit, Data Protection
2. Which is the most common form of authentication used in Hadoop?
-
a. ACL
-
b. Kerberos
-
c. LDAP
-
d. Proxy
2. Which is the most common form of authentication used in Hadoop?
Answer: b.Kerberos
Explanation: Kerberos in Hadoop:(a)establishes identity for clients, hosts and services; (b)prevents impersonation/passwords are never sent over the wire; (c) Integrates w/ enterprise identity management tools such as LDAP/AD;(d)More granular auditing of data access/job execution
3. Which product among the following is not used for Hadoop Security?
-
a. Sentry
-
b. Knox
-
c. Rhino
-
d. Tez
3. Which product among the following is not used for Hadoop Security?
Answer: d.Tez
Explanation: Sentry, Knox and Rhino are used for Hadoop Security solutions. Tez is for SQL on Hadoop.
4. What is a delegation token?
-
a. Data masking token
-
b. Two party authentication protocol
-
c. Firewall entry code
-
d. All of the above
4. What is a delegation token?
Answer: b.Two party authentication protocol
Explanation: A delegation token is a two-party authentication protocol that lets users authenticate themselves with the Namenode (using Kerberos); on receipt of the delegation token, users can provide the token to the JobTracker.
comments: