Kerberos authorizes SQL Access for Hive and Impala.
Kerberos builds on symmetric key cryptography and requires a trusted third party.
Kerberos works on the basis of tickets.
Correct answer: B
Question 2
You have a 3-Rack Hadoop Cluster and you have configured HDFS with the replication factor set to 3. All Racks and Nodes are up and running.
Which is the correct Data Replica layout by default?
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on the fastest node in the cluster.
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on a different node in the same remote Rack2.
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on a different node in Local Rack1.
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on a node in the remote Rack3.
Correct answer: A
Question 3
You need to enforce network encryption, as Kerberos authentication does not protect data as it travels through the network. Hadoop being a distributed system means that data must be transmitted over the network across machines.
Which is NOT a network communication protocol used network encryption?