crackyourinterview.com


To improves our performance please Like Share Subscribe(Will boost us)

In CDH, what is used for authorization?
Question Posted on 14 Jan 2021Home >> Apache Hadoop >> Hadoop Security >> In CDH, what is used for authorization?

In CDH, what is used for authorization?
Please choose the correct option from below list
(1)Sentry Server
(2)Data Engine
(3)None of the options
(4)Sentry Plugin

Answer:-(1)Sentry Server
0
0



.


Most Visited Questions:-

Deep Learning Questions Answers
Below are the different Deep Leaning Questions and answer a More...

Continuous Integration Questions Answers
Below are the 20 odd questions for CI or Continuous Integra More...

Derived relationships in Association Rule Mining are represented in the form of __________.
Derived relationships in Association Rule Mining are repres More...

What is Gulpjs and some multiple choice questions on Gulp
Gulpjs is an open source whihc helps in building Javascript More...

Microservices Architecture Questions Answers
Below are the different questions on Microservices Architec More...




Other Important Questions

What is the process of identifying an individual?

What are the different types of communication channels between Hadoop components?

Assume there is a table in Hive with 20 columns. The first 15 columns can be seen by everyone, but 5 columns can be seen by admins only. What security

What are the key factors for driving security in Hadoop?

A person wants to buy a flight ticket. On finding a flight at an ideal price, the person enters their credit card details and personal information whi






@2014-2022 Crackyourinterview (All rights reserved)
Privacy Policy - Disclaimer - Sitemap