When a user wants to access a Hive table, _______ protection can be used to secure the channel of communication. This mechanism is called ________.
Please choose the correct option from below list
(1)JDBC, Wire Encryption
(2)RPC, Wire Encryption
(3)RPC, Ranger
(4)JDBC, Ranger
Answer:-(2)RPC, Wire Encryption | |