MongoDB Security Access Control FAQ

Connect with

14. TLS encyption works through the use of…

Check all that apply:
a. Public/Private key encryption
b. SSL certificates
c. PGP encryption
d. GPG encyption

Answer: a and b

TLS encryption works through the use of the following:

– Public/Private key encryption
– SSL certificates

TLS encryption does not work through the use of…
– PGP encryption
– GPG encyption

15. Which of the following is a valid mongod commandline configuration with auditing enabled?

Check all that apply:

a. mongod --dbpath /data/db --auditDestination syslog

b. mongod --dbpath /data/db --auditDestination file \
       --auditFormat JSON --auditPath /data/db/auditLog.json

c. mongod --dbpath /data/db --auditDestination file \
       --auditFormat BSON --auditPath /data/db/auditLog.bson
	   
d. mongod --dbpath /data/db --auditDestination stdout

Answer

All of the following are valid mongod commandline configurations with auditing enabled:

mongod --dbpath /data/db --auditDestination syslog

mongod --dbpath /data/db --auditDestination file \
       --auditFormat JSON --auditPath /data/db/auditLog.json

mongod --dbpath /data/db --auditDestination file \
       --auditFormat BSON --auditPath /data/db/auditLog.bson

Why does the other command fail?

mongod --dbpath /data/db --auditDestination stdout

This is not a valid command-line configuration for mongod. The –auditDestination option can only be passed an argument of syslog, file, or console. If you’d like your log output to go to stdout use the console argument.


Connect with

Leave a Comment

Your email address will not be published. Required fields are marked *