14. TLS encyption works through the use of…
Check all that apply:
a. Public/Private key encryption
b. SSL certificates
c. PGP encryption
d. GPG encyption
Answer: a and b
TLS encryption works through the use of the following:
– Public/Private key encryption
– SSL certificates
TLS encryption does not work through the use of…
– PGP encryption
– GPG encyption
15. Which of the following is a valid mongod commandline configuration with auditing enabled?
Check all that apply:
a. mongod --dbpath /data/db --auditDestination syslog b. mongod --dbpath /data/db --auditDestination file \ --auditFormat JSON --auditPath /data/db/auditLog.json c. mongod --dbpath /data/db --auditDestination file \ --auditFormat BSON --auditPath /data/db/auditLog.bson d. mongod --dbpath /data/db --auditDestination stdout
Answer
All of the following are valid mongod commandline configurations with auditing enabled:
mongod --dbpath /data/db --auditDestination syslog mongod --dbpath /data/db --auditDestination file \ --auditFormat JSON --auditPath /data/db/auditLog.json mongod --dbpath /data/db --auditDestination file \ --auditFormat BSON --auditPath /data/db/auditLog.bson
Why does the other command fail?
mongod --dbpath /data/db --auditDestination stdout
This is not a valid command-line configuration for mongod. The –auditDestination option can only be passed an argument of syslog, file, or console. If you’d like your log output to go to stdout use the console argument.