1. For running Hadoop service daemons in Hadoop in secure mode ___________ principals are required.
2. Point out the correct statement.
3. The simplest way to do authentication is using _________ command of Kerberos.
4. Data transfer between Web-console and clients are protected by using _________
5. Point out the wrong statement.
6. In order to turn on RPC authentication in Hadoop, set the value of hadoop.security.authentication property to _________
7. The __________ provides a proxy between the web applications exported by an application and an end user.
8. ___________ used by YARN framework which defines how any container launched and controlled.
9. The ____________ requires that paths including and leading up to the directories specified in yarn.nodemanager.local-dirs.
10. The configuration file must be owned by the user running _________
11. What is data privacy?
12. What is personal data?
13. Amongst which of the following is a component of data privacy?
14. Information that directly or indirectly links to a person is considered as
15. Amongst which of the following is/are example of PII information?
16. Brajesh Shrivas lives at 60, City Center, Gwalior, India; this data record is an example of
17. What is pseudonymization?
18. When sensitive data falls into the hands of someone who is unauthorised person, it is
19. What is General Data Protection Regulation (GDPR)?
20. Amongst which of the following is/are the main principle of GDPR?
21. Amongst which of the following is/are the action point that data controllers and processors need to takes under GDPR?
22. How many types of fines are imposed by GDPR on businesses that violate its policies?
23. Amongst which of the following is/are true with respect to the category of violation GDPR?
24. Which of the following is true about “Right to rectification” under GDPR?
25. Which of the following is true about “Right to Data Portability” under GDPR?
26. Which of the following is true about “Right of access” under GDPR?
27. In a storage unit like database, if a record is save as “Person 17332”; this will be
28. What is a basic difference between data privacy and data security?
29. Information privacy, Individual privacy and communication privacy is the three main pillars of
30. Which of the following is a private Search-engine?
31. ____ is a process of retaining data at a secure place to the long-time storage.
32. Amongst which of the following is/are true about selective archiving?
33. Amongst which of the following is/are true to secure disposal of data?
34. Amongst which of the following is/are true about Eliminate potential clues?
35. Amongst which of the following is/are a change taken place in GDPR?
36. What is the primary purpose of data masking in Big Data security?
37. Which technique is used for encryption at rest in HDFS?
38. What is the role of Apache Ranger in Big Data security?
39. Which protocol is commonly used for authentication in Hadoop clusters?
40. What does ABAC stand for in access control models?
41. In Big Data, what is tokenization?
42. Which feature of Spark provides authentication for its web UI?
43. What is the purpose of auditing in Big Data systems?
44. Which regulation focuses on data protection in the EU?
45. What is dynamic data masking?
46. In Kafka, what secures data in transit?
47. What is a common threat in Big Data environments?
48. Which tool is used for fine-grained access control in Hive?
49. What is data anonymization?
50. In HDFS, permissions are based on what model?
51. What secures RPC in Hadoop?
52. Which is a compliance standard for healthcare Big Data?
53. What is key management in Big Data encryption?
54. In Spark, how is executor security enforced?
55. What is differential privacy?
56. Which Apache project provides auditing for Hadoop?
57. What is the CIA triad in security?
58. In Big Data, what is a data lakehouse security challenge?
59. What is OAuth used for in Big Data?
60. Which is a risk in multi-tenant Big Data clusters?
61. What is static data masking?
62. In HBase, security is managed via what?
63. What is the purpose of KMS in Hadoop?
64. Which standard is for payment card data in Big Data?
65. What is federated identity management?
66. In Big Data, what is a zero-trust model?
67. What protects against SQL injection in Big Data queries?
68. Which is used for secure multi-party computation in Big Data?
69. What is the role of Apache Knox in Big Data?
70. In GDPR, what is data minimization?
71. What is a blockchain use in Big Data security?
72. Which cipher is recommended for Big Data encryption?
73. What is role-based access control (RBAC)?
74. In cloud Big Data, what is shared responsibility model?
75. What is k-anonymity in privacy protection?
76. Which tool enforces policies in Kafka?
77. What is a DDoS threat to Big Data systems?
78. What is certificate pinning in Big Data?
79. In Big Data, what is secure multi-tenancy?
80. What is the purpose of data lineage in security?
81. Which is a vulnerability in unsecured Hadoop?
82. What is SAML in Big Data auth?
83. What is the main goal of Big Data security?
84. In Spark, what is dynamic allocation security implication?
85. What is HIPAA compliance in Big Data?
86. Which encryption type for data in transit?
87. What is Apache Sentry?
88. What is a privacy-preserving technique using noise?
89. In YARN, what enforces container security?
90. What is CCPA?
91. What is secure boot in Big Data nodes?
92. Which is a Big Data insider threat mitigation?
93. What is format-preserving encryption?
94. In Big Data, what is SIEM?
95. What is the benefit of column-level encryption?
96. Which protocol for secure shell in Big Data clusters?
97. What is data sovereignty in Big Data?
98. What is a canary token in security?
99. In Spark SQL, security is via what?
100. What is the purpose of threat modeling in Big Data?
101. Which is a quantum-resistant encryption for future Big Data?
102. What is RBAC in HDFS?
103. What is the impact of unpatched Big Data software?
104. What is secure deletion in Big Data?
105. In Kafka, ACLs are for what?
106. What is the principle of defense in depth?
107. Which is a Big Data security best practice?
108. What is attribute-based encryption (ABE)?
109. In Big Data, what is PII de-identification?
110. What is the role of IDS in Big Data?
111. Which compliance for financial data?
112. What is secure coding in Big Data apps?
113. What is a honey pot in Big Data security?
114. In HDFS, what is encryption zone?
115. What is the GDPR right to be forgotten?
116. Which is used for secure data sharing in Big Data?
117. What is vulnerability scanning in Big Data?
118. What is the benefit of immutable infrastructure?
119. In Big Data, what is context-aware access control?
120. What is a security information model for Big Data?
121. Which is a post-quantum algorithm?
122. What is data classification in security?
123. In Spark, what secures shuffle data?
124. What is FERPA for Big Data?
125. What is penetration testing in Big Data?
126. What is just-in-time access?
127. In HDFS, what is block access token?
128. What is the purpose of security baselines?
129. Which is a Big Data security metric?
130. What is confidential computing?
131. In Ranger, what is tag-based policy?
132. What is a supply chain attack in Big Data?
133. What is the role of DLP in Big Data?
134. Which hashing algorithm for integrity in Big Data?
135. What is micro-segmentation in Big Data security?
136. What is the GDPR data protection impact assessment?
137. In Big Data, what is secure code repository access?
138. What is behavioral analytics in security?
139. Which is a key rotation best practice?
140. What is the purpose of security orchestration?
141. In Big Data, what is homomorphic encryption benefit?
142. What is a privacy by design principle?
143. Which tool for Big Data lineage and security?
144. What is the risk of shadow IT in Big Data?
145. What is certificate management in TLS?
146. In Big Data, what is secure analytics?
147. What is the PCI-DSS requirement for Big Data?
148. What is a blue team in Big Data security?
149. What is data redaction?
150. In YARN, what is delegation token?
151. What is the benefit of immutable logs?
152. Which is a Big Data encryption key hierarchy?
153. What is threat hunting in Big Data?
154. What is the role of SOAR in security?
155. In Big Data, what is synthetic data for security?
156. What is a security rating for Big Data vendors?
157. What is the principle of least functionality?
158. Which is a Big Data security framework?
159. What is endpoint detection and response (EDR)?
160. In Big Data, what is secure supply chain?
161. What is the GDPR accountability principle?
162. What is chaos engineering for security?
163. Which is a post-incident security measure?
164. What is secure multi-cloud strategy?
165. In Big Data, what is privacy-enhancing technology (PET)?


