AWS BDS-C00 Certified Big Data Speciality Practice Test Set 7

Which of the following is true with regards to the current limitation on AWS Kinesis shards? Choose answers from the options below.


Options are :

  • Each shard can support up to 5 transactions per second for reads .- (Correct)
  • Each shard can support up to 10 transactions per second for reads
  • The maximum total data read rate Is 1 MB per second
  • The maximum total data read rate is 2 MB per second (Correct)

Answer : Each shard can support up to 5 transactions per second for reads .- The maximum total data read rate is 2 MB per second

Which of the following operations are available for scaling a Redshift Cluster Please select: Please select:


Options are :

  • All of the above (Correct)
  • Scale the cluster up or down by specifying a different node type
  • Scale the cluster in or out by changing the number of nodes
  • Use the snapshot and restore operations to make a copy of an existing cluster, Then, resize the new cluster

Answer : All of the above

Your application is using the KCL library on EC2 Instances to work with Kinesis shards. Which of the following can be used to scale up processing in your application? Choose 3 answers from the options given below Please select:


Options are :

  • Increasing the number of shards
  • Increasing the number of instances up to the maximum number of open shards (Correct)
  • Adding an ELB In front of the EC2 Instances
  • Increasing the instance size of the underlying EC2 Instances.

Answer : Increasing the number of instances up to the maximum number of open shards

Which of the following services isa fully-managed service that can be used to build machine learning models at any scale


Options are :

  • AWS Greengrass (Correct)
  • AWSFargate
  • AWS SageMlaker
  • AWS Polly

Answer : AWS Greengrass

You currently have an orders table defined in Red shift, This orders table has a sort key defined on the columns orders date. You are now planning on loading data into the Red shift table month wise. Which is the most efficient way to load this data.


Options are :

  • Load the data using the LOAD command and ensure the data is loaded in sort key order
  • Load the data using the LOAD command directly because this will be the fastest.
  • Load the data using the COPY command directly because this will be the fastest.
  • Load the data using the COPY command and ensure the data is loaded in sort key order (Correct)

Answer : Load the data using the COPY command and ensure the data is loaded in sort key order

There is a requirement to export data from Dynamo DB tables to S3. How can this be achieved in the easiest way possible?


Options are :

  • Configure AWS Import/Export to copy data onto 53
  • Configure AWS Data Pipeline to copy data onto S3 (Correct)
  • Configure Dynamo DB streams to copy data onto S3
  • Configure an AWS Lambda function to copy data onto 53.

Answer : Configure AWS Data Pipeline to copy data onto S3

there is a requirement to perform SQL querying along with complex queries on HDFS and 53 file systems. Which of the below tools can fulfil this requirement?


Options are :

  • QuidcSight
  • Kinesis
  • LPresto
  • YARN (Correct)

Answer : YARN

You enable encryption when you launch a cluster. To migrate from an unencrypted duster to an encrypted duster. you first unload your data from the existing, source duster. Then you reload the data In a new, target cluster What is the purpose of the Hadoop Encrypted Shuffle feature?


Options are :

  • The data in transit between the nodes in a cluster is encrypted (Correct)
  • The EC2 instances are shuffled across the cluster for better performance
  • The encryption keys used in a cluster are shuffled at regular intervals
  • The files are shuffled across nodes in a cluster

Answer : The data in transit between the nodes in a cluster is encrypted

Which of the following is not a condition that needs to be met by the local secondary index for a Dynamo DB table Please select?


Options are :

  • The sort key consists of exactly one scalar attribute.
  • The partition key is different from that of the base table (Correct)
  • The partition key is the same as that of its base table
  • The sort key of the base table is projected into the index, where it acts as a non-key attribute.

Answer : The partition key is different from that of the base table

You are configuring a number of loT devices with AWS loT. You are planning on using the current Google credentials already in place for authentication. Which of the following Is recommended for this sort of authentication


Options are :

  • Using IAM Roles
  • Using IAM Users
  • Using Amazon Cognito .. (Correct)
  • Using X.509 certificates

Answer : Using Amazon Cognito ..

Which of the following needing to be done to create supervised machine learning models in the AWS ML service?


Options are :

  • Using external blueprints in AWS Machine Learning
  • Creation of test models in the Machine Learning Designer
  • Creation of training data (Correct)
  • Usage of existing blueprints in AWS Machine Learning

Answer : Creation of training data

What is the current maximum total data read rate for a Kinesis shard


Options are :

  • 2 MB per second (Correct)
  • 1 MB per second
  • 10 MB per second
  • SMB per second

Answer : 2 MB per second

Which of the following can be used by an organization for archival of data for long periods of time? Please select:


Options are :

  • Amazon Kinesis
  • Amazon Glacier (Correct)
  • Amazon EMR
  • Amazon S3

Answer : Amazon Glacier

Which one of the following statements are false when it comes to using EBS volumes with an EMR Cluster?


Options are :

  • A 10 GB EBS root volume is already attached to an EC2 Instance which is part of the EMR cluster.
  • Amazon EBS Volumes attached to an EMR Cluster can persist even after the cluster has been terminated. (Correct)
  • You can?t snapshot an EBS volume and then restore it within Amazon EMR
  • An encrypted EBS root storage volume Is supported only when using a custom AMP

Answer : Amazon EBS Volumes attached to an EMR Cluster can persist even after the cluster has been terminated.

You currently have web servers that put data from their log files onto Kinesis streams. In this scenario what role are the web servers playing Please select:


Options are :

  • The producers role (Correct)
  • The stream role
  • The data stream role
  • The consumers role

Answer : The producers role

A company is currently managing their data workload in Amazon Aurora. They are looking at encrypting the data at rest. Which of the following can be used for managing the encryptions keys?


Options are :

  • AWS CIoud HSM
  • Client side encryption
  • AWS KMS (Correct)
  • S3-SSE

Answer : AWS KMS

Which one of the following is not True about loT enabled devices?


Options are :

  • Message Broker provides a secure mechanism for devices and AWS loT applications to publish and receive messages from each other
  • Number of thing types that can be associated with a thing is 1.
  • Device Shadow is a YAML document used to store and retrieve current state information for a device (Correct)
  • Maximum number of thing types in an AWS account is unlimited

Answer : Device Shadow is a YAML document used to store and retrieve current state information for a device

You are developing an application that makes use of the KPL library. Which of the following can be used to reduce the kinesis related costs for your application? Choose 3 answers from the options given below


Options are :

  • Collection
  • Batching
  • Compression
  • Aggregation (Correct)

Answer : Aggregation

You have a defined a local secondary index for a Dynamo DB table. You are then performing queries against the index, but the performance is not ideal as expected. Which of the following can reduce the performance of querying an index when using the Local Secondary Index?


Options are :

  • When querying for a different sort key value
  • When querying a partition key that is not present in the LSI
  • When querying for a projected attribute
  • When querying for a non-projected attribute (Correct)

Answer : When querying for a non-projected attribute

Your application currently uses Dynamo DB as the data store. You also have a test environment where you perform load tests on your application. There is a constant need to reset the data In the Dynamo DB tables. How can this be achieved? Choose 2 answers from the options below. Each answer forms part of the solution.


Options are :

  • Use the AWS Data Pipeline to export data from a Dynamo DB table to a file in an Amazon S3 bucket before the test begins .... (Correct)
  • Use the Dynamo DB export feature to copy the data before the test begins
  • Use the Dynamo DB import feature to copy the data after the test ends.
  • Use the AWS Data Pipeline to import data from a Dynamo DB table from the file in an Amazon 53 bucket after the test ends (Correct)

Answer : Use the AWS Data Pipeline to export data from a Dynamo DB table to a file in an Amazon S3 bucket before the test begins .... Use the AWS Data Pipeline to import data from a Dynamo DB table from the file in an Amazon 53 bucket after the test ends

A company has many employees who need to run internal applications that access the company?s AWS resources. These employees already have user credentials in the company?s current Identity authentication system, which does not support SAML 2.0. The company does not want to create a separate lAM user for each company employee. How should the SSO setup be designed? Choose the 2 correct answers from the options below Please select:


Options are :

  • Create a custom identity broker application which authenticates employees using the existing system and uses the Assume Role API call to gain temporary. role-based access to AWS. (Correct)
  • Create a custom identity broker application which authenticates the employees using the existing system. uses the GetFeclerationToken API call and passes a permission policy to gain temporary access credentials from STS.
  • Configure an AD server which synchronizes from the company?s current Identity Provide and configures SAML-based single sign-on which will then use the Assume Role With SAML API calls to generate credentials for the employees. (Correct)
  • Create an lAM user to share based off of employee roles in the company

Answer : Create a custom identity broker application which authenticates employees using the existing system and uses the Assume Role API call to gain temporary. role-based access to AWS. Configure an AD server which synchronizes from the company?s current Identity Provide and configures SAML-based single sign-on which will then use the Assume Role With SAML API calls to generate credentials for the employees.

You work for a company that deals with credit card based transactions. You have to identify potential fraudulent credit card transactions using Amazon Machine Learning. You have been given historical labeled data that you can use to create your model. You will also need to the ability to tune the model you pick. / Which model type should you use for this sort of requirement?


Options are :

  • Binary (Correct)
  • Regression
  • Categorical
  • Simple

Answer : Binary

You need to store data quickly in a cost-effective manner. At the moment, the amount of data that is going to be processed in the coming months is not known. All that is known as this moment is that there can be burst of processing capabilities required during this time frame. Which Big Data tool should you use for this requirement?


Options are :

  • AWS Machine Learning
  • AWS Kinesis
  • AWS EMR (Correct)
  • AWS Red shift

Answer : AWS EMR

You have a set of web servers that deliver their logs to Cloud Watch Logs. There is a requirement to perform a search on Cloud Watch logs for certain types of errors. Which of the below services would be recommended for this requirement


Options are :

  • AWS Elastic Search (Correct)
  • AWS Red shift
  • AWS Config
  • Elastic Map Reduce

Answer : AWS Elastic Search

You?ve created a mobile application that serves data stored in an Amazon Dynamo DB table. Your primary concern is scalability of the application and being able to handle millions of visitors and data requests. As part of your application, the customer needs access to the data located in the DynamoDB table. Given the application requirements, what would be the best method for designing the application?


Options are :

  • Let the users sign into the app using a third party identity provider such as Amazon, Google. or Facebook. Use the AssumeRoleWlthWebldentity API call to assume the role containing the proper permissions to communicate with the DynamoDB table. Write the application in a server-side language using the AWS SDK and host the application in an 53 bucket for scalability
  • Configure an on-premise AD server utilizing SAML 2.0 to manage the application users inside of the on-premise AD server and write code that authenticates against the LD serves. Grant a role assigned to the STS token allow the end-user to access the required data in the DynamoDB table
  • Let the users sign in to the app using a third party identity provider such as Amazon, Google. or Facebook. Use the AssumeRoleWlthWebldentity API call to assume the role containing the proper permissions to communicate with the DynamoDB table. Write the application injavaScript and host the JavaScript interface in an S3 bucket. (Correct)
  • Let the users sign into the app using a third party Identity provider such as Amazon, Google. or Facebook. Use the AssumeRoleWith API call to assume the role containing the proper permissions to communicate with the DynamoDB table. Write the application injavaScript and host the javascript interface in an 53 bucket.

Answer : Let the users sign in to the app using a third party identity provider such as Amazon, Google. or Facebook. Use the AssumeRoleWlthWebldentity API call to assume the role containing the proper permissions to communicate with the DynamoDB table. Write the application injavaScript and host the JavaScript interface in an S3 bucket.

Your company has an enterprise application that requires key-value storage as the database. The data is expected to be about 100 GB the first month and grow to 2PB over the next couple of years. There are no other query requirements at this time. Which one of the below solutions would assist In this case?


Options are :

  • H Base on HDFS
  • AWS RDS
  • DynamoDB (Correct)
  • Hadoop with Spark

Answer : DynamoDB

You currently have a SQL database defined in the Azure platform. You need to migrate this data to AWS RDS. Which of the below services can be used to fulfill this requirement


Options are :

  • AWS Data Migration (Correct)
  • AWS Kinesis
  • AWS Kinesis Fire hose
  • AWS Data Pipeline

Answer : AWS Data Migration

Amazon Athena is known to be highly available and durable. What is the underlying data store for Amazon Athena that makes it so highly available and durable Please select:


Options are :

  • Amazon 53 (Correct)
  • Amazon EMR
  • Amazon Dynamo DB
  • Amazon Red shift

Answer : Amazon 53

When loading encrypted files from Amazon S3 into Redshift, which of the following is not a supported types of Amazon S3 encryption for the COPY command? Please select:


Options are :

  • Server-side encryption with Amazon S3-managed keys
  • Client-side encryption using a client-side symmetric master key
  • Server-side encryption with customer-provided keys (Correct)
  • Server-side encryption with AWS KMS-managed keys

Answer : Server-side encryption with customer-provided keys

You are using Quick Sight to identify demand vs supply trends over multiple months. Which type of visualization do you choose?


Options are :

  • PivotTable
  • Bar Charts
  • Line Chart (Correct)
  • Scatter Plot

Answer : Line Chart

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions