Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified Big Data - Specialty Certification - Part 10

Mary Smith

Wed, 15 Apr 2026

AWS Certified Big Data - Specialty Certification - Part 10

1. The company has a redshift clusters for petabyte-scale storage. The data in the cluster is easy to reproduce from the additional data stored in Amazon S3. The company wants to reduce the total cost of Red Shift cluster run ,. Which scenario would best meet the needs of the current cluster at the same time reducing the total cost of ownership of a cluster?

A) Enable automatic snapshots, but set the retention period to a lesser extent, to reduce storage costs
B) Disable automatic and manual snapshots on cluster
C) Instead of performing automatic daily backups, write a CLI script to create a snapshot of each manual F days. Copy the manual snapshot in the middle AWS region for dealing with emergencies.
D) None
E) Implement daily backup. but do not allow multi-region up to save money on data charges.


2. This application stores various buckets in S3. Access to these buckets should be based on a sign for the Microsoft Active Directory usage. Which of the following methods of implementation can be used?

A) None
B) Using impersonation, make sure that the user can gain access to the desired bucket.
C) Use lame federation, and access is provided based on the user group as defined in 1 AD
D) Using Active Directory Connector to secure access can be granted on the basis of UserA à , ¬ state Ys.
E) Create a bucket policy based on groups defined in Microsoft AD


3. At elimination of cluster slowness of CSOs, which of the following types of sites should not be investigated issues. Please, choose:

A) The top task
B) None
C) ~~ core nodes POS = Drop
D) master node
E) leader Node


4. What is the standard power shelf life Kinesis? Please, choose:

A) None
B) 1 day
C) 3 days
D) 7 days
E) 5 days


5. You have just developed a new mobile application that handles workloads analysis on large data sets stored on Amazon Red shift. Hence, the need for access to Amazon redshifts table. Which of the following methods would be better, both practical and safety terms of access to the tables?

A) None
B) Create red shlft read-only access policy in Lam and paste these links in the application.
C) Use roles that allow web users to federate identities to assume a role that provides access to the redshift of the table, providing time reference.
D) Creating HSM client certificate in the redshift and authenticated using this certificate
E) Creating a lame users and generate the encryption keys for the user. Creating a policy for redshift Embed keys in the application.


1. Right Answer: B
Explanation: Since the data in the cluster from easily reproduces the additional data stored on the Amazon ST and the need to reduce costs. 53 eleven 9s durability, there is no need to maintain some form of snapshots of snapshots at a point in time backup of the cluster. There are two types of images: automatic and manual. Amazon Red store these shift internally Amazon 53 pictures using an encrypted Secure Sockets Layer (SSL)

2. Right Answer: C
Explanation:

3. Right Answer: C
Explanation: The leader node is a term used to red shift. All three types of node EMR Amazon EMR cluster composed of nodes running on Amazon EC2 instances. If these cases are associated resources (such as running out of CPU or memory). problems connecting to the network, or completed, the processing speed rags suffer.

4. Right Answer: B
Explanation: Amazon Kinesis (the family called the product or the entire platform) makes it easy to collect, process. and analyze video and data streams in real time. Using Kinesis video streams catch. process. and store video streams for analysis and machine learning (new) Using Kinesis data streams (often implicitly refer to the Kinesis power) to create custom applications that analyze the data streams using popular stream processing frames. Kinesis (data) flow is a set of fragments. Each fragment has the sequence of data elements.

5. Right Answer: C
Explanation: AWS Security Token Service (STS) is now offering a web-Identity Federation (WIF). This allows developers to federate their applications from the book Face. Google. or Amazon with their AWS account, which allows end users to authenticate with one of these providers certificates (LDP), and time to get AWS credentials from time to time. In combination with the variable policy. WIF allows the developer to limit end users�  à , ¬ A Subset access to AWS resources in your account.

0 Comments

Leave a comment