Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified Big Data - Specialty Certification - Part 12

Mary Smith

Wed, 15 Apr 2026

AWS Certified Big Data - Specialty Certification - Part 12

1. Your company has a Web site hosted in AWS. There is a requirement to analyze the data about visits to the site, and it must be done in real time. Which of the following can be used to meet this requirement.

A) Using Amazon Kinesis Service to process data to Agent Kinesis
B) None
C) Service use EMR to receive data so that it can be analyzed at a later date.
D) Use redshift service receive data so that it can be analyzed at a later date.
E) Publish Web clicks on the Amazon SQS


2. You're going to download a lot of data in a redshift of the cluster. You are not sure if the load will be a success or failure. Which of the following options can help to see if an error occurred during the download process.

A) Use the Copy command
B) Use the COPY command with the option NOLOAD
C) Using IMPORT Command
D) None
E) Use the import option NOLOAD


3. You want to use the service AWS rules for highly compatible device for recording data to the AWS Dynamo DB. Which of the following measures should be taken to ensure that the rules will not work as intended? Please, choose:

A) Make sure that the rights of lamas access to AWS gave Dynamo DB
B) Make sure that the unit of production are determined in Amazon VPC.
C) Make sure that the units of production are defined in AWS Config
D) None
E) Make sure that the units are registered as a user in Lam


4. Which of the following statements about database encryption redshift is false?

A) Encryption can be the default for a cluster
B) In the Amazon Red Shift, you can enable encryption for the database cluster to protect data at rest
C) None
D) When encryption is enabled, it is also possible for the images created
E) When encryption is enabled, the system is also encrypted metadata


5. If you need to turn on encryption on the server side with Amazon Kinesis data fire hose, which can later be used as a data source to ensure that encryption may be possible to select:

A) Kinesis flows
B) redshift
C) None
D) Simple Storage Service
E) Dynamo DB


1. Right Answer: A
Explanation: Amazon Kinesis makes it easy to collect, process. and analyze in real-time streaming data, so you can have a penetration into the essence of time and to react quickly to new information. Amazon Kinesis provides significant opportunities for cost-effective processing of data streaming in any scale, along with the flexibility to choose the tool that best suits the requirements of your application. With Amazon Kinesis you can eat the real-time data, such as application logs. Website dick flows. LOT telemetry. and many other databases. Lake information and data storage, or to create your own application in real time, using this data. Amazon Kinesis allows you to process and analyze the data coming and react in real time, instead of having to wait until all the data collected before treatment can begin.

2. Right Answer: B
Explanation: AWS documentation mentions the following to verify the data input 53 on Amazon Dynamo DB file table to load the data, use NOLOAD option using the COPY command. Using NOLOAD with the same copy commands and options that you want to actually read the data. NOLOAD checks the integrity of all data without reading it in the database. In NOLOAD shows a variant of any errors that would occur if you tried to download the data.

3. Right Answer: A
Explanation:

4. Right Answer: A
Explanation: In the Amazon Red Shift, you can enable database encryption for your rags to protect data at rest. When you turn on encryption for the cluster, data blocks and system metadata is encrypted for the cluster and its images. Encryption is optional, the same ratio of the cluster, if you want encryption, you need to activate it during the startup process conflicts. If you want to go from encrypted to unencrypted cluster of clusters, or vice versa, you need to download the data from the existing clusters and load it into a new cluster with the chosen setting up the encryption.

5. Right Answer: D
Explanation: If you have sensitive information, you can encrypt the data on the server side using Amazon Kinesis data fire hose. However, this is only possible when using the data of the current source Kinesis. When configuring Kinesis power as a data source for a data stream Kinesis fire hose. Kinesis fire hose of data is no longer stored data alone. Instead, the data is stored in the power of Kinesis.

0 Comments

Leave a comment