Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified Big Data - Specialty Certification - Part 35

Mary Smith

Mon, 15 Sep 2025

AWS Certified Big Data - Specialty Certification - Part 35

1. When you create a database in Amazon Aurora What are the two types of cases are created. Choose two of the options listed below?(Select 2answers)

A) primary Instance
B) replica Aurora
C) Backup Instance
D) initial Instance



2. Which of the following is not supported by the data sources for Amazon Peek?

A) Amazon redshift
B) amazon Athena
C) Amazon Dynamo DB
D) None
E) Amazon 53


3. The mobile app needs access to each user to store data in Table Dynamo DB. What is the best METI to provide all mobile devices, ensuring that the program has access to the database tables for storing Dynamo BB is required? Select the correct answer from the options below

A) When a user logs into the system. Of temporary security credentials using STS.
B) During the installation and configuration of the game, each user can create a link to PAM and set of LAM user to a group with the right power to communicate with the Dynamo database.
C) Creating a lame group only allows access to your application and database tables Dynamo. Then, when you write a DynamoDB only includes a unique identifier of the device to associate data with a specific user.
D) Creating an Active Directory server and AD user for each mobile application users. When a user logs in II of AD system logon to the ad server in the federated using SAML 2.0 for PAM and assign roles to AD user as a second thought to assume the role of SAML.
E) Create a PAM role with the right public policy to deal with the Dynamo database table. Use .This identity federation, which assumes the role of Lam assistance Assume the role of a web identity


4. Which of the following is an open-source tools that can be used on top of the issues related to Hadoop SQL? Choose two of the following options to choose?(Select 2answers)

A) ganglia
B) Hive
C) H Base
D) Impala



5. Which of the following can be used to encrypt databases on AWS redshift? Choose two of the options listed below?(Select 2answers)

A) AWS KMS
B) AWS Cloud HSM
C) S3 SSE
D) LUKS



1. Right Answer: A,B
Explanation: When you create an example of Amazon Aurora, you are creating a database cluster. Database cluster consists of one or more database instances and the cluster volume, which processes data for these cases. Displacement Aurora cluster volume is a virtual storage database which encompasses several Availability zone, wherein each zone has a copy of the database availability cluster data. Two instances of DB-type form clusters Aurora DB. Primary copy - read and write operations support and comply with all data modifications in the volume of the cluster. Aurora DB Each cluster has a primary copy.

2. Right Answer: C
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: B,D
Explanation: irnpai is open source Hadoop ecosystem of interactive, ad hoc queries using the SQL syntax. Instead of using MapReduce. it uses massively parallel processing (MPP) engine, similar to that found in traditional relational database (RDBMS). it is open source software and information systems house analysis package that runs on top of Hadoop. Beehive is controlled based on the SQL language called Ulogo QL, which allows users to organize, summarize, and sources of data queries are stored in Amazon

5. Right Answer: A,D
Explanation: Amazon uses a red shift of the hierarchy of encryption keys for encrypting the database. You can use either the AWS Key Management Service (KMS AWS) or security hardware module (HSM) to manage the encryption keys, the top level of this hierarchy.

0 Comments

Leave a comment