1. There is a requirement to perform SQL-queries with complex issues and 53 HDFS file system. Which of the following tools can meet this requirement?
A) kinesis B) YARN C) QuidcSight D) LPresto E) None
2. Which of the following is true when it comes to the current limit of AWS Kinesis fragments? Choose the answer from the options below.(Select 2answers)
A) Each shard can manage up to 5 transactions per second read .- B) Each shard can manage up to 10 operations per second for reading C) The maximum amount of data read speed of 2 MB per second D) Reading the maximum data rate of 1 Mb per second
3. A third-party auditor brought analyze security processes, and configuration for all Sh AMC company accounts. The company does not use the identity provider OnPremise. Instead, they rely on the Lam accounts in each AWS accounts. The auditor should read-only access to all the resources AWS Shaw due to AWS. Subject to the requirements, what is the best way to protect the access to the development of the architecture for security auditor?
A) Create a role lame read-only permissions to all AWS services in any AWS account. Create an account accountant llamas and add permission policy that allows the auditor to accept the role of each ARN AWS - - account, which is assigned to the role. B) None C) Setting up a local ad server and enable SAML and determine federation for single sign-on each account AWS. D) Creation of software to order the broker identity, which enables the auditor to use the existing Amazon credentials to enter the AMS environments. E) Create users for each lame AMCA accounting with the policies permit read-only for auditors and disable the account when the review is completed.
4. You now have a redshift cluster defined in AWS. This information is not encrypted in nature at this time. Now you have decided that the cluster must encrypt data. How can you achieve this? Choose two of the options listed below. Each answer is part of the solution?(Select 2answers)
A) Loading data into a new target clusters to a selected setting encryption B) Make a backup copy of the data from an existing source cluster and encrypt it with SSE C) Unloading of data from the existing one. cluster source D) Enabling encryption cluster attributes
5. You are currently web server, which places data from log files on Kinesis flows. In this case, the Web server role to play Select:
A) The data stream role B) The role of the consumer C) current role D) None E) The role of producers
Leave a comment