1. When loading encrypted files with Amazon S3 in Redshift, which of the following is not a type supported by the COPY command encryption Amazon S3? Please, choose:
A) server-side encryption key with the client provided
B) Server Side Encryption with AWS KMS managed keys
C) None
D) encrypting the client side using a symmetric master key on the client side
E) Server Side Encryption using Amazon S3 driven keys
2. Which of the following features are available to scale the cluster RedShift Select: Select:
A) Use snapshot and restore order to make a copy of an existing cluster, and then change the size of the new cluster
B) None
C) Scale cluster or by changing the number of nodes
D) All of the above
E) Scaling up and down the cluster with a different type of node
3. You work for a company that is engaged in transactions through credit cards. You need to identify potential fraudulent credit card transactions via Amazon Machine Learning. You have been labeled historical data that you can use to create the model. You must also be able to establish a model you choose. / Which model you should use this type of requirement?
A) just
B) binary
C) categorical
D) None
E) regression
4. You have created a mobile application that serves as the data stored in Amazon Dynamo DB Table. Your main problem is the scalability of the application and handles millions of visitors and requests for data. Within the app, customers have access to the data contained in the table DynamoDB. In connection with the requirements of the application, it would be the best way for the development of the program?
A) None
B) Setting up a local server AD uses SAML 2.0 for user management applications AD server within a space and write code that authenticates against LD serves. Grant's role as STS marker allows the end user to have access to the information required in DynamoDB table
C) Let users sign in to the application using a third-party identity provider, such as Amazon, Google. or Facebook. Using AssumeRoleWlthWebldentity API call to take on the role, which contains the appropriate permissions to communicate with DynamoDB table. Writing applications in the server-side with the AWS SDK and the host application at 1:53 scoop scalability
D) Let users sign in to the application using a third-party identity provider, such as Amazon, Google. or Facebook. Using AssumeRoleWlthWebldentity API call to take on the role, which contains the appropriate permissions to communicate with DynamoDB table. Print application injavaScript and many JavaScript interface to the S3 bucket.
E) Let users sign in to the application using a third-party identity provider, such as Amazon, Google. or Facebook. Using the API calls AssumeRoleWith the role that contains the appropriate permissions for communications with DynamoDB table. Print application injavaScript and many JavaScript interface at 1:53 bucket.
5. The company is currently processing its data processing tasks in Amazon Aurora. Look encrypt data at rest. Which of the following can be used to manage the encryption keys?
A) Client side encryption
B) AWS KMS
C) S3 SSE
D) None
E) AWS CIoud HSM
Leave a comment