Inspirational journeys

Follow the stories of academics and their research expeditions

AWS Certified Big Data - Specialty Certification - Part 40

Mary Smith

Mon, 17 Mar 2025

AWS Certified Big Data - Specialty Certification - Part 40

1. When loading encrypted files with Amazon S3 in Redshift, which of the following is not a type supported by the COPY command encryption Amazon S3? Please, choose:

A) server-side encryption key with the client provided
B) Server Side Encryption with AWS KMS managed keys
C) None
D) encrypting the client side using a symmetric master key on the client side
E) Server Side Encryption using Amazon S3 driven keys


2. Which of the following features are available to scale the cluster RedShift Select: Select:

A) Use snapshot and restore order to make a copy of an existing cluster, and then change the size of the new cluster
B) None
C) Scale cluster or by changing the number of nodes
D) All of the above
E) Scaling up and down the cluster with a different type of node


3. You work for a company that is engaged in transactions through credit cards. You need to identify potential fraudulent credit card transactions via Amazon Machine Learning. You have been labeled historical data that you can use to create the model. You must also be able to establish a model you choose. / Which model you should use this type of requirement?

A) just
B) binary
C) categorical
D) None
E) regression


4. You have created a mobile application that serves as the data stored in Amazon Dynamo DB Table. Your main problem is the scalability of the application and handles millions of visitors and requests for data. Within the app, customers have access to the data contained in the table DynamoDB. In connection with the requirements of the application, it would be the best way for the development of the program?

A) None
B) Setting up a local server AD uses SAML 2.0 for user management applications AD server within a space and write code that authenticates against LD serves. Grant's role as STS marker allows the end user to have access to the information required in DynamoDB table
C) Let users sign in to the application using a third-party identity provider, such as Amazon, Google. or Facebook. Using AssumeRoleWlthWebldentity API call to take on the role, which contains the appropriate permissions to communicate with DynamoDB table. Writing applications in the server-side with the AWS SDK and the host application at 1:53 scoop scalability
D) Let users sign in to the application using a third-party identity provider, such as Amazon, Google. or Facebook. Using AssumeRoleWlthWebldentity API call to take on the role, which contains the appropriate permissions to communicate with DynamoDB table. Print application injavaScript and many JavaScript interface to the S3 bucket.
E) Let users sign in to the application using a third-party identity provider, such as Amazon, Google. or Facebook. Using the API calls AssumeRoleWith the role that contains the appropriate permissions for communications with DynamoDB table. Print application injavaScript and many JavaScript interface at 1:53 bucket.


5. The company is currently processing its data processing tasks in Amazon Aurora. Look encrypt data at rest. Which of the following can be used to manage the encryption keys?

A) Client side encryption
B) AWS KMS
C) S3 SSE
D) None
E) AWS CIoud HSM


1. Right Answer: A
Explanation:

2. Right Answer: D
Explanation: As your needs for storage capacity and performance to change and grow, you can change the size of the duster, make best use of computers and data storage options such as Amazon Reds hift provides. You can scale clashes in and by changing the number of nodes. Or. You can scale the cluster up or down using a different type of node. You can change the size of the cluster, using one of the following methods: Use the resize operation to the existing cluster. Use snapshot and restore order to make a copy of an existing cluster. Then change the size of the new cluster

3. Right Answer: B
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: B
Explanation: Amazon Aurora, you can now encrypt their databases with the arrow keys to control the key management Servtce AWS (KMS). The database instance performed via Amazon Aurora encryption data stored in the rest of the base store in encrypted form. as well as automated backups. snapshots. and replication of the same cloth.

0 Comments

Leave a comment