You are on page 1of 11

1.

The Amazon is a Web-based service that allows business subscribers to run


application programs in the Amazon.com computing environment.

a) EC3

b) EC4

c) EMR

d) None of the mentioned

Answer: d

2. Point out the correct statement.

a) Amazon Web Services offers reliable, scalable, and inexpensive cloud computing services

b) MongoDB runs well on Amazon EC2

c) To deploy MongoDB on EC2 you can either set up a new instance manually

d) All of the mentioned

Answer: d

3. Amazon EC2 provides virtual computing environments, known as

a) chunks

b) instances

c) messages

d) none of the mentioned

Answer: b

4. Amazon is well suited to transfer bulk amount of data.

a) EC2

b) EC3

c) EC4

d) All of the mentioned

Answer: b

5. The EC2 can serve as a practically unlimited set of machines.

a) virtual

b) real

c) distributed

d) all of the mentioned

Answer: a
6. Amazon cloud-based storage system allows you to store data objects ranging in size from
1 byte up to 5GB.

a) S1

b) S2

c) S3

d) S4

Answer: c

7. Which of the following can be done with S3 buckets through the SOAP and REST APIs?

a) Upload new objects to a bucket and download them

b) Create, edit, or delete existing buckets

c) Specify where a bucket should be stored

d) All of the mentioned

Answer: d

8. Which of the following operation retrieves the newest version of the object?

a) PUT

b) GET

c) POST

d) COPY

Answer: b

9. Which of the following statement is wrong about Amazon S3?

a) Amazon S3 is highly reliable

b) Amazon S3 provides large quantities of reliable storage that is highly protected

c) Amazon S3 is highly available

d) None of the mentioned

Answer: c

10. Which of the following instance has an hourly rate with no long-term commitment?

a) On-Demand Instance

b) Reserved Instances

c) Spot Instance

d) All of the mentioned

Answer: a

11. Instance A and instance B are running in two different subnets A and B of a VPC. Instance A is not
able to ping instance B. What are two possible reasons for this? (Pick 2 correct answers)

A. The routing table of subnet A has no target route to subnet B

B. The security group attached to instance B does not allow inbound ICMP traffic

C. The policy linked to the IAM role on instance A is not configured correctly

D. NACL on subnet B does not allow outbound ICMP traffic

Answer: B, D

12. An instance is launched into a VPC subnet with the network ACL configured to allow all inbound
traffic and deny all outbound traffic. The instance’s security group is configured to allow SSH from
any IP address and deny all outbound traffic. What changes need to be made to allow SSH access to
the instance?

A. The outbound security group needs to be modified to allow outbound traffic

B. The outbound network ACL needs to be modified to allow outbound traffic

C. Nothing, it can be accessed from any IP address using SSH

D. Both the outbound security group and outbound network ACL need to be modified to allow
outbound traffic.

Answer: B
13. From what services I can block incoming/outgoing IPs?

A. Security Groups

B. DNS

C.ELB

D. VPC subnet

E. NACL

Answer E

14. What is the difference between a security group in VPC and a network ACL in VPC (chose 3
correct answers)

A. Security group restricts access to a Subnet while ACL restricts traffic to EC2

B. Security group restricts access to EC2 while ACL restricts traffic to a subnet

C. Security group can work outside the VPC also while ACL only works within a VPC

D. Network ACL performs stateless filtering and Security group provides stateful filtering

E. Security group can only set Allow rule, while ACL can set Deny rule also

Answer: B, D, E

15. Which of the following statements describes network ACLs? (Choose 2 answers)

A. Responses to allowed inbound traffic are allowed to flow outbound regardless of outbound
rules, and vice versa (are stateless)
B. Using network ACLs, you can deny access from a specific IP range

C. Keep network ACL rules simple and use a security group to restrict application-level access

D. NACLs are associated with a single Availability Zone (associated with Subnet)

Answer: B, C

16. Which of the following is the most secure way of giving access to AWS services to applications
running on Ec2 instances?

A. Creating Service users

B. Creating service groups

C. Roles

D. Attaching policies to applications

Answer: C

17. True or False: An explicit Deny in IAM precedes over an explicit allow

A. TRUE

B. FALSE

Answer: A

18. Which of the following sections in a policy specifies the entities to whom access to a resource is
granted or denied?

A. Statement ID

B. Resources

C. Principal

D. Conditions

Answer: C

19. TRUE or FALSE: By default, a new user in IAM has permissions to log in to the AWS Console.

A. TRUE

B. FLASE

Answer: B

20. Which of the following is not an IAM best practice?

A. Delete user accounts not in use

B. Attach policies to individual users

C. Manage permissions by adding users to groups

D. Enable MFA on user accounts


Answer: B

21. Which of the following set of credentials are used to log in to AWS programmatically? (Choose
two)

A. Username

B. Access Key

C. Password

D. Secret Key

Answer: B, D

22. What is the data warehouse tool offered by AWS?

A. Amazon Elasticsearch

B. Amazon Aurora

C. Amazon S3

D. Amazon Redshift

Answer: D

23. What is Amazon Athena?

A. A machine learning tool

B. An interactive query engine

C. A managed NoSQL storage

D. An ETL tool

Answer: B

24. Which is NOT a features of AWS Glue?

A. Data Catalog

B. ETL

C. Running Spark Jobs

D. Indexing blob storage

Answer: D

25. Which is NOT a feature of AWS Lake Formation?

A. Blueprints

B. Access Control

C. Interactive Query

D. ML Transform
Answer: C

26. Which of the following offering from AWS is based on serverless technology?

A. AWS Glue

B. Amazon EC2

C. Amazon Redshift

D. Amazon EMR

Answer: A

27. Where is the data stored in a Data Lake

A. Amazon S3

B. Amazon EC2

C. Amazon EMR

D. Amazon Aurora

Answer: A

28. Who is the CEO of AWS?

A. Jeff Bezos

B. Andy Jassy

C. Elon Musk

D. Bill Gates

Answer: B

29. Which of the following is NOT essential component of Data Lake?

A. Amazon S3

B. AWS Glue

C. Amazon Athena

D. AWS Lambda

Answer: D

30. Which components in Lake Formation will helps to define the Data Source Schema
automatically?

A. Jupyter Notebook

B. Apache Spark Job

C. Python Shell

D. Blueprint

Answer: D
31. Which services is the storage component of a Data Lake?

A. AWS Glue

B. Apache Hive

C. Amazon S3

D. Amazon Athena

Answer: C

32. What is the security module that is used to fine grained control the access of a Data Lake?

A. Amazon Macie

B. IAM

C. Amazon Redshift

D. AWS Glue

Answer: B

33. Amazon RDS provides users with re-sizable and cost-effective capability. Mention number of
AWS RDS engines, such as:

A. MySQL

B. Oracle

C. PostgreSQL

D. SQL Server

E. MariaDB

Answer A, B, C, D, E

34. I want to monitor data history of my RDS instance, what should I use?

A. RDS Console

B. CloudWatch

C. Database Snapshots

D. Amazon Aurora

Answer B

35. Amazon Kinesis provides key capabilities in the form of

A. Kinesis Firehose – to easily load streaming data into AWS

B. Kinesis Analytics – to easily process and analyze streaming data with standard SQL

C. Kinesis Storm - to easily process unbounded streams of data.

D. Kinesis Video Streams - to capture, process, and store video streams for analytics.
E. Kinesis Streams – to build custom applications that process and analyze data.

Answer: A, B, D, E

36. You are deploying an application to track GPS coordinates of delivery trucks in the United States.
Coordinates are transmitted from each delivery truck once every three seconds. You need to design
an architecture that will enable real-time processing of these coordinates from multiple consumers.

Which service should you use to implement data ingestion?

A. Amazon Kinesis

B. AWS Data Pipeline

C. Amazon AppStream

D. Amazon Simple Queue Service

Answer: A

37. You are deploying an application to collect votes for a very popular television show. Millions of
users will submit votes using mobile devices. The votes must be collected into a durable, scalable,
and highly available data store for real-time public tabulation.

Which service should you use?

A. Amazon DynamoDB

B. Amazon Redshift

C. Amazon Kinesis

D. Amazon Simple Queue Service

Answer: A

38. You need to replicate API calls across two systems in real time.

What tool should you use as a buffer and transport mechanism for API call events?

A. AWS SQS

B. AWS Lambda

C. AWS Kinesis

D. AWS SNS

Answer: C

39. A stock market monitoring application uses Amazon Kinesis for data ingestion. During simulated
tests of peak data rates, the Kinesis stream cannot keep up with the incoming data.

What step will allow Kinesis to accommodate the traffic during peak hours?

A. Install the Kinesis Producer Library (KPL) for ingesting data into the stream

B. Reduce the data retention period to allow for more data ingestion using Decrease Stream
Retention Period

C. Increase the shard count of the stream using Update Shard Count
D. Ingest multiple records into the stream in a single call using Put Records

Answer: C

40. Which programming language is currently not supported by Lambda?

A. Go

B. Ruby

C. NodeJS

D. C#

E. Python

Answer: B

41. For which of the following would a Lambda function require permissions granted by an IAM role?
Choose 2.

A. Running a query on an RDS instance in a private VPC subnet

B. Accessing a public webservice on the Internet

C. Saving interim data into a DynamoDB table

D. Making a call to a service via API Gateway

E. Getting an image from an S3 bucket

Answer: C, E

42. Which of the following is NOT a possible trigger for a Lambda function?

A. Resource Groups

B. Scheduled Events

C. Kinesis Streams

D. DynamoDB

E. S3

Answer: A

43. Which of the following would be suitable to deploy as a Lambda Function?

A. An e-commerce application with multiple features and functions

B. An application that resizes an image and saves it in S3

C. A bastion service that allows you to connect to private instances

D. A CRM application for a global sales team

Answer: B

44. What service(s) could you use to run a microservice on AWS?

A. Lambda
B. ECS containers

C. All of these

D. Elastic Beanstalk

Answer: C

45. Your Lambda function typically returns in about 8 seconds. But since it has an external
dependency it may sometimes hang if the external service is unavailable. What can you do so you
won't have to pay for 5 minutes of compute time if your function fails to return?

A. Set a timeout of around 10 to 15 seconds

B. You can submit your CloudWatch Logs to AWS Support for a refund

C. AWS does not charge you if your function has an error

D. Set a metric in CloudWatch to monitor execution time and send a notification

Answer: A

46. How can you give your Lambda function more CPU capacity so it completes faster?

A. Enable autoscaling to increase capacity when the function takes more than XX seconds to
execute on average

B. You can only increase the amount of RAM, not CPU capacity

C. The only thing you can do is make your code more efficient

D. You can dial up the amount of RAM, which also proportionally increases CPU

Answer: D

46. Technology growth is one of the biggest factors for the evolution of Big data. Is it true or false?

A. True

B. False

Answer: A

47. The data never been used is called as

A. Relevant data

B. Warm data

C. Cold data

D. Waste data

Answer: C

48. Velocity means,

A. Fastness of generation

B. Speed of data generation


C. Variability

D. Both a and b

Answer: D

49 .................... data is information that does not reside in a relational database but that have some
organizational properties that make it easier to analyze

A. structured

B. semi structured

C. unstructured

D. none of the above

Answer: B

50. The technologies for gathering, storing, analysing, and providing access to data to help make
better business decisions refers to ....

A. Business Intelligence

B. Data Warehousing

C. Cloud Computing

D. Business Analytics

E. Internet of Things

Answer: A

You might also like