Professional Documents
Culture Documents
a) EC3
b) EC4
c) EMR
Answer: d
a) Amazon Web Services offers reliable, scalable, and inexpensive cloud computing services
c) To deploy MongoDB on EC2 you can either set up a new instance manually
Answer: d
a) chunks
b) instances
c) messages
Answer: b
a) EC2
b) EC3
c) EC4
Answer: b
a) virtual
b) real
c) distributed
Answer: a
6. Amazon cloud-based storage system allows you to store data objects ranging in size from
1 byte up to 5GB.
a) S1
b) S2
c) S3
d) S4
Answer: c
7. Which of the following can be done with S3 buckets through the SOAP and REST APIs?
Answer: d
8. Which of the following operation retrieves the newest version of the object?
a) PUT
b) GET
c) POST
d) COPY
Answer: b
Answer: c
10. Which of the following instance has an hourly rate with no long-term commitment?
a) On-Demand Instance
b) Reserved Instances
c) Spot Instance
Answer: a
11. Instance A and instance B are running in two different subnets A and B of a VPC. Instance A is not
able to ping instance B. What are two possible reasons for this? (Pick 2 correct answers)
B. The security group attached to instance B does not allow inbound ICMP traffic
C. The policy linked to the IAM role on instance A is not configured correctly
Answer: B, D
12. An instance is launched into a VPC subnet with the network ACL configured to allow all inbound
traffic and deny all outbound traffic. The instance’s security group is configured to allow SSH from
any IP address and deny all outbound traffic. What changes need to be made to allow SSH access to
the instance?
D. Both the outbound security group and outbound network ACL need to be modified to allow
outbound traffic.
Answer: B
13. From what services I can block incoming/outgoing IPs?
A. Security Groups
B. DNS
C.ELB
D. VPC subnet
E. NACL
Answer E
14. What is the difference between a security group in VPC and a network ACL in VPC (chose 3
correct answers)
A. Security group restricts access to a Subnet while ACL restricts traffic to EC2
B. Security group restricts access to EC2 while ACL restricts traffic to a subnet
C. Security group can work outside the VPC also while ACL only works within a VPC
D. Network ACL performs stateless filtering and Security group provides stateful filtering
E. Security group can only set Allow rule, while ACL can set Deny rule also
Answer: B, D, E
15. Which of the following statements describes network ACLs? (Choose 2 answers)
A. Responses to allowed inbound traffic are allowed to flow outbound regardless of outbound
rules, and vice versa (are stateless)
B. Using network ACLs, you can deny access from a specific IP range
C. Keep network ACL rules simple and use a security group to restrict application-level access
D. NACLs are associated with a single Availability Zone (associated with Subnet)
Answer: B, C
16. Which of the following is the most secure way of giving access to AWS services to applications
running on Ec2 instances?
C. Roles
Answer: C
17. True or False: An explicit Deny in IAM precedes over an explicit allow
A. TRUE
B. FALSE
Answer: A
18. Which of the following sections in a policy specifies the entities to whom access to a resource is
granted or denied?
A. Statement ID
B. Resources
C. Principal
D. Conditions
Answer: C
19. TRUE or FALSE: By default, a new user in IAM has permissions to log in to the AWS Console.
A. TRUE
B. FLASE
Answer: B
21. Which of the following set of credentials are used to log in to AWS programmatically? (Choose
two)
A. Username
B. Access Key
C. Password
D. Secret Key
Answer: B, D
A. Amazon Elasticsearch
B. Amazon Aurora
C. Amazon S3
D. Amazon Redshift
Answer: D
D. An ETL tool
Answer: B
A. Data Catalog
B. ETL
Answer: D
A. Blueprints
B. Access Control
C. Interactive Query
D. ML Transform
Answer: C
26. Which of the following offering from AWS is based on serverless technology?
A. AWS Glue
B. Amazon EC2
C. Amazon Redshift
D. Amazon EMR
Answer: A
A. Amazon S3
B. Amazon EC2
C. Amazon EMR
D. Amazon Aurora
Answer: A
A. Jeff Bezos
B. Andy Jassy
C. Elon Musk
D. Bill Gates
Answer: B
A. Amazon S3
B. AWS Glue
C. Amazon Athena
D. AWS Lambda
Answer: D
30. Which components in Lake Formation will helps to define the Data Source Schema
automatically?
A. Jupyter Notebook
C. Python Shell
D. Blueprint
Answer: D
31. Which services is the storage component of a Data Lake?
A. AWS Glue
B. Apache Hive
C. Amazon S3
D. Amazon Athena
Answer: C
32. What is the security module that is used to fine grained control the access of a Data Lake?
A. Amazon Macie
B. IAM
C. Amazon Redshift
D. AWS Glue
Answer: B
33. Amazon RDS provides users with re-sizable and cost-effective capability. Mention number of
AWS RDS engines, such as:
A. MySQL
B. Oracle
C. PostgreSQL
D. SQL Server
E. MariaDB
Answer A, B, C, D, E
34. I want to monitor data history of my RDS instance, what should I use?
A. RDS Console
B. CloudWatch
C. Database Snapshots
D. Amazon Aurora
Answer B
B. Kinesis Analytics – to easily process and analyze streaming data with standard SQL
D. Kinesis Video Streams - to capture, process, and store video streams for analytics.
E. Kinesis Streams – to build custom applications that process and analyze data.
Answer: A, B, D, E
36. You are deploying an application to track GPS coordinates of delivery trucks in the United States.
Coordinates are transmitted from each delivery truck once every three seconds. You need to design
an architecture that will enable real-time processing of these coordinates from multiple consumers.
A. Amazon Kinesis
C. Amazon AppStream
Answer: A
37. You are deploying an application to collect votes for a very popular television show. Millions of
users will submit votes using mobile devices. The votes must be collected into a durable, scalable,
and highly available data store for real-time public tabulation.
A. Amazon DynamoDB
B. Amazon Redshift
C. Amazon Kinesis
Answer: A
38. You need to replicate API calls across two systems in real time.
What tool should you use as a buffer and transport mechanism for API call events?
A. AWS SQS
B. AWS Lambda
C. AWS Kinesis
D. AWS SNS
Answer: C
39. A stock market monitoring application uses Amazon Kinesis for data ingestion. During simulated
tests of peak data rates, the Kinesis stream cannot keep up with the incoming data.
What step will allow Kinesis to accommodate the traffic during peak hours?
A. Install the Kinesis Producer Library (KPL) for ingesting data into the stream
B. Reduce the data retention period to allow for more data ingestion using Decrease Stream
Retention Period
C. Increase the shard count of the stream using Update Shard Count
D. Ingest multiple records into the stream in a single call using Put Records
Answer: C
A. Go
B. Ruby
C. NodeJS
D. C#
E. Python
Answer: B
41. For which of the following would a Lambda function require permissions granted by an IAM role?
Choose 2.
Answer: C, E
42. Which of the following is NOT a possible trigger for a Lambda function?
A. Resource Groups
B. Scheduled Events
C. Kinesis Streams
D. DynamoDB
E. S3
Answer: A
Answer: B
A. Lambda
B. ECS containers
C. All of these
D. Elastic Beanstalk
Answer: C
45. Your Lambda function typically returns in about 8 seconds. But since it has an external
dependency it may sometimes hang if the external service is unavailable. What can you do so you
won't have to pay for 5 minutes of compute time if your function fails to return?
B. You can submit your CloudWatch Logs to AWS Support for a refund
Answer: A
46. How can you give your Lambda function more CPU capacity so it completes faster?
A. Enable autoscaling to increase capacity when the function takes more than XX seconds to
execute on average
B. You can only increase the amount of RAM, not CPU capacity
C. The only thing you can do is make your code more efficient
D. You can dial up the amount of RAM, which also proportionally increases CPU
Answer: D
46. Technology growth is one of the biggest factors for the evolution of Big data. Is it true or false?
A. True
B. False
Answer: A
A. Relevant data
B. Warm data
C. Cold data
D. Waste data
Answer: C
A. Fastness of generation
D. Both a and b
Answer: D
49 .................... data is information that does not reside in a relational database but that have some
organizational properties that make it easier to analyze
A. structured
B. semi structured
C. unstructured
Answer: B
50. The technologies for gathering, storing, analysing, and providing access to data to help make
better business decisions refers to ....
A. Business Intelligence
B. Data Warehousing
C. Cloud Computing
D. Business Analytics
E. Internet of Things
Answer: A