Precise AWS-Certified-Big-Data-Specialty Software 2021

Pinpoint of AWS-Certified-Big-Data-Specialty download materials and free demo for Amazon certification for examinee, Real Success Guaranteed with Updated AWS-Certified-Big-Data-Specialty pdf dumps vce Materials. 100% PASS Amazon AWS Certified Big Data - Speciality exam Today!

Online Amazon AWS-Certified-Big-Data-Specialty free dumps demo Below:

NEW QUESTION 1
You have been tasked with deployment a solution for your company that will store images, which the
marketing department will use for its campaigns. Employees are able to upload images via a web interface, and once uploaded, each image must be resized and watermarked with the company logo. Image resize and watermark is not time-sensitive and can be completed days after upload if required.
How should you design this solution in the most highly available and cost-effective way?

  • A. Configure your web application to upload images to the Amazon Elastic Transcoder servic
  • B. Use the Amazon Elastic Transcoder watermark feature to add the company logo as a watermark on your images and then upload the final image into an Amazon s3 bucket
  • C. Configure your web application to upload images to Amazon S3, and send the Amazon S3 bucket URI to an Amazon SQS queu
  • D. Create an Auto Scaling group and configure it to use Spot instances, specifying a price you are willing to pa
  • E. Configure the instances in this Auto Scaling group to poll the SQS queue for new images and then resize and watermark the image before uploading the final images into Amazon S3
  • F. Configure your web application to upload images to Amazon S3, and send the S3 object URI to an Amazon SQS queu
  • G. Create an Auto Scaling launch configuration that uses Spot instances, specifying a price you are willing to pa
  • H. Configure the instances in this Auto Scaling group to poll the Amazon SQS queue for new images and then resize and watermark the image before uploading the new images into Amazon S3 and deleting the message from the Amazon SQS queue
  • I. Configure your web application to upload images to the local storage of the web serve
  • J. Create a cronjob to execute a script daily that scans this directory for new files and then uses the Amazon EC2 Service API to launch 10 new Amazon EC2 instances, which will resize and watermark the images daily

Answer: C

NEW QUESTION 2
A systems engineer for a company proposes digitalization and backup of large archives for customers.
The systems engineer needs to provide users with a secure storage that makes sure that data will never be tempered with once it has been uploaded. How should this be accomplished?

  • A. Create an Amazon Glacier Vaul
  • B. Specify a “Deny” Vault lock policy on this vault to block “glacier:DeleteArchive”.
  • C. Create an Amazon S3 bucke
  • D. Specify a “Deny” bucket policy on this bucket to block “s3:DeleteObject”.
  • E. Create an Amazon Glacier Vaul
  • F. Specify a “Deny” vault access policy on this Vault to block “glacier:DeleteArchive”.
  • G. Create a secondary AWS containing an Amazon S3 bucke
  • H. Grant “s3:PutObject” to the primary account.

Answer: A

NEW QUESTION 3
What is one key difference between an Amazon EBS-backed and an instance-store backed instance?

  • A. Amazon EBS-backed instances can be stopped and restarted
  • B. Instance-store backed instances can be stopped and restarted
  • C. Auto scaling requires using Amazon EBS-backed instances
  • D. Virtual Private Cloud requires EBS backed instances

Answer: A

NEW QUESTION 4
A company is preparing to give AWS Management Console access to developers. Company policy
mandates identity federation and role based access control. Roles are currently assigned using groups in the corporate Active Directory. What combination of the following will give developers access to the AWS console? Choose 2 answers

  • A. AWS Directory Service AD connector
  • B. AWS Directory Service Simple AD
  • C. AWS identity and Access Management groups
  • D. AWS identity and Access Management roles
  • E. AWS identity and Access Management users

Answer: AD

NEW QUESTION 5
A user is running one instance for only 3 hours every day. The user wants to save some cost with the
instance. Which of the below mentioned Reserved Instance categories is advised in this case?

  • A. The user should not use RI; instead only go with the on-demand pricing
  • B. The user should use the AWS high utilized RI
  • C. The user should use the AWS medium utilized RI
  • D. The user should use the AWS low utilized RI

Answer: A

NEW QUESTION 6
A photo sharing service stores pictures in Amazon Simple Storage Service (S3) and allows application
signin using an Open ID Connect compatible identity provider. Which AWS Security Token approach to temporary access should you use for the Amazon S3 operations?

  • A. SAML-based identity Federation
  • B. Cross-Account Access
  • C. AWS identity and Access Management roles
  • D. Web identity Federation

Answer: A

NEW QUESTION 7
A new algorithm has been written in Python to identify SPAM e-mails. The algorithm analyzes the free text contained within a sample set of 1 million e-mails stored on Amazon S3. The algorithm must be scaled across a production of 5 PB, which also resides in Amazon S3 storage
Which AWS service strategy is best for this use case?

  • A. Copy the data into Amazon ElasticCache to perform text analysis on the in-memory data and export the results of the model into Amazon machine learning
  • B. Use Amazon EMR to parallelize the text analysis tasks across the cluster using a streaming program step
  • C. Use Amazon Elasticsearch service to store the text and then use the Python Elastic search client to run analysis against the text index
  • D. Initiate a python job from AWS Data pipeline to run directly against the Amazon S3 text files

Answer: C

Explanation:
Reference: https://aws.amazon.com/blogs/database/indexing-metadata-in-amazon-elasticsearch- service-using-aws-lambda-and-python/

NEW QUESTION 8
An Amazon Redshift Database is encrypted using KMS. A data engineer needs to use the AWS CLI to
create a KMS encrypted snapshot of the database in another AWS region.
Which three steps should the data engineer take to accomplish this task? (Select Three.)

  • A. Create a new KMS key in the destination region
  • B. Copy the existing KMS key to the destination region
  • C. Use CreateSnapshotCopyGrant to allow Amazon Redshift to use the KMS key created in the destination region
  • D. Use CreateSnapshotCopyGrant to allow Amazon Redshift to use the KMS key from the source region
  • E. In the source, enable cross-region replication and specify the name of the copy grant created
  • F. In the destination region, enable cross-region replication and specify the name of the copy grant created

Answer: BDF

NEW QUESTION 9
Your Devops team is responsible for a multi-tier, Windows-based web application consisting of web servers, Amazon RDS database instances, and a load balancer behind Amazon Route53. You have been asked by your manager to build a cost-effective rolling deployment solution for this web application.
What method should you use?

  • A. Re-deploy your application on an AWS OpsWorks stac
  • B. Use the AWS OpsWorks clone stack feature to allow updates between duplicate stacks
  • C. Re-deploy your application on Elastic BeanStalk and take advantage of Elastic BeanStalk rolling updates
  • D. Re-deploy your application using an AWS CloudFormation template, launch a new AWS CloudFormation stack during each deployment, and then tear down the old stack
  • E. Re-deploy your application using an AWS CloudFormation templat
  • F. Use AWS CloudFormation rolling deployment policies, create a new policy for your AWS CloudFormation stack, and initiate an update stack operation to deploy new code

Answer: D

NEW QUESTION 10
A user has setup an RDS DB with Oracle. The user wants to get notifications when someone modifies
the security group of that DB. How can the user configure that?

  • A. It is not possible to get the notifications on a change in the security group
  • B. Configure SNS to monitor security group changes
  • C. Configure event notification on the DB security group
  • D. Configure the CloudWatch alarm on the DB for a change in the security group

Answer: C

NEW QUESTION 11
When you put objects in Amazon 53, what is the indication that an object was successfully stored?

  • A. A HTTP 200 result code and MD5 checksum, taken together, indicate that the operation was successful
  • B. A success code is inserted into the S3 object metadata
  • C. Amazon S3 is engineered for 99.999999999% durabilit
  • D. Therefore there is no need to confirm that data was inserted.
  • E. Each S3 account has a special bucket named_ s3_log
  • F. Success codes are written to this bucket with a timestamp and checksum

Answer: A

NEW QUESTION 12
A company operates an international business served from a single AWS region. The company wants to expand into a new country. The regulator for that country requires the Data Architect to maintain a log of financial transactions in the country within 24 hours of production transaction. The production application is latency insensitive. The new country contains another AWS region.
What is the most cost-effective way to meet this requirement?

  • A. Use CloudFormation to replicate the production application to the new region
  • B. Use Amazon CloudFront to serve application content locally in the country; Amazon CloudFront logs will satisfy the requirement
  • C. Continue to serve customers from the existing region while using Amazon Kinesis to stream transaction data to the regulator
  • D. Use Amazon S3 cross-region replication to copy and persist production transaction logs to a budget the new country’s region

Answer: D

NEW QUESTION 13
You have an ASP.NET web application running in Amazon Elastic BeanStalk. Your next version of the
application requires a third-party Windows installer package to be installed on the instance on first boot and before the application launches.
Which options are possible? Choose 2 answer

  • A. In the application’s Global.asax file, run msiexec.exe to install the package using Process.Start() in the Application_Start event handler
  • B. In the source bundle’s .ebextensions folder, create a file with a .config extensio
  • C. In the file, under the “packages” section and “msi” package manager, include the package’s URL
  • D. Launch a new Amazon EC2 instance from the AMI used by the environmen
  • E. Log into the instance, install the package and run syspre
  • F. Create a new AM
  • G. Configure the environment to use the new AMI
  • H. In the environment’s configuration, edit the instances configuration and add the package’s URL to the “Packages” section
  • I. In the source bundle’s .ebextensions folder, create a “Packages” folde
  • J. Place the package in the folder

Answer: BC

NEW QUESTION 14
Using only AWS services. You intend to automatically scale a fleet of stateless of stateless web
servers based on CPU and network utilization metrics. Which of the following services are needed? Choose 2 answers

  • A. Auto Scaling
  • B. Amazon Simple Notification Service
  • C. AWS Cloud Formation
  • D. CloudWatch
  • E. Amazon Simple Workflow Service

Answer: AD

NEW QUESTION 15
The Trusted Advisor service provides insight regarding which four categories of an AWS account?

  • A. Security, fault tolerance, high availability, and connectivity
  • B. Security, access control, high availability, and performance
  • C. Performance, cost optimization, security, and fault tolerance
  • D. Performance, cost optimization, access control, and connectivity

Answer: C

NEW QUESTION 16
You are configuring your company’s application to use Auto Scaling and need to move user state
information. Which of the following AWS services provides a shared data store with durability and low latency?

  • A. Amazon Simple Storage Service
  • B. Amazon DynamoDB
  • C. Amazon EC2 instance storage
  • D. AWS ElasticCache Memcached

Answer: A

NEW QUESTION 17
Which of the following requires a custom cloudwatch metric to monitor?

  • A. Memory utilization of an EC2 instance
  • B. CPU utilization of an EC2 instance
  • C. Disk usage activity of an EC2 instance
  • D. Data transfer of an EC2 instance

Answer: A

NEW QUESTION 18
You have a load balancer configured for VPC, and all backend Amazon EC2 instances are in service. However, your web browser times out when connecting to the load balancer’s DNS name. Which options are probable causes of this behavior?

  • A. The load balancer was not configured to use a public subnet with an Internet gateway configured
  • B. The Amazon EC2 instances do not have a dynamically allocated private IP address
  • C. The security groups or network ACLs are not properly configured for web traffic
  • D. The load balancer is not configured in a private subnet with a NAT instance
  • E. The VPC does not have a VGW configured

Answer: AC

NEW QUESTION 19
You are working with customer who has 10 TB of archival data that they want to migrate to Amazon Glacier. The customer has a 1Mbps connection to the Internet. Which service or feature provide the fastest method of getting the data into Amazon Glacier?

  • A. Amazon Glacier multipart upload
  • B. AWS Storage Gateway
  • C. VM Import/Export
  • D. AWS Import/Export

Answer: D

NEW QUESTION 20
A customer needs to determine the optimal distribution strategy for the ORDERS fact table in its
Redshift schema. The ORDERS table has foreign key relationships with multiple dimension tables in this schema.
How should the company determine the most appropriate distribution key for the ORDRES table?

  • A. Identity the largest and most frequently joined dimension table and ensure that it and the ORDERS table both have EVEN distribution
  • B. Identify the target dimension table and designate the key of this dimension table as the distribution key of the ORDERS table
  • C. Identity the smallest dimension table and designate the key of this dimension table as the distribution key of ORDERS table
  • D. Identify the largest and most frequently joined dimension table and designate the key of this dimension table as the distribution key for the orders table

Answer: D

NEW QUESTION 21
An administrator needs to design a distribution strategy for a star schema in a Redshift cluster. The
administrator needs to determine the optimal distribution style for the tables in the Redshift schema. In which three circumstances would choosing Key-based distribution be most appropriate? (Select three)

  • A. When the administrator needs to optimize a large, slowly changing dimension table
  • B. When the administrator needs to reduce cross-node traffic
  • C. When the administrator needs to optimize the fact table for parity with the number of slices
  • D. When the administrator needs to balance data distribution and collocation of data
  • E. When the administrator needs to take advantage of data locality on a local node of joins and aggregates

Answer: ADE

NEW QUESTION 22
An organization needs a data store to handle the following data types and access patterns
• Faceting
• Search
• Flexible schema (JSON) and fixed schema
• Noise word elimination
Which data store should the organization choose?

  • A. Amazon Relational Database Service (RDS)
  • B. Amazon Redshift
  • C. Amazon DynamoDB
  • D. Amazon Elasticsearch Service

Answer: C

NEW QUESTION 23
A user has created an ELB with Auto Scaling. Which of the below mentioned offerings from ELB helps
the user to stop sending new requests traffic from the load balancer to the EC2 instance when the instance is being deregistered while continuing in-flight requests?

  • A. ELB sticky session
  • B. ELB deregistration check
  • C. ELB connection draining
  • D. ELB auto registration Off

Answer: C

NEW QUESTION 24
You have a video Trans coding application running on Amazon EC2. Each instance pools a queue to find out which video should be Trans coded, and then runs a Trans coding process.
If this process is interrupted, the video will be Trans coded by another instance based on the queuing system. You have a large backlog of videos which need to be Trans coded and would like to reduce this backlog by adding more instances. You will need these instances only until the backlog is reduced. Which type of Amazon EC2 instance should you use to reduce the backlog in the most cost- effective way?

  • A. Dedicated instances
  • B. Spot instances
  • C. On-demand instances
  • D. Reserved instances

Answer: B

NEW QUESTION 25
An organization uses Amazon Elastic MapReduce (EMR) to process a series of extract-transform-load
(ETL) steps that run in sequence. The output of each step must be fully processed in subsequent steps but will not be retained.
Which of the following techniques will meet this requirement most efficiently?

  • A. Use the EMR File System (EMRFS) to store the outputs from each step as objects in Amazon Simple Storage Service (S3).
  • B. Use the s3n URI to story the data to be processes as objects in Amazon S3.
  • C. Define the ETL steps as separate AWS Data Pipeline activities.
  • D. Load the data to be processed into HDFS and then write the final output to Amazon S3.

Answer: A

NEW QUESTION 26
......

100% Valid and Newest Version AWS-Certified-Big-Data-Specialty Questions & Answers shared by Exambible, Get Full Dumps HERE: https://www.exambible.com/AWS-Certified-Big-Data-Specialty-exam/ (New 243 Q&As)