AWS Certified Data Analytics Exam Simulator 2 | (50 questions)
Quiz Summary
0 of 50 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Failed (80% required to pass)
-
Passed (80% required to pass)
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 50
1. Question
Your users have started to complain about poor application performance. You determine that your on-premises VPN connection is saturated with authentication and authorization traffic to the on-premises Microsoft Active Directory (AD) environment. Which option will reduce on-premises network traffic?
CorrectIncorrect -
Question 2 of 50
2. Question
You have configured a consumer Virtual Private Cloud (VPC) endpoint for a remote authentication service hosted by a business partner using AWS PrivateLink. The endpoints have been whitelisted and configured on the consumer and provider. Some instances are not able to access the private authentication service. Which of the following could cause this issue? (Choose two.)
CorrectIncorrect -
Question 3 of 50
3. Question
You are using an existing RADIUS-based multi-factor authentication (MFA) infrastructure. Which AWS service is your best choice?
CorrectIncorrect -
Question 4 of 50
4. Question
Which of the following uses authentication based on AWS Security Token Service (STS) tokens?
CorrectIncorrect -
Question 5 of 50
5. Question
Which Multi-Factor Authentication devices does the IAM service support?
CorrectIncorrect -
Question 6 of 50
6. Question
How does multi-factor authentication work?
CorrectIncorrect -
Question 7 of 50
7. Question
Which AWS service provides centralized management of access and authentication of users administering the services in an AWS account?
CorrectIncorrect -
Question 8 of 50
8. Question
Consider the following statements about the AAA architecture:
I. Authentication deals with the question “Who is the user?”
II. Authorization addresses the question “What is the user allowed to do?”
III. Accountability answers the question “What did the user do?”
Which of the following is correct?CorrectIncorrect -
Question 9 of 50
9. Question
What authorization feature can restrict the actions of an account’s root user?
CorrectIncorrect -
Question 10 of 50
10. Question
What is the maximum duration of an AWS penetration testing authorization?
CorrectIncorrect -
Question 11 of 50
11. Question
A large manufacturing organization has started capturing data from sensors across the assembly lines. It is looking to perform operational analytics and build real-time dashboards based on specific index patterns and looking at ultra-low latency. The data is available in Elasticsearch. Which of the following visualization techniques is best suited for such an organization?
CorrectIncorrect -
Question 12 of 50
12. Question
A leading financial organization is looking to migrate its enterprise data warehouse to AWS. It has 30 TB of data in its data warehouse but is only using 500 GB for reporting and dashboarding while the remaining data is occasionally required for compliance purposes. Which of the following is a more cost-effective solution?
CorrectIncorrect -
Question 13 of 50
13. Question
Compliance documents are available from which of the following?
CorrectIncorrect -
Question 14 of 50
14. Question
For regulatory compliance, your application may only provide data to requests coming from the United States. Which of the following routing policies can be configured to do this?
CorrectIncorrect -
Question 15 of 50
15. Question
Your web application relies on data objects stored in AWS S3 buckets. Compliance with industry regulations requires that those objects are encrypted and that related events can be closely tracked. Which combination of tools should you use? (Choose two.)
CorrectIncorrect -
Question 16 of 50
16. Question
Your company must retain legacy compliance data for five years in “an immutable form” in the unlikely event of a tax audit. What is the most cost-effective method that will achieve compliance?
CorrectIncorrect -
Question 17 of 50
17. Question
Your company has a compliance requirement to record all writes to an Amazon Simple Storage Service (Amazon S3) bucket and any time that content was read publicly. What are the two steps needed to achieve compliance? (Choose two.)
CorrectIncorrect -
Question 18 of 50
18. Question
You must set up centralized logging for an application and create a cost-effective way to archive logs for compliance purposes. Which is the best solution?
CorrectIncorrect -
Question 19 of 50
19. Question
Which AWS Cloud service enables governance, compliance, operational auditing, and risk auditing of your AWS account?
CorrectIncorrect -
Question 20 of 50
20. Question
You have a set of users that have been granted access to your Amazon S3 bucket. For compliance purposes, you need to keep track of all files accessed in that bucket. To have a record of who accessed your Amazon Simple Storage Service (Amazon S3) data and from where, what should you do?
CorrectIncorrect -
Question 21 of 50
21. Question
Which of the following standards governs AWS-based applications processing credit card transactions?
CorrectIncorrect -
Question 22 of 50
22. Question
To protect its website, the organization directs you to implement known-attacker protection for the website. The website resides behind an Application Load Balancer. You have subscribed to a threat intelligence service that posts hourly IP reputation lists. What combination of AWS Cloud services will allow you to block traffic based on this threat intelligence?
CorrectIncorrect -
Question 23 of 50
23. Question
AWS Shield Standard provides protection at which layers of the Open Systems Interconnection (OSI) model? (Choose two.)
CorrectIncorrect -
Question 24 of 50
24. Question
You are looking for an endpoint protection solution, and you want to use the same solution that you are using on-premises today to improve your workload protection running on your Amazon EC2 instances. Where can you find endpoint protection solutions to protect your servers running in the AWS Cloud?
CorrectIncorrect -
Question 25 of 50
25. Question
Who is responsible for network traffic protection in Amazon Virtual Private Cloud (Amazon VPC)?
CorrectIncorrect -
Question 26 of 50
26. Question
You are looking to run large scale data processing jobs on Amazon EMR running in a stepexecution mode. The data processing jobs can be run at any time with input data available on Amazon S3. Which of the following options will ensure that the data remains available, provides a consistent view, and is encrypted for protection during and after the cluster is terminated after the completion of steps? (Choose One.)
CorrectIncorrect -
Question 27 of 50
27. Question
You are looking for an endpoint protection solution, and you want to use the same solution that you are using on-premises today to improve your workload protection running on your Amazon EC2 instances. Where can you find endpoint protection solutions to protect your servers running in the AWS Cloud?
CorrectIncorrect -
Question 28 of 50
28. Question
Which of the following provide the most protection against data corruption and accidental deletion for existing objects stored in S3? (Choose two.)
CorrectIncorrect -
Question 29 of 50
29. Question
What is the term for a relational database that stores large amounts of structured data from a variety of sources for reporting and analysis?
CorrectIncorrect -
Question 30 of 50
30. Question
Your team uses an application to receive information quickly from other parts of your infrastructure. It leverages low-latency multicast feeds to receive information from other applications and displays analysis. Which approach could help satisfy the application’s low latency requirements in AWS?
CorrectIncorrect -
Question 31 of 50
31. Question
Read the following statements and choose the correct option:
■ a. A vulnerability is a weakness within a computer system that can be exploited to perform unauthorized actions.
■ b. A security risk is defined as any entity (such as a person or a tool) that can exploit a vulnerability intentionally or by accident.
■ c. A threat relates to the probability of a certain vulnerability being exploited by a threat actor, which will depend on the value of the digital asset under analysis.CorrectIncorrect -
Question 32 of 50
32. Question
Your CIO has recently announced that you will be migrating to AWS to reduce your costs and improve overall agility by benefitting from the breadth and depth of the platform. You have a number of on-premises Oracle databases, which are not only expensive from a licensing perspective but also difficult to scale. You have realized that you can get the same performance from Amazon Aurora at 1/10 of the cost and hence would like to proceed with the migration. You want to create the schema beforehand on the AWS My SQL instance. Which of the following is the easiest approach in getting this done?
CorrectIncorrect -
Question 33 of 50
33. Question
Which of the following common partition schemas includes a partition key design that distributes I/O requests evenly across partitions and uses provisioned I/O capacity of an Amazon DynamoDB table efficiently?
CorrectIncorrect -
Question 34 of 50
34. Question
What is a collection of related findings, grouped by a common attribute and saved as a filter in AWS Security Hub, called?
CorrectIncorrect -
Question 35 of 50
35. Question
You need a cost-effective solution to store a large collection of audio, video, and PDF files and provide users with the ability to track and analyze all your data efficiently using your existing business intelligence tools. Which of the following would form the solution required to fulfill the requirements?
CorrectIncorrect -
Question 36 of 50
36. Question
If you specify a hook script in the ApplicationStop lifecycle event of an AWS CodeDeploy appspec.yml, will it run on the first deployment to your instance(s)?
CorrectIncorrect -
Question 37 of 50
37. Question
Which of the following AWS services (alone or combined) would suit better the remediate phase of an incident lifecycle?
I. AWS Config
II. AWS CloudTrail
III. AWS Systems ManagerCorrectIncorrect -
Question 38 of 50
38. Question
Which of the following classes will usually make the most sense for long-term storage when included within a sequence of lifecycle rules?
CorrectIncorrect -
Question 39 of 50
39. Question
Your developers require a service that easily provisions an environment and then deploys and runs applications in the AWS cloud. The service needs to be integrated with developer tools and provides a one-stop experience for you to manage the lifecycle of your applications. What service would provide this capability without needing to write code specifically to deploy the infrastructure?
CorrectIncorrect -
Question 40 of 50
40. Question
A company uses a third-party service to send checks to its employees for payroll. The company is required to send the third-party service a JSON file with the person’s name and the check amount. The company’s internal payroll application supports exporting only to CSVs, and it currently has cron jobs set up on their internal network to process these files. The server that is processing the data is aging, and the company is concerned that it might
fail in the future. It is also looking to have the AWS services perform the payroll function. What would be the best serverless option to accomplish this goal?CorrectIncorrect -
Question 41 of 50
41. Question
Which of the following is a distributed data processing option on Apache Hadoop and was the main processing engine until Hadoop 2.0?
CorrectIncorrect -
Question 42 of 50
42. Question
You are working for a ride-hailing company that has recently ventured into food delivery and order processing. The order processing system is built on AWS. The order processing runs into scaling issues particularly during lunch and dinner times when there is an excessive amount of orders received. In the current infrastructure, you have EC2 instances that pick up the orders from the application and EC2 instances in an Auto Scaling group to
process the orders. What architecture would you recommended to ensure that the EC2 processing instances are scaled correctly based on the demand?CorrectIncorrect -
Question 43 of 50
43. Question
You are working for a large utilities company which has deployed smart meters across its customer base. They are getting near real-time usage data from their customers and ingesting it into Amazon S3 via Amazon Kinesis. They were previously running some large scale transformations using PySpark on their on-premises Hadoop cluster. They have the Pyspark application available and expect no change other than input and output parameters while
running the job. They are looking to reuse their code as much as possible, while looking at the possibility to tune the environment specific to their workload. Which of the following is the right data processing choice for their workload that meets the customers’ requirements at the lowest cost? (Choose One.)CorrectIncorrect -
Question 44 of 50
44. Question
Your organization expects to be storing and processing large volumes of data in many small increments. When considering S3 usability, you’ll need to know whether you’ll face any practical limitations in the use of AWS account resources. Which of the following will normally be available only in limited amounts?
CorrectIncorrect -
Question 45 of 50
45. Question
What are the major differences between Simple Storage Service (S3) and Elastic Block Store (EBS)? (Select TWO.)
CorrectIncorrect -
Question 46 of 50
46. Question
What do new Relational Database Service (RDS) instances use for database storage?
CorrectIncorrect -
Question 47 of 50
47. Question
What’s the maximum amount of data you can store in a Redshift cluster when using dense storage nodes?
CorrectIncorrect -
Question 48 of 50
48. Question
In what ways does Amazon Simple Storage Service (Amazon S3) object storage differ from block and file storage? (Select TWO.)
CorrectIncorrect -
Question 49 of 50
49. Question
On an Amazon Elastic Compute Cloud (Amazon EC2) instance using an Amazon Elastic Block Store (Amazon EBS) volume for persistence, there is a large inconsistency in the response times of the database queries. While investigating the issue, you find that there is a large amount of wait time on the database’s disk volume. How can you improve the performance of the database’s storage while maintaining the current persistence of the data? (Choose two.)
CorrectIncorrect -
Question 50 of 50
50. Question
In what ways does Amazon Simple Storage Service (Amazon S3) object storage differ from block and file storage? (Choose two.)
CorrectIncorrect