1. Which of the following components used for transferring data to the Kinesis Stream. Please, choose:
A) Kinesis Firehose B) debris C) None D) manufacturers E) consumers
2. Which of the following can be used to control the portable document using a browser? Please, choose:
A) None B) AMY C) d3.js D) Quick view E) jupyter
3. Your company has decided to use AWS Quick Sight for visualization. The President wants to see targets for each department in the company. At the design stage, it was decided that the user interface will be presented to each department in the form of a rectangle with the dimensions of the rectangle, which defines the purpose. In this case, after a quick view will help to build the correct visualization
A) Scatter plots B) None C) CPI D) The heat ~~ POS = TRUNC E) tree Map
4. Which of the following is incorrect in relation to Kinesis client library?
A) You can drag and drop data elements from the stream B) It can be used to connect to the current C) None D) You can count shards in the stream E) You can create a flow using KCL
5. Your company has an Oracle database installed on the EC2 instance. TDE is enabled for the Oracle database. The company needed a solution for the storage of TDE master encryption key for added security. Which of the following is a managed service that can completely fill this requirement?
A) S3-KMS B) AWS CIoud HSM C) None D) AWS KMS E) The site HSM
1. Right Answer: D Explanation:
2. Right Answer: E Explanation:
3. Right Answer: A Explanation:
4. Right Answer: E Explanation: KPL KCL do not create power. With Kinesis Currents, you build applications that use Kinesis Producer Library (CPL), and publish data to the stream, and then process the consumer program with Kinesis client library (KCL)
5. Right Answer: B Explanation: In order to keep your data safe in the Amazon alone redshift encrypts each block using the AES-256 hardwareaccelerated, as it is written to disk. By default, Amazon Red shift takes over key management, but you can choose to manage keys with hardware security modules (HSM) or control keys through the Key Management Service AWS.
Leave a comment