|Exam Name||:||Oracle Cloud Platform Big Data Management 2018 Associate|
|Questions and Answers||:||60 Q & A|
|Updated On||:||Click to Check Update|
|PDF Download Mirror||:||1Z0-928 Brain Dump|
|Get Full Version||:||Pass4sure 1Z0-928 Full Version|
A company is using Oracle Big Data Cloud Service that has Hive tables owned by user A. The tables are being dropped by user B. How should you implement authorization in Hadoop?
Role-based separation is not possible because Hadoop is a file system.
Configure Apache Record Service
Implement role-based security using Sentry.
Implement role-based security using Kerberos
Which statement is true about Big Data File System in Oracle Big Data Cloud?
It is a transparent distributed cache layer.
It supports HDFS as a datalake concept.
It is a block storage layer.
It offers block storage with NVMe-based SSD.
During provisioning, which can you create in order to integrate Big Data Cloud with Other Oracle PaaS services?
ABC Media receives thousands of files every day from many sources. Each text-formatted file is typically 1-2 MB in size. They need to store all these files for at least two years. They heard about Hadoop and about the HDFS filesystem, and want to take advantage of the cost-effective storage to store the vast number of files.
Which two recommendations could you provide to the customer to maintain the effectiveness of HDFS with the growing number of files?
Consider breaking down files into smaller files before ingesting.
Consider adding additional Name Nodes to increase data storage capacity.
Reduce the memory available for namenode as 1-2 MB files don’t need a lot of memory.
Consider concatenating files after ingesting.
Use compression to free up space.
You have a 3-Rack Hadoop Cluster and you have configured HDFS with the replication factor set to 3. All Racks and Nodes are up and running.
Which is the correct Data Replica layout by default?
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on the fastest node in the cluster.
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on a different node in the same remote Rack2.
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on a different node in Local Rack1.
One replica on one node in Local Rack1, another replica on a node in a remote Rack2, and the last replica on a node in the remote Rack3.
Which methods of Kafka deployment on Oracle Cloud does NOT provide SSH access?
Oracle Event Hub Cloud Service Dedicated associated with Big Data Cloud
Oracle Event Hub Cloud Service (Multi Tenant Version)
Oracle Event Hub Cloud Service-Dedicated (Kafka as a service)
Customer installed Kafka on Oracle Cloud Infrastructure
You need to enforce network encryption, as Kerberos authentication does not protect data as it travels through the network. Hadoop being a distributed system means that data must be transmitted over the network across machines. Which is NOT a network communication protocol used network encryption?
Big Data Cloud has tools for easy provisioning, managing, and monitoring of Apache Hadoop clusters. Which component does Oracle Big Data Cloud use as the platform stack for cluster orchestration and provisioning?
MapR Control System
Oracle Enterprise Manager
You have data in large files you need to copy from your Hadoop HDFS to other storage providers. You decided to use the Oracle Big Data Cloud Service distributed copy utility odcp.
As odcp is compatible with Cloudera Distribution Including Apache Hadoop, which four are supported when copying files?
Secure WebHDFS (SWebHDFS)
Apache Hadoop Distributed File Service (HDFS)
Hypertext Transfer Protocol (HTTP)
Oracle Cloud Infrastructure Object Storage
Reference: https://docs.oracle.com/en/cloud/paas/big-data-cloud/csbdi/copy-data-odcp.html#GUID-4049DB4F- 2E9A-4050-AB6F-B8F99918059F
Which function is NOT a part of Kerberos?
Kerberos offers Strong Authentication features.
Kerberos authorizes SQL Access for Hive and Impala.
Kerberos builds on symmetric key cryptography and requires a trusted third party.
Kerberos works on the basis of tickets.