1. Which of the following statements is true about the AWS Deep Learning AMIs (DLAMI)?
A) AWS Deep Learning AMIs are not available for use with GPU instances. B) The AWS Deep Learning AMIs come with pre-installed deep learning frameworks and libraries, making it easier to develop and deploy deep learning models. C) AWS Deep Learning AMIs are only available for use with Amazon SageMaker. D) The AWS Deep Learning AMIs come with pre-configured Kubernetes clusters for easier deployment of machine learning workloads.
2. You are building a machine learning application that requires you to process data in real-time and store the results in an S3 bucket. You have decided to use AWS Lambda to run your machine learning application. However, you are concerned about the security of your Lambda function and the data it processes. Which of the following options would be the best way to secure your Lambda function and the data it processes?
A) Use AWS Key Management Service (KMS) to encrypt your Lambda function code and restrict access to it using IAM policies. B) Encrypt your S3 bucket and restrict access to it using IAM policies. C) Use the VPC endpoint to isolate your Lambda function and restrict access to it using security groups. D) Use AWS Lambda Layers to share code and data between your Lambda functions and restrict access to them using IAM policies.
3. You are building a deep learning model to classify images in an ecommerce platform, and you want to train your model using Amazon SageMaker. You have a large dataset of images stored in an Amazon S3 bucket, and you want to use Amazon SageMaker's built-in algorithms to train your model. However, you need to preprocess the images before training by resizing them to a specific size and converting them to grayscale.Which of the following approaches should you use to preprocess the images using Amazon SageMaker?
A) Use Amazon SageMaker's built-in transform jobs to resize and convert the images to grayscale before training, and specify the transformed data location as the input to the training job. B) Use Amazon SageMaker's built-in hyperparameter tuning to preprocess the images before training, and specify the preprocessed data location as the input to the training job. C) Use Amazon SageMaker's built-in training jobs to resize and convert the images to grayscale during training, and specify the S3 location of the original images as the input to the training job. D) Use Amazon SageMaker's built-in batch transform to resize and convert the images to grayscale before training, and specify the transformed data location as the input to the training job.
4. You are deploying a Kubernetes cluster on Amazon EKS and you want to use the AWS Key Management Service (KMS) to encrypt your Kubernetes secrets. Which of the following statements is true about the use of KMS with Amazon EKS?
A) Amazon EKS encrypts all Kubernetes secrets using KMS by default. B) KMS cannot be used to encrypt Kubernetes secrets on Amazon EKS. C) Amazon EKS only supports encryption of Kubernetes secrets using AWS Certificate Manager (ACM). D) You need to manually configure KMS to encrypt Kubernetes secrets on Amazon EKS.
5. You are designing a machine learning solution on AWS that requires role-based access control for your AWS resources. Which of the following statements regarding AWS Identity and Access Management (IAM) is correct?
A) IAM allows you to manage users and permissions for your AWS account. B) IAM is a service that provides secure and controlled access to your AWS resources using roles, policies, and permissions. C) IAM is a fully managed database service that provides high availability and automatic backups. D) IAM is a web service that provides resizable compute capacity in the cloud.
Leave a comment