MCQs on Data Preparation and Management | AWS Amazon SageMaker MCQs Question

Learn essential concepts of AWS Amazon SageMaker with these MCQ questions and answers. This set focuses on data preparation and management, covering data import and processing, feature engineering, and data security with access control. These questions are perfect for mastering SageMaker’s role in machine learning workflows and ensuring data integrity.


MCQs

Data Import and Processing

  1. What is the primary use of Amazon SageMaker Data Wrangler?
    a) Manage large-scale database queries
    b) Simplify data preparation workflows
    c) Automate machine learning model deployment
    d) Store training datasets securely
  2. Which of the following is a supported data source for SageMaker?
    a) Google Drive
    b) AWS Glue Data Catalog
    c) Microsoft OneDrive
    d) Dropbox
  3. Which type of data storage is commonly used for training in SageMaker?
    a) Amazon S3
    b) Amazon RDS
    c) AWS Lambda
    d) Amazon Aurora
  4. How can you preprocess data in SageMaker?
    a) Using predefined templates in Amazon Redshift
    b) By writing custom scripts in Jupyter Notebooks
    c) Through Elastic Beanstalk
    d) Using AWS CloudTrail
  5. What role does AWS Glue play in SageMaker data preparation?
    a) Deploying machine learning models
    b) Extracting, transforming, and loading data
    c) Monitoring SageMaker endpoints
    d) Scaling training instances automatically
  6. Which SageMaker tool can be used for automated data labeling?
    a) Ground Truth
    b) AutoPilot
    c) Data Wrangler
    d) Feature Store
  7. How is data imported into SageMaker for training?
    a) Directly from Amazon DynamoDB
    b) By uploading datasets to S3 and linking them
    c) Using AWS IAM policies
    d) Through AWS Snowball devices
  8. What is the typical file format for input data in SageMaker?
    a) .docx
    b) .xlsx
    c) .csv
    d) .exe

Feature Engineering

  1. What is the purpose of feature engineering in SageMaker?
    a) Automating model deployment
    b) Extracting meaningful information from raw data
    c) Visualizing model predictions
    d) Scaling machine learning infrastructure
  2. Which SageMaker component is used to store and retrieve machine learning features?
    a) AWS Glue Catalog
    b) SageMaker Feature Store
    c) SageMaker Data Wrangler
    d) AWS Lambda
  3. What technique is commonly used for handling missing values in datasets?
    a) Model tuning
    b) Imputation
    c) Instance scaling
    d) Data mirroring
  4. How does SageMaker ensure that feature engineering is scalable?
    a) By integrating with on-premises databases
    b) Through support for distributed processing
    c) By offering auto-scaling for RDS instances
    d) Using direct connections to Amazon CloudFront
  5. Which method helps in reducing dimensionality in datasets?
    a) Normalization
    b) Principal Component Analysis (PCA)
    c) Label encoding
    d) Hyperparameter tuning
  6. What is the primary benefit of using SageMaker Feature Store?
    a) It automates instance scaling for training jobs
    b) Enables real-time access to precomputed features
    c) It visualizes machine learning workflows
    d) Provides real-time security monitoring
  7. How can you monitor the quality of engineered features in SageMaker?
    a) Using AWS Config
    b) By integrating with Amazon CloudWatch
    c) Through SageMaker Clarify
    d) Using AWS Cost Explorer

Data Security and Access Control

  1. How does SageMaker ensure data security during training?
    a) By storing all data in public S3 buckets
    b) By encrypting data in transit and at rest
    c) Using unencrypted local storage
    d) Through predefined network policies
  2. What is a key practice for access control in SageMaker?
    a) Using AWS Identity and Access Management (IAM)
    b) Creating root user accounts
    c) Disabling logging for endpoints
    d) Sharing access keys publicly
  3. Which feature of SageMaker enables network isolation for data security?
    a) Elastic Load Balancing
    b) VPC Endpoints
    c) AWS Lambda
    d) Amazon DynamoDB
  4. How can you audit access to SageMaker resources?
    a) Using AWS CloudTrail
    b) Through SageMaker AutoPilot logs
    c) By monitoring with Amazon GuardDuty
    d) Using SageMaker Ground Truth
  5. What is the default encryption state for data stored in Amazon S3 when used with SageMaker?
    a) Data is encrypted by default
    b) Data is unencrypted by default
    c) Encryption depends on S3 bucket policies
    d) Encryption is not supported
  6. Which encryption option is available in SageMaker?
    a) Key Pair Encryption
    b) AWS Key Management Service (KMS)
    c) SSL/TLS certificates only
    d) RSA public key encryption
  7. What type of access policy is recommended for SageMaker training jobs?
    a) Broad permissions for all users
    b) Least privilege access policies
    c) No access restrictions
    d) Publicly shared IAM roles
  8. Which of the following ensures secure API calls to SageMaker?
    a) Using AWS CloudFormation templates
    b) Signing API requests with AWS Signature Version 4
    c) Enabling step functions
    d) Using unencrypted connections
  9. How can SageMaker resources be restricted to specific regions?
    a) By disabling multi-region replication
    b) Through service control policies (SCPs)
    c) Using Amazon Athena queries
    d) By enabling cross-region logging
  10. Which security mechanism prevents unauthorized access to SageMaker notebooks?
    a) Amazon Inspector
    b) Multi-Factor Authentication (MFA)
    c) AWS Trusted Advisor
    d) SageMaker Debugger

Answer Key

QnoAnswer
1b) Simplify data preparation workflows
2b) AWS Glue Data Catalog
3a) Amazon S3
4b) By writing custom scripts in Jupyter Notebooks
5b) Extracting, transforming, and loading data
6a) Ground Truth
7b) By uploading datasets to S3 and linking them
8c) .csv
9b) Extracting meaningful information from raw data
10b) SageMaker Feature Store
11b) Imputation
12b) Through support for distributed processing
13b) Principal Component Analysis (PCA)
14b) Enables real-time access to precomputed features
15c) Through SageMaker Clarify
16b) By encrypting data in transit and at rest
17a) Using AWS Identity and Access Management (IAM)
18b) VPC Endpoints
19a) Using AWS CloudTrail
20a) Data is encrypted by default
21b) AWS Key Management Service (KMS)
22b) Least privilege access policies
23b) Signing API requests with AWS Signature Version 4
24b) Through service control policies (SCPs)
25b) Multi-Factor Authentication (MFA)

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top