최신 CCAH CCA-410 무료샘플문제:
1. You has a cluster running with the Fail Scheduler enabled. There are currently no jobs running on the cluster you submit a job A, so that only job A is running on the cluster. A while later, you submit job B.
Now job A and Job B are running on the cluster al the same time. How will the Fair' Scheduler handle these two Jobs?
A) When job A gets submitted, it consumes all the task slot
B) When job B gets submitted, it will get assigned tasks, while job A continues to run with fewer tasks.
C) When job A gets submitted, it doesn't consume all the task slot
D) When job B gets submitted, Job A has to finish first, before job it can get scheduled.
2. The most important consideration for slave nodes in a Hadoop cluster running production jobs that require short turnaround times is:
A) The ratio between the number of processor cores and number of disk drives.
B) The ratio between the number of processor cores and total storage capacity.
C) The ratio between the amount of memory and the total storage capacity.
D) The ratio between the number of processor cores and the amount of memory.
E) The ratio between the amount of memory and the number of disk drives.
3. Identity four pieces of cluster information that are stored on disk on the NameNode?
A) An edit log of changes that have been made since the last snapshot compaction by the Secondary NameNode.
B) The status of the heartbeats of each DataNode.
C) The directory structure of the files in HDFS.
D) A catalog of DataNodes and the blocks that are stored on them.
E) File permissions of the files in HDFS.
F) Names of the files in HDFS.
G) An edit log of changes that have been made since the last snapshot of the NameNode.
4. Which command does Hadoop offer to discover missing or corrupt HDFS data?
A) The map-only checksum utility,
B) Hadoop does not provide any tools to discover missing or corrupt data; there is no need because three replicas are kept for each data block.
C) Du
D) Dskchk
E) Fsck
5. What does CDH packaging do on install to facilitate Kerberos security setup?
A) Creates directories for temp, hdfs, and mapreduce with correct permissions.
B) Creates a set of pre-configured Kerberos keytab files and their permissions.
C) Automatically configure permissions for log files at $MAPPED_LOG_DIR/userlogs
D) Creates and configures you kdc with default cluster values.
E) Creates users for hdfs and mapreduce to facilitate role assignment.
질문과 대답:
질문 # 1 정답: B | 질문 # 2 정답: A | 질문 # 3 정답: A,C,E,F | 질문 # 4 정답: E | 질문 # 5 정답: E |