How should you complete the command?
DRAG DROPYou have an Apache HBase cluster in Azure HDInsight. The cluster has a table named sales that contains a
column family named customerfamily.
You need to add a new column family named customeraddr to the sales table.
How should you complete the command? To answer, drag the appropriate values to the correct targets. Each
value may be used once, more than once, or not at all. You may need to drag the split bar between panes or
scroll to view content.
NOTE: Each correct selection is worth one point.
Select and Place:
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series
contains a unique solution that might meet the stated goals. Some question sets might have more than one
correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will
not appear in the review screen.
You are building a security tracking solution in Apache Kafka to parse security logs. The security logs record an
entry each time a user attempts to access an application. Each log entry contains the IP address used to make
the attempt and the country from which the attempt originated.
You need to receive notifications when an IP address from outside of the United States is used to access the
application.
Solution: Create a consumer and a broker. Create a file import process to send messages. Run the producer.
Does this meet the goal?
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in the series
contains a unique solution that might meet the stated goals. Some question sets might have more than one
correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these questions will
not appear in the review screen.
You are building a security tracking solution in Apache Kafka to parse security logs. The security logs record an
entry each time a user attempts to access an application. Each log entry contains the IP address used to make
the attempt and the country from which the attempt originated.
You need to receive notifications when an IP address from outside of the United States is used to access the
application.
Solution: Create new topics. Create a file import process to send messages. Start the consumer and run the
producer.
Does this meet the goal?
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You are building a security tracking solution in Apache Kafka to parse security logs. The security logs record an
entry each time a user attempts to access an application. Each log entry contains the IP address used to make
the attempt and the country from which the attempt originated.
You need to receive notifications when an IP address from outside of the United States is used to access the
application.
Solution: Create two new consumers. Create a file import process to send messages. Start the producer.
Does this meet the goal?
Does this meet the goal?
Note: This question is part of a series of questions that present the same scenario. Each question in
the series contains a unique solution that might meet the stated goals. Some question sets might have
more than one correct solution, while others might not have a correct solution.
After you answer a question in this sections, you will NOT be able to return to it. As a result, these
questions will not appear in the review screen.
You are building a security tracking solution in Apache Kafka to parse security logs. The security logs record an
entry each time a user attempts to access an application. Each log entry contains the IP address used to make
the attempt and the country from which the attempt originated.
You need to receive notifications when an IP address from outside of the United States is used to access the
application.
Solution: Create two new brokers. Create a file import process to send messages. Run the producer.
Does this meet the goal?