Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! DVA-C01 has been withdrawn. The new exam code is DVA-C02

DVA-C01 Practice Exam Questions with Answers AWS Certified Developer Associate Exam Certification

Question # 6

A developer added a new feature to an application running on an Amazon EC2 instance that uses Amazon SQS After deployment, the developer noticed a significant increase in Amazon SQS costs. When monitoring the Amazon SQS metrics on Amazon CloudWatch. the developer found that on average one message per minute is posted on this queue.

What can be done to reduce Amazon SQS costs for this application?

A.

Increase the Amazon SQS queue polling timeout

B.

Scale down the Amazon SQS queue to the appropriate size for low traffic demand.

C.

Configure push delivery via Amazon SNS instead of polling the Amazon SQS queue

D.

Use an Amazon SQS first-in, first-out (FIFO) queue instead of a standard queue.

Full Access
Question # 7

An application is running on a cluster of Amazon EC2 instance. While trying to read objects stored within a single Amazon S3 bucket that are encrypted with server-side encryption with AWS KMS managed keys (SSE-KMS), the application receives the following error:

Service : AWSKMS: Status Code: 400: Code : ThrottlingException

Which combination of steps should be taken to prevent this failure? (Select TWO.)

A.

Contact AWS Support to request an AWS KMS rate limit increase.

B.

Perform error retries with exponential backoff in the application code.

C.

Contact AWS Support to request a S3 rate limit increase.

D.

Import a customer master key (CMK) with a larger key size.

E.

Use more than one customer master key (CMK) to encrypt S3 data

Full Access
Question # 8

A company is adding stored value for gift card) capability to its highly popular casual gaming website. Users need to be able to trade this value for other users' items on the platform. This would require both users' records be updated as a single transaction, or both users' records to be completely rolled back.

Which AWS database options can provide the transactional capability required for this new feature? (Select TWO )

A.

Amazon DynamoDB with operations made with the ConsistentRead parameter set to true

B.

Amazon ElastiCache for Memcached with operations made within a transaction block

C.

Amazon Aurora MySQL with operations made within a transaction block

D.

Amazon DynamoDB with reads and writes made using Transact" operations

E.

Amazon Redshift with operations made within a transaction block

Full Access
Question # 9

A developer needs to create an application that supports Security Assertion Markup Language (SAML) and Facebook authentication It must also allow access to AWS services, such as Amazon DynamoDB.

Which AWS service or feature will meet these requirements with the LEAST amount of additional coding?

A.

AWSAppSync

B.

Amazon Cognito identity pools

C.

Amazon Cognito user pools

D.

Amazon Lambda@Edge

Full Access
Question # 10

An organization is using Amazon CloudFront to ensure that its users experience low-latency access to its web application. The organization has identified a need to encrypt all traffic between users and CloudFront, and all traffic between CloudFront and the web application.

How can these requirements be met? (Choose two.)

A.

Use AWS KMS to encrypt traffic between CloudFront and the web application.

B.

Set the Origin Protocol Policy to “HTTPS Only”.

C.

Set the Origin’s HTTP Port to 443.

D.

Set the Viewer Protocol Policy to “HTTPS Only” or “Redirect HTTP to HTTPS”.

E.

Enable the CloudFront option Restrict Viewer Access.

Full Access
Question # 11

Queries to an Amazon DynamoDB table are consuming a large amount of read capacity. The table has a significant number of large attributes. The application does not need all of the attribute data.

How can DynamoDB costs be minimized while maximizing application performance?

A.

Batch all the writes, and perform the write operations when no or few reads are being performed.

B.

Create a global secondary index with a minimum set of projected attributes.

C.

Implement exponential backoffs in the application.

D.

Load balance the reads to the table using an Application Load Balancer.

Full Access
Question # 12

A front-end web application is using Amazon Cognito user pools to handle the user authentication flow. A developer is integrating Amazon DynamoDB into the application using the AWS SDK for JavaScript

How would the developer securely call the API without exposing the access or secret keys?

A.

Configure Amazon Cognito identity pools and exchange the JSON Web Token (JWT) for temporary credentials

B.

Run the web application in an Amazon EC2 instance with the instance profile configured

C.

Hardcode the credentials use Amazon S3 to host the web application, and enable server-side encryption

D.

Use Amazon Cognito user pool JSON Web Tokens (JWTs) to access the DynamoDB APIs.

Full Access
Question # 13

A global company has an application running on Amazon EC2 instances that serves image files from Amazon S3. User requests from the browser are causing high traffic, which results in degraded performance.

Which optimization solution should a Developer implement to increase application performance?

A.

Create multiple prefix in the S3 bucket to increase the request rate

B.

Create an Amazon ElastiCache cluster to cache and serve frequently accessed items.

C.

Use Amazon CloudFront to serve the content of images stored in Amazon S3.

D.

Submit a ticket to AWS support to request a rate limit increase for the S3 bucket.

Full Access
Question # 14

A company is developing a report executed by AWS Step Functions Amazon CloudWatch shows errors in the Step Functions task state machine To troubleshoot each task, the state input needs to be included along with the error message in the state output.

Which coding practice can preserve both the original input and the error for the state?

A.

Use ResultPath in a Catch statement to include the error with the original input

B.

Use inputPath in a Catch statement and set the value to null.

C.

Use ErrorEquals in a Retry statement to include the error with the original input

D.

Use OutputPath in a Retry statement and set the value to $.

Full Access
Question # 15

A company has an AWS CloudFormation template that is stored as a single file. The template is able to launch and create a full infrastructure stack.

Which best practice would increase the maintainability of the template?

A.

Use nested stacks for common template patterns.

B.

Embed credentials to prevent typos.

C.

Remove mappings to decrease the number of variables.

D.

Use AWS::Include to reference publicly-hosted template files.

Full Access
Question # 16

A gaming company is developing a mobile game application for iOS® and Android® platforms. This mobile game securely stores user data locally on the device. The company wants to allow users to use multiple device for the game, which requires user data synchronization across device.

Which service should be used to synchronize user data across devices without the need to create a backend application?

A.

AWS Lambda

B.

Amazon S3

C.

Amazon DynamoDB

D.

Amazon Cognito

Full Access
Question # 17

A company runs continuous integration/continuous delivery (CI/CD) pipeline for its application on AWS CodePipeline. A developer must write unit tests and run them as part of the pipelines before staging the artifacts for testing.

How should the Developer incorporate unit tests as part of CI/CD pipeline?

A.

Create a separate codePipline pipline to run unit tests.

B.

Update the AWS codeBuild build specification to include a phase for running unit tests.

C.

Install the AWS CodeDeploy agent on an Amazon EC2 instance to run unit tests.

D.

Create a testing branch in AWS CodeCommit to run unit tests.

Full Access
Question # 18

A company caches session information for a web application in an Amazon DynamoDB table. The company wants an automated way to delete old items from the table.

What is the simplest way to do this?

A.

Write a script that deletes old records; schedule the scripts as a cron job on an Amazon EC2 instance.

B.

Add an attribute with the expiration time; enable the Time To Live feature based on that attribute.

C.

Each day, create a new table to hold session data; delete the previous day’s table.

D.

Add an attribute with the expiration time; name the attribute ItemExpiration.

Full Access
Question # 19

A company is running a Docker application on Amazon ECS. The application must scale based on user load in the last 15 seconds.

How should a Developer instrument the code so that the requirement can be met?

A.

Create a high-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 30 seconds

B.

Create a high-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 5 seconds

C.

Create a standard-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 30 seconds

D.

Create a standard-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 5 seconds

Full Access
Question # 20

A developer is designing a serverless application for an ecommerce website. An Amazon API Gateway API exposes.....

user operations. The website features shopping carts for the users. The shopping carts must be stored for extended..... the front-end application.

The load on the application will vary significantly based on the time of day and the promotional sales that are offered..... scale automatically to meet these changing demands.

Which solution will meet these requirements?

A.

Store the data objects on an Amazon RDS DB instance. Cache the data objects in memory by using Amazon ElastiCache.

B.

Store the data objects on Amazon EC2 instances behind an Application Load Balancer. Use session affinity (sticky sessions) for each user's shopping cart.

C.

Store the data objects in Amazon S3 buckets. Cache the data objects by using Amazon CloudFront with the maximum TTL.

D.

Store the data objects in Amazon DynamoDB tables. Cache the data objects by using DynamoDB Accelerator (DAX).

Full Access
Question # 21

A Developer created a new AWS account and must create a scalable AWS Lambda function that meets the following requirements for concurrent execution:

  • Average execution time of 100 seconds
  • 50 requests per second

Which step must be taken prior to deployment to prevent errors?

A.

Implement dead-letter queues to capture invocation errors

B.

Add an event source from Amazon API Gateway to the Lambda function

C.

Implement error handling within the application code

D.

Contact AWS Support to increase the concurrent execution limits

Full Access
Question # 22

A company is building an application for stock trading. The application needs sub-millisecond latency for processing trade requests. The company uses Amazon DynamoDB to store all the trading data that is used to process each trading request

A development team performs load testing on the application and finds that the data retrieval time is higher than expected. The development team needs a solution that reduces the data retrieval time with the least possible effort.

Which solution meets these requirements?

A.

Add local secondary indexes (LSIs) for the trading data

B.

Store the trading data in Amazon S3, and use S3 Transfer Acceleration.

C.

Add retries with exponential backoff for DynamoDB queries.

D.

Use DynamoDB Accelerator (DAX) to cache the trading data

Full Access
Question # 23

A company manages a financial services application that stores a large volume of data in an Amazon DynamoDB table. A developer needs to improve the performance of the DynamoDB read queries without increasing the cost.

Which solution meets these requirements?

A.

Use parallel scans

B.

Add a local secondary index (LSI).

C.

Create a DynamoDB Accelerator (DAX) cluster.

D.

Query with the Projection Expression parameter

Full Access
Question # 24

A developer runs an application that uses an Amazon API Gateway REST API. The developer needs to implement a solution to proactively monitor the health of both API responses and latencies in case a deployment causes a service disruption despite passing deployment pipeline tests. The solution also must check for endpoint vulnerability and unauthorized changes to APIs. URLs, and website content.

Which solution will meet these requirements?

A.

Use the Amazon CloudWatch Synthetics canary functionality to call the API and check the responses and duration of the request.

B.

Use a custom health check in the API that queries hosts to check the duration of the request.

C.

Implement a custom AWS Lambda function with an Amazon EventBridge event to periodically call the API and check the responses and duration of the request.

D.

Use the built-in API Gateway metrics to monitor the average duration of the API response.

Full Access
Question # 25

A development team set up a pipeline to launch a test environment. The developers want to automate tests for their application. The team created an AWS CodePipeline stage to deploy the application to a test environment in batches using AWS Elastic Beanstalk. A later CodePipeline stage contains a single action that uses AWS CodeBuild to run numerous automated Selenium-based tests on the deployed application. The team must speed up the pipeline without removing any of the individual tests.

Which set of actions will MOST effectively speed up application deployment and testing?

A.

Set up an all-at-once deployment in Elastic Beanstalk. Run tests in parallel with multiple CodeBuild actions.

B.

Set up a rolling update in Elastic Beanstalk. Run tests in serial with a single CodeBuild action.

C.

Set up an immutable update in Elastic Beanstalk. Run tests in serial with a single CodeBuild action.

D.

Set up a traffic-splitting deployment in Elastic Beanstalk. Run tests in parallel with multiple CodeBuild actions.

Full Access
Question # 26

A company requires objects that are stored in Amazon S3 to be encrypted The company is currently using server-side encryption with AWS KMS managed encryption keys (SSE-KMS) A developer needs to optimize the cost-effectiveness of the encryption mechanism without negatively affecting performance

What should the developer do to meet these requirements?

A.

Change the encryption type to customer-provided keys.

B.

Configure the SJ bucket to use an S3 Bucket Key for SSE-KMS

C.

Use S3 bucket policies to limit the principals who can create objects

D.

Use a custom policy to limit the number of AWS KMS calls that are allowed

Full Access
Question # 27

An application that is running on Amazon EC2 instances stores data in an Amazon S3 bucket. All the data must be encrypted in transit. How can a developer ensure that all traffic to the S3 bucket is encrypted?

A.

Install certificates on the EC2 instances.

B.

Create a private VPC endpoint.

C.

Configure the S3 bucket with server-side encryption with AWS KMS managed encryption keys (SSE-KMS).

D.

Create an S3 bucket policy that denies traffic when the value for the aws:SecureTransport condition key is false.

Full Access
Question # 28

A developer needs to deploy an application to AWS Elastic Beanstalk for a company. The application consists of a single Docker image. The company's automated continuous integration and continuous delivery (CI/CD) process builds the Docker image and pushes the image to a public Docker registry.

How should the developer deploy the application to Elastic Beanstalk?

A.

Create a Dockerfile. Configure Elastic Beanstalk to build the application as a Docker image.

B.

Create a docker-compose.yml file. Use the Elastic Beanstalk CLI to deploy the application.

C.

Create a .zip file that contains the Docker image. Upload the .zip file to Elastic Beanstalk.

D.

Create a Dockerfile. Run the Elastic Beanstalk CLI eb local run command in the same directory.

Full Access
Question # 29

A developer is migrating to Amazon Cognito from a custom user management solution that stores user information in a database. The developer has created a…… Amazon Cognito user pool. The developer needs to migrate the existing user information to the user pool without forcing users to change their passwords.

Which solution will meet these requirements?

A.

Import users from a .csv file.

B.

Add an OpenID Connect (OIDC) identity provider to the user pool.

C.

Import users from a .json file.

D.

Import users with a user migration AWS Lambda trigger.

Full Access
Question # 30

A company is expanding the compatibility of its photo-sharing mobile app to hundreds of additional devices with unique screen dimensions and resolutions. Ph are stored in Amazon S3 in their original format and resolution. The company uses an Amazon CloudFront distribution to serve the photos. The app includes th dimension and resolution of the display as GET parameters with every request.

A developer needs to implement a solution that optimizes the photos that are served to each device to reduce load time and increase photo quality.

Which solution will meet these requirements MOST cost-effectively?

A.

Use S3 Batch Operations to invoke an AWS Lambda function to create new variants of the photos with the required dimensions and resolutions. Cr........dynamic CloudFront origin that automatically maps the request of each device to the corresponding photo variant.

B.

Use S3 Batch Operations to invoke an AWS Lambda function to create new variants of the photos with the required dimensions and resolutions. Cre;..... Lambda@Edge function to route requests to the corresponding photo variant by using request headers.

C.

Create a Lambda@Edge function that optimizes the photos upon request and returns the photos as a response. Change the CloudFront TTL cache policy to the maximum value possible.

D.

Create a Lambda@Edge function that optimizes the photos upon request and returns the photos as a response. In the same function, store a copy to processed photos on Amazon S3 for subsequent requests.

Full Access
Question # 31

A media company wants to test its web application more frequently. The company deploys the application by using a separate AWS CloudFormation stack for each environment. The same CloudFormation template is deployed to each stack as the application progresses through the development lifecycle.

A developer needs to build an automated alert for the quality assurance (QA) team. The developer wants the alert to occur for new deployments in the final pre-production environment.

Which solution will moot these requirements?

A.

Create an Amazon Simple Notification Service (Amazon SNS) topic. Add a subscription to notify the QA team. Update the CloudFormation stack options to point to the SNS topic in the pro-production environment. Most Voted

B.

Create an AWS Lambda function that notifies the QA team. Create an Amazon EventBridge rule to invoke the Lambda function on the default event bus. Filter the events on the CloudFormation service and the CloudFormation stack Amazon Resource Name (ARM).

C.

Create an Amazon CloudWatch alarm that monitors the metrics from CloudFormation. Filter the metrics on the stack name and the stack status. Configure the alarm to notify the QA team.

D.

Create an AWS Lambda function that notifies the QA team. Configure the event source mapping to receive events from CloudFormation. Specify the filtering values to limit invocations to the desired CloudFormation stack.

Full Access
Question # 32

A company is migrating a legacy application to a serverless application on AWS. The legacy application consists of a set of web services that are exposed by a Amazon API Gateway API. A developer needs to replace the existing implementation of web services with AWS Lambda functions. The developer needs to test new version of the" API that uses the functions in production. The developer must minimize the impact of the testing on the application's users.

Which solution will meet these requirements?

A.

Create a beta stage for the new version of the API. Send the updated endpoint to the users.

B.

Create a development stage for the new version of the API. Use a canary deployment.

C.

Create a development stage for the new version of the API. Promote a canary release.

D.

Create a deployment stage. Enable mutual TLS for the new version of the API.

Full Access
Question # 33

A company has an application that runs on AWS Elastic Beanstalk in a load-balanced environment. The company needs to update the instance types in the environment to a more recent generation of instance types. The company must minimize downtime during the deployment of this configuration change.

Which deployment options will meet these requirements? (Choose two.)

A.

Disabled

B.

Rolling based on Health

C.

Immutable

D.

All at once

E.

Canary

Full Access
Question # 34

A developer notices timeouts from the AWS CLI when the developer runs list commands. What should the developer do to avoid these timeouts?

A.

Use the -page-size parameter to request a smaller number of items.

B.

Use shorthand syntax to separate the list by a single space.

C.

Use the yaml-stream output for faster viewing of large datasets.

D.

Use quotation marks around strings to enclose data structure.

Full Access
Question # 35

A company is using an AWS Lambda function to process records from an Amazon Kinesis data stream The company recently observed slow processing of the records. A developer notices that the iterator age metric for the function is Increasing and that the Lambda run duration is constantly above normal.

Which actions should the developer take to increase the processing speed? (Select TWO.)

A.

Increase the number of shards of the Kinesis data stream

B.

Decrease the timeout of the Lambda function

C.

Increase the memory that is allocated to the Lambda function.

D.

Decrease the number of shards of the Kinesis data stream

E.

Increase the timeout of the Lambda function

Full Access
Question # 36

An IAM role is attached to an Amazon EC2 instance that explicitly denies access to all Amazon S3 API actions. The EC2 instance credentials file specifies the IAM access key and secret access key, which allow full administrative access.

Given that multiple modes of IAM access are present for this EC2 instance, which of the following is correct?

A.

The EC2 instance will only be able to list the S3 buckets

B.

The EC2 instance will only be able to list the contents of one S3 bucket at a time

C.

The EC2 instance will be able to perform all actions on any S3 bucket

D.

The EC2 instance will not be able to perform any S3 action on any S3 bucket.

Full Access
Question # 37

A gaming application stores scores for players in an Amazon DynamoDB table that has four attributes user_id, user_name, user_score, and user_rank. The users are allowed to update their names only A user is authenticated by web identity federation.

Which set of conditions should be added in the policy attached to the role for the dynamodb Putltem API call?

A)

B)

DVA-C01 question answer

C)

DVA-C01 question answer

D)

DVA-C01 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 38

A developer is trying to get data from an Amazon DynamoDB table called demoman-table The developer configured the AWS CLI to use a specific 1AM user's credentials and executed the following command:

aws dynamodb get-item table-name demoman-table --key '("id": <"N''; ''1993''}} '

The command returned errors and no rows were returned

What is the MOST likely cause of these issues?

A.

The command is incorrect; it should be rewritten to use : ut-i t am with a string argument.

B.

The developer needs to log a ticket with AWS Support to enable access to the demoman-table.

C.

Amazon DynamoDB cannot be accessed from the AWS CLI and needs to be called via the REST API

D.

The 1AM user needs an associated policy with read access to demoman-table.

Full Access
Question # 39

A company is providing read access to objects in an Amazon S3 bucket for different customers The company uses 1AM permissions to restnd access to the S3 bucket The customers can access only their own files

Due to a regulation requirement the company needs to enforce encryption in transit for interactions with Amazon S3

Which solution will meet these requirements'?

A.

Add a bucket policy to the S3 bucket to deny S3 actions when the aws SecureTransport condition is equal to false

B.

Add a bucket policy to the S3 bucket to deny S3 actions when the s3 x-amz-aci condition is equal to public-read

C.

Add an IAM policy to the IAM users to enforce the usage of the AWS SDK

D.

Add an IAM policy to the IAM users that allows S3 actions when the s3 x-arnz-acl condition is equal to bucket-owner-read

Full Access
Question # 40

A developer is building a static, client-side rendered website that is powered by ReactJS The code has no server-side generated components and does not need to run any programming languages on the server However the code serves static HTML, CSS, and JavaScript to the client on each request The developer's solution to host the website must maximize performance and cost-effectiveness

Which combination of AWS services or resources should the developer use to meet these requirements?

A.

Application Load Balancer and Amazon EC2

B.

Amazon API Gateway and AWS Lambda

C.

Amazon CloudFront and Amazon S3

D.

Amazon CloudFront and AWS Elastic Beanstalk

Full Access
Question # 41

A developer is building a WebSocket API using Amazon API Gateway. The payload sent to this API is JSON that includes an action key This key can have three different values create, update, and remove The developer must integrate with different routes based on the value of the action key of the incoming JSON payload.

How can the developer accomplish this task with the LEAST amount of configuration?

A.

Deploy the WebSocket API to three stages for the respective routes create, update, and remove

B.

Create a new route key and set the name as action

C.

Set the value of the route selection expression to action

D.

Set the value of the route selection expression to $request.body action

Full Access
Question # 42

A data-processing application includes an AWS Lambda function that processes data in several steps. Recently, the function has been reaching the Lambda tii A developer wants to use AWS X-Ray to find out how long each step is taking so that the developer can determine which step is causing the timeout.

Which combination of actions should the developer take to accomplish this goal? (Select TWO.)

A.

Modify the application to call the PutMetricData API operation after each processing step. Include the time taken in milliseconds.

B.

Use the aws lambda update-function-configuration AWS CLI command to enable active tracing on the Lambda function.

C.

Modify the application to record each processing step in an X-Ray subsegment by using the X-Ray software development kit (SDK).

D.

Add the xray:PutTraceSegments permission and the xray:PutTelemetryRecords permission to the Lambda function's execution role.

E.

Modify the application to put each processing step in a separate Lambda layer. Include all the layers in the Lambda function.

Full Access
Question # 43

A developer is writing a new serverless application for a company. Several other developers must collaborate on the code for this application, and the company expects frequent changes to the code. The developer needs to deploy the code from source control to AWS Lambda with the fewest number of manual steps.

Which strategy for the build and deployment should the developer use to meet these requirements?

A.

Build the code locally, and then upload the code into the source control system. When a release is needed, run AWS CodePipeline to extract the uploaded build and deploy the resources.

B.

Use the AWS Serverless Application Model (AWS SAM) CLI to build and deploy the application from the developer's local machine with the latest version checked out locally.

C.

Use AWS CodeBuild and AWS CodePipeline to invoke builds and corresponding deployments when configured source controlled branches have pull requests merged into them

D.

Use the Lambda console to upload a .zip file of the application that is created by the AWS Serverless Application Model (AWS SAM) CLI build command.

Full Access
Question # 44

A developer is creating an AWS CloudFormation template to deploy Amazon EC2 instances across multiple AWS accounts. The developer must choose the EC2 instances from a list of approved instance types.

How can the developer incorporate the list of approved instance types in the CloudFormation template?

A.

Create a separate CloudFormation template for each EC2 instance type in the list

B.

In the Resources section of the CloudFormation template, create resources for each EC2 instance type in the list.

C.

In the CloudFormation template, create a separate parameter for each EC2 instance type in the list.

D.

In the CloudFormation template, create a parameter with the list of EC2 instance types as AllowedValues

Full Access
Question # 45

A company must encrypt sensitive data that the company will store in Amazon S3. A developer must retain total control over the company's AWS Key Management Service (AWS KMS) key and the company’s data keys. The company currently uses an on-premises hardware security module (HSM) solution. The company wants to move its key management onto AWS.

Which solution will meet these requirements?

A.

Implement server-side encryption with AWS KMS managed keys (SSE-KMS). Use AWS CloudHSM to generate the KMS key and data keys to use with AWS KMS.

B.

Implement server-side encryption with customer-provided encryption keys (SSE-C). Use AWS CloudHSM to generate the KMS key and manage the data keys that the company will use to read and write objects to Amazon S3.

C.

Implement server-side encryption with Amazon S3 managed encryption keys (SSE-S3). Use AWS CloudHSM to generate the KMS key and manage the data keys that the company will use to read and write objects to Amazon S3.

D.

Implement server-side encryption with AWS KMS managed keys (SSE-KMS). Use the AWS KMS custom key store feature to manage the data keys. Then read or write objects to Amazon S3 as normal.

Full Access
Question # 46

A developer needs to secure the static assets in a company's Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET. The company has an Amazon CtoudFront distribution that serves the S3 bucket's assets to the public. The developer has already created the origin access identity (OAI) and has associated the OAI with the distribution. The developer must write a bucket policy that allows only the CloudFront distribution to access the S3 bucket

Which policy will meet this requirement MOST securely?

A)

DVA-C01 question answer

B)

DVA-C01 question answer

C)

DVA-C01 question answer

D)

DVA-C01 question answer

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 47

A developer wants to implement authentication using Amazon Cognito user pools for an existing API in Amazon API Gateway. After creating the Amazon Cognito user pool, the developer tests the GET request to the API. Unauthenticated requests to the API return a 200 OK status response.

Which combination of additional steps are required to complete the authentication implementation? (Select TWO.)

A.

Create an Amazon Cognito authonzer in API Gateway and specify the Amazon Cognito user pool.

B.

Create an AWS Lambda authorizer in API Gateway and specify the Amazon Cognito user pool.

C.

Specify the authofizer in the GET method section of API Gateway and redeploy the API.

D.

Use Amazon Cognito user pools to make and authenticate the request to API Gateway.

E.

Create an Amazon Cognito authorizer in API Gateway and specify the Amazon Cognito identity pool.

Full Access
Question # 48

A developer is creating a web application that collects highly regulated and confidential user data through a POST request. The web application is served through Amazon CloudFront. User names and phone numbers must be encrypted at the edge and must remain encrypted throughout the entire application stack.

What is the MOST secure way to meet these requirements?

A.

Enforce Match Viewer with HTTPS Only on CloudFront.

B.

Use only the newest TLS security policy on CloudFront.

C.

Enforce a signed URL on CloudFront on the front end.

D.

Use field-level encryption on CloudFront.

Full Access
Question # 49

A developer at a company recently created a serverless application to process and show data from business reports. The application's user interface (Ul) allow users to select and start processing the files. The Ul displays a message when the result is available to view. The application uses AWS Step Functions with A Lambda functions "to process the files. The developer used Amazon API Gateway and Lambda functions to create an API to support the Ul.

The company's Ul team reports that the request to process a file is often returning timeout errors because of the size or complexity of the files. The Ul team w< API to provide an immediate response so that the Ul can display a message while the files are being processed. The backend process that is invoked by the A needs to send an email message when the report processing is complete.

What should the developer do to configure the API to meet these requirements?

A.

Change the API Gateway route to add an X-Amz-lnvocation-Type header with a static value of 'Event' in the integration request. Deploy the API Gatt stage to apply the changes.

B.

Change the configuration of the Lambda function that implements the request to process a file. Configure the maximum age of the event so that the Lambda function will run asynchronously.

C.

Change the API Gateway timeout value to match the Lambda function timeout value. Deploy the API Gateway stage to apply the changes.

D.

Change the API Gateway route to add an X-Amz-Target header with a static value of 'Async' in the integration request. Deploy the API Gateway stag apply the changes.

Full Access
Question # 50

A developer deploys an ecommerce application on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances run in an Amazon EC2 Auto Scaling group. The EC2 instances are based on an Amazon Machine Image (AMI) that uses an Amazon Elastic Block Store (Amazon EBS) root volume. After deployment, the developer notices that a third of the instances seem to be idle. These instances are not receiving requests from the load balancer. The developer verifies that all the instances are registered with the load balancer. The developer must implement a solution to allow the EC2 instances to receive requests from the load balancer.

Which action will meet this requirement?

A.

Reregister the failed instances with the ALB.

B.

Enable all Availability Zones for the ALB.

C.

Use the instance refresh feature to redeploy the EC2 Auto Scaling group.

D.

Restart the EC2 instances that are not receiving traffic.

Full Access
Question # 51

A developer is planning to use an Amazon API Gateway and AWS Lambda to provide a REST API The developer will have three distinct environments to manage development, test, and production. How should the application be deployed while minimizing the number of resources to manage?

A.

Create a separate API Gateway and separate Lambda function for each environment in the same Region

B.

Assign a Region for each environment and deploy API Gateway and Lambda to each Region

C.

Create one API Gateway with multiple stages with one Lambda function with multiple aliases.

D.

Create one API Gateway and one Lambda function, and use a REST parameter to identify tne environment.

Full Access
Question # 52

A developer is creating AWS CloudFormation templates to manage an application's deployment in Amazon Elastic Container Service (Amazon ECS) through AWS CodeDeploy. The developer wants to automatically deploy new versions of the application to a percentage of users before the new version becomes available for all users.

How should the developer manage the deployment of the new version?

A.

Modify the CloudFormation template to include a Transform section and the AWS "CodeDeploy::BlueGreen hook.

B.

Deploy the new version in a new CloudFormation stack After testing is complete, update the application's DNS records for the new stack.

C.

Run CloudFormation stack updates on the application stack to deploy new application versions when they are available.

D.

Create a nested stack for the new version. Include a Transform section and the AWS: CodeDeploy BlueGreen hook.

Full Access
Question # 53

A Developer must analyze performance issues with production-distributed applications written as AWS Lambda functions. These distributed Lambda applications invoke other components that make up the applications.

How should the Developer identify and troubleshoot the root cause of the performance issues in production?

A.

Add logging statements to the Lambda functions, then use Amazon CloudWatch to view the logs.

B.

Use AWS Cloud Trail and then examine the logs

C.

Use AWS X-Ray, then examine the segments and errors

D.

Run Amazon Inspector agents and then analyze performance

Full Access
Question # 54

A company is using Amazon API Gateway to manage its public-facing API. The CISO requires that the APIs be used by test account users only. What is the MOST secure way to restrict API access to users of this particular AWS account?

A.

Client-side SSL certificates for authentication

B.

API Gateway resource policies

C.

Cross-origin resource sharing (CORS)

D.

Usage plans

Full Access
Question # 55

A three-tier application hosted on AWS uses Amazon RDS for MYSQL as its database. A developer must ensure the database credentials are stored and accessed securely.

What is the MOST secure way for the developer to achieve this?

A.

Store the credentials in a configuration file and commit it to the GIT repository.

B.

Store the credentials in AWS Secrets Manager and enable automatic secret rotation.

C.

Store the credentials using Amazon RDS and enable automatic rotation

D.

Store the credentials in code and handle credentials rotation within the application.

Full Access
Question # 56

A Developer is migrating an on-premises application to AWS. The application currently takes user uploads and saves them to a local directory on the server. All uploads must be saved and made immediately available to all instances in an Auto scaling group.

Which approach will meet these requirements?

A.

Use Amazon EBS and configure the application AMI to use a snapshot of the same EBS instance on boot.

B.

Use Amazon S3 and rearchitect the application so all uploads are placed in S3.

C.

Use instance storage and share it between instances launched from the same Amazon machine image (AMI).

D.

Use Amazon EBS and file synchronization software to achieve eventual consistency among the auto scaling group.

Full Access
Question # 57

A developer Is designing an AWS Lambda function that create temporary files that are less than 10 MB during execution. The temporary files will be accessed and modified multiple times during execution. The developer has no need to save or retrieve these files in the future.

Where should the temporary file be stored?

A.

the /tmp directory

B.

Amazon EFS

C.

Amazon EBS

D.

Amazon S3

Full Access
Question # 58

A Developer is going to deploy an AWS Lambda function that requires significant CPU utilization. Which approach will MINIMIZE the average runtime of the function?

A.

Deploy the function into multiple AWS Regions

B.

Deploy the function into multiple Availability Zones

C.

Deploy the function using Lambda layers

D.

Deploy the function with its memory allocation set to the maximum amount

Full Access
Question # 59

To include objects defined by the AWS Serverless Application Model (SAM) in an AWS CloudFormation template, in addition to Resources, what section MUST be included in the document root?

A.

Conditions

B.

Globals

C.

Transform

D.

Properties

Full Access
Question # 60

An application writes items to an Amazon DynamoDB table. As the application scales to thousands of instances, calls to the DynamoDB API generate occasional ThrottlingException errors. The application is coded in a language incompatible with the AWS SDK.

How should the error be handled?

A.

Add exponential backoff to the application logic

B.

Use Amazon SQS as an API message bus

C.

Pass API calls through Amazon API Gateway

D.

Send the items to DynamoDB through Amazon Kinesis Data Firehose

Full Access
Question # 61

An application uses Amazon Kinesis Data Streams to ingest and process large streams of data records in real time. Amazon EC2 instances consume and process the data from the shards of the Kinesis data stream by using Amazon Kinesis Client Library (KCL). The application handles the failure scenarios and does not require standby workers. The application reports that a specific shard is receiving more data than expected. To adapt to the chnages in the rate of data flow, the “hot” shard is resharded.

Assuming that the initial number of shards in the Kinesis data stream is 4, and after resharding the number of shards increased to 6, what is the maximum number of EC2 instances that can be deployed to process data from all the shards?

A.

12

B.

6

C.

4

D.

1

Full Access
Question # 62

A developer has created an AWS Lambda function that is written in Python The Lambda function reads data from objects in Amazon S3 and writes data to an Amazon DynamoDB table

The function is successfully invoked from an S3 event notification when an object is created However, the function fails when if attempts to write to the DynamoDB table

What is the MOST likely cause of this issue?

A.

The Lambda function's concurrency limit has been exceeded

B.

The DynamoDB table requires a global secondary index (GSI) to support writes.

C.

The Lambda function does not have 1AM permissions to write to DynamoDB ID.

D.

The DynamoDB table is not running in the same Availability Zone as the Lambda function.

Full Access
Question # 63

A developer wants to insert a record into an Amazon DynamoDB table as soon as a new file is added to an Amazon S3 bucket.

Which set of steps would be necessary to achieve this?

A.

Create an event with Amazon CloudWatch Events that will monitor the S3 bucket and then insert the records into DynamoDB

B.

Configure an S3 event to invoke a Lambda function that inserts records into DynamoDB

C.

Create a Lambda function that will poll the S3 bucket and then insert the records into DynamoDB.

D.

Create a cron job that will run at a scheduled time and insert the records into DynamoDB

Full Access
Question # 64

An application running on multiple Amazon EC2 instances pulls messages ...SQS queue. A requirement for the application is that all messages must be encrypted at rest.

Developers are instructed to use methods that allow for centralized .. possible support requirements whenever possible.

Which of the following solution supports these requirements?

A.

Encrypt individual messages by using client-side encryption with customer managed keys, then write to the SQS queue.

B.

Encrypt individual messages by using SQS Extended Client and the Amazon S3 encryption client.

C.

Create an SQS queue, and encrypt the queue by using server-side encryption with AWS KMS

D.

Create an SQS queue and encrypt the queue by using client-side encryption

Full Access
Question # 65

A developer is leveraging a Border Gateway Protocol (BGP)-based AWS VPN connection to connect from on-premises to Amazon EC2 instances in the developer's account The developer is able to access an EC2 instance in subnet A, but is unable to access an EC2 instance in subnet B in the same VPC

Which logs can the developer use to verify whether the traffic is reaching subnet B?

A.

VPN logs

B.

BGP logs

C.

VPC Flow Logs

D.

AWS CloudTrail logs

Full Access
Question # 66

A developer from AnyCompany's AWS account needs access to the Example Corp AWS account AnyCompany uses an identity provider that is compatible with OpenID Connect.

What is the MOST secure way for Example Corp to allow developer access?

A.

Create a cross-account role and call the AssumeRole API operation

B.

Create a user in the Example Corp account and provide the access keys

C.

Create a user in the Example Corp account and provide the credentials

D.

Create a cross-account role and call the AssumeRoleWithWebldentity API operation

Full Access
Question # 67

A company process incoming documents from an Amazon S3 bucket. Users upload documents to an S3 bucket using a web user interface. Upon receiving files in S3, and AWS Lambda function is invoked to process the files, but the Lambda function times out intermittently.

If the Lambda function is configured with the default settings, what will happen to the S3 event when there is a timeout exception?

A.

Notification of a failed S3 event is sent as an email through Amazon SNS.

B.

The S3 event is sent to the default Deed Letter Queue.

C.

The S3 event is processed unit it is successful.

D.

The S3 event is discarded after the event is retried twice.

Full Access
Question # 68

An application runs on multiple EC2 instances behind an ELB.

Where is the session data best written so that it can be served reliably across multiple requests?

A.

Write data to Amazon ElasticCache.

B.

Write data to Amazon Elastic Block Store.

C.

Write data to Amazon EC2 instance Block Store.

D.

Write data to the root filesystem.

Full Access
Question # 69

A developer is working on an ecommerce website. The developer wants to review server logs without logging in to each of the application servers individually. The website runs on multiple Amazon EC2 instances, is written in Python, and needs to be highly available.

How can the developer update the application to meet these requirements with MINIMUM changes?

A.

Rewrite the application to be cloud native and to run on AWS Lambda where the logs can be reviewed in Amazon CloudWatch.

B.

Set up centralized logging by using Amazon Elasticsearch Service (Amazon ES), Logstash, and Kibana

C.

Scale down the application to one larger EC2 instance where only one instance is recording logs.

D.

Install the unified Amazon CloudWatch agent on the EC2 instances. Configure the agent to push the application logs to CloudWatch.

Full Access
Question # 70

A company has a multi-tiered web application on AWS. During a recent spike in traffic, one of the primary relational databases on Amazon RDS could not serve all the traffic. Some read queries for repeatedly accessed items failed, so users received error messages.

What can be done to minimize the impact on database read queries MOST efficiently during future traffic spikes?

A.

Use Amazon S3 to cache database query results.

B.

Use Amazon RDS as a custom origin for Amazon CloudFront.

C.

Use local storage and memory on Amazon EC2 instances to cache data.

D.

Use Amazon ElastiCache in front of the primary database to cache data.

Full Access
Question # 71

A Developer wants to find a list of items in a global secondary index from an Amazon DynamoDB table.

Which DynamoDB API call can the Developer use in order to consume the LEAST number of read capacity units?

A.

Scan operation using eventually-consistent reads

B.

Query operation using strongly-consistent reads

C.

Query operation using eventually-consistent reads

D.

Scan operation using strongly-consistent reads

Full Access
Question # 72

Which of the following are valid SNS delivery transports? Choose 2 answers

A.

HTTP

B.

UDP

C.

SMS

D.

DynamoDB

E.

Named Pipes

Full Access
Question # 73

A Developer is developing an application that manages financial transactions. To improve security, multi-factor authentication (MFA) will be required as part of the login protocol.

What services can the Developer use to meet these requirements?

A.

Amazon DynamoDB to store MFA session data, and Amazon SNS to send MFA codes

B.

Amazon Cognito with MFA

C.

AWS Directory Service

D.

AWS IAM with MFA enabled

Full Access
Question # 74

A company wants to implement a continuous integration for its workloads on AWS. The company wants to trigger unit test in its pipeline for commits-on its code repository, and wants to be notified of failure events in the pipeline.

How can these requirements be met?

A.

Store the source code in AWS CodeCommit. Create a CodePipeline to automate unit testing. Use Amazon SNS to trigger notifications of failure events.

B.

Store the source code in GitHub. Create a CodePipeline to automate unit testing. Use Amazon SES to

trigger notifications of failure events.

C.

Store the source code on GitHub. Create a CodePipeline to automate unit testing. Use Amazon

CloudWatch to trigger notifications of failure events.

D.

Store the source code in AWS CodeCommit. Create a CodePipeline to automate unit testing. Use Amazon

CloudWatch to trigger notification of failure events.

Full Access
Question # 75

A company needs to encrypt data at rest, but it wants to leverage an AWS managed service using its own master key.

Which of the following AWS service can be used to meet these requirements?

A.

SSE with Amazon S3

B.

SSE with AWS KMS

C.

Client-side encryption

D.

AWS IAM roles and policies

Full Access
Question # 76

If an application is storing hourly log files from thousands of instances from a high traffic web site, which naming scheme would give optimal performance on S3?

A.

Sequential

B.

instanceID_log-HH-DD-MM-YYYY

C.

instanceID_log-YYYY-MM-DD-HH

D.

HH-DD-MM-YYYY-log_instanceID

E.

YYYY-MM-DD-HH-log_instanceID

Full Access
Question # 77

A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available.

Which of the following could create this situation? (Select two.)

A.

The traces are reaching X-Ray, but the Developer does not have access to view the records.

B.

The X-Ray daemon is not installed on the EC2 instance.

C.

The X-Ray endpoint specified in the application configuration is incorrect.

D.

The instance role does not have “xray:BatchGetTraces” and “xray:GetTraceGraph” permissions.

E.

The instance role does not have “xray:PutTraceSegments” and “xray:PutTelemetryRecords” permissions.

Full Access
Question # 78

An application running on Amazon EC2 instances must access objects within an Amaon S3 busket that are encrypted using server-side encryption using AWS KMS encryption keys (SSE-KMS). The application must have access to the customer master key (CMK) to decrypt the objects.

Which combination of steps will grant the application access? (Select TWO.)

A.

Write an S3 bucket policy that grants the bucket access to the key.

B.

Grant access to the key in the IAM EC2 role attached to the application’s EC2 instances.

C.

Write a key policy that enables IAM policies to grant access to the key.

D.

Grant access to the key in the S3 bucket’s ACL

E.

Create a Systems Manager parameter that exposes the KMS key to the EC2 instances.

Full Access
Question # 79

A Developer is designing a fault-tolerant environment where client sessions will be saved.

How can the Developer ensure that no sessions are lost if an Amazon EC2 instance fails?

A.

Use sticky sessions with an Elastic Load Balancer target group.

B.

Use Amazon SQS to save session data.

C.

Use Amazon DynamoDB to perform scalable session hadling.

D.

Use Elastic Load Balancer connection draining to stop sending requests to failing instances.

Full Access
Question # 80

Amazon S3 has the following structure: S3://BUCKET/FOLDERNAME/FILENAME.zip

Which S3 best practice would optimize performance with thousands of PUT request each second to a single bucket?

A.

Prefix folder names with user id; for example, s3://BUCKET/2013-FOLDERNAME/FILENAME.zip

B.

Prefix file names with timestamps; for example, s3://BUCKET/FOLDERNAME/2013-26-05-15-00-00- FILENAME.zip

C.

Prefix file names with random hex hashes; for example, s3://BUCKET/FOLDERNAME/23a6- FILENAME.zip

D.

Prefix folder names with random hex hashes; for example, s3://BUCKET/23a6-FOLDERNAME/

FILENAME.zip

Full Access
Question # 81

Given the source code for an AWS Lambda function in the local store.py containing a handler function called get_store and the following AWS CloudFormation template:

DVA-C01 question answer

What should be done to prepare the template so that it can be deployed using the AWS CLI command aws

cloudformation deploy?

A.

Use aws cloudformation compile to base64 encode and embed the source file into a modified

CloudFormation template.

B.

Use aws cloudformation package to upload the source code to an Amazon S3 bucket and produce a

modified CloudFormation template.

C.

Use aws lambda zip to package the source file together with the CloudFormation template and deploy

the resulting zip archive.

D.

Use aws serverless create-package to embed the source file directly into the existing

CloudFormation template.

Full Access
Question # 82

Company C has recently launched an online commerce site for bicycles on AWS. They have a "Product" DynamoDB table that stores details for each bicycle, such as, manufacturer, color, price, quantity and size to display in the online store. Due to customer demand, they want to include an image for each bicycle along with the existing details.

Which approach below provides the least impact to provisioned throughput on the "Product" table?

A.

Serialize the image and store it in multiple DynamoDB tables

B.

Create an "Images" DynamoDB table to store the Image with a foreign key constraint to the "Product” table

C.

Add an image data type to the "Product" table to store the images in binary format

D.

Store the images in Amazon S3 and add an S3 URL pointer to the "Product" table item for each image

Full Access
Question # 83

An application has hundreds of users. Each user may use multiple devices to access the application. The Developer wants to assign unique identifiers to these users regardless of the device they use.

Which of the following methods should be used to obtain unique identifiers?

A.

Create a user table in Amazon DynamoDB as key-value pairs of users and their devices. Use these keys as unique identifiers.

B.

Use IAM-generated access key IDs for the users as the unique identifier, but do not store secret keys.

C.

Implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.

D.

Assign IAM users and roles to the users. Use the unique IAM resource ID as the unique identifier.

Full Access
Question # 84

What AWS products and features can be deployed by Elastic Beanstalk? Choose 3 answers

A.

Auto scaling groups

B.

Route 53 hosted zones

C.

Elastic Load Balancers

D.

RDS Instances

E.

Elastic IP addresses

F.

SQS Queues

Full Access
Question # 85

Which of the following is chosen as the default region when making an API call with an AWS SDK?

A.

ap-northeast-1

B.

us-west-2

C.

us-east-1

D.

eu-west-1

E.

us-central-1

Full Access
Question # 86

A Developer is asked to implement a caching layer in front of Amazon RDS. Cached content is expensive to regenerate in case of service failure. Which implementation below would work while maintaining maximum uptime?

A.

Implement Amazon ElastiCache Redis in Cluster Mode

B.

Install Redis on an Amazon EC2 instance.

C.

Implement Amazon ElastiCache Memcached.

D.

Migrate the database to Amazon Redshift.

Full Access
Question # 87

Which of the following services are included at no additional cost with the use of the AWS platform? Choose 2 answers

A.

Simple Storage Service

B.

Elastic Compute Cloud

C.

Auto Scaling

D.

Elastic Load Balancing

E.

CloudFormation

F.

Simple Workflow Service

Full Access
Question # 88

Company B provides an online image recognition service and utilizes SQS to decouple system components for scalability The SQS consumers poll the imaging queue as often as possible to keep end-to-end throughput as high as possible. However, Company B is realizing that polling in tight loops is burning CPU cycles and increasing costs with empty responses.

How can Company B reduce the number of empty responses?

A.

Set the imaging queue visibility Timeout attribute to 20 seconds

B.

Set the Imaging queue ReceiveMessageWaitTimeSeconds attribute to 20 seconds

C.

Set the imaging queue MessageRetentionPeriod attribute to 20 seconds

D.

Set the DelaySeconds parameter of a message to 20 seconds

Full Access
Question # 89

You have written an application that uses the Elastic Load Balancing service to spread traffic to several web servers. Your users complain that they are sometimes forced to login again in the middle of using your application, after they have already logged in. This is not behavior you have designed.

What is a possible solution to prevent this happening?

A.

Use instance memory to save session state.

B.

Use instance storage to save session state.

C.

Use EBS to save session state

D.

Use ElastiCache to save session state.

E.

Use Glacier to save session slate.

Full Access
Question # 90

A Developer is writing an imaging micro service on AWS Lambda. The service is dependent on several libraries that are not available in the Lambda runtime environment.

Which strategy should the Developer follow to create the Lambda deployment package?

A.

Create a ZIP file with the source code and all dependent libraries.

B.

Create a ZIP file with the source code and a script that installs the dependent libraries at runtime.

C.

Create a ZIP file with the source code. Stage the dependent libraries on an Amazon S3 bucket indicated by the Lambda environment variable LD_LIBRARY_PATH

D.

Create a ZIP file with the source code and a buildspec.yaml file that installs the dependent libraries on AWS Lambda.

Full Access
Question # 91

A company maintains an application responsible for processing several thousand external callbacks each day. The company’s System administrators want to know how many callbacks are being received on a rolling basis, and they want this data available for 10 days. The company also wants the ability to issue automated alerts if the number of callbacks exceeds the defined thresholds.

What is the MOST cost-effective way to address the need to track and alert on these statistics?

A.

Push callback data to an Amazon RDS database that can be queried to show historical data and to alert on exceeded thresholds.

B.

Push callback data to AWS X-Ray and use AWS Lambda to query, display, and alert on exceeded thresholds.

C.

Push callback data to Amazon Kinesis Data Streams and invoke an AWS Lambda function that stores data in Amazon DynamoDB and sends the required alerts.

D.

Push callback data to Amazon CloudWatch as a custom metric and use the CloudWatch alerting mechanisms to alert System Administrators.

Full Access