Valentine Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

DVA-C01 Sample Questions Answers

Questions 4

A developer has written an Amazon kinesis Data streams application. As usage grows and traffic over time, the application is regularly receiving provisionedThroughputExceededException error messages.

Which steps should the Developer take to resolve the error? (Select Two.)

Options:

A.

Use Auto scaling to scale the stream for better performance.

B.

Increase the delay between the GetRecords call and the PutRecords call.

C.

Increase the number of shards in the data stream.

D.

Specify a shard iterator using the shardlterator parameter.

E.

Implement exponential backoff on the GetRecords call and the PutRecords call.

Buy Now
Questions 5

An AWS Lambda function must access an external site by using a regularly rotated user name and password. These items must be kept securely and cannot be stored in the function code.

What combination of AWS services can be used to accomplish this? (Choose two.)

Options:

A.

AWS Certificate Manager (ACM)

B.

AWS Systems Manager Parameter Store

C.

AWS Trusted Advisor

D.

AWS KMS

E.

Amazon GuardDuty

Buy Now
Questions 6

While developing an application that runs on Amazon EC2 in an Amazon VPC, a Developer identifies the need for centralized storage of application-level logs.

Which AWS service can be used to securely store these logs?

Options:

A.

Amazon EC2 VPC Flow Logs

B.

Amazon CloudWatch Logs

C.

Amazon CloudSearch

D.

AWS CloudTrail

Buy Now
Questions 7

A software engineer developed an AWS Lambda function in Node.js to do some CPU-intensive data processing. With the default settings, the Lambda function takes about 5 minutes to complete.

Which approach should a developer take to increase the speed of completion''

Options:

A.

Instead of using Node js. rewrite the Lambda function using Python

B.

Instead of packaging the libraries in the ZIP file with the function move them to a Lambda layer and use the layer with the function.

C.

Allocate the maximum available CPU units lo the function

D.

Increase the available memory to the function.

Buy Now
Questions 8

A developer is migrating code to an AWS Lambda function that will access an Amazon Aurora MySQL database.

What is the MOST secure way to authenticate the function to the database?

Options:

A.

Store the database credentials as encrypted parameters in AWS Systems Manager Parameter Store Obtain the credentials from Systems Manager when the Lambda function needs to connect to the database

B.

Store the database credentials in AWS Secrets Manager Let Secrets Manager handle the rotation of the credentials, as required

C.

Store the database credentials in an Amazon S3 bucket that has a restrictive bucket policy for the Lambda role only when accessing the credentials Use AWS KMS to encrypt the data

D.

Create a policy with rds-db connect access to the database and attach it to the role assigned to the Lambda function

Buy Now
Questions 9

A company is creating a REST service using an Amazon API Gateway with AWS Lambda integration. The service must run different versions for testing purposes.

What would be the BEST way to accomplish this?

Options:

A.

Use an X-Version header to denote which version is being called and pass that header to the Lambda function(s)

B.

Create an API Gateway Lambda authorizer to route API clients to the correct API version

C.

Create an API Gateway resource policy to isolate versions and provide context to the Lambda function(s)

D.

Deploy the API versions as unique stages with unique endpoints and use stage variables to provide further context

Buy Now
Questions 10

A development team is creating a new application designed to run on AWS. While the test and production environments will run on Amazon EC2 instances, developers will each run their own environment on their laptops.

Which of the following is the simplest and MOST secure way to access AWS services from the local development machines?

Options:

A.

Use an IAM role to assume a role and execute API calls using the role.

B.

Create an IAM user to be shared with the entire development team, provide the development team with the access key.

C.

Create an IAM user for each developer on the team: provide each developer with a unique access key

D.

Set up a federation through an Amazon Cognito user pool.

Buy Now
Questions 11

An advertising company has a dynamic website with heavy traffic. The company wants to migrate the website infrastructure to AWS to handle everything except website development.

Which solution BEST meets these requirements?

Options:

A.

Use AWS VM Import to migrate a web server image to AWS Launch the image on a compute-optimized Amazon EC2 instanceLaunch.

B.

Launch multiple Amazon Lighsall instance behind a load balancer. Set up the website on those instances.

C.

Deploy the website code in an AWS Elastic Beanstalk environment. Use Auto Scaling to scale the numbers of instance

D.

Use Amazon S3 to host the website. Use Amazon CloudFornt to deliver the content at scale.

Buy Now
Questions 12

An application is running on a cluster of Amazon EC2 instance. While trying to read objects stored within a single Amazon S3 bucket that are encrypted with server-side encryption with AWS KMS managed keys (SSE-KMS), the application receives the following error:

Service : AWSKMS: Status Code: 400: Code : ThrottlingException

Which combination of steps should be taken to prevent this failure? (Select TWO.)

Options:

A.

Contact AWS Support to request an AWS KMS rate limit increase.

B.

Perform error retries with exponential backoff in the application code.

C.

Contact AWS Support to request a S3 rate limit increase.

D.

Import a customer master key (CMK) with a larger key size.

E.

Use more than one customer master key (CMK) to encrypt S3 data

Buy Now
Questions 13

A Developer is storing sensitive documents in Amazon S3 that will require encryption at rest. The encryption keys must be rotated annually, at least.

What is the easiest way to achieve this?

Options:

A.

Encrypt the data before sending it to Amazon S3

B.

Import a custom key into AWS KMS with annual rotation enabled

C.

Use AWS KMS with automatic key rotation

D.

Export a key from AWS KMS to encrypt the data

Buy Now
Questions 14

A developer is writing an AWS Lambda function. The Lambda function needs to access items that are stored in an Amazon DynamoDB table.

What is the MOST secure way to configure this access for the Lambda function?

Options:

A.

Create an IAM user that has permissions to access the DynamoDB table. Create an access key for this user. Store the access key ID and secret...... key in the Lambda function environment variables.

B.

Add a resource-based policy to the DynamoDB table to allow access from the Lambda function's IAM role.

C.

Create an IAM policy that allows access to the DynamoDB table. Attach this policy to the Lambda function's 1AM role.

D.

Create a DynamoDB Accelerator (DAX) cluster. Configure the Lambda function to use the DAX cluster to access the DynamoDB table.

Buy Now
Questions 15

A developer is designing a serverless application that customers use to select seats for a concert venue. Customers send the ticket requests to an Amazon API Gateway API with an AWS Lambda function that acknowledges the order and generates an order ID. The application includes two additional Lambda functions: one for inventory management and one for payment processing. These two Lambda functions run in parallel and write the order to an Amazon Dynamo DB table.

The application must provide seats to customers according to the following requirements. If a seat is accidently sold more than once, the first order that the application received must get the seat. In these cases, the application must process the payment for only the first order. However, if the first order is rejected during payment processing, the second order must get the seat. In these cases, the application must process the payment for the second order.

Which solution will meet these requirements?

Options:

A.

Send the order ID to an Amazon Simple Notification Service (Amazon SNS) FIFO topic that fans out to one Amazon Simple Queue Service (Amazon SQS) FIFO queue for inventory management and another SQS FIFO queue for payment processing.

B.

Change the Lambda function that generates the order ID to initiate the Lambda function for inventory management. Then initiate the Lambda function for payment processing.

C.

Send the order ID to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the Lambda functions for inventory management and payment processing to the topic.

D.

Deliver the order ID to an Amazon Simple Queue Service (Amazon SQS) queue. Configure the Lambda functions for inventory management and payment processing to poll the queue.

Buy Now
Questions 16

A developer deploys an ecommerce application on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances run in an Amazon EC2 Auto Scaling group. The EC2 instances are based on an Amazon Machine Image (AMI) that uses an Amazon Elastic Block Store (Amazon EBS) root volume. After deployment, the developer notices that a third of the instances seem to be idle. These instances are not receiving requests from the load balancer. The developer verifies that all the instances are registered with the load balancer. The developer must implement a solution to allow the EC2 instances to receive requests from the load balancer.

Which action will meet this requirement?

Options:

A.

Reregister the failed instances with the ALB.

B.

Enable all Availability Zones for the ALB.

C.

Use the instance refresh feature to redeploy the EC2 Auto Scaling group.

D.

Restart the EC2 instances that are not receiving traffic.

Questions 17

A company is running an application on AWS Elastic Beanstalk in a single-instance environment. The company's deployments must avoid any downtime. Which deployment option will meet these requirements?

Options:

A.

All at once

B.

Rolling

C.

Rolling with additional batch

D.

Immutable

Buy Now
Questions 18

Which solution will meet these requirements?

Options:

A.

Build the container from the amazon/aws-xray-daemon base image. Use the AWS X-Ray SDK to instrument the application.

B.

Install the Amazon CloudWatch agent on the container image. Use the CloudWatch SDK to publish custom metrics from each of the microservices.

C.

Install the AWS X-Ray daemon on each of the ECS instances.

D.

Configure AWS CloudTrail data events to capture the traffic between the microservices.

Buy Now
Questions 19

A developer deployed an application to an Amazon EC2 instance. The application needs to know the public IPv4 address of the instance. How can the application find this information?

Options:

A.

Query the instance metadata from http://169.254.169.254/latest/meta-data/.

B.

Query the instance user data from http://169 254.169.254/latest/user-data/.

C.

Query the Amazon Machine Image (AMI) information from http://169 254.169.254/latesl/meta-data/ami/.

D.

Check the hosts file of the operating system.

Buy Now
Questions 20

A company is using Amazon Cognito user pools for sign-up and login functionality for a web application. The company is using Amazon RDS for the application's data persistence and is using Amazon API Gateway and AWS Lambda for the application's API functionality. Users must provide their first name, last name, email address, and phone number to sign up. All API endpoints have a Cognito user pool authorizer to guard against unauthenticated requests.

A developer wants to show a personalized welcome screen to users after they log in. The welcome screen needs to show the user's first name and the user's previous login date. According to company policy. developers who work on the web application cannot store any personally identifiable information in RDS instances.

Which solution should the developer implement to meet these requirements?

Options:

A.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the identity token in the Authorization header of the request. Extract the user name from the given_name claim and the user's universally unique identifier (UUID) from the sub claim inside the identity token. Use the UUID as the key to store and retrieve the previous login information from the database.

B.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the access token in the Authorization header of the request. Extract the user name from the given_name claim and the user's universally unique identifier (UUID) from the sub claim inside the access token. Use the UUID as the key to store and retrieve the previous login information from the database.

C.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the identity token in the Authorization header of the request. Extract the user name from the given_name claim and the user's universally unique identifier (UUID) from the iss claim inside the identity token. Use the UUID as the key to store and retrieve the previous login information from the database.

D.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the access token in the Authorization header of the request. Extract the user name from the given name claim and the user's universally unique identifier (UUID) from the iss claim inside the access token. Use the UUID as the key to store and retrieve the previous login information from the database.

Buy Now
Questions 21

A developer is working on an application that is deployed on an Amazon EC2 instance. The application needs to transfer a file to an Amazon S3 bucket. What should the developer do to authenticate the application's access to the S3 bucket in the MOST secure way?

Options:

A.

Create an access key for an IAM user. Store the access key in the application's environment variables.

B.

Create an IAM role. Create an access key for the role. Store the access key in the application's environment variables.

C.

Associate an IAM role with the EC2 instance. Use the instance metadata service to retrieve the credentials.

D.

Configure a bucket policy for the S3 bucket. Allow access from the EC2 instance ID in the bucket policy.

Buy Now
Questions 22

A developer is running an application on an Amazon EC2 instance. When the application tries to read an Amazon S3 bucket, the application fails. The developer notices that the associated IAM role is missing the S3 read permission. The developer needs to give the application the ability to read the S3 bucket.

Which solution will meet this requirement with the LEAST application disruption?

Options:

A.

Add the permission to the role. Terminate the existing EC2 instance. Launch a new EC2 instance.

B.

Add the permission to the role so that the change will take effect automatically.

C.

Add the permission to the role. Hibernate and restart the existing EC2 instance.

D.

Add the permission to the S3 bucket. Restart the EC2 instance.

Buy Now
Questions 23

A company uses AWS CloudFormation to deploy an application that uses an Amazon API Gateway REST API with AWS Lambda function integration. The application uses Amazon DynamoDB for data persistence. The application has three stages, development, testing, and production. Each stage uses its own DynamoDB table.

The company has encountered unexpected issues when promoting changes to the production stage. The changes were successful in the development and testing stages. A developer needs to route 20% of the traffic to the new production stage API with the next production release. The developer needs to route the remaining 80% of the traffic to the existing production stage. The solution must minimize the number of errors that any single customer experiences.

Which approach should the developer take to meet these requirements?

Options:

A.

Update 20% of the planned changes to the production stage. Deploy the new production stage. Monitor the results. Repeat this process five times to test all planned changes

B.

Update the Amazon Route 53 DNS record entry for the production stage API to use a weighted routing policy Set the weight to a value of 80. Add a second record for the production domain name Change the second routing policy to a weighted routing policy. Set the weight of the second policy to a value of 20. Change the alias of the second policy to use the testing stage API.

C.

Deploy an Application Load Balancer (ALB) in front of the REST API Change the production API Amazon Route 53 record to point traffic to the ALB Register the production and testing stages as targets of the ALB with weights of 80% and 20%. respectively.

D.

Configure canary settings for the production stage API. Change the percentage of traffic directed to canary deployment to 20%. Make the planned updates to the production stage Deploy the changes.

Buy Now
Questions 24

A developer is building varKHJS microservices for an application that will run on Amazon EC2 instances. The developer needs to monitor the end-to-end view of the requests between the microservices and debug any issues in the various microservices.

What should the developer do to accomplish these tasks?

Options:

A.

Use Amazon CloudWatch to aggregate the microservices' logs and metrics, and build the monitoring dashboard

B.

Use AWS CloudTrail to aggregate the microservices' logs and metrics, and build the monitoring dashboard

C.

Use the AWS X-Ray SDK to add instrumentation in all the microsen/ices, and monitor using the X-Ray service map.

D.

Use AWS Health to monitor the health of all the microservices

Questions 25

An open-source map application gathers data from several geolocation APIs. The application's source code repository is public and can be used by anyone, but the geolocation APIs must not be directly accessible.

A developer must implement a solution to prevent the credentials that are used to access the APIs from becoming public. The solution also must ensure that the application still functions properly.

Which solution will meet these requirements MOST cost-effectively?

Options:

A.

Store the credentials in AWS Secrets Manager. Retrieve the credentials by using the GetSecretValue API operation.

B.

Store the credentials in AWS Key Management Service (AWS KMS). Retrieve the credentials by using the GetPublicKey API operation.

C.

Store the credentials in AWS Security Token Service (AWS STS). Retrieve the credentials by using the GetCallerldentity API operation.

D.

Store the credentials in AWS Systems Manager Parameter Store. Retrieve the credentials by using the GetParameter API operation.

Buy Now
Questions 26

A developer is writing an application that will run on Amazon EC2 instances in an Auto Scaling group. The developer wants to externalize the session state to support the application. Miich AWS services or resources can the developer use to meet these requirements? (Select TWO.)

Options:

A.

Amazon DynamoDB

B.

Amazon Cognito

C.

Amazon ElastiCache

D.

Application Load Balancer

E.

Amazon Simple Queue Service (Amazon SQS)

Buy Now
Questions 27

A company has an application that provides blog hosting services to its customers. The application includes an Amazon DynamoDB table with a primary key The primary key consists of the customers' UserName as a partition key and the NumberOIBIogs as a sort key. The application stores the TotalReactionsOnBlogs as an attribute on the same DynamoDB table.

A developer needs to implement an operation to retrieve the top 10 customers based on the greatest number of reactions on their blogs This operation must not consume the DynamoDB table's existing read capacity.

What should the developer do to meet these requirements in the MOST operationally efficient manner?

Options:

A.

For the existing DynamoDB table, create a new global secondary index (GSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key.

B.

For the existing DynamoDB table, create a new local secondary index (LSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key

C.

Back up and restore the DynamoDB table to a new DynamoDB table Create a new global secondary index (GSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key Delete the old DynamoDB table

D.

Back up and restore the DynamoDB table to a new DynamoDB table. Create a new local secondary index (LSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key. Delete the old DynamoDB table.

Buy Now
Questions 28

A developer is writing a web application that allows users to sign in. The application will run on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances will run in an Auto Scaling group across multiple Availability Zones.

How can the developer ensure that users stay signed in when the Auto Scaling group is scaled down?

Options:

A.

Enable sticky sessions on the ALB target group.

B.

Create an Amazon DynamoDB table. Configure the application to use the DynamoDB table to store session state such as login status.

C.

Create an Amazon Elastic Block Store (Amazon EBS) volume. Use EBS Multi-Attach to attach the volume to all instances in the Auto Scaling group. Configure the application to use the volume to store session state such as login status.

D.

Enable deregistration delay on the ALB target group.

Buy Now
Questions 29

A business intelligence application runs on Amazon Elastic Container Service (Amazon ECS) on AWS Fargate. Application-level audits require a searchable log of all API calls from users to the application. The application’s developers must store the logs centrally on AWS.

Which solution will meet these requirements?

Options:

A.

Install the Amazon CloudWatch agent on the Amazon EC2 host that runs Fargate.

B.

Configure the awslogs log driver in the ECS task definition.

C.

Configure AWS CloudTrail for the ECS containers.

D.

Install the ECS logs collector on the ECS hosts.

Buy Now
Questions 30

A distributed application includes an AWS Lambda function that runs successfully in the DEV environment with 128 MB of memory assigned. The same function is failing in the TEST environment. The developer is monitoring the application using AWS X-Ray, but the Lambda function cannot be seen on the X-Ray service graph. The Lambda execution role has AWS X-Ray permissions

What is the MOST LIKELY cause for AWS X-Ray not showing any data for the Lambda function?

Options:

A.

The AWS SDK needs to be included in the AWS Lambda deployment package.

B.

VPC Flow Logs are not enabled for the application VPC.

C.

Active tracing needs to be enabled for the Lambda function

D.

The memory needs to be increased to 2 GB for the TEST environments.

Buy Now
Questions 31

A developer needs to secure the static assets in a company's Amazon S3 bucket that is named DOC-EXAMPLE-BUCKET. The company has an Amazon CtoudFront distribution that serves the S3 bucket's assets to the public. The developer has already created the origin access identity (OAI) and has associated the OAI with the distribution. The developer must write a bucket policy that allows only the CloudFront distribution to access the S3 bucket

Which policy will meet this requirement MOST securely?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 32

A development team set up a pipeline to launch a test environment. The developers want to automate tests for their application. The team created an AWS CodePipeline stage to deploy the application to a test environment in batches using AWS Elastic Beanstalk. A later CodePipeline stage contains a single action that uses AWS CodeBuild to run numerous automated Selenium-based tests on the deployed application. The team must speed up the pipeline without removing any of the individual tests.

Which set of actions will MOST effectively speed up application deployment and testing?

Options:

A.

Set up an all-at-once deployment in Elastic Beanstalk. Run tests in parallel with multiple CodeBuild actions.

B.

Set up a rolling update in Elastic Beanstalk. Run tests in serial with a single CodeBuild action.

C.

Set up an immutable update in Elastic Beanstalk. Run tests in serial with a single CodeBuild action.

D.

Set up a traffic-splitting deployment in Elastic Beanstalk. Run tests in parallel with multiple CodeBuild actions.

Buy Now
Questions 33

\ developer is designing a serverless application for a game in which users register and log in through a web browser. The application makes requests on behalf of users to a set of AWS Lambda functions that un behind an Amazon API Gateway HTTP API.

rhe developer needs to implement a solution to register and log in users on the application's sign-in page. The solution must minimize operational overhead and must minimize ongoing management of user identities.

Which solution will meet these requirements?

Options:

A.

Create Amazon Cognito user pools for external social identity providers. Configure 1AM roles for the identity pools.

B.

Program the sign-in page to create users' 1AM groups with the 1AM roles attached to the groups.

C.

Create an Amazon RDS for SQL Server DB instance to store the users and manage the permissions to the backend resources in AWS.

D.

Configure the sign-in page to register and store the users and their passwords in an Amazon DynamoDB table with an attached 1AM policy.

Buy Now
Questions 34

A developer is building an application using an Amazon API Gateway REST API backed by an AWS Lambda function that interacts with an Amazon DynamoDB table During testing, the developer observes high latency when making requests to the API

How can the developer evaluate the end-to-end latency and identify performance bottlenecks?

Options:

A.

Enable AWS CloudTrail logging and use the logs to map each latency and bottleneck

B.

Enable and configure AWS X-Ray tracing on API Gateway and the Lambda function Use X-Ray to trace and analyze user requests

C.

Enable Amazon CloudWatch Logs for the Lambda function Enable execution logs for API Gateway to view and analyze user request logs.

D.

Enable VPC Flow Logs to capture and analyze network traffic within the VPC

Buy Now
Questions 35

A company is using an AWS Lambda function to process records from an Amazon Kinesis data stream The company recently observed slow processing of the records. A developer notices that the iterator age metric for the function is Increasing and that the Lambda run duration is constantly above normal.

Which actions should the developer take to increase the processing speed? (Select TWO.)

Options:

A.

Increase the number of shards of the Kinesis data stream

B.

Decrease the timeout of the Lambda function

C.

Increase the memory that is allocated to the Lambda function.

D.

Decrease the number of shards of the Kinesis data stream

E.

Increase the timeout of the Lambda function

Buy Now
Questions 36

A developer has launched an application that calls an API by way of Amazon API Gateway. It offers information that changes several times a day, but is not updated in real time. The application has become so popular that the API endpoint is overloaded and that traffic to the endpoint must be reduced.

What can the developer do to address the performance issues?

Options:

A.

Enable API caching in Amazon ElastiCache.

B.

Enable an Auto Scaling group on the endpoint service and database.

C.

Create an additional API Gateway and use an Application Load Balancer

Buy Now
Questions 37

A team deployed an AWS CloudFormaiion template to update a stack that already included an Amazon RDS DB instance However, before the deployment of the update the team changed the name of the DB instance on the template by mistake The DeletionPoIicy attribute for all resources was not changed from the default values

What will be the result of this mistake?

Options:

A.

AWS CloudFormation will create a new database and delete the old one

B.

AWS CloudFormation will create a new database and keep the old one

C.

AWS CloudFormation will overwrite the existing database and rename it

D.

AWS CloudFormation will leave the existing database and will not create a new one

Buy Now
Questions 38

A company is launching a new web application in the AWS Cloud. The company's development team is using AWS Elastic Beanstalk for deployment and maintenance. According to the company's change management process, the development team must evaluate changes for a specific time period before completing the rollout.

Which deployment policy meets this requirement?

Options:

A.

Immutable

B.

Rolling

C.

Rolling with additional batch

D.

Traffic splitting

Buy Now
Questions 39

A developer is changing the configuration for a CPU-intensive AWS Lambda function that runs once an hour. The function usually takes 45 seconds to run, but sometimes the run time is up to 1 minute. The timeout parameter is set to 3 minutes, and all other parameters are set to default.

The developer needs to optimize the run time of this function.

Which solution will meet this requirement?

Options:

A.

Redeploy the function within the default VPC

B.

Increase the function's memory.

C.

Redeploy the function by using Lambda layers

D.

Increase the function's reserved concurrency

Buy Now
Questions 40

A company is running a custom application on a set of on-premises Linux servers that are accessed using Amazon API Gateway. AWS X-Ray tracing has been enabled on the API test stage

How can a developer enable X-Ray tracing on the on-premises servers with the LEAST amount of configuration''

Options:

A.

Install and run the X-Ray SDK on the on-premises servers to capture and relay the data to the X-Ray service.

B.

Install and run the X-Ray daemon on the on-premises servers to capture and relay the data to the X-Ray service

C.

Capture incoming requests on-premises and configure an AWS Lambda function to pull, process, and relay relevant data to X-Ray using the PutTraceSegments API call

D.

Capture incoming requests on-premises and configure an AWS Lambda function to pull, process, and relay relevant data to X-Ray using the PutTelemetryRecords API call.

Buy Now
Questions 41

A company runs its APIs using Amazon API Gateway in front of AWS Lambda functions The company wants to add logging at the API level Each API must have production and development environments The developer wants to enable different logging levels in both environments.

How can these requirements be met?

Options:

A.

Set up a stage for each environment In each stage, point to different Lambda functions that implement the logging logic m the code Access the logs in Amazon CloudWatch Logs

B.

Set up a stage for each environment In each stage, define a different logging level according to the logging requirements Access the logs in Amazon CloudWatch Logs

C.

Set up a stage and use the same Lambda functions In Amazon CloudWatch Logs set up a filter based on the log level according to the logging requirements

D.

Set up a stage for each environment In each stage, define a variable for the log level Set the value according to the logging requirements.

Buy Now
Questions 42

A developer is working on a serverless application. The application uses Amazon API Gateway. AWS Lambda functions that are written in Python, and Amazon DynamoDB.

Which combination of steps should the developer take so that the Lambda functions can be debugged in the event of application failures? (Select TWO )

Options:

A.

Configure an AWS CloudTrail trail to deliver log files to an Amazon S3 bucket

B.

Ensure that the Lambda functions write log messages to stdout and stderr

C.

Enable an AWS CloudTrail trail for the Lambda function

D.

Ensure that the execution role for the Lambda function has access to write to Amazon CloudWatch Logs.

E.

Use the Amazon CloudWatch metric for Lambda errors to create a CloudWatch alarm.

Buy Now
Questions 43

A developer is leveraging a Border Gateway Protocol (BGP)-based AWS VPN connection to connect from on-premises to Amazon EC2 instances in the developer's account The developer is able to access an EC2 instance in subnet A, but is unable to access an EC2 instance in subnet B in the same VPC

Which logs can the developer use to verify whether the traffic is reaching subnet B?

Options:

A.

VPN logs

B.

BGP logs

C.

VPC Flow Logs

D.

AWS CloudTrail logs

Buy Now
Questions 44

A company hosts a microservices application that uses Amazon API Gateway, AWS Lambda, Amazon Simple Queue Service (Amazon SOS), and Amazon DynamoDB, One of the Lambda functions adds messages to an SOS FIFO queue.

When a developer checks the application logs, the developer finds a few duplicated items in a DynamoDB table. The items were inserted by another polling function that processes messages from the queue.

What is the MOST likely cause of this issue?

Options:

A.

Write operations on the DynamoDB table are being throttled

B.

The SOS queue delivered the message to the function more than once

C.

API Gateway duplicated the message in the SOS queue

D.

The polling function timeout is greater than the queue visibility timeout

Buy Now
Questions 45

A developer wants to modify the following AWS Cloud Formation template to embed another CloudFormation stack:

Which syntax should the developer add to the blank line of the CloudFormation template to meet this requirement?

Options:

A.

"Mapping" : "AWS::CloudFormation::Stack",

B.

"Type" : "AWS;:CloudFcrmation::NestedStack",

C.

"Typ©" : "AWS::CloudFormation::Stack",

D.

"Mapping" : "AWS::CloudFormation::NestedStack",

Buy Now
Questions 46

A developer works in an environment with multiple AWS accounts that have AWS Lambda functions processing the same 100 KB payloads. The developer wants to centralize the point of origin of the payloads to one account and have all the Lambda functions be invoked whenever the initiating event occurs in the parent account.

How can the developer design the workflow in the MOST efficient way, so all the multi-account Lambda functions get invoked when the event occurs?

Options:

A.

Create a Lambda function in the parent account and use cross-account IAM roles with the AWS Security Token Service (AWS STS) AssumeRole API call to make AWS Lambda invoke the API call to invoke all the cross-account Lambda functions.

B.

Subscribe all the multi-account Lambda functions to an Amazon SNS topic and make a SNS Publish API call with the payload to the SNS topic.

C.

Set up an Amazon SQS queue with the queue policy permitting the ReceiveMessage action for multi-account Lambda functions. Then send the payload to the SQS queue using the sqs:SendMessage permission and poll the queue using multi-account Lambda functions.

D.

Use a worker on an Amazon EC2 instance to poll for the payload event. Invoke all Lambda functions using the Lambda Invoke API after using cross-account IAM roles with the AWS Security Token Service (AWS STS) AssumeRole API call.

Buy Now
Questions 47

A legacy service has an XML-based SOAP interface. The Developer wants to expose the functionality of the service to external clients with the Amazon API Gateway. Which technique will accomplish this?

Options:

A.

Create a RESTful API with the API Gateway; transform the incoming JSON into a valid XML message for the SOAP interface using mapping templates.

B.

Create a RESTful API with the API Gateway; pass the incoming JSON to the SOAP interface through an Application Load Balancer.

C.

Create a RESTful API with the API Gateway; pass the incoming XML to the SOAP interface through an Application Load Balancer.

D.

Create a RESTful API with the API Gateway; transform the incoming XML into a valid message for the

SOAP interface using mapping templates.

Buy Now
Questions 48

A movie fan club hosts a serverless web application in an Amazon S3 bucket. The application uses an AWS Lambda function that is exposed by an Amazon API Gateway API. The function queries an Amazon DynamoDB table to list actors sorted by movie. In the DynamoDB table. Actor is the primary key, Movie is the sort key, and Role and Year are attributes.

In the web application, a developer wants to add a page that is named Phase 1 that lists only the movies that were released between 2008 and 2012. The developer needs to fetch the Phase 1 items in a way that minimizes the impact on the DynamoDB table.

Which solution will meet these requirements?

Options:

A.

Create a global secondary index (GSl) with the Year attribute as the sort key. Create a Lambda function to return the results from a new method in the API.

B.

Design a Lambda function that scans the DynamoDB table and filters the results for the Phase 1 items. Invoke the function from a new method in the API.

C.

Use a DynamoDB stream to send items that are filtered by Year to a new DynamoDB table. Invoke a Lambda function from a new method in the API.

D.

Set up an Amazon CloudFront distribution. Create a Lambda@Edge function to filter the items that are returned from the API request.

Buy Now
Questions 49

An application that is running on Amazon EC2 instances stores data in an Amazon S3 bucket. All the data must be encrypted in transit. How can a developer ensure that all traffic to the S3 bucket is encrypted?

Options:

A.

Install certificates on the EC2 instances.

B.

Create a private VPC endpoint.

C.

Configure the S3 bucket with server-side encryption with AWS KMS managed encryption keys (SSE-KMS).

D.

Create an S3 bucket policy that denies traffic when the value for the aws:SecureTransport condition key is false.

Buy Now
Questions 50

A developer is monitoring an application that runs on an Amazon EC2 instance. The developer has configured a custom Amazon CloudWatch metric with d#ta granularity of 1 second. If any issues occur, the developer wants to be notified within 30 seconds by Amazon Simple Notification Service (Amazon SNS).

What should the developer do to meet this requirement?

Options:

A.

Configure a high-resolution CloudWatch alarm.

B.

Set up a custom CloudWatch dashboard.

C.

Use Amazon CloudWatch Logs Insights.

D.

Change to a default CloudWatch metric.

Buy Now
Questions 51

A company wants to implement authentication for its new REST service using Amazon API Gateway. To authenticate the calls, each request must include HTTP headers with a client ID and user ID. These credentials must be compared to authentication data in an Amazon DynamoDB table.

What MUST the company do to implement this authentication in API Gateway?

Options:

A.

Implement an AWS Lambda authorizer that references the DynamoDB authentication table

B.

Create a model that requires the credentials, then grant API Gateway access to the authentication table

C.

Modify the integration requests to require the credentials, then grant API Gateway access to the authentication table

D.

Implement an Amazon Cognito authorizer that references the DynamoDB authentication table

Buy Now
Questions 52

An application uses Lambda functions to extract metadata from files uploaded to an S3 bucket; the metadata is stored in Amazon DynamoDB. The application starts behaving unexpectedly, and the Developer wants to examine the logs of the Lambda function code for errors.

Based on this system configuration, where would the Developer find the logs?

Options:

A.

Amazon S3

B.

AWS CloudTrail

C.

Amazon CloudWatch

D.

Amazon DynamoDB

Buy Now
Questions 53

A developer is working on an AWS Lambda function that accesses Amazon DynamoDB The Lambda function must retrieve an item and update some of its attributes. or create the item if it does not exist The Lambda function has access to the primary key.

Which IAM permissions should the developer request for the Lambda function to achieve this functionality?

Options:

A.

dynaracdb:DeleteItem

dynamodb:GetItem

dynamcdb:Putltem

B.

dynamodb:Updateltem

dynamcdb:Getltem

dynamodb:DescribeTable

C.

dynamcdb:GetRecords

dynamcdb:Putltem

dynamodb:updateTable

D.

dynamodb:Updateltem

dynamodb:Getltem

dynamodb:Putltem

Buy Now
Questions 54

A company is running a Docker application on Amazon ECS. The application must scale based on user load in the last 15 seconds.

How should a Developer instrument the code so that the requirement can be met?

Options:

A.

Create a high-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 30 seconds

B.

Create a high-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 5 seconds

C.

Create a standard-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 30 seconds

D.

Create a standard-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 5 seconds

Buy Now
Questions 55

A developer needs temporary access to resources in a second account

What is the MOST secure way to achieve this?

Options:

A.

Use the Amazon Cognito user pools to get short-lived credentials for the second account

B.

Create a dedicated IAM access key for the second account, and send it by mail.

C.

Create a cross-account access role, and use sts:AssumeRcie API to get short-lived credentials

D.

Establish trust, and add an SSH key for the second account to the IAM user

Buy Now
Questions 56

A developer has written an Amazon Kinesis Data Streams application. As usage grows and traffic increases over time, the application is regularly receiving ProvisionedThroughputExceededException error messages

Which steps should the developer take to resolve the error? (Select TWO.)

Options:

A.

Use Auto Scaling to scale the stream for better performance

B.

Increase the delay between the GetRecords call and the PutRecords call.

C.

Increase the number of shards in the data stream

D.

Specify a shard iterator using the Shardlterator parameter.

E.

Implement exponential backoff on the GetRecords call and the PutRecords call.

Buy Now
Questions 57

A team of Developers must migrate an application running inside an AWS Elastic Beanstalk environment from a Classic Load Balancer to an Application Load Balancer.

Which steps should be taken to accomplish the task using the AWS Management Console?

Options:

A.

1. Update the application code in the existing deployment.

2. Select a new load balancer type before running the deployment.

3. Deploy the new version of the application code to the environment.

B.

1. Create a new environment with the same configurations except for the load balancer type.

2. Deploy the same application version as used in the original environment.

3. Run the swap-environment-cnames action.

C.

1. Clone the existing environment, changing the associated load balancer type.

2. Deploy the same application version as used in the original environment.

3. Run the swap-environment-cnames action.

D.

1. Edit the environment definitions in the existing deployment.

2. Change the associated load balancer type according to the requirements.

3. Rebuild the environment with the new load balancer type.

Buy Now
Questions 58

When developing an AWS Lambda function that processes Amazon Kinesis Data Streams, Administrators within the company must receive a notice that includes the processed data.

How should the Developer write the function to send processed data to the Administrators?

Options:

A.

Separate the Lambda handler from the core logic

B.

Use Amazon CloudWatch Events to send the processed data

C.

Publish the processed data to an Amazon SNS topic

D.

Push the processed data to Amazon SQS

Buy Now
Questions 59

A Development team wants to instrument their code to provide more detailed information to AWS X-Ray than simple outgoing and incoming requests. This will generate large amounts of data, so the Development team wants to implement indexing so they can filter the data.

What should the Development team do to achieve this?

Options:

A.

Add annotations to the segment document and the code

B.

Add metadata to the segment document and the code

C.

Configure the necessary X-Ray environment variables

D.

Install required plugins for the appropriate AWS SDK

Buy Now
Questions 60

n application running on an Amazon Linux EC2 instance needs to manage the AWS infrastructure.

How can the EC2 instance be configured to make AWS API calls securely?

Options:

A.

Sign the AWS CLI command using the signature version 4 process.

B.

Run the aws configure AWS CLI command and specify the access key id and secret access key.

C.

Specify a role for the EC2 instance with the necessary privileges.

D.

Pass the access key id and secret access key as parameters for each AWS CLI command.

Buy Now
Questions 61

A company's fleet of Amazon EC2 instances receives data from millions of users through an API. The servers batch the data, add an object for each user, and upload the objects to an S3 bucket to ensure high access rates The object attributes are Customer ID, Server ID, TS-Server (TimeStamp and Server ID) the size of the object, and a timestamp A developer wants to find all the objects for a given user collected during a specified time range

After creating an S3 object created event, how can the developer achieve this requirement^

Options:

A.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon DynamoDB record for every object with the Customer ID as the partition key and the Server ID as the sort key Retrieve all the records using the Customer ID and Server ID attributes

B.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon Redshift record for every object with the Customer ID as the partition key and TS-Server as the sort key Retrieve all the records using the Customer ID and TS-Server attributes

C.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon DynamoDB record for every object with the Customer ID as the partition key and TS-Server as the sort key Retrieve all the records using the Customer ID and TS-Server attributes

D.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon Redshift record for every object with the Customer ID as the partition key and the Server ID as the sort key. Retrieve all the records using the Customer ID and Server ID attributes.

Buy Now
Questions 62

A developer is using Amazon S3 as the event source that invokes a Lambda function when new objects are created in the bucket The event source mapping Information Is stored in the bucket notification configuration The developer is working with different versions of the Lambda function, and has a constant need to update notification configuration so that Amazon S3 invokes the correct version

What is the MOST efficient and effective way to achieve mapping Between the S3 event and Lambda?

Options:

A.

Use a different Lambda trigger

B.

Use Lambda environment variables

C.

Use a Lambda alias

D.

Use Lambda tags.

Buy Now
Questions 63

An IAM role is attached to an Amazon EC2 instance that explicitly denies access to all Amazon S3 API actions. The EC2 instance credentials file specifies the IAM access key and secret access key, which allow full administrative access.

Given that multiple modes of IAM access are present for this EC2 instance, which of the following is correct?

Options:

A.

The EC2 instance will only be able to list the S3 buckets

B.

The EC2 instance will only be able to list the contents of one S3 bucket at a time

C.

The EC2 instance will be able to perform all actions on any S3 bucket

D.

The EC2 instance will not be able to perform any S3 action on any S3 bucket.

Buy Now
Questions 64

A company is adding items to an Amazon DynamoDB table from an AWS Lambda function that is written in Python A developer needs to implement a solution that inserts records in the DynamoDB table and performs automatic retry when the insert fails

Which solution meets these requirements with MINIMUM code changes?

Options:

A.

Configure the Python code to run the AWS CLl through shell to call the Putltem operation

B.

Call the Putltem operation from Python by using the DynamoDB HTTP API

C.

Queue the items in AWS Glue: which will put them into the DynamoDB table

D.

Use the AWS software development kit (SDK) for Python (boto3) to call the Putltem operation

Buy Now
Questions 65

A developer is building a static, client-side rendered website that is powered by ReactJS The code has no server-side generated components and does not need to run any programming languages on the server However the code serves static HTML, CSS, and JavaScript to the client on each request The developer's solution to host the website must maximize performance and cost-effectiveness

Which combination of AWS services or resources should the developer use to meet these requirements?

Options:

A.

Application Load Balancer and Amazon EC2

B.

Amazon API Gateway and AWS Lambda

C.

Amazon CloudFront and Amazon S3

D.

Amazon CloudFront and AWS Elastic Beanstalk

Buy Now
Questions 66

A developer needs to deploy a new version to an AWS Elastic Beanstalk application How can the developer accomplish this task?

Options:

A.

Upload and deploy the new application version in the Elastic Beanstalk console

B.

Use the eb init CLI command to deploy a new version '

C.

Terminate the current Elastic Beanstalk environment and create a new one

D.

Modify the ebextensions folder to add a source option to services

Buy Now
Questions 67

A company recently experienced some unexpected downtime. After investigating, the company determines that a developer mistakenly terminated several production Amazon EC2 instances.

What should the company do to BEST protect against accidental terminations in the future.

Options:

A.

Enable EC2 termination protection on all production instances unless approval has been given through AWS Resource Access Manager.

B.

Modify the developer group’s permissions policy to deny them access to delete production instances unless approved has been given through AWS Resource Access Manager.

C.

Modify the developer group’s permission policy to require multi-factor authentication (MFA) only production instances are being delete Enable EC2 termination protection on production instances.

D.

Enable EC2 termination protection on production instances. Deny the developer group’s permissions policy access to terminate instance. Create a new role that developer can assume when termination is necessary.

Buy Now
Questions 68

A company has deployed an application on AWS Elastic Beanstalk The company has configured the Auto Scaling group that is associated with the Elastic Beanstalk environment to have five Amazon EC2 instances If the capacity is fewer than four EC2 instances during the deployment, application performance degrades The company is using the all-at-once deployment policy

What is the MOST cost-effective way to solve the deployment issue1?

Options:

A.

Change the Auto Scaling group to six desired instances

B.

Change the deployment policy to traffic splitting Specify an evaluation time of 1 hour.

C.

Change the deployment policy to rolling with additional batch Specify a batch size of 1

D.

Change the deployment policy to rolling Specify a batch size of 2.

Buy Now
Questions 69

A developer is using Amazon DynamoDB to store application data . The developer wants to further improve application performance by reducing response limes for read and write operations.

Which DynamoDB feature should be used to meet these requirement?

Options:

A.

Amazon DynamoDB Streams

B.

Amazon DynamoDB Accelerator

C.

Amazon DynamoDB global tables

D.

Amazon DynamoDB transactions

Buy Now
Questions 70

A developer has written a multi-threaded application that is running on a fleet of Amazon EC2 instances. The operations team has requested a graphical method to monitor the number of running threads over time.

What is the MOST efficient way to fulfill this request?

Options:

A.

Periodically send the thread count to AWS X-Ray segments, then generate a service graph on demand

B.

Create a custom Amazon CloudWatch metric and periodically perform a PutMetricData call with the current thread count.

C.

Periodically log thread count data to Amazon S3. Use Amazon Kinesis to process the data into a graph.

D.

Periodically write the current thread count to a table using Amazon DynarnoDB and use Amazon CloudFront to create a graph

Buy Now
Questions 71

Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com. Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint https://s3-us-west-1.amazonaws.com/cdfonts. While testing the new web fonts, Company D recognized the web fonts are being blocked by the browser.

What should Company D do to prevent the web fonts from being blocked by the browser?

Options:

A.

Enable versioning on the cdfonts bucket for each web font

B.

Create a policy on the cdfonts bucket to enable access to everyone

C.

Add the Content-MD5 header to the request for webfonts in the cdfonts bucket from the website

D.

Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration

Buy Now
Questions 72

Developer is creating an AWS Lambda function to process a stream of data from an Amazon Kinesis Data Stream. When the Lambda function parses the data and encounters a missing field, it exits the function with an error. The function is generating duplicate records from the Kinesis stream. When the Developer looks at the stream output without the Lambda function, there are no duplicate records.

What is the reason for the duplicates?

Options:

A.

The Lambda function did not advance the Kinesis stream pointer to the next record after the error.

B.

The Lambda event source used asynchronous invocation, resulting in duplicate records.

C.

The Lambda function did not handle the error, and the Lambda service attempted to reprocess the data.

D.

The Lambda function is not keeping up with the amount of data coming from the stream.

Buy Now
Questions 73

A Developer is creating a web application that requires authentication, but also needs to support guest access

to provide users limited access without having to authenticate. What service can provide support for the application to allow guest access?

Options:

A.

IAM temporary credentials using AWS STS.

B.

Amazon Directory Service

C.

Amazon Cognito with unauthenticated access enabled

D.

IAM with SAML integration

Buy Now
Questions 74

A Developer must re-implement the business logic for an order fulfilment system. The business logic has to make requests to multiple vendors to decide where to purchase an item. The whole process can take up to a week to complete.

What is the MOST efficient and SIMPLEST way to implement a system that meets these requirements?

Options:

A.

Use AWS Step Functions to execute parallel Lambda functions, and join the results.

B.

Create an AWS SQS for each vendor, poll the queue from a worker instance, and joint the results.

C.

Use AWS Lambda to asynchronously call a Lambda function for each vendor, and join the results.

D.

Use Amazon CloudWatch Events to orchestrate the Lambda functions.

Buy Now
Questions 75

Which features can be used to restrict access to data in S3? Choose 2 answers

Options:

A.

Use S3 Virtual Hosting

B.

Set an S3 Bucket policy.

C.

Enable IAM Identity Federation.

D.

Set an S3 ACL on the bucket or the object.

E.

Create a CloudFront distribution for the bucket

Buy Now
Questions 76

What happens, by default, when one of the resources in a CloudFormation stack cannot be created?

Options:

A.

Previously-created resources are kept but the stack creation terminates.

B.

Previously-created resources are deleted and the stack creation terminates.

C.

The stack creation continues, and the final results indicate which steps failed.

D.

CloudFormation templates are parsed in advance so stack creation is guaranteed to succeed.

Buy Now
Questions 77

A Developer is writing an imaging micro service on AWS Lambda. The service is dependent on several libraries that are not available in the Lambda runtime environment.

Which strategy should the Developer follow to create the Lambda deployment package?

Options:

A.

Create a ZIP file with the source code and all dependent libraries.

B.

Create a ZIP file with the source code and a script that installs the dependent libraries at runtime.

C.

Create a ZIP file with the source code. Stage the dependent libraries on an Amazon S3 bucket indicated by the Lambda environment variable LD_LIBRARY_PATH

D.

Create a ZIP file with the source code and a buildspec.yaml file that installs the dependent libraries on AWS Lambda.

Buy Now
Questions 78

How is provisioned throughput affected by the chosen consistency model when reading data from a DynamoDB table?

Options:

A.

Strongly consistent reads use the same amount of throughput as eventually consistent reads

B.

Strongly consistent reads use more throughput than eventually consistent reads.

C.

Strongly consistent reads use less throughput than eventually consistent reads

D.

Strongly consistent reads use variable throughput depending on read activity

Buy Now
Questions 79

In DynamoDB, what type of HTTP response codes indicate that a problem was found with the client request sent to the service?

Options:

A.

5xx HTTP response code

B.

200 HTTP response code

C.

306 HTTP response code

D.

4xx HTTP response code

Questions 80

You have written an application that uses the Elastic Load Balancing service to spread traffic to several web servers. Your users complain that they are sometimes forced to login again in the middle of using your application, after they have already logged in. This is not behavior you have designed.

What is a possible solution to prevent this happening?

Options:

A.

Use instance memory to save session state.

B.

Use instance storage to save session state.

C.

Use EBS to save session state

D.

Use ElastiCache to save session state.

E.

Use Glacier to save session slate.

Buy Now
Questions 81

During non-peak hours, a Developer wants to minimize the execution time of a full Amazon DynamoDB table scan without affecting normal workloads. The workloads average half of the strongly consistent read capacity units during non-peak hours.

How would the Developer optimize this scan?

Options:

A.

Use parallel scans while limiting the rate

B.

Use sequential scans

C.

Increase read capacity units during the scan operation

D.

Change consistency to eventually consistent during the scan operation

Buy Now
Questions 82

If an application is storing hourly log files from thousands of instances from a high traffic web site, which naming scheme would give optimal performance on S3?

Options:

A.

Sequential

B.

instanceID_log-HH-DD-MM-YYYY

C.

instanceID_log-YYYY-MM-DD-HH

D.

HH-DD-MM-YYYY-log_instanceID

E.

YYYY-MM-DD-HH-log_instanceID

Buy Now
Questions 83

A company wants to migrate its web application to AWS and leverage Auto Scaling to handle pear workloads.

The Solutions Architect determined that the best metric for an Auto Scaling event is the number of concurrent users.

Based on this information, what should the Developer use to autoscale based on concurrent users?

Options:

A.

An Amazon SNS topic to be triggered when a concurrent user threshold is met

B.

An Amazon Cloudwatch Networkin metric

C.

Amazon CloudFront to leverage AWS Edge Locations

D.

A Custom Amazon CloudWatch metric for concurrent users.

Buy Now
Questions 84

A company is providing services to many downstream consumers. Each consumer may connect to one or more services. This has resulted in a complex architecture that is difficult to manage and does not scale well. The company needs a single interface to manage these services to consumers.

Which AWS service should be used to refactor this architecture?

Options:

A.

AWS Lambda

B.

AWS X-Ray

C.

Amazon SQS

D.

Amazon API Gateway

Buy Now
Questions 85

Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)?

Options:

A.

DescnbeInstances

B.

DescribeAMls

C.

DescribeImages

D.

GetAMls

E.

You cannot retrieve a list of AMIs as there are over 10,000 AMIs

Buy Now
Questions 86

A Developer needs to use AWS X-Ray to monitor an application that is deployed on EC2 instances.

What steps have to be executed to perform the monitoring?

Options:

A.

Deploy the X-Ray SDK with the application and use X-Ray annotation.

B.

Install the X-Ray daemon and instrument the application code.

C.

Install the X-Ray daemon and configure it to forward data to Amazon CloudWatch Events.

D.

Deploy the X-Ray SDK with the application and instrument the application code.

Buy Now
Questions 87

An existing serverless application processes uploaded image files. The process currently uses a single Lambda function that takes an image file, performs the processing, and stores the file in Amazon S3. Users of the application now require thumbnail generation of the images. Users want to avoid any impact to the time it takes to perform the image uploads.

How can thumbnail generation be added to the application, meeting user requirements while minimizing changes to existing code?

Options:

A.

Change the existing Lambda function handling the uploads to create thumbnails at the time of upload. Have the function store both the image and thumbnail in Amazon S3.

B.

Create a second Lambda function that handles thumbnail generation and storage. Change the existing Lambda function to invoke it asynchronously.

C.

Create an S3 event notification with a Lambda function destination. Create a new Lambda function to generate and store thumbnails.

D.

Create an S3 event notification to an SQS Queue. Create a scheduled Lambda function that processes the queue, and generates and stores thumbnails.

Buy Now
Questions 88

A company needs to secure its existing website running behind an Elastic Load Balancer. The website’s Amazon EC2 instances are CPU-constrained.

What should be done to secure the website while not increasing the CPU load on the EC2 web servers? (Select TWO.)

Options:

A.

Configure an Elastic Load Balancer with SSL pass-through.

B.

Configure SSL certificates on an Elastic Load Balancer.

C.

Configure an Elastic Load Balancer with a Loadable Storage System.

D.

Install SSL certificates on the EC2 instances.

E.

Configure an Elastic Load Balancer with SSL termination.

Buy Now
Questions 89

A Developer has created a large Lambda function, and deployment is failing with the following error:

ClientError: An error occurred (InvalidParameterValueException) when calling the

CreateFunction operation: Unzipped size must be smaller than XXXXXXXXX bytes’, where XXXXXXXXX is the current Lambda limit

What can the Developer do to fix this problem?

Options:

A.

Submit a limit increase request to AWS Support to increase the function to the size needed.

B.

Use a compression algorithm that is more efficient than ZIP.

C.

Break the function into multiple smaller Lambda functions.

D.

ZIP the ZIP file twice to compress it further.

Buy Now
Questions 90

An AWS Lambda function generates a 3MB JSON file and then uploads it to an Amazon S3 bucket daily. The file contains sensitive information, so the Developer must ensure that it is encrypted before uploading to the bucket.

Which of the following modifications should the Developer make to ensure that the data is encrypted before uploading it to the bucket?

Options:

A.

Use the default AWS KMS customer master key for S3 in the Lambda function code.

B.

Use the S3 managed key and call the GenerateDataKey API to encrypt the file.

C.

Use the GenerateDateKey API, then use that data key to encrypt the file in the Lambda function code.

D.

Use a custom KMS customer master key created for S3 in the Lambda function code.

Buy Now
Questions 91

What are the steps to using the AWS CLI to launch a templatized serverless application?

Options:

A.

Use AWS CloudFormation get-template then CloudFormation execute-change-set.

B.

Use AWS CloudFormation validate-template then CloudFormation create-change-set.

C.

Use AWS CloudFormation package then CloudFormation deploy.

D.

Use AWS CloudFormation create-stack then CloudFormation update-stack.

Buy Now
Status:
Expired , and Replaced By
Exam Code: DVA-C01
Exam Name: AWS Certified Developer Associate Exam
Last Update: Apr 14, 2023
Questions: 608
$64  $159.99
$48  $119.99
$40  $99.99
buy now DVA-C01