Amazon AWS Certified Developer - Associate DVA-C01
Prev

There are 237 results

Next
#91 (Accuracy: 100% / 2 votes)
A company is using an Amazon API Gateway REST API endpoint as a webhook to publish events from an on-premises source control management (SCM) system to Amazon EventBridge (Amazon CloudWatch Events). The company has configured an EventBridge (CloudWatch Events) rule to listen for the events and to control application deployment in a central AWS account. The company needs to receive the same events across multiple receiver AWS accounts.

How can a developer meet these requirements without changing the configuration of the SCM system?
  • A. Deploy the API Gateway REST API to all the required AWS accounts. Use the same custom domain name for all the gateway endpoints so that a single SCM webhook can be used for all events from all accounts.
  • B. Deploy the API Gateway REST API to all the receiver AWS accounts. Create as many SCM webhooks as the number of AWS accounts.
  • C. Grant permission to the central AWS account for EventBridge (CloudWatch Events)to access the receiver AWS accounts. Add an EventBridge (CloudWatch Events) event bus on the receiver AWS accounts as the targets to the existing EventBridge (CloudWatch Events) rule.
  • D. Convert the API Gateway type from REST API to HTTP API.
#92 (Accuracy: 100% / 5 votes)
A development team uses AWS Elastic Beanstalk for application deployment. The development team has configured the application version lifecycle policy to limit the number of application versions to 25. However, even with the application version lifecycle policy, the source bundle is deleted from the Amazon S3 source bucket.
What should the development team do in the Elastic Beanstalk application version lifecycle settings to retain the source code in the S3 bucket?
  • A. Enable versioning on the source bundle S3 bucket.
  • B. Disable the S3 bucket lifecycle policy to avoid the archiving of the source bundle.
  • C. Update the Elastic Beanstalk application version lifecycle policy to increase the version quota to 50.
  • D. Update the Elastic Beanstalk application version lifecycle policy to retain the source bundle in Amazon S3.
#93 (Accuracy: 100% / 8 votes)
A global company has a mobile app with static data stored in an Amazon S3 bucket in the us-east-1 Region. The company serves the content through an Amazon
CloudFront distribution.
The company is launching the mobile app in South Africa. The data must reside in the af-south-1 Region. The company does not want to deploy a specific mobile client for South Africa.
What should the company do to meet these requirements?
  • A. Use the CloudFront geographic restriction feature to block access to users in South Africa.
  • B. Create a Lambda@Edge function. Associate the Lambda@Edge function as an origin request trigger with the CloudFront distribution to change the S3 origin Region.
  • C. Create a Lambda@Edge function. Associate the Lambda@Edge function as a viewer response trigger with the CloudFront distribution to change the S3 origin Region.
  • D. Include af-south-1 in the alternate domain name (CNAME) of the CloudFront distribution.
#94 (Accuracy: 92% / 4 votes)
A company manages a microservices application on Amazon EC2 instances. A developer has integrated the AWS X-Ray SDK with the application. The developer also has an IAM role that is associated with the EC2 instances. The role includes the AWSXRayDaemonWriteAccess managed IAM policy.

When the developer queries the X-Ray traces by using the GetServiceGraph API operation, no errors and no trace data are returned.


What could be the reason that no X-Ray trace data is being returned? (Choose two.)
  • A. The X-Ray daemon is not installed on each EC2 instance.
  • B. The GetServiceGraph API operation is providing a StartTime value and an EndTime value that are older than 30 days.
  • C. X-Ray trace data is not available for querying for 30 minutes after it is captured.
  • D. The developer’s IAM policy contains the AWSXRayReadOnlyAccess managed policy.
  • E. The GetServiceGraph API operation does not include an EndTime value.
#95 (Accuracy: 100% / 4 votes)
A company has an ecommerce application. To track product reviews, the company's development team uses an Amazon DynamoDB table.

Every record includes the following:

• A Review ID, a 16-digit universally unique identifier (UUID)
• A Product ID and User ID, 16-digit UUIDs that reference other tables
• A Product Rating on a scale of 1-5
• An optional comment from the user

The table partition key is the Review ID.
The most performed query against the table is to find the 10 reviews with the highest rating for a given product.

Which index will provide the FASTEST response for this query?
  • A. A global secondary index (GSI) with Product ID as the partition key and Product Rating as the sort key
  • B. A global secondary index (GSI) with Product ID as the partition key and Review ID as the sort key
  • C. A local secondary index (LSI) with Product ID as the partition key and Product Rating as the sort key
  • D. A local secondary index (LSI) with Review ID as the partition key and Product ID as the sort key
#96 (Accuracy: 100% / 4 votes)
A developer is deploying a company's application to Amazon EC2 instances. The application generates gigabytes of data files each day. The files are rarely accessed, but the files must be available to the application’s users within minutes of a request during the first year of storage. The company must retain the files for 7 years.

How can the developer implement the application to meet these requirements MOST cost-effectively?
  • A. Store the files in an Amazon S3 bucket Use the S3 Glacier Instant Retrieval storage class. Create an S3 Lifecycle policy to transition the files to the S3 Glacier Deep Archive storage class after 1 year.
  • B. Store the files in an Amazon S3 bucket. Use the S3 Standard storage class. Create an S3 Lifecycle policy to transition the files to the S3 Glacier Flexible Retrieval storage class after 1 year.
  • C. Store the files on an Amazon Elastic Block Store (Amazon EBS) volume. Use Amazon Data Lifecycle Manager (Amazon DLM) to create snapshots of the EBS volumes and to store those snapshots in Amazon S3.
  • D. Store the files on an Amazon Elastic File System (Amazon EFS) mount. Configure EFS lifecycle management to transition the files to the EFS Standard-Infrequent Access (Standard-IA) storage class after 1 year.
#97 (Accuracy: 100% / 2 votes)
A developer is designing a serverless application for a game in which users register and log in through a web browser. The application makes requests on behalf of users to a set of AWS Lambda functions that run behind an Amazon API Gateway HTTP API.

The developer needs to implement a solution to register and log in users on the application's sign-in page.
The solution must minimize operational overhead and must minimize ongoing management of user identities.

Which solution will meet these requirements?
  • A. Create Amazon Cognito user pools for external social identity providers. Configure IAM roles for the identity pools.
  • B. Program the sign-in page to create users' IAM groups with the IAM roles attached to the groups.
  • C. Create an Amazon RDS for SQL Server DB instance to store the users and manage the permissions to the background resources in AWS.
  • D. Configure the sign-in page to register and store the users and their passwords in an Amazon DynamoDB table with an attached IAM policy.
#98 (Accuracy: 100% / 8 votes)
A developer needs to use Amazon DynamoDB to store customer orders. The developer's company requires all customer data to be encrypted at rest with a key that the company generates.
What should the developer do to meet these requirements?
  • A. Create the DynamoDB table with encryption set to None. Code the application to use the key to decrypt the data when the application reads from the table. Code the application to use the key to encrypt the data when the application writes to the table.
  • B. Store the key by using AWS Key Management Service (AWS KMS). Choose an AWS KMS customer managed key during creation of the DynamoDB table. Provide the Amazon Resource Name (ARN) of the AWS KMS key.
  • C. Store the key by using AWS Key Management Service (AWS KMS). Create the DynamoDB table with default encryption. Include the kms:Encrypt parameter with the Amazon Resource Name (ARN) of the AWS KMS key when using the DynamoDB software development kit (SDK).
  • D. Store the key by using AWS Key Management Service (AWS KMS). Choose an AWS KMS AWS managed key during creation of the DynamoDB table. Provide the Amazon    Resource Name (ARN) of the AWS KMS key.
#99 (Accuracy: 100% / 8 votes)
A developer is implementing user authentication and authorization for a web application that is hosted on an Amazon EC2 instance. The developer needs to ensure that the user credentials are encrypted and secure when they are stored and transmitted.
Which solution will meet these requirements?
  • A. Activate web server modules for authentication and authorization on the instance. Use HTTP basic authentication for the user login.
  • B. Deploy a custom authentication and authorization API over HTTP. Store the user credentials on Amazon ElastiCache for Redis.
  • C. Use Amazon Cognito to configure a user pool. Use the Amazon Cognito API to authenticate and authorize the users.
  • D. Create IAM users. Assign the users to different IAM groups. Use AWS Single Sign-On to authenticate and authorize each user.
#100 (Accuracy: 100% / 5 votes)
A developer needs to modify an application architecture to meet new functional requirements. Application data is stored in Amazon DynamoDB and processed for analysis in a nightly batch. The system analysts do not want to wait until the next day to view the processed data and have asked to have it available in near-real time.

Which application architecture pattern would enable the data to be processed as it is received?
  • A. Event driven
  • B. Client-server driven
  • C. Fan-out driven
  • D. Schedule driven