Amazon AWS Certified Developer - Associate DVA-C01
Prev

There are 237 results

Next
#151 (Accuracy: 100% / 5 votes)
A company is developing a report implemented using AWS Step Functions. Amazon CloudWatch shows errors in the Step Functions task state machine. To troubleshoot each task, the state input needs to be included along with the error message in the state output.
Which coding practice can preserve both the original input and the error for the state?
  • A. Use ResultPath in a Catch statement to include the error with the original input.
  • B. Use InputPath in a Catch statement and set the value to null.
  • C. Use ErrorEquals in a Retry statement to include the error with the original input.
  • D. Use OutputPath in a Retry statement and set the value to $.
#152 (Accuracy: 100% / 12 votes)
An application runs on multiple EC2 instances behind an ELB.
Where is the session data best written so that it can be served reliably across multiple requests?
  • A. Write data to Amazon ElastiCache.
  • B. Write data to Amazon Elastic Block Store.
  • C. Write data to Amazon EC2 Instance Store.
  • D. Write data to the root filesystem.
#153 (Accuracy: 94% / 9 votes)
A company has migrated an application to Amazon EC2 instances. Automatic scaling is working well for the application user interface. However, the process to deliver shipping requests to the company's warehouse staff is encountering issues. Duplicate shipping requests are arriving, and some requests are lost or arrive out of order.

The company must avoid duplicate shipping requests and must process the requests in the order that the requests arrive.
Requests are never more than 250 KB in size and take 5-10 minutes to process. A developer needs to rearchitect the application to improve the reliability of the delivery and processing of the requests.

What should the developer do to meet these requirements?
  • A. Create an Amazon Kinesis Data Firehose delivery stream to process the requests. Create an Amazon Kinesis data stream. Modify the application to write the requests to the Kinesis data stream.
  • B. Create an AWS Lambda function to process the requests. Create an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the Lambda function to the SNS topic. Modify the application to write the requests to the SNS topic.
  • C. Create an AWS Lambda function to process the requests. Create an Amazon Simple Queue Service (Amazon SQS) standard queue. Set the SQS queue as an event source for the Lambda function. Modify the application to write the requests to the SQS queue.
  • D. Create an AWS Lambda function to process the requests. Create an Amazon Simple Queue Service (Amazon SQS) FIFO queue. Set the SQS queue as an event source for the Lambda function. Modify the application to write the requests to the SQS queue.
#154 (Accuracy: 100% / 5 votes)
A company has three AWS Lambda functions that are written in Node.js. The Lambda functions include a mix of custom code and open-source modules. When bugs are occasionally detected in the open-source modules, all three Lambda functions must be patched.

What is the MOST operationally efficient solution to deploy a patched open-source library for all three Lambda functions?
  • A. Create a custom AWS CloudFormation public registry extension. Reference a GitHub repository that hosts the open-source modules in the extension. Configure CloudFormation to scan the repository once each day. Write an AWS Serverless Application Model (AWS SAM) template to redeploy the three Lambda functions upon a scan notification change.
  • B. Create an Amazon CloudFront distribution with an Amazon S3 bucket as the origin. Upload the patched modules to Amazon S3 when needed. Modify each Lambda function to download the patched modules from the CloudFront distribution during the cold start.
  • C. Launch an Amazon EC2 instance. Host a private open-source module registry on the EC2 instance. Upload the modified open-source modules to the private registry when needed. Modify each Lambda function deployment script to download the modules from the private registry. Redeploy the three new Lambda functions.
  • D. Create a Lambda layer with the open-source modules. Modify all three Lambda functions to depend on the layer. Remove the open-source modules from each Lambda function. Patch the Lambda layer with the modified open-source modules when needed. Update the Lambda functions to reference the new layer version.
#155 (Accuracy: 100% / 4 votes)
A developer is writing an application to encrypt files outside of AWS before uploading the files to an Amazon S3 bucket. The encryption must be symmetric and must be performed inside the application.

How can the developer implement the encryption in the application to meet these requirements?
  • A. Create a data key in AWS Key Management Service (AWS KMS). Use the AWS Encryption SDK to encrypt the files.
  • B. Create a Hash-Based Message Authentication Code (HMAC) key in AWS Key Management Service (AWS KMS). Use the AWS Encryption SDK to encrypt the files.
  • C. Create a data key pair in AWS Key Management Service (AWS KMS). Use the AWS CL to encrypt the files.
  • D. Create a data key in AWS Key Management Service (AWS KMS). Use the AWS CLI to encrypt the files.
#156 (Accuracy: 100% / 4 votes)
A developer is creating a new application that will be accessed by users through an API created using Amazon API Gateway. The users need to be authenticated by a third-party Security Assertion Markup Language (SAML) identity provider. Once authenticated, users will need access to other AWS services, such as Amazon S3 and Amazon DynamoDB.

How can these requirements be met?
  • A. Use an Amazon Cognito user pool with SAML as the resource server.
  • B. Use Amazon Cognito identity pools with a SAML identity provider as one of the authentication providers.
  • C. Use the AWS IAM service to provide the sign-up and sign-in functionality.
  • D. Use Amazon CloudFront signed URLs to connect with the SAML identity provider.
#157 (Accuracy: 100% / 4 votes)
A company is working on a new serverless application. A developer needs to find an automated way to deploy AWS Lambda functions and the dependent infrastructure with minimum coding effort. The application also needs to be reliable.

Which method will meet these requirements with the LEAST operational overhead?
  • A. Build the application by using shell scripts to create .zip files for each Lambda function. Manually upload the .zip files to the AWS Management Console.
  • B. Build the application by using the AWS Serverless Application Model (AWS SAM). Use a continuous integration and continuous delivery (CI/CD) pipeline and the SAM CLI to deploy the Lambda functions.
  • C. Build the application by using shell scripts to create .zip files for each Lambda function. Upload the .zip files. Deploy the .zip files as Lambda functions by using the AWS CLI in a continuous integration and continuous delivery (CI/CD) pipeline.
  • D. Build a container for each Lambda function. Store the container images in AWS CodeArtifact. Deploy the containers as Lambda functions by using the AWS CLI in a continuous integration and continuous delivery (CI/CD) pipeline.
#158 (Accuracy: 93% / 5 votes)
An application that is deployed to Amazon EC2 is using Amazon DynamoDB. The application calls the DynamoDB REST API. Periodically, the application receives a ProvisionedThroughputExceededException error when the application writes to a DynamoDB table.

Which solutions will mitigate this error MOST cost-effectively? (Choose two.)
  • A. Modify the application code to perform exponential backoff when the error is received.
  • B. Modify the application to use the AWS SDKs for DynamoDB.
  • C. Increase the read and write throughput of the DynamoDB table.
  • D. Create a DynamoDB Accelerator (DAX) cluster for the DynamoDB table.
  • E. Create a second DynamoDB table. Distribute the reads and writes between the two tables.
#159 (Accuracy: 100% / 3 votes)
A company is building a serverless application that uses AWS Lambda. The application includes Lambda functions that are exposed by Amazon API Gateway. The functions will use several large third-party libraries, and the build artifacts will exceed 50 MB in size.

Which combination of steps should a developer take to prepare and perform the deployment? (Choose two.)
  • A. Issue the aws lambda update-function-code CLI command with the --zip-file fileb://my-function.zip parameter.
  • B. Upload the build artifact to Amazon S3.
  • C. Issue the aws cloudformation package CLI command.
  • D. Issue the aws lambda update-function-code CLI command with the --s3-bucket and --s3-key parameters.
  • E. Issue the aws lambda update-function-code CLI command with a parameter that points to the source code in AWS CodeCommit.
#160 (Accuracy: 100% / 7 votes)
A developer is using an AWS Key Management Service (AWS KMS) customer master key (CMK) with imported key material to encrypt data in Amazon S3. The developer accidentally deletes the key material of the CMK and is unable to decrypt the data.
How can the developer decrypt the data that was encrypted by the CMK?
  • A. Request support from AWS to recover the deleted key material.
  • B. Create a new CMK. Use the new CMK to decrypt the data.
  • C. Use the CMK without the key material.
  • D. Reimport the same key material to the CMK.