Amazon AWS Certified Developer - Associate DVA-C01
Prev

There are 237 results

Next
#11 (Accuracy: 100% / 9 votes)
A Developer has been asked to create an AWS Lambda function that is triggered any time updates are made to items in an Amazon DynamoDB table. The function has been created, and appropriate permissions have been added to the Lambda execution role. Amazon DynamoDB streams have been enabled for the table, but the function is still not being triggered.
Which option would enable DynamoDB table updates to trigger the Lambda function?
  • A. Change the StreamViewType parameter value to NEW_AND_OLD_IMAGES for the DynamoDB table
  • B. Configure event source mapping for the Lambda function
  • C. Map an Amazon SNS topic to the DynamoDB streams
  • D. Increase the maximum execution time (timeout) setting of the Lambda function
#12 (Accuracy: 100% / 5 votes)
A developer designed an application on an Amazon EC2 instance. The application makes API requests to objects in an Amazon S3 bucket.
Which combination of steps will ensure that the application makes the API requests in the MOST secure manner? (Choose two.)
  • A. Create an IAM user that has permissions to the S3 bucket. Add the user to an IAM group.
  • B. Create an IAM role that has permissions to the S3 bucket.
  • C. Add the IAM role to an instance profile. Attach the instance profile to the EC2 instance.
  • D. Create an IAM role that has permissions to the S3 bucket. Assign the role to an 1AM group.
  • E. Store the credentials of the IAM user in the environment variables on the EC2 instance.
#13 (Accuracy: 96% / 8 votes)
A developer has created a Java application that makes HTTP requests directly to AWS services. Application logging shows 5xx HTTP response codes that occur at irregular intervals. The errors are affecting users.
How should the developer update the application to improve the application's resiliency?
  • A. Revise the request content in the application code.
  • B. Use the AWS SDK for Java to interact with AWS APIs.
  • C. Scale out the application so that more instances of the application are running.
  • D. Add additional logging to the application code.
#14 (Accuracy: 100% / 4 votes)
A developer is writing a serverless application that requires an AWS Lambda function to be invoked every 10 minutes.

What is an automated and serverless way to invoke the function?
  • A. Deploy an Amazon EC2 instance based on Linux, and edit its /etc/crontab file by adding a command to periodically invoke the Lambda function.
  • B. Configure an environment variable named PERIOD for the Lambda function. Set the value to 600.
  • C. Create an Amazon EventBridge (Amazon CloudWatch Events) rule that runs on a regular schedule to invoke the Lambda function.
  • D. Create an Amazon Simple Notification Service (Amazon SNS) topic that has a subscription to the Lambda function with a 600-second timer.
#15 (Accuracy: 96% / 6 votes)
A company has an application that uses Amazon Cognito user pools as an identity provider. The company must secure access to user records. The company has set up multi-factor authentication (MFA). The company also wants to send a login activity notification by email every time a user logs in.
What is the MOST operationally efficient solution that meets this requirement?
  • A. Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon API Gateway API to invoke the function. Call the API from the client side when login confirmation is received.
  • B. Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon Cognito post authentication Lambda trigger for the function.
  • C. Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Create an Amazon CloudWatch Logs log subscription filter to invoke the function based on the login status.
  • D. Configure Amazon Cognito to stream all logs to Amazon Kinesis Data Firehose. Create an AWS Lambda function to process the streamed logs and to send the email notification based on the login status of each user.
#16 (Accuracy: 91% / 6 votes)
An application running on Amazon EC2 opens connections to an Amazon RDS SQL Server database. The developer does not want to store the user name and password for the database in the code. The developer would also like to automatically rotate the credentials.
What is the MOST secure way to store and access the database credentials?
  • A. Create an IAM role that has permissions to access the database. Attach the role to the EC2 instance.
  • B. Use AWS Secrets Manager to store the credentials. Retrieve the credentials from Secrets Manager as needed.
  • C. Store the credentials in an encrypted text file in an Amazon S3 bucket. Configure the EC2 instance's user data to download the credentials from Amazon S3 as the instance boots.
  • D. Store the user name and password credentials directly in the source code. No further action is needed because the source code is stored in a private repository.
#17 (Accuracy: 91% / 11 votes)
A developer is designing a serverless application for an ecommerce website. An Amazon API Gateway API exposes AWS Lambda functions for billing, payment, and user operations. The website features shopping carts for the users. The shopping carts must be stored for extended periods of time and will be retrieved frequently by the front-end application.
The load on the application will vary significantly based on the time of day and the promotional sales that are offered on the website.
The application must be able to scale automatically to meet these changing demands.
Which solution will meet these requirements?
  • A. Store the data objects on an Amazon RDS DB instance. Cache the data objects in memory by using Amazon ElastiCache.
  • B. Store the data objects on Amazon EC2 instances behind an Application Load Balancer. Use session affinity (sticky sessions) for each user's shopping cart.
  • C. Store the data objects in Amazon S3 buckets. Cache the data objects by using Amazon CloudFront with the maximum TTL.
  • D. Store the data objects in Amazon DynamoDB tables. Cache the data objects by using DynamoDB Accelerator (DAX).
#18 (Accuracy: 100% / 4 votes)
A developer maintains an Amazon API Gateway REST API. Customers use the API through a frontend UI and Amazon Cognito authentication.

The developer has a new version of the API that contains new endpoints and backward-incompatible interface changes.
The developer needs to provide beta access to other developers on the team without affecting customers.

Which solution will meet these requirements with the LEAST operational overhead?
  • A. Define a development stage on the API Gateway API. Instruct the other developers to point the endpoints to the development stage.
  • B. Define a new API Gateway API that points to the new API application code. Instruct the other developers to point the endpoints to the new API.
  • C. Implement a query parameter in the API application code that determines which code version to call.
  • D. Specify new API Gateway endpoints for the API endpoints that the developer wants to add.
#19 (Accuracy: 100% / 3 votes)
A developer is developing an application that uses signed requests (Signature Version 4) to call other AWS services. The developer has created a canonical request, has created the string to sign, and has calculated signing information.

Which methods could the developer use to complete a signed request? (Choose two.)
  • A. Add the signature to an HTTP header that is named Authorization
  • B. Add the signature to a session cookie
  • C. Add the signature to an HTTP header that is named Authentication
  • D. Add the signature to a query string parameter that is named X-Amz-Signature
  • E. Add the signature to an HTTP header that is named WWW-Authenticate
#20 (Accuracy: 94% / 5 votes)
A company deploys a new application to AWS. The company is streaming application logs to Amazon CloudWatch Logs. The company’s development team must receive notification by email when the word “ERROR” appears in any log lines. A developer sets up an Amazon Simple Notification Service (Amazon SNS) topic and subscribes the development team to the topic.

What should the developer do next to meet the requirements?
  • A. Select the appropriate log group. Create a CloudWatch metric filter with “ERROR” as the search term. Create an alarm on this metric that notifies the SNS topic when the metric is 1 or higher.
  • B. In CloudWatch Logs Insights, select the appropriate log group. Create a metric query to search for the term “ERROR” in the logs. Create an alarm on this metric that notifies the SNS topic when the metric is 1 or higher.
  • C. Select the appropriate log group. Create an SNS subscription filter with “ERROR” as the filter pattern. Select the SNS topic as the destination.
  • D. Create a CloudWatch alarm that includes “ERROR” as a filter pattern, a log group dimension that defines the appropriate log group, and a destination that notifies the SNS topic.