Amazon AWS Certified Developer - Associate DVA-C01
Prev

There are 237 results

Next
#201 (Accuracy: 94% / 5 votes)
A company is running a software-as-a-service (SaaS) application in its on-premises data center. The application architecture uses a frontend Apache web server to support many customer-specific websites. The Apache web server routes traffic to a different set of servers based on the domain name that is specified in the host header of the initial request.

The company decides to move its architecture to AWS.
A developer is moving the customer-specific backend servers onto Amazon EC2 instances. The developer must configure the EC2 instances in Auto Scaling groups for each customer and must register the instances in different target groups. The developer needs to replace the frontend Apache web server with an Elastic Load Balancing (ELB) load balancer. The developer also must forward queries for specific domain names to the appropriate target groups.

Which configuration on AWS will meet these requirements?
  • A. Use a Network Load Balancer and host-based routing to respective backend target groups.
  • B. Use a Network Load Balancer and path-based routing to respective backend target groups.
  • C. Use an Application Load Balancer and host-based routing to respective backend target groups.
  • D. Use an Application Load Balancer and path-based routing to respective backend target groups.
#202 (Accuracy: 100% / 5 votes)
A developer is designing a web application in which new users will use their email addresses to create accounts. Millions of users are expected to sign up. The application will store attributes for each user.

Which AWS service or feature should the developer implement to meet these requirements?
  • A. Amazon Cognito user pools
  • B. AWS Mobile Hub User File Storage
  • C. AWS AppSync
  • D. AWS Mobile Hub Cloud Logic
#203 (Accuracy: 100% / 5 votes)
A developer is building a new application that uses an Amazon DynamoDB table. The specification states that all items that are older than 48 hours must be removed.

Which solution will meet this requirement?
  • A. Create a new attribute that has the Number data type. Add a local secondary index (LSI) for this attribute, and enable TTL with an expiration of 48 hours. In the application code, set the value of this attribute to the current timestamp for each new item that is being inserted.
  • B. Create a new attribute that has the String data type. Add a local secondary index (LSI) for this attribute, and enable TTL with an expiration of 48 hours. In the application code, set the value of this attribute to the current timestamp for each new item that is being inserted.
  • C. Create a new attribute that has the Number data type. Enable TTL on the DynamoDB table for this attribute. In the application code, set the value of this attribute to the current timestamp plus 48 hours for each new item that is being inserted.
  • D. Create a new attribute that has the String data type. Enable TTL on the DynamoDB table for this attribute. In the application code, set the value of this attribute to the current timestamp plus 48 hours for each new item that is being inserted.
#204 (Accuracy: 100% / 3 votes)
A developer is writing an application in AWS Lambda. To simplify testing and deployments, the developer needs the database connection string to be easily changed without modifying the Lambda code.

How can this requirement be met?
  • A. Store the connection string as a secret in AWS Secrets Manager.
  • B. Store the connection string in an IAM user account.
  • C. Store the connection string in AWS KMS.
  • D. Store the connection string as a Lambda layer.
#205 (Accuracy: 100% / 3 votes)
A company has an Amazon S3 bucket containing premier content that it intends to make available to only paid subscribers of its website. The S3 bucket currently has default permissions of all objects being private to prevent inadvertent exposure of the premier content to non-paying website visitors.

How can the company limit the ability to download a premier content file in the S3 bucket to paid subscribers only?
  • A. Apply a bucket policy that allows anonymous users to download the content from the S3 bucket.
  • B. Generate a pre-signed object URL for the premier content file when a paid subscriber requests a download.
  • C. Add a bucket policy that requires multi-factor authentication for requests to access the S3 bucket objects.
  • D. Enable server-side encryption on the S3 bucket for data protection against the non-paying website visitors.
#206 (Accuracy: 100% / 6 votes)
A developer must build a mobile application that allows users to read and write data from an Amazon DynamoDB table to store user state for each unique user. The solution needs to limit data access to allow users access only to their own data.

Which solution below is the most secure?
  • A. Embed AWS access credentials into the application and create DynamoDB queries that limit user access.
  • B. Use Amazon Cognito identity pools to assign unique identifiers and provide user access.
  • C. Modify the DynamoDB table to allow public read and writes, then add client-side filtering.
  • D. Create a web portal for users to create an account on AWS Directory Service.
#207 (Accuracy: 100% / 4 votes)
A software engineer developed an AWS Lambda function in Node.js to do some CPU-intensive data processing. With the default settings, the Lambda function takes about 5 minutes to complete.

Which approach should a developer take to increase the speed of completion?
  • A. Instead of using Node.js. rewrite the Lambda function using Python.
  • B. Instead of packaging the libraries in the ZIP file with the function, move them to a Lambda layer and use the layer with the function.
  • C. Allocate the maximum available CPU units to the function.
  • D. Increase the available memory to the function.
#208 (Accuracy: 100% / 3 votes)
In a move toward using microservices, a company's management team has asked all development teams to build their services so that API requests depend only on that service's data store. One team is building a Payments service which has its own database; the service needs data that originates in the Accounts database. Both are using Amazon DynamoDB.

What approach will result in the simplest, decoupled, and reliable method to get near-real time updates from the Accounts database?
  • A. Use Amazon Glue to perform frequent ETL updates from the Accounts database to the Payments database.
  • B. Use Amazon ElastiCache in Payments, with the cache updated by triggers in the Accounts database.
  • C. Use Amazon Kinesis Data Firehose to deliver all changes from the Accounts database to the Payments database.
  • D. Use Amazon DynamoDB Streams to deliver all changes from the Accounts database to the Payments database.
#209 (Accuracy: 100% / 4 votes)
A software company must ensure that documents that are uploaded by users are securely stored in Amazon S3. The documents must be encrypted at rest in Amazon S3. The company wants to avoid client-side encryption and does not want to manage the security infrastructure. In addition, the company wants control over the keys that are used for encryption at rest.

Which solution for encryption keys should a developer use to meet these requirements?
  • A. Amazon S3 managed keys
  • B. Application-level encryption with customer-provided encryption keys that are stored in an on-premises hardware security module (HSM)
  • C. AWS Key Management Service (AWS KMS) customer managed keys
  • D. IAM access keys
#210 (Accuracy: 100% / 4 votes)
A development team sets up a project's file directory structure in AWS CodeCommit. The team plans to use AWS CodeBuild and AWS CodeDeploy. The team creates the necessary configuration files for CodeBuild and CodeDeploy. The team wants to name and place these files according to service defaults.

Where should the team place the CodeBuild and CodeDeploy files?
  • A. A directory named "aws" under the route source directory
  • B. A directory named "deploy" under the root source directory
  • C. A directory named "scripts" under the root source directory
  • D. The root of the source directory