Amazon AWS Certified Developer - Associate DVA-C01
Prev

There are 237 results

Next
#31 (Accuracy: 100% / 5 votes)
A developer is adding a feature to a client-side application so that users can upload videos to an Amazon S3 bucket.
What is the MOST secure way to give the application the ability to write files to the S3 bucket?
  • A. Update the S3 bucket policy to allow public write access. Allow any user to upload videos by removing the need to handle user authentication within the client- side application.
  • B. Create a new IAM policy and a corresponding IAM user with permissions to write to the S3 bucket. Store the key and the secret for the user in the application code. Use the key to authenticate the video uploads.
  • C. Configure the API layer of the application to have a new endpoint that creates signed URLs that allow an object to be put into the S3 bucket. Generate a presigned URL through this API call in the client application. Upload the video by using the signed URL.
  • D. Generate a new IAM key and a corresponding secret by using the AWS account root user credentials. Store the key and the secret for the user in the application code. Use the key to authenticate the video uploads.
#32 (Accuracy: 100% / 4 votes)
A developer is designing a serverless application with two AWS Lambda functions to process photos. One Lambda function stores objects in an Amazon S3 bucket and stores the associated metadata in an Amazon DynamoDB table. The other Lambda function fetches the objects from the S3 bucket by using the metadata from the DynamoDB table. Both Lambda functions use the same Python library to perform complex computations and are approaching the quota for the maximum size of zipped deployment packages.
What should the developer do to reduce the size of the Lambda deployment packages with the LEAST operational overhead?
  • A. Package each Python library in its own .zip file archive. Deploy each Lambda function with its own copy of the library.
  • B. Create a Lambda layer with the required Python library. Use the Lambda layer in both Lambda functions.
  • C. Combine the two Lambda functions into one Lambda function. Deploy the Lambda function as a single .zip file archive.
  • D. Download the Python library to an S3 bucket. Program the Lambda functions to reference the object URLs.
#33 (Accuracy: 100% / 3 votes)
A developer has a legacy application that is hosted on-premises. Other applications hosted on AWS depend on the on-premises application for proper functioning.
In case of any application errors, the developer wants to be able to use Amazon CloudWatch to monitor and troubleshoot all applications from one place.

How can the developer accomplish this?
  • A. Install an AWS SDK on the on-premises server to automatically send logs to CloudWatch.
  • B. Download the CloudWatch agent to the on-premises server. Configure the agent to use IAM user credentials with permissions for CloudWatch.
  • C. Upload log files from the on-premises server to Amazon S3 and have CloudWatch read the files.
  • D. Upload log files from the on-premises server to an Amazon EC2 instance and have the instance forward the logs to CloudWatch.
#34 (Accuracy: 100% / 4 votes)
A developer is writing a new AWS Serverless Application Model (AWS SAM) template with a new AWS Lambda function. The Lambda function runs complex code. The developer wants to test the Lambda function with more CPU power.
What should the developer do to meet this requirement?
  • A. Increase the runtime engine version.
  • B. Increase the timeout.
  • C. Increase the number of Lambda layers.
  • D. Increase the memory.
#35 (Accuracy: 100% / 4 votes)
An organization is storing large files in Amazon S3, and is writing a web application to display meta-data about the files to end-users. Based on the metadata a user selects an object to download. The organization needs a mechanism to index the files and provide single-digit millisecond latency retrieval for the metadata.

What AWS service should be used to accomplish this?
  • A. Amazon DynamoDB
  • B. Amazon EC2
  • C. AWS Lambda
  • D. Amazon RDS
#36 (Accuracy: 100% / 4 votes)
A developer is automating a new application deployment with AWS Serverless Application Model (AWS SAM). The new application has one AWS Lambda function and one Amazon S3 bucket. The Lambda function must access the S3 bucket to only read objects.

How should the developer configure AWS SAM to grant the necessary read privilege to the S3 bucket?
  • A. Reference a second Lambda authorizer function.
  • B. Add a custom S3 bucket policy to the Lambda function.
  • C. Create an Amazon Simple Queue Service (SQS) topic for only S3 object reads Reference the topic in the template.
  • D. Add the S3ReadPolicy template to the Lambda function's execution role.
#37 (Accuracy: 100% / 7 votes)
A company stores the photographs in an Amazon S3 bucket. The company wants to resize the photographs automatically after writing the photographs to the S3 bucket. The company creates an AWS Lambda function to resize the photographs.

Which solution will meet these requirements?
  • A. Configure S3 Event Notifications to invoke the Lambda function
  • B. Configure an S3 Lifecycle rule to invoke the Lambda function.
  • C. Configure S3 Select on a schedule to invoke the Lambda function.
  • D. Configure S3 Storage Lens to invoke the Lambda function.
#38 (Accuracy: 100% / 6 votes)
A development team is designing a mobile app that requires multi-factor authentication.

Which steps should be taken to achieve this? (Choose two.)
  • A. Use Amazon Cognito to create a user pool and create users in the user pool.
  • B. Send multi-factor authentication text codes to users with the Amazon SNS Publish API call in the app code.
  • C. Enable multi-factor authentication for the Amazon Cognito user pool.
  • D. Use AWS IAM to create IAM users.
  • E. Enable multi-factor authentication for the users created in AWS IAM.
#39 (Accuracy: 100% / 5 votes)
A developer is integrating Amazon ElastiCache in an application. The cache will store data from a database. The cached data must populate real-time dashboards.

Which caching strategy will meet these requirements?
  • A. A read-through cache
  • B. A write-behind cache
  • C. A lazy-loading cache
  • D. A write-through cache
#40 (Accuracy: 100% / 3 votes)
A company has a web application in an Amazon Elastic Container Service (Amazon ECS) cluster running hundreds of secure services in AWS Fargate containers. The services are in target groups routed by an Application Load Balancer (ALB). Application users log in to the website anonymously, but they must be authenticated using any OpenID Connect protocol-compatible identity provider (IdP) to access the secure services.

Which authentication approach would meet these requirements with the LEAST amount of effort?
  • A. Configure the services to use Amazon Cognito.
  • B. Configure the ALB to use Amazon Cognito.
  • C. Configure the services to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP.
  • D. Configure the Amazon ECS cluster to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP.