Amazon AWS Certified Developer - Associate DVA-C02
Prev

There are 313 results

Next
#61 (Accuracy: 92% / 4 votes)
A company has a serverless application on AWS that uses a fleet of AWS Lambda functions that have aliases. The company regularly publishes new Lambda function by using an in-house deployment solution. The company wants to improve the release process and to use traffic shifting. A newly published function version should initially make available only to a fixed percentage of production users.

Which solution will meet these requirements?
  • A. Configure routing on the alias of the new function by using a weighted alias.
  • B. Configure a canary deployment type for Lambda.
  • C. Configure routing on the new versions by using environment variables.
  • D. Configure a linear deployment type for Lambda.
#62 (Accuracy: 100% / 6 votes)
A company has developed a new serverless application using AWS Lambda functions that will be deployed using the AWS Serverless Application Model (AWS SAM) CLI.

Which step should the developer complete prior to deploying the application?
  • A. Compress the application to a .zip file and upload it into AWS Lambda.
  • B. Test the new AWS Lambda function by first tracing it in AWS X-Ray.
  • C. Bundle the serverless application using a SAM package.
  • D. Create the application environment using the eb create my-env command.
#63 (Accuracy: 100% / 6 votes)
A developer needs to deploy an application running on AWS Fargate using Amazon ECS. The application has environment variables that must be passed to a container for the application to initialize.

How should the environment variables be passed to the container?
  • A. Define an array that includes the environment variables under the environment parameter within the service definition.
  • B. Define an array that includes the environment variables under the environment parameter within the task definition.
  • C. Define an array that includes the environment variables under the entryPoint parameter within the task definition.
  • D. Define an array that includes the environment variables under the entryPoint parameter within the service definition.
#64 (Accuracy: 100% / 6 votes)
A developer has been asked to create an AWS Lambda function that is invoked any time updates are made to items in an Amazon DynamoDB table. The function has been created, and appropriate permissions have been added to the Lambda execution role. Amazon DynamoDB streams have been enabled for the table, but the function is still not being invoked.

Which option would enable DynamoDB table updates to invoke the Lambda function?
  • A. Change the StreamViewType parameter value to NEW_AND_OLD_IMAGES for the DynamoDB table.
  • B. Configure event source mapping for the Lambda function.
  • C. Map an Amazon Simple Notification Service (Amazon SNS) topic to the DynamoDB streams.
  • D. Increase the maximum runtime (timeout) setting of the Lambda function.
#65 (Accuracy: 100% / 5 votes)
A company runs an application on AWS. The application uses an AWS Lambda function that is configured with an Amazon Simple Queue Service (Amazon SQS) queue called high priority queue as the event source. A developer is updating the Lambda function with another SQS queue called low priority queue as the event source. The Lambda function must always read up to 10 simultaneous messages from the high priority queue before processing messages from low priority queue. The Lambda function must be limited to 100 simultaneous invocations.

Which solution will meet these requirements?
  • A. Set the event source mapping batch size to 10 for the high priority queue and to 90 for the low priority queue.
  • B. Set the delivery delay to 0 seconds for the high priority queue and to 10 seconds for the low priority queue.
  • C. Set the event source mapping maximum concurrency to 10 for the high priority queue and to 90 for the low priority queue.
  • D. Set the event source mapping batch window to 10 for the high priority queue and to 90 for the low priority queue.
#66 (Accuracy: 100% / 5 votes)
A developer is trying to get data from an Amazon DynamoDB table called demoman-table. The developer configured the AWS CLI to use a specific IAM user’s credentials and ran the following command:

aws dynamodb get-item --table-name demoman-table --key '{"id": {"N":"1993"}}'

The command returned errors and no rows were returned.


What is the MOST likely cause of these issues?
  • A. The command is incorrect; it should be rewritten to use put-item with a string argument.
  • B. The developer needs to log a ticket with AWS Support to enable access to the demoman-table.
  • C. Amazon DynamoDB cannot be accessed from the AWS CLI and needs to be called via the REST API.
  • D. The IAM user needs an associated policy with read access to demoman-table.
#67 (Accuracy: 100% / 6 votes)
A developer is deploying a new application to Amazon Elastic Container Service (Amazon ECS). The developer needs to securely store and retrieve different types of variables. These variables include authentication information for a remote API, the URL for the API, and credentials. The authentication information and API URL must be available to all current and future deployed versions of the application across development, testing, and production environments.
How should the developer retrieve the variables with the FEWEST application changes?
  • A. Update the application to retrieve the variables from AWS Systems Manager Parameter Store. Use unique paths in Parameter Store for each variable in each environment. Store the credentials in AWS Secrets Manager in each environment.
  • B. Update the application to retrieve the variables from AWS Key Management Service (AWS KMS). Store the API URL and credentials as unique keys for each environment.
  • C. Update the application to retrieve the variables from an encrypted file that is stored with the application. Store the API URL and credentials in unique files for each environment.
  • D. Update the application to retrieve the variables from each of the deployed environments. Define the authentication information and API URL in the ECS task definition as unique names during the deployment process.
#68 (Accuracy: 100% / 21 votes)
A company wants to share information with a third party. The third party has an HTTP API endpoint that the company can use to share the information. The company has the required API key to access the HTTP API.
The company needs a way to manage the API key by using code.
The integration of the API key with the application code cannot affect application performance.
Which solution will meet these requirements MOST securely?
  • A. Store the API credentials in AWS Secrets Manager. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.
  • B. Store the API credentials in a local code variable. Push the code to a secure Git repository. Use the local code variable at runtime to make the API call.
  • C. Store the API credentials as an object in a private Amazon S3 bucket. Restrict access to the S3 object by using IAM policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.
  • D. Store the API credentials in an Amazon DynamoDB table. Restrict access to the table by using resource-based policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.
#69 (Accuracy: 100% / 9 votes)
A developer is creating an AWS CloudFormation template to deploy Amazon EC2 instances across multiple AWS accounts. The developer must choose the EC2 instances from a list of approved instance types.
How can the developer incorporate the list of approved instance types in the CloudFormation template?
  • A. Create a separate CloudFormation template for each EC2 instance type in the list.
  • B. In the Resources section of the CloudFormation template, create resources for each EC2 instance type in the list.
  • C. In the CloudFormation template, create a separate parameter for each EC2 instance type in the list.
  • D. In the CloudFormation template, create a parameter with the list of EC2 instance types as AllowedValues.
#70 (Accuracy: 90% / 9 votes)
An application is using Amazon Cognito user pools and identity pools for secure access. A developer wants to integrate the user-specific file upload and download features in the application with Amazon S3. The developer must ensure that the files are saved and retrieved in a secure manner and that users can access only their own files. The file sizes range from 3 KB to 300 MB.
Which option will meet these requirements with the HIGHEST level of security?
  • A. Use S3 Event Notifications to validate the file upload and download requests and update the user interface (UI).
  • B. Save the details of the uploaded files in a separate Amazon DynamoDB table. Filter the list of files in the user interface (UI) by comparing the current user ID with the user ID associated with the file in the table.
  • C. Use Amazon API Gateway and an AWS Lambda function to upload and download files. Validate each request in the Lambda function before performing the requested operation.
  • D. Use an IAM policy within the Amazon Cognito identity prefix to restrict users to use their own folders in Amazon S3.