AWS DVA-C00 Certified Developer Associate Practice Exam Set 5

Your team has developed an application that makes use of AWS resources. In order to provide frequent releases to the customer, you are required to automate the Cl/CD process. Which of the following can be used for this purpose?


Options are :

  • Use AWS Code Commit to host your code repository. Use the build tool in AWS Code Commit to build your pipeline
  • Create a Pipeline in the AWS Code Build Service
  • Create a Pipeline using AVIS Code Pipeline. Configure a stage for Unit testing as well in the Pipeline (Correct)
  • Create a Pipeline in the AWS Code Star service

Answer : Create a Pipeline using AVIS Code Pipeline. Configure a stage for Unit testing as well in the Pipeline

As a developer you have been told to create an API gateway stage that will directly interact with Dynamo DB tables. Which of the following feature of the API gateway must be used to ensure this requirement can be fulfilled?


Options are :

  • Ensure to enable DAX
  • Ensure to create an Integration request (Correct)
  • Enable Binary payloads
  • Ensure to enable CORS

Answer : Ensure to create an Integration request

You?re developing an application that is going to make use of Amazon Kinesis. Due to the high throughput, you decide to have multiple shards for the streams. Which of the following is TRUE when it comes to processing data across multiple shards?


Options are :

  • You need to use Kinesis fire hose to guarantee the order of data.
  • You cannot guarantee the order of data across multiple shards. Its possible only within a shard
  • Order of data is not possible at all in Kinesis streams
  • Order of data is possible across all shards in a stream (Correct)

Answer : Order of data is possible across all shards in a stream

You are developing a mobile based application that needs to make use of an authentication service. There are a set of videos files which need to be accessed via unauthenticated access. How can you BEST achieve this using AWS?


Options are :

  • Use AWS Cognito with unauthenticated access enabled (Correct)
  • Use AWS STS with SAML
  • Create an AM user with public access
  • Create an lAM group with public access

Answer : Use AWS Cognito with unauthenticated access enabled

As a developer you have created a Lambda function that is used to work with a bucket in Amazon S3. The Lambda function is not working as expected. You need to debug the Issue and understand what?s the underlying Issue. How can you accomplish this?


Options are :

  • Set the Lambda function debugging level to verbose
  • Put logging statements In your code (Correct)
  • Use AWS Cloud watch metrics
  • Use AWS Cloud trail logs

Answer : Put logging statements In your code

Your planning to use AWS Kinesis streams for an application being developed for a company. The company policy mandates that all data is stored at rest. How can you accomplish this in the easiest way possible for Kinesis streams?


Options are :

  • Enable server-side encryption for Kinesis streams (Correct)
  • Use the AWS CLI to encrypt the data
  • Enable client-side encryption for Kinesis streams
  • Use the SDK for Kinesis to encrypt the data before being stored at rest

Answer : Enable server-side encryption for Kinesis streams

You have an application that is hosted on an EC2 Instance. This application is part of a custom domain www.demo.com. The application has been changed to make calls to the API gateway. But the browser is not rendering the responses and Java script errors are being seen In the developer console. What must be done to ensure that this issue can be resolved?


Options are :

  • Make the application call a Lambda function instead.
  • Make use of Cognito user pools
  • There is an issue with the stage defined on the API gateway. hence define a new stage
  • Enable CORS for the API gateway (Correct)

Answer : Enable CORS for the API gateway

You are planning on using the Server less Application model which will be used to deploy a servervicess application consisting of a Node. Js function. Which of the following steps need to be carried out? Choose 2 answers from the options given below.


Options are :

  • Use the cloud formation deploy command
  • Use the sam deploy command (Correct)
  • Use the cloud formation package command
  • Use the sam package command (Correct)

Answer : Use the sam deploy command Use the sam package command

Your company is planning on using the Simple Storage service to host objects that will be accessed by users. There is a speculation that there would be roughly 3000 GET requests per second. Which of the following could be used to ensure optimal performance? Choose 2 answers from the options given below?


Options are :

  • Use hash key prefixes for the object keys (Correct)
  • Enable versioning for the objects
  • Enable Cross Region Replication for the bucket
  • Use a Cloud front distribution In front of the S3 bucket (Correct)

Answer : Use hash key prefixes for the object keys Use a Cloud front distribution In front of the S3 bucket

Your application must write to an SQS queue. Your corporate security policies require that AWS credentials are always encrypted and are rotated at least once a week. How can you securely provide credentials that allow your application to write to the queue?


Options are :

  • Have the application fetch an access key from an Amazon S3 bucket at run time
  • Create environment variables in the EC2 Instance with the Access Keys
  • Launch the applications Amazon EC2 instance with an lAM role. (Correct)
  • Embed the Access keys in the application

Answer : Launch the applications Amazon EC2 instance with an lAM role.

An application is currently accessing a Dynamo DB table. Currently the tables queries are performing well. Changes have been made to the application and now the performance of the application Is starting to degrade. After looking at the changes , you see that the queries are making use of an attribute which is not the partition key? Which of the following would be the adequate change to make to resolve the issue?


Options are :

  • Add an index for the Dynamo DB table (Correct)
  • Change all the queries to ensure they use the partition key
  • Change the read capacity on the table
  • Enable global tables for Dynamo DB

Answer : Add an index for the Dynamo DB table

Your company is hosting a set of resources on the AWS Cloud. There is now a security requirement that states that all requests to the STS service be monitored. How can you accomplish this requirement?


Options are :

  • Use Cloud watch metrics
  • Monitor the Cloud watch logs service
  • Create a cloud watch trail (Correct)
  • Use the STS logging service

Answer : Create a cloud watch trail

A company has a cloud formation template that is used to create a huge list of resources. It creates a VPC, subnets, EC2 Instances ,Auto scaling Groups, Load Balancers etc. Which of the following should be considered when designing such Cloud formation templates?


Options are :

  • Package the templates together and use the cloud formation deploy command
  • Ensure to create one entire stack from the template
  • Package the templates together and use the cloud formation package command
  • Look towards breaking the templates into smaller manageable templates ...- (Correct)

Answer : Look towards breaking the templates into smaller manageable templates ...-

You have defined some custom policies in AWS. You need to test out the permissions assigned to those policies. Which of the following can be used for this purpose via the CLI? Choose 2 answers from the options given below ?


Options are :

  • Use the aws jam get-custom-policy command
  • Use the aws lam simulate-custom-policy command (Correct)
  • Get the context keys first (Correct)
  • Get the AWS lAM Access keys first

Answer : Use the aws lam simulate-custom-policy command Get the context keys first

Your team has a Code Commit repository in your account. You need to give access to a set of developer?s in another account access to your Code Commit repository. Which of the following is the most effective way to grant access?


Options are :

  • Create an lAM Group, add the lAM users and then provide access to the repository
  • Create lAM users for each developer and provide access to the repository
  • Enable public access for the repository
  • Create a cross account role. give the role the privileges. Provide the role ARN to the developers (Correct)

Answer : Create a cross account role. give the role the privileges. Provide the role ARN to the developers

Your team is developing a solution that will make use of Dynamo DB tables. Currently the application is designed to perform scan?s on the entire table. Which of the following can be done to improve the performance of the application when it Interacts with the Dynamo DB table? Choose 2 answers from the options given below ?


Options are :

  • Consider using parallel scans (Correct)
  • Consider using string partition keys
  • Consider using large tables
  • Consider using queries (Correct)

Answer : Consider using parallel scans Consider using queries

You are developing an application that would be used to upload images from users. You need to effectively store the images and also the name of the user who uploaded the image. How would you accomplish this? Choose 2 answers from the options given below?


Options are :

  • Store the images in Dynamo DB
  • Store the name of the user in 53
  • Store the name of the user in Dynamo DB (Correct)
  • Store the Images In S3 (Correct)

Answer : Store the name of the user in Dynamo DB Store the Images In S3

Your team developed and deployed an application on an EC2 Instance. To test the application, you were given access credentials which also included the rights to write to an 53 bucket. Once the testing was confirmed , an lAM Role was assigned to the Instance. This role one has permissions to read from the bucket. But you notice that the application still has access to write to the S3 bucket. Why is this the case?


Options are :

  • You need to restart the instance for the Role settings to take effect
  • The CU is corrupted. hence the credentials are not being revoked
  • The Environment variables which were set for CLI access are taking priority (Correct)
  • The EBS Volume needs to be reattached again for the Instance profile to take effect

Answer : The Environment variables which were set for CLI access are taking priority

Your company has asked you to maintain an application using Elastic Beanstalk. They have mentioned that when updates are made to the application , that the infrastructure maintains its full capacity. Which of the following deployment methods should you use for this requirement?


Options are :

  • Immutable
  • Rolling
  • Rolling with additional batch (Correct)
  • All at once

Answer : Rolling with additional batch

Your company has asked you to maintain an application using Elastic Beanstalk. At times , you normally hit the application version limit when deploying new versions of the application. Which of the following Is the most effective way to manage this Issue?


Options are :

  • Create multiple applications and deploy the different versions to different applications
  • Delete the application versions manually.
  • Create an application lifecycle policy (Correct)
  • Create multiple environments and deploy the different versions to different environments

Answer : Create an application lifecycle policy

An application is currently in production that makes calls to an AWS RDS Instance. The database has recently been facing performance problems. It has been noticed that the same queries are putting a strain on the database. Which of the following can be used to resolve the issue?


Options are :

  • Place an Elastic Cache in front of the database (Correct)
  • Place a cloud front distribution in front of the database
  • Enable Multi-AZ for the database
  • Place an SOS queue in front of the database

Answer : Place an Elastic Cache in front of the database

Your developing a common lambda function that will be used across several environments such as staging, development etc. The lambda function needs to interact with a database In each of these environments. What is the best way to develop the Lambda function?


Options are :

  • Create a Lambda function for each environment so that each function can point to its respective database
  • Create one Lambda function and create several versions for each database
  • Create one Lambda function and create environment variables for each database (Correct)
  • Create one Lambda function and create several ALIAS for each database

Answer : Create one Lambda function and create environment variables for each database

Your company is developing an application that will primarily be used by users on their mobile devices. The users need to have the ability to authenticate themselves via identity providers such as Face book. Which of the following service should be used for user management?


Options are :

  • AWS Cognito (Correct)
  • AWS Federation
  • AWS STS with lAM
  • AWS SAML

Answer : AWS Cognito

An application is currently in production that makes calls to an AWS RDS Instance. The database has recently been facing performance problems. It has been noticed that the same queries are putting a strain on the database. Which of the following can be used to resolve the issue?


Options are :

  • Place an Elastic Cache in front of the database (Correct)
  • Place an SQS queue in front of the database
  • Enable Multi-AZ for the database
  • Place a cloud front distribution in front of the database

Answer : Place an Elastic Cache in front of the database

Your company currently stores its objects in S3. The current request rate is around 2000 GET requests per second. There is now a mandate for objects to be encrypted at rest, So you enable encryption using KMS. There are now performance issues being encountered. What could be the main reason behind this?


Options are :

  • You need to also enable CORS to ensure optimal performance
  • You are now exceeding the throttle limits for KMS API calls (Correct)
  • You need to also enable versioning to ensure optimal performance
  • Amazon S3 will now throttle the requests since they are now being encrypted using KMS

Answer : You are now exceeding the throttle limits for KMS API calls

A Dynamo DB table is set to have a write capacity of 5. Which of the following will give the maximum read throughput for the table?


Options are :

  • Read capacity set to 5 for 4KB reads of data at strong consistency
  • Read capacity set to 15 for 1 KB reads of data at strong consistency
  • Read capacity set to 5 for 1 KB reads of data at eventual consistency
  • Read capacity set to 5 for 4KB reads of data at eventual consistency (Correct)

Answer : Read capacity set to 5 for 4KB reads of data at eventual consistency

You have a lambda function that is processed asynchronously. You need a way to check and debug issues if the function fails? How could you accomplish this?


Options are :

  • Assign a dead letter queue (Correct)
  • Use AWS Cloud trail logs
  • Configure SNS notifications
  • Use AWS Cloud watch metrics

Answer : Assign a dead letter queue

An application needs to use an authentication in AWS. Users need to have MFA enabled when trying to log into the application. Which of the following can be used for this purpose?


Options are :

  • Create an lAM group with public access
  • Use AWS Cognito with MFA (Correct)
  • Create an lAM user with public access
  • Use AWS STS with SAML

Answer : Use AWS Cognito with MFA

You are a developer for a company. You have been asked to deploy an application for development purposes onto an Elastic beanstalk environment. You need to ensure that custom software is installed on th backend Linux servers that are launched as part of the Elastic Beanstalk environment. Which of the following can be used to achieve this? Choose 2 answers from the options given below ?


Options are :

  • Create an XML file with the required package names to be Installed on the server
  • Create an YAML file with the required package names to be installed on the server (Correct)
  • Place the file in the .eb extensions folder in your Application Source Bundle (Correct)
  • Place the file in the .config folder in your Application Source Bundle

Answer : Create an YAML file with the required package names to be installed on the server Place the file in the .eb extensions folder in your Application Source Bundle

Your company has a large set of data sets that need to be streamed directly into Amazon 53. Which of the following would be perfect for such a requirement?


Options are :

  • AWS Dynarno DB
  • Kinesis Streams
  • Kinesis Data Fire hose (Correct)
  • AWS Red shift

Answer : Kinesis Data Fire hose

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions