AWS DVA-C01 Certified Developer Associate Practice Exam Set 4

You have a legacy application that works via XML messages. You need to place the application behind the API gateway In order for customers to make API calls. Which of the following would you need to configure?


Options are :

  • You will need to work with the Request and Response Data mapping (Correct)
  • Enable CORS
  • Enable Payload compression
  • Enable multiple stages

Answer : You will need to work with the Request and Response Data mapping

An application needs to make use of an SQS queue for working with messages. An SQS queue has been created with the default settings. The application needs 60 seconds to process each message. Which of the following step need to be carried out by the application. ?


Options are :

  • Change the VisibilityTime out for each message and then delete the message after processing is completed. (Correct)
  • Delete the message and change the visibility timeout.
  • Process the message . change the visibility timeout. Delete the message
  • Process the message and delete the message

Answer : Change the VisibilityTime out for each message and then delete the message after processing is completed.

You have been instructed to use the Code Pipeline service for the Cl/CD automation in your company. Due to security reasons • the resources that would be part of the deployment are placed in another account. Which of the following steps need to be carried out to accomplish this deployment? Choose 2 answers from the options given below ?


Options are :

  • Add a cross account role (Correct)
  • Embed the access keys in the code pipeline process
  • Define a customer master key In KMS (Correct)
  • Create a reference Code Pipeline instance in the other account

Answer : Add a cross account role Define a customer master key In KMS

AWS SOA-C00 Certified Sys Ops Administrator Associate Exam Set 5

Your team developed and deployed an application on an EC2 Instance. To test the application, you were given access credentials which also included the rights to write to an S3 bucket. Once the testing was confirmed , an lAM Role was assigned to the Instance. This role only has permissions to read from the bucket. But you notice that the application still has access to write to the 53 bucket. Why is this the case?


Options are :

  • The EBS Volume needs to be reattached again for the instance profile to take effect
  • You need to restart the instance for the Role settings to take effect
  • The Environment variables which were set for CLI access are taking priority (Correct)
  • The CLI is corrupted . hence the credentials are not being revoked

Answer : The Environment variables which were set for CLI access are taking priority

As a developer you have been told to create an API gateway stage that will directly interact with Dynamo DB tables. Which of the following feature of the API gateway must be used to ensure this requirement can be fulfilled?


Options are :

  • Ensure to create an Integration request (Correct)
  • Ensure to enable DAX
  • Ensure to enable CORS
  • Enable Binary payloads

Answer : Ensure to create an Integration request

You just developed code in AWS Lambda that makes use of recursive functions. After several invocations, you are beginning to see throttling errors In the metrics. Which of the following should be done to resolve this issue?


Options are :

  • Use the API gateway to call the recursive code.
  • Use versioning for the recursive function
  • Avoid using recursive code altogether (Correct)
  • Place the recursive function in a separate package

Answer : Avoid using recursive code altogether

Certification : Get AWS Certified Solutions Architect in 1 Day (2018 Update) Set 12

You are planning on using the Server less Application model which will be used to deploy a server less application consisting of a Node.js function. Which of the following steps need to be carried out? Choose 2 answers from the options given below?


Options are :

  • Use the cloud formation deploy command
  • Use the cloud formation package command
  • Use the sam deploy command (Correct)
  • Use the sam package command (Correct)

Answer : Use the sam deploy command Use the sam package command

As a developer , you have enable server logging on an S3 bucket. You have a simple static web page with CSS pages uploaded to the bucket which Is 1 MB in total size. After a duration of 2 weeks • you come back and see that the size of the bucket has increased to 50MB. Which of the following could be a reason for this?


Options are :

  • You have enabled Encryption on the bucket as well . that Is why the space Is being consumed
  • Monitoring has been enabled for the bucket
  • You have enabled CRR on the bucket as well . that is why the space is being consumed
  • This is the normal behavior since the logs are being delivered to the same bucket (Correct)

Answer : This is the normal behavior since the logs are being delivered to the same bucket

You have an application that is hosted on an EC2 Instance. This application is part of a custom domain wwv. demo.? in. The application has been changed to make calls to the API gateway. But the browser Is not rendering the responses and Java script errors are being seen in the developer console. What must be done to ensure that this issue can be resolved?


Options are :

  • Make use of Cognito user pools
  • Make the application call a Lambda function instead.
  • There is an issue with the stage defined on the API gateway. hence define a new stage
  • Enable COPS for the API gateway (Correct)

Answer : Enable COPS for the API gateway

AWS SOA-C00 Certified Sys Ops Administrator Associate Exam Set 4

Your company has a large set of data sets that need to be streamed directly into Amazon 53. Which of the following would be perfect for such a requirement?


Options are :

  • AWS Dynamo DB
  • Kinesis Data Fire hose (Correct)
  • Kinesis Streams
  • AWS Red shift

Answer : Kinesis Data Fire hose

A company is planning on using a cache service for their application. Which of the following should be used for this purpose? An important requirement is that trying to recover data lost in cache is an expensive affair for the company, which they would want to avoid?


Options are :

  • Amazon Elastic Cache — Red is (Correct)
  • Amazon Elastic cache – Mem cached
  • Amazon SQS queues
  • Amazon Lambda

Answer : Amazon Elastic Cache — Red is

A company has a cloud formation template that is used to create a huge list of resources. It creates a VPC, subnets, EC2 Instances , Auto scaling Groups, Load Balancers etc. Which of the following should be considered when designing such Cloud formation templates?


Options are :

  • Ensure to create one entire stack from the template
  • Package the templates together and use the cloud formation deploy command
  • Look towards breaking the templates into smaller manageable templates (Correct)
  • Package the templates together and use the cloud formation package command

Answer : Look towards breaking the templates into smaller manageable templates

AWS Devops Engineer Professional Certified Practice Exam Set 7

Your application currently points to several Lambda functions in AWS. A change is being made to one of the Lambda functions. You need to ensure that application traffic Is shifted slowly from one Lambda function to the other. Which of the following steps would you carry out?


Options are :

  • Create an ALIAS with the -routing-config parameter (Correct)
  • Create a version with the -routingconfig parameter
  • Update the ALIAS with the -routingconfig parameter (Correct)
  • Update the version with the -routing-config parameter

Answer : Create an ALIAS with the -routing-config parameter Update the ALIAS with the -routingconfig parameter

Your company is developing an application that will primarily be used by users on their mobile devices. The users need to have the ability to authenticate themselves via identity providers such as Face book. Which of the following service should be used for user management?


Options are :

  • AWSSAML
  • AWS Cognito (Correct)
  • AWS Federation
  • AWS STS with PAM

Answer : AWS Cognito

When calling an API operation on an EC2 Instance, the following error message was returned A client error (Un authorized Operation) occurred when calling the Run instances operation: You are not authorized to perform this operation. Encoded authorization failure message: oGsbAalV7wlfj8zUqebH UAN HzFbm kzlLlxyjy9xwhl H k99U_cUq 1 FleZnskWDjQl wSHStVfdCEyZlLGoccGpCi Jvowq6mNimO Which of the following can be used to get a human readable error message?


Options are :

  • Use the command aws sts decode-authorization-message (Correct)
  • Use the command aws get authorization-message
  • Use the lAM Policy simulator, enter the error message to get the human read ble format
  • Use the command aws set authorization-message

Answer : Use the command aws sts decode-authorization-message

Certification : Get AWS Certified Solutions Architect in 1 Day (2018 Update) Set 11

You are developing a Java based application that needs to make use of the AWS KMS service for encryption. Which of the following must be done for the encryption and decryption process? Choose 2 answers from the options given below?


Options are :

  • Use the Customer master key to generate a data key for the encryption process (Correct)
  • Use the Customer master key to decrypt the data
  • Use the generated data key to decrypt the data (Correct)
  • Use the Customer master key to encrypt the data

Answer : Use the Customer master key to generate a data key for the encryption process Use the generated data key to decrypt the data

Your team is developing a solution that will make use of Dynamo DB tables. Currently the application is designed to perform scans on the entire table. Which of the following can be done to improve the performance of the application when it interacts with the Dynamo DB table? Choose 2 answers from the options given below ?


Options are :

  • Consider using string partition keys
  • Consider using large tables
  • Consider using queries (Correct)
  • Consider using parallel scans (Correct)

Answer : Consider using queries Consider using parallel scans

Your company is hosting a set of resources on the AWS Cloud. There is now a security requirement that states that all requests to the STS service be monitored. How can you accomplish this requirement? Please select:


Options are :

  • Create a Cloud Trail (Correct)
  • Use Cloud watch metrics
  • Use the STS logging service
  • Monitor the Cloud watch logs service

Answer : Create a Cloud Trail

AWS DVA-C00 Certified Developer Associate Practice Exam Set 7

You?ve define a Dynamo DB table with a read capacity of 5 and a write capacity of 5. Which of the following statements are TRUE? Choose 3 answers from the options given below ? Please select:


Options are :

  • Strong consistent reads of a maximum of 20 KB per second (Correct)
  • Strong consistent reads of a maximum of 40 KB per second
  • Maximum writes of 5KB per second (Correct)
  • Eventual consistent reads of a maximum of 20 KB per second
  • Eventual consistent reads of a maximum of 40 KB per second (Correct)

Answer : Strong consistent reads of a maximum of 20 KB per second Maximum writes of 5KB per second Eventual consistent reads of a maximum of 40 KB per second

Your using the AWS Code Deploy service to deploy an application onto AWS. The application uses secure parameters which are stored in the AWS Systems Manager Parameter store. Which of the following must be done, so that the deployment can be automated via Code Deploy? Choose 2 answers from the options given below ?


Options are :

  • Give permissions to the AWS Code Deploy service via an lAM Role (Correct)
  • Use the aws ssm get-parameters with the —with-no-decryption option
  • Give permissions to the AWS Code Deploy service via AWS Access Keys
  • Use the aws ssm get-parameters with the —with-decryption option (Correct)

Answer : Give permissions to the AWS Code Deploy service via an lAM Role Use the aws ssm get-parameters with the —with-decryption option

An application is currently in production that makes calls to an AWS RDS Instance. The application consists of a reporting module and a transactional system. Due high load times , the response time for the application used to get very high. This was being attributed to the number of queries being fired against the database system. Which of the following can be used to resolve the response time for the application? Please select:


Options are :

  • Place a cloud front distribution In front of the database
  • Enable Read Replicas for the database (Correct)
  • Enable Multi-AZ for the database
  • Move the database to Dynamo DB

Answer : Enable Read Replicas for the database

AWS DVA-C00 Certified Developer Associate Practice Exam Set 14

A company is planning on using Amazon Kinesis fire hose to stream data into an 53 bucket They need the data to be transformed first before it can be sent to the 53 bucket. Which of the following would be used for the transformation process?


Options are :

  • AWS EC2
  • AWS API Gateway
  • AWS Lambda (Correct)
  • AWS SQS

Answer : AWS Lambda

You have defined some custom policies in AWS. You need to test out the permissions assigned to those policies. Which of the following can be used for this purpose via the CLI? Choose 2 answers from the options given below ?


Options are :

  • Use the aws iam get.custom-policy command
  • Get the AWS lAM Access keys first
  • Get the context keys first (Correct)
  • Use the aws iam simulate-custom-policy command (Correct)

Answer : Get the context keys first Use the aws iam simulate-custom-policy command

An application is currently in production that makes calls to an AWS RDS Instance. The database has recently been facing performance problems. It has been noticed that the same queries are putting a strain on the database. Which of the following can be used to resolve the issue?


Options are :

  • Enable Multi-AZ for the database
  • Place an SQS queue in front of the database
  • Place an Elastic Cache in front of the database (Correct)
  • Place a cloud front distribution in front of the database

Answer : Place an Elastic Cache in front of the database

AWS SOA-C00 Certified Sys Ops Administrator Associate Exam Set 8

A company is storing sensitive data in their 53 bucket. The company policy states that all objects in the S3 bucket need to be encrypted at rest. Which of the following help ensure this policy is met?


Options are :

  • Deny permission to upload an object if the header includes x-allow-encryption
  • Deny permission to upload an object if the header includes x-amz-serverside-encryption
  • Deny permission to upload an object If the header does not include xallow-encryption
  • Deny permission to upload an object if the header does not include x-amz-server-sideencryption (Correct)

Answer : Deny permission to upload an object if the header does not include x-amz-server-sideencryption

A Dynamo DB table is set to have a Read capacity of 5. Which of the following will give the maximum read throughput for the table?


Options are :

  • Read capacity set to 5 for 4KB reads of data at eventual consistency (Correct)
  • Read capacity set to 5 for 1 KB reads of data at eventual consistency
  • Read capacity set to 5 for 4KB reads of data at strong consistency
  • Read capacity set to 15 for 1 KB reads of data at strong consistency

Answer : Read capacity set to 5 for 4KB reads of data at eventual consistency

You are developing an application for your company. They need to ensure that the JSON data generated by the application is stored In a backend store. Which of the following is the ideal data store for this scenario?


Options are :

  • AWS RDS MYSQL
  • AWS Dynamo DB (Correct)
  • AWS Red Shift
  • AWS Aurora

Answer : AWS Dynamo DB

AWS DVA-C01 Certified Developer Associate Practice Exam Set 7

You need to give the API gateway URL to a set of users for testing. What must be done before the users can test the API?


Options are :

  • Generate the SDI< for the API
  • Enable support for binary payloads
  • Ensure that a deployment Is created In the API gateway (Correct)
  • Ensure that CORS is enabled for the API gateway

Answer : Ensure that a deployment Is created In the API gateway

An application currently makes use of Dynamo DB tables. There are thousand requests made per second on the Dynamo DB table. Another application takes the changes to the items In the Dynamo DB table, for further analytics processing. Which of the following can be affectively used to manage this requirement?


Options are :

  • Enable streams for Dynamo DB (Correct)
  • Enable a scan on the entire table to check for changes
  • Enable global tables for Dynamo DB
  • Create a query to check for changes

Answer : Enable streams for Dynamo DB

Your team has developed an application that makes use of AWS resources. In order to provide frequent releases to the customer, you are required to automate the Cl/CD process. Which of the following can be used for this purpose?


Options are :

  • Create a Pipeline using AWS Code Pipeline. Configure a stage for Unit testing as well in the Pipeline. (Correct)
  • Use AWS Code Commit to host your code repository. Use the build tool in AWS Code Commit to build your pipeline
  • Create a Pipeline in the AWS Code Build Service
  • Create a Pipeline in the AWS Code Star service

Answer : Create a Pipeline using AWS Code Pipeline. Configure a stage for Unit testing as well in the Pipeline.

Certification : Get AWS Certified Solutions Architect in 1 Day (2018 Update) Set 17

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions