AWS DVA-C00 Certified Developer Associate Practice Exam Set 1

How many requests in SQS are available in the free tier? Choose the correct answer from the options below Please select?


Options are :

  • 1000
  • 10 million
  • 10,000
  • 1 million (Correct)

Answer : 1 million

One of your requirements is to setup an S3 bucket to store your files like documents and images. However, those objects should not be directly accessible via the S3 URL, they should ONLY be accessible from pages on your website so that only your paying customers can see them. How could you implement this? Choose the correct answer from the options below


Options are :

  • You can use server-side and client-side encryption. where only your application can decrypt the objects
  • Use HTTPS endpoints to encrypt your data
  • You can use a bucket policy and check for the AWS: Referrer key in a condition, where that key matches domain (Correct)
  • You cant The S3 URL must be public in order to use It on your website

Answer : You can use a bucket policy and check for the AWS: Referrer key in a condition, where that key matches domain

How much data can be stored in 53? Choose the correct answer from the options below Please select:


Options are :

  • SGB
  • 500 GB (Correct)
  • No limits to the amount of data 7
  • 500 TB

Answer : 500 GB

Buckets can contain both encrypted and non-encrypted objects. Choose the correct answer from the options below ?


Options are :

  • FALSE
  • TRUE (Correct)

Answer : TRUE

What is one key difference between an Amazon EBS-backed and an instance-store backed instance? Choose the correct answer from the options below Please select:


Options are :

  • Virtual Private Cloud requires EBS backed instances
  • Amazon EBS-backed instances can be stopped and restarted (Correct)
  • Auto scaling requires using Amazon EBS-backed instances
  • Instance-store backed instances can be stopped and restarted

Answer : Amazon EBS-backed instances can be stopped and restarted

Which of the following would you not expect to see in an SNS message body? Please select:


Options are :

  • Signature
  • Subject ld (Correct)
  • Message ld
  • Signing Certt JRL

Answer : Subject ld

Which of the following request headers, when specified in an API call, will cause an object to be SSE? Choose the correct answer from the options below ?


Options are :

  • AES256
  • x-amz-server-side-encryption (Correct)
  • amz-server-side-encryption
  • server-side-encryption

Answer : x-amz-server-side-encryption

Which API call occurs in the final process of creating an AMI? Choose the correct answer from the options below Please select:


Options are :

  • Registerimage
  • Createlmage
  • ami-register-image (Correct)
  • ami-create-image

Answer : ami-register-image

Can one configure anonymous access to a queue? Choose the correct answer from the options below Please select?


Options are :

  • FALSE
  • TRUE (Correct)

Answer : TRUE

Company B provides an online image recognition service and utilizes SQS to decouple system components for scalability. The SQS consumers poll the imaging queue as often as possible to keep end-to-end throughput as high as possible. However, Company B is realizing that polling in tight loops Is burning CPU cycles and increasing costs with empty responses. How can Company B reduce the number empty responses? Choose the correct answer from the options below ?


Options are :

  • Set the imaging queue Message Retention Period attribute to 20 seconds
  • Set the imaging queue Receive Message Wait Time Seconds Attribute to 20 seconds (Correct)
  • Set the Delay Seconds parameter of a message to 20 seconds
  • Set the imaging queue Visibility Timeout attribute to 20 seconds

Answer : Set the imaging queue Receive Message Wait Time Seconds Attribute to 20 seconds

You have multiple instances behind private and public subnets. None of the instances have an EIP assigned to them. How can you connect them to the internet to download system updates? Choose the correct answer from the options below?


Options are :

  • Create a NAT instance (Correct)
  • Assign EIP to each instance
  • Use both a NAT instance and a VPN
  • Connect to a VPN

Answer : Create a NAT instance

An lAM role, when assigned to an EC2 instance, will allow code to be executed on that instance without API access keys. Choose the correct answer from the options below Please select:


Options are :

  • TRUE (Correct)
  • FALSE

Answer : TRUE

Which API call would best be used to describe an Amazon Machine Image? Choose the correct answer from the options below ? Please select:


Options are :

  • ami-describe-image
  • Describe image
  • Describe images (Correct)
  • ami-describe-images

Answer : Describe images

What is Amazon SQS max message size? Choose the correct answer from the options below Please select:


Options are :

  • 64KB
  • 256 KB (Correct)
  • 128KB
  • 16KB

Answer : 256 KB

You decide to configure a bucket for static website hosting. As per the AWS documentation, you create a bucket named „mybucket.com? and then you enable website hosting with an index document of „index.html? and you leave the error document as blank. You then upload a file named „index.html? to the bucket. After clicking on the endpoint of mybucket.com.s3- website-us-east-1 .amazonAWS.com you receive 403 Forbidden error. You then change the CORS configuration on the bucket so that everyone has access, however you still receive the 403 Forbidden error. What additional step do you need to do so that the endpoint is accessible to everyone? Choose the correct answer from the options below ?


Options are :

  • Change the permissions on the index.html file also, so that everyone has access. (Correct)
  • Wait for the DNS change to propagate
  • You need to add a name for the error document, because it is a required field.
  • Register mybucket.com on Route53

Answer : Change the permissions on the index.html file also, so that everyone has access.

If you?re executing .Net code against AWS on an EC2 instance that is assigned an lAM role, which of the following Is a true statement? Choose the correct answer from the options below Please select:


Options are :

  • The code will assume the same permissions as the lAM role
  • The code must have AWS access keys in order to execute (Correct)
  • Only .Net code can assume lAM roles
  • None of the above

Answer : The code must have AWS access keys in order to execute

You are deploying your first EC2 instance in AWS and are using the AWS console to do this. You have chosen your AMI and your instance type and have now come to the screen where you configure your instance details. One of the things that you need to decide Is whether you want to autoassign a public IP address or not. You assume that if you do not choose this option you will be able to assign an Elastic P address later, which happens to be a correct assumption. Which of the below options best describes why an Elastic IP address would be preferable to a public IP address? Choose the correct answer from the options below Please select:


Options are :

  • With an Elastic IP address, you can mask the failure of an instance or software by rapidly remapping the address to another instance in your account. (Correct)
  • An Elastic IP address is free, whilst you must pay for a public P address
  • An Elastic IP address cannot be accessed from the internet like a public IP address and hence is safer from a security standpoint.
  • You can have an unlimited amount of Elastic IP addresses, however public IP addresses are limited In number.

Answer : With an Elastic IP address, you can mask the failure of an instance or software by rapidly remapping the address to another instance in your account.

AMIs can be shared to individual AWS accounts. Choose the correct answer from the options below Please select:


Options are :

  • FALSE
  • TRUE (Correct)

Answer : TRUE

A Developer is migrating an on-premises web application to the AWS Cloud. The application currently runs on a 32-processor server and stores session state in memory. On Friday afternoons the server runs at 75% CPU utilization, but only about 5% CPU utilization at other times. How should the Developer change to code to better take advantage of running in the cloud?


Options are :

  • Store session state in an Elastic Cache cluster. (Correct)
  • Store session state on EC2 instance Store
  • Encrypt the session state data In memory
  • Compress the session state data in memory

Answer : Store session state in an Elastic Cache cluster.

After having created a new Linux instance on Amazon EC2, and downloaded the .pem file (called LAfile.pem) you try and SSH into your IP address (52.2.222.22) using the following command. ssh -I LAfiIe.pem ec2-user@52.2.222.22 However you receive the following error. WARNING: UNPROTECTED PRIVATE KEY FILE! What is the most probable reason for this and how can you fix it?


Options are :

  • You do not have root access on your terminal and need to use the sudo option for this to work as follows. I ?sudo ssh -i LAfiIe.pem ec2-user@52.2.222.22?
  • Your key file must not be publicly viewable for SSH to work. You need to modify your pem file as follows ?chmod 400 LAfile.pem? v (Correct)
  • Your key file does not have the correct permissions for you to run the command. You need to modify your pem file as follows ?chmod 644 LAfiIe.pem?
  • Your key file is not encrypted. You need to use the -u option for un encrypted not the -i option as follows. ?ssh -u LAf1Ie,pem ec2-user@52.2.222.22?

Answer : Your key file must not be publicly viewable for SSH to work. You need to modify your pem file as follows ?chmod 400 LAfile.pem? v

What is the best method for maintaining application session state when using an Elastic Load Balancer? Choose the correct answer from the options below Please select:


Options are :

  • Enable Application Generated Cookie Stickiness
  • Use Elastic Cache (Correct)
  • Disable Stickiness
  • Enable Load Balancer Generated Cookie Stickiness

Answer : Use Elastic Cache

Amazon Simple Notification Service (Amazon SNS) provides support for delivery of message attributes to Amazon SQS endpoints and each message attribute consists of the following items: Name, Type and Value. Which of the following is TRUE, regarding message attributes? Choose the correct answer from the options below Please select:


Options are :

  • Amazon Simple Notification Service (Amazon SNS) provides support for delivery of message attributes to Amazon SQS endpoints and each message attribute consists of the following items: Name, Type and Value. Which of the following is TRUE, regarding message attributes? Choose the correct answer from the options below Please select:
  • Name. type and value should not be empty or null but the message body can be empty or null.
  • Name, type, and value must not be empty or null and the message body shouldn?t be empty or null (Correct)
  • Name, type. and value can be empty or null and the message body can be empty or null.

Answer : Name, type, and value must not be empty or null and the message body shouldn?t be empty or null

An organization?s application needs to monitor application specific events with a standard AWS service. The service should capture the number of logged in users and trigger events accordingly. During peak times, monitoring frequency will occur every 10 seconds. What should be done to meet these requirements?


Options are :

  • Create a standard resolution custom Amazon Cloud Watch log
  • Create a custom Amazon Cloud Trail log.
  • Create a high resolution custom Amazon Cloud Watch metric (Correct)
  • Create an Amazon SNS notification

Answer : Create a high resolution custom Amazon Cloud Watch metric

In S3 what can be used to delete a large number of objects Please select:


Options are :

  • There is no such option available
  • Multi-S3 Delete
  • Quick Delete
  • Multi-Object Delete (Correct)

Answer : Multi-Object Delete

You have just set up a push notification service to send a message to an app installed on a device with the Apple Push Notification Service. It seems to work fine. You now want to send a message to an app installed on devices for multiple platforms, those being the Apple Push Notification Service(APNS) and Google Cloud Messaging for Android (GCM). What do you need to do first for this to be successful? Choose the correct answer from the options below ?


Options are :

  • Request a Token from Mobile Platforms, so that each device has the correct access control policies to access the SNS publisher
  • Create a Platform Application Object which will connect all of the mobile devices with your app to the
  • Request Credentials from Mobile Platforms, so that each device has the correct access control policies to access the SNS publisher.
  • in order to be able to connect to the push notification service you are trying to setup (Correct)

Answer : in order to be able to connect to the push notification service you are trying to setup

How many messages queues can be created in SQS? Choose the correct answer from the options below ?


Options are :

  • Any number (Correct)
  • 100
  • 50
  • 200

Answer : Any number

True or False: A core benefit of using a SQS subscription endpoint with Amazon SNS is that SQS Messages can be delivered to applications that require immediate notification of an event and messages are also persistent in an Amazon SQS queue for other applications to process later in time (considering the SQS limitation on how long the messages can be stored in SQS queue). Please select:


Options are :

  • FALSE
  • TRUE (Correct)

Answer : TRUE

Company B is using Amazon SQS to decouple their systems for scale ability. However, they need to send messages up to 456Kb In size. What might Company B do in order to send more than 256KB of data? Choose the correct answer from the options below


Options are :

  • Any of the above
  • Set the Maximum Message Size attribute to 456KB
  • Request an increase of the message limit by contacting Amazon
  • Use the Amazon SQS Extended Client Library for Java ., (Correct)

Answer : Use the Amazon SQS Extended Client Library for Java .,

In regards to their data consistency model, AWS states that ?Amazon S3 buckets in all Regions provide read- after-write consistency for PUTS of new objects and eventual consistency for overwrite PUTS and DELETES. What does AWS actually mean when they say Read-after-write consistency for PUTS of new objects? Choose the correct answer from the options below?


Options are :

  • If you write a new key to S3. it may write corrupted or partial data.
  • You cannot write a new key to S3 unless there has been a read done prior to the write
  • If you write a new key to S3. you will be able to retrieve any object immediately afterwards. Also, any newly created object or file will be visible immediately, without any delay. (Correct)
  • If you write a new key to S3. a subsequent read might return the old data or the updated data. Your applications should be built with this uncertainty in mind.

Answer : If you write a new key to S3. you will be able to retrieve any object immediately afterwards. Also, any newly created object or file will be visible immediately, without any delay.

All operations on elastic IP addresses can be performed program magically through the API, or manually from Sh the AWS Management Console. Choose the correct answer from the options below Sh Dv ?


Options are :

  • FALSE
  • TRUE (Correct)

Answer : TRUE

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions