AWS DVA-C00 Certified Developer Associate Practice Exam Set 10

Which of the following SNS information item has the following information -?A Universally Unique Identifier, unique for each notification published?. Choose the correct answer from the options below Please select:


Options are :

  • Message id (Correct)
  • Message
  • Topic ARN
  • Type

Answer : Message id

You are writing to a Dynamo DB table and receive the following exception:? Provisioned Through put Exceeded Exception, though according to your Cloud watch metrics for the table, you are not exceeding your provisioned throughput. What could be an explanation for this?


Options are :

  • You?re exceeding your capacity on a particular Hash Key (Correct)
  • You haven?t configured Dynamo DB Auto Scaling triggers
  • You?re exceeding your capacity on a particular Range Key
  • You have not provisioned enough Dynamo DB storage instances
  • You?re exceeding your capacity on a particular Sort Key

Answer : You?re exceeding your capacity on a particular Hash Key

Games-R-Us is launching a new game app for mobile devices. Users will log into the game using their existing Face book account and the game will record player data and scoring information directly to a Dynamo DB table. What is the most secure approach for signing requests to the Dynamo DS API? Choose an answer from the options below?


Options are :

  • Distribute the AWS root account access credentials with the mobile app to sign the requests
  • Create an lAM user with access credentials that are distributed with the mobile app to sign the requests
  • Establish cross account access between the mobile app and the Dynamo DB table to sign the requests
  • Request temporary security credentials using web identity federation to sign the requests (Correct)

Answer : Request temporary security credentials using web identity federation to sign the requests

Which of the following are valid SNS delivery transports? Choose 2 answers from the options below ?


Options are :

  • UDPX
  • SMS (Correct)
  • Dynamo DB
  • Named Pipes
  • HTTP (Correct)

Answer : SMS HTTP

Which Dynamo DB limits can be raised by contacting AWS support? Choose 2 answers from the options below ?


Options are :

  • The number of provisioned throughput units per account (Correct)
  • The number of tables per account (Correct)
  • The number of local secondary indexes per account
  • The maximum storage used per account
  • The number of hash keys per account

Answer : The number of provisioned throughput units per account The number of tables per account

After launching an instance that you intend to serve as a NAT (Network Address Translation) device in a public subnet you modify your route tables to have the NAT device be the target of internet bound traffic of your private subnet. When you try and make an outbound connection to the Internet from an instance in the private subnet, you are not successful. Which of the following steps could resolve the issue? Choose an answer from the options below ?


Options are :

  • Attaching an Elastic lP address to the instance in the private subnet
  • Attaching a second Elastic Network interface (ENI) to the NAT instance, and placing it in the private subnet
  • Attaching a second Elastic Network Interface (ENI) to the instance In the private subnet. and placing it In the public subnet
  • Disabling the Source/Destination Check attribute on the NAT instance (Correct)

Answer : Disabling the Source/Destination Check attribute on the NAT instance

In SQS does long polling cost more than short polling? Choose an answer from the options below Please select?


Options are :

  • FALSE (Correct)
  • TRUE

Answer : FALSE

Which of the following services are key/value stores? Choose 3 answers from the options below Please select?


Options are :

  • Simple Workflow Service
  • Dynamo DB
  • Amazon Elastic Cache (Correct)
  • Simple Notification Service (Correct)
  • Simple Storage Service (Correct)

Answer : Amazon Elastic Cache Simple Notification Service Simple Storage Service

A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via IPSec VPN. The application must authenticate against the onpremise LDAP server. Once authenticated, logged-In users can only access an S3 key space specific to the user. Which two approaches can satisfy the objectives?


Options are :

  • The application authenticates against LDAP, and retrieves the name of an AM role associated with the use/1 The application then calls the lAM Security Token Service to assume that lAM Role. The application can use temporary credentials to access the appropriate 53 bucket. (Correct)
  • The application authenticates against lAM Security Token Service using the LDAP credentials. The application uses those temporary AWS security credentials to access the appropriate S3 bucket.
  • Develop an Identity broker which authenticates against lAM Security Token Service to assume an lAM Role to get temporary AWS security credentials. The application calls the identity broker to get AWS temporary security credentials with access to the appropriate 53 bucket.
  • Develop an identity broker which authenticates against LDAP, and then calls lAM Security Token Service to get lAM federated user credentials. The application calls the identity broker to get AM federated user credentials with access to the appropriate S3 bucket.
  • The application authenticates against LDAP. The application then calls the AM Security Service to login to lAM using the LDAP credentials. The application can use the lAM temporary credentials to access the appropriate S3 bucket.

Answer : The application authenticates against LDAP, and retrieves the name of an AM role associated with the use/1 The application then calls the lAM Security Token Service to assume that lAM Role. The application can use temporary credentials to access the appropriate 53 bucket.

A meteorological system monitors 600 temperature gauges, obtaining temperature samples every minute and saving each sample to a Dynamo DB table. Each sample Involves writing 1 KB of data and the writes are evenly distributed over time. How much write throughput is required for the target table? Choose an from the options below.


Options are :

  • 1 write capacity unit
  • 3600 write capacity units
  • 600 write capacity units
  • 10 write capacity units (Correct)
  • 60 write capacity units

Answer : 10 write capacity units

What are some of the owner operations possible in SNS? Choose 3 correct answers from the options below ?


Options are :

  • Delete Topic (Correct)
  • Add Permission (Correct)
  • Create Topic (Correct)
  • List Subscriptions

Answer : Delete Topic Add Permission Create Topic

How can you secure data at rest on an EBS volume? Choose an answer from the options below Please select:


Options are :

  • Attach the volume to an instance using EC2?s SSL interface.
  • Create an LAM policy that restricts read and write access to the volume.
  • Use an encrypted file system on top of the EBS volume (Correct)
  • Encrypt the volume using the S3 server-side encryption service.
  • Write the data randomly instead of sequentially

Answer : Use an encrypted file system on top of the EBS volume

Company D is running their corporate website on Amazon S3 accessed from http//www.companyd.com. Their marketing team has published new web fonts to a separate S3 bucket accessed by the S3 endpoint https://s3-us-westl. amazonaws.com/cd fonts. While testing the new web fonts, Company D recognized the web fonts are being blocked by the browser. What should Company D do to prevent the web fonts from being blocked by the browser?


Options are :

  • Create a policy on the cd fonts bucket to enable access to everyone 44
  • Add the Content-MD5 header to the request for web fonts in the cd fonts bucket from the website
  • Enable version ing on the cd fonts bucket for each web font
  • Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration (Correct)

Answer : Configure the cdfonts bucket to allow cross-origin requests by creating a CORS configuration

What type of block cipher does Amazon 53 offer for server side encryption? Choose an answer from the options below ?


Options are :

  • Triple DES
  • RCS
  • Advanced Encryption Standard (Correct)
  • Blowfish

Answer : Advanced Encryption Standard

Which features can be used to restrict access to data in 53? Choose 2 answers from the options below Please select:


Options are :

  • Set an 53 ACL on the bucket or the object. (Correct)
  • Use Server-Side encryption to encrypt the data stored in 53 bucket.
  • Enable lAM Identity Federation.
  • Set an 53 Bucket policy. (Correct)

Answer : Set an 53 ACL on the bucket or the object. Set an 53 Bucket policy.

What item operation allows the retrieval of multiple items from a Dynamo DB table in a single API call? Choose an answer from the options below ?


Options are :

  • Batch Get ltem (Correct)
  • Get item
  • Get item Range
  • Get Multiple ltems

Answer : Batch Get ltem

How long can messages live in an SQS queue. Choose the correct answer from the options below ?


Options are :

  • l0days
  • 12 hours
  • l4day s (Correct)
  • 1 year

Answer : l4day s

What is the format of structured notification messages sent by Amazon SNS? Choose an answer from the options below ?


Options are :

  • AJSON object containing Message ld, unsubscribe URL Subject. Message and other values (Correct)
  • An XML object containing Message ld, Duplicate Flag. Message and other values
  • AJSON object containing Message ld. Duplicate Flag. Message and other values
  • An XML object containing Message ld, Un subscribe URL Subject. Message and other values

Answer : AJSON object containing Message ld, unsubscribe URL Subject. Message and other values

If a message is retrieved from a queue in Amazon SOS, how long is the message inaccessible to other users by default? Choose an answer from the options below


Options are :

  • 1 hour
  • 0 seconds
  • forever
  • 30 seconds (Correct)
  • 1 day

Answer : 30 seconds

What are the new type of SQS queues available in some regions? Choose an answer from the options below ?


Options are :

  • LIFO
  • Static
  • Dynamic
  • FIFO (Correct)

Answer : FIFO

Company A has recently launched an online commerce site for bicycles on AWS. They have a ?Product? Dynamo DB table that stores details for each bicycle, such as, manufacturer, color, price, quantity and size to display in the online store. Due to customer demand, they want to include an image for each bicycle along with the existing details. Which approach below provides the least impact to provisioned throughput on the ?Product? table? Choose an answer from the options below Please select:


Options are :

  • Serialize the image and store it In multiple Dynamo DB tables
  • Store the images in Amazon 53 and add an 53 URL pointer to the ?Product table item for each image (Correct)
  • Add an image data type to the ?Product table to store the images in binary format
  • Create an Images? Dynamo DB table to store the Image with a foreign key constraint to the Producr tabi

Answer : Store the images in Amazon 53 and add an 53 URL pointer to the ?Product table item for each image

If an application is storing hourly log files from thousands of instances from a high traffic web site, which naming scheme would give optimal performance on S3? Choose an answer from the options below ?


Options are :

  • Sequential
  • instancelD_log-HI-1-DD-MM-YYYY
  • .instance lD_log-YVYY-MM-DD-HH
  • WYY-MM-DD-HH-logjnstancelD
  • HH-DD-MM-VYYY.logjnstancelD (Correct)

Answer : HH-DD-MM-VYYY.logjnstancelD

Which of the below APIS are available for tables in Dynamo DB? Choose 3 answers from the options below ?


Options are :

  • Update All Tables
  • List Tables (Correct)
  • Update Table (Correct)
  • Create Table (Correct)

Answer : List Tables Update Table Create Table

Which EC2 API call would you use to retrieve a list of Amazon Machine Images (AMIs)? Choose an answer sh from the options below ?


Options are :

  • Get AMlS
  • You cannot retrieve a list of AMIs as there are over 10.000 AMIs
  • Describe instances
  • Describe images (Correct)
  • Describe AMlS

Answer : Describe images

You have written an application that uses the Elastic Load Balancing service to spread traffic to several web servers Your users complain that they are sometimes forced to login again in the middle of using your application, after they have already togged in. This is not behavior you have designed. What is a possible solution to prevent this happening? Choose an answer from the options below ?


Options are :

  • Use instance storage to save session state.
  • Use instance memory to save session state
  • Use EBS to save session state
  • Use Elastic Cache to save session state. (Correct)
  • Use Glacier to save session slate.

Answer : Use Elastic Cache to save session state.

When using a large Scan operation in Dynamo DB, what technique can be used to minimize the impact of a scan on a table?s provisioned throughput? Choose an answer from the options below ?


Options are :

  • Define a range index on the table
  • Pre-warm the table by updating all items
  • Set a smaller page size for the scan (Correct)
  • Use parallel scans

Answer : Set a smaller page size for the scan

You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some point you find out that other sites have been linking to the photos on your site, causing loss to your business. What is an effective method to mitigate this? Choose an answer from the options below ?


Options are :

  • Store photos on an EBS volume of the web server
  • Use Cloud Front distributions for static content.
  • Use Cloud Front distributions for static content.
  • Remove public read access and use signed URLs with expiry dates. (Correct)

Answer : Remove public read access and use signed URLs with expiry dates.

An Amazon S3 bucket, ?my AWS bucket? is configured with website hosting in Tokyo region, what is the region- specific website endpoint? Choose an answer from the options below


Options are :

  • my aws bucket .to kyo .amazoriaws.corn
  • www.myawsbucket.ap-northeast-1 .amazonaws.com
  • myawsbucket.amazonaws.com
  • myawsbucket.s3-website-ap-northeast-1 .amazonaws.com (Correct)

Answer : myawsbucket.s3-website-ap-northeast-1 .amazonaws.com

What is the maximum number of topics allowed per account in SNS? Choose the correct answer from the options below ?


Options are :

  • 10,000
  • There is no limit
  • 1,000
  • 1,00,000 (Correct)

Answer : 1,00,000

What are the protocol versions supported by SQS. Choose 3 answers from the options below ?


Options are :

  • TLS 1.2 (Correct)
  • TLS 1.1 (Correct)
  • TLS1.3
  • TLS 1.0 (Correct)

Answer : TLS 1.2 TLS 1.1 TLS 1.0

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions