AWS DVA-C00 Certified Developer Associate Practice Exam Set 6

Your team is developing a solution that will make use of Dynamo DB tables. Due to the nature of the application, the data is needed across a couple of regions across the world, Which of the following would help reduce the latency of requests to Dynamo DB from different regions?


Options are :

  • Enable Multi-AZ for the Dynamo DB table
  • Increase the read and write throughput for the table
  • Enable global tables for Dynamo DB „ (Correct)
  • Enable Indexes for the table

Answer : Enable global tables for Dynamo DB „

Your using the AWS Code Deploy service to deploy an application onto AWS. The application uses secure parameters which are stored in the AWS Systems Manager Parameter store. Which of the following must be done • so that the deployment can be automated via Code Deploy? Choose 2 answers from the options given below


Options are :

  • Give permissions to the AWS Code Deploy service via an lAM Role (Correct)
  • Use the aws ssm get-parameters with the —with-no-decryption option
  • Give permissions to the AWS Code Deploy service via AWS Access Keys
  • Use the aws ssm get-parameters with the --with-decryption option (Correct)

Answer : Give permissions to the AWS Code Deploy service via an lAM Role Use the aws ssm get-parameters with the --with-decryption option

You are planning on deploying an application to the worker role in Elastic Beanstalk. Which of the following is a must have as part of the deployment?


Options are :

  • An appspec.j son file
  • An appspec.yaml file
  • A cron.config file
  • A cron.yaml file (Correct)

Answer : A cron.yaml file

An application needs to make use of an SQS queue for working with messages. An SQS queue has been created with the default settings. The application needs 60 seconds to process each message. Which of the following step need to be carried out by the application?


Options are :

  • Delete the message and change the visibility timeout.
  • Change the Visibility Timeout for each message and then delete the message after processing is completed. (Correct)
  • Process the message change the visibility timeout. De?ete the message
  • Process the message and delete the message

Answer : Change the Visibility Timeout for each message and then delete the message after processing is completed.

You?ve developed a Lambda function and are now in the process of debugging it. You add the necessary print statements in the code to assist in the debugging. You go to Cloud watch logs, but you see no logs for the lambda function. Which of the following could be the underlying issue for this?


Options are :

  • You?ve not enabled versioning for the Lambda function
  • The AM Role assigned to the Lambda function does not have the necessary permission to create Logs (Correct)
  • There is not enough time assigned to the function
  • There is not enough memory assigned to the function

Answer : The AM Role assigned to the Lambda function does not have the necessary permission to create Logs

An application currently makes use of Dynamo DB tables. There are thousand requests made per second on the Dynamo DB table. Another application takes the changes to the items in the Dynamo DB table, for further analytics processing. Which of the following can be affectively used to manage this requirement?


Options are :

  • Enable streams for Dynamo DB (Correct)
  • Create a query to check for changes
  • Enable a scan on the entire table to check for changes
  • Enable global tables for Dynamo DB

Answer : Enable streams for Dynamo DB

You have docker containers which are going to be deployed in the AWS Elastic Container Service. You need to ensure that instances of containers cannot access each other since these different instances are going to be used by Individual customers. How can you accomplish this?


Options are :

  • Place the access keys In the Docker containers
  • Place lAM Roles for the underlying EC2 Instances
  • Place the access keys in the EC2 Instances
  • Create Task lAM Roles (Correct)

Answer : Create Task lAM Roles

You are developing a Java based application that needs to make use of the AWS KMS service for encryption. Which of the following must be done for the encryption and decryption process? Choose 2 answers from th options given below?


Options are :

  • Use the Customer master key to generate a data key for the encryption process (Correct)
  • Use the generated data key to decrypt the data (Correct)
  • Use the Customer master key to encrypt the data
  • Use the Customer master key to decrypt the data

Answer : Use the Customer master key to generate a data key for the encryption process Use the generated data key to decrypt the data

A Lambda function has been developed with the default settings and is using Node.js. The function makes calls to a Dynamo DB table. The code was first tested and executed on an EC2 Instance in the same language and took 300 seconds to execute. When the lambda function is executed , it is not adding the required rows to the Dynamo DB table. What needs to be changed in order to ensure that the Lambda function works as desired?


Options are :

  • Ensure to change the timeout for the function (Correct)
  • Ensure to change the memory assigned to the function as 1 GB
  • Ensure that the underlying programming language is changed to python
  • Assign an lAM user to the Lambda function

Answer : Ensure to change the timeout for the function

You?ve define a Dynamo DB table with a read capacity of 5 and a write capacity of 5. Which of the following statements are TRUE? Choose 3 answers from the options given below ?


Options are :

  • Strong consistent reads of a maximum of 20 KB per second (Correct)
  • Strong consistent reads of a maximum of 40 KB per second
  • Eventual consistent reads of a maximum of 20 KB per second
  • Eventual consistent reads of a maximum of 40 KB per second E. Maximum writes of 5KB per second (Correct)

Answer : Strong consistent reads of a maximum of 20 KB per second Eventual consistent reads of a maximum of 40 KB per second E. Maximum writes of 5KB per second

A company is planning on using Amazon Kinesis fire hose to stream data into an 53 bucket. They need the data to be transformed first before it can be sent to the 53 bucket. Which of the following would be used for the transformation process?


Options are :

  • AWS SQS
  • AWS Lambda (Correct)
  • AWS EC2
  • AWS API Gateway

Answer : AWS Lambda

Your application currently points to several Lambda functions in AWS. A change is being made to one of the Lambda functions. You need to ensure that application traffic Is shifted slowly from one Lambda function to the other. Which of the following steps would you carry out?


Options are :

  • Create a version with the —routing-config parameter
  • Update the ALIAS with the -routingconfig parameter (Correct)
  • Update the version w;th the - routing-config parameter
  • Create an ALIAS with the -routing-config parameter (Correct)

Answer : Update the ALIAS with the -routingconfig parameter Create an ALIAS with the -routing-config parameter

Which of the following combination of services can be used for development and hosting of the RESTful service? Choose 2 answers from the options below ?


Options are :

  • AWS 53 and Cloud front
  • AWS Lambda and AWS API gateway (Correct)
  • AWS SQS and Cloud front
  • AWS EC2 and AWS Elastic Load Balancer (Correct)

Answer : AWS Lambda and AWS API gateway AWS EC2 and AWS Elastic Load Balancer

A company is storing sensitive data in their S3 bucket. The company policy states that all objects in the S3 bucket need to be encrypted at rest. Which of the following help ensure this policy Is met?


Options are :

  • Deny permission to upload an object If the header does not Include xallow-encryption
  • Deny permission to upload an object if the header includes x-amz-serverside-encryption
  • Deny permission to upload an object if the header does not include x-amz-server-sideencryption (Correct)
  • Deny permission to upload an object if tIe header includes x-allow-encryption

Answer : Deny permission to upload an object if the header does not include x-amz-server-sideencryption

A company currently allows access to their API?s to customers via the API gateway. Currently all clients have a 6-month period to move from using the older API?s to newer versions of the APrs. The code for the API is hosted in AWS Lambda. Which of the following is the Ideal strategy to employ in such a situation?


Options are :

  • Create another stage in the API gateway (Correct)
  • Create another AWS Lambda version and give the link to that version to the customers.
  • Create a deployment package that would automatically change the link to the new Lambda version
  • Create another AWS Lambda ALIAS and give the link to that version to the customers.

Answer : Create another stage in the API gateway

Your application is developed to pick up metrics from several servers and push them off to Cloud watch. At times ,the application gets client (4xx) errors. Which of the following can be done from the programming side to resolve such errors?


Options are :

  • Use exponential back off in your requests (Correct)
  • Enable encryption for the requests
  • Use the AWS CLI instead of the SDK to push the metrics
  • Ensure that all metrics have a timestamp before sending them across

Answer : Use exponential back off in your requests

Your company is hosting a static web site in S3. The code has recently been changes wherein Java script calls are being made to the web pages in the same bucket via the FQDN. But the browser is blocking the requests. What should be done to alleviate the issue?


Options are :

  • Enable CORS on the bucket (Correct)
  • Enable encryption the bucket
  • Enable versioning on the bucket
  • Enable CRR on the bucket

Answer : Enable CORS on the bucket

You?ve just recently developed an AWS Lambda function and placed in front of an API gateway instance. You need to give the API gateway URL to a set of users for testing. What must be done before the users can test the API?


Options are :

  • Ensure that a deployment is created in the API gateway (Correct)
  • Generate the SDK for the API
  • Ensure that CORS Is enabled for the API gateway
  • Enable support for binary payloads

Answer : Ensure that a deployment is created in the API gateway

A company is planning on using Dynamo DB as their data store. The tables in Dynamo DB will be receiving millions of requests. Which of the following can be used to ensure the latency of requests to the Dynamo DB table is kept at a minimal?


Options are :

  • Enable Multi-AZ for the Dynamo DB table
  • Enable Dynamo DB Accelerator (Correct)
  • Create a read replica of the Dynamo DB table
  • Enable Encryption for the Dynamo DB table

Answer : Enable Dynamo DB Accelerator

Your company is planning on using the Simple Storage service to host objects that will be accessed by users. There is a speculation that there would be roughly 3000 GET requests per second. Which of the following is the right way to use object keys for optimal performance?


Options are :

  • example aws bucket/sample/232a-201 9-14-03-1 5-00-OOphotol .jpg
  • example aws bucket sample/photo l .jpg
  • example aws bucket/201 9-14-03-1 5-00-00/photo l .jpg
  • exampleawsbuckev232a-201 9-1 4-03-1 S-00-0O/photo l .jpg (Correct)

Answer : exampleawsbuckev232a-201 9-1 4-03-1 S-00-0O/photo l .jpg

You have been instructed to use the Code Pipeline service for the Cl/CD automation in your company. Due t security reasons • the resources that would be part of the deployment are placed in another account. Which of the following steps need to be carried out to accomplish this deployment? Choose 2 answers from the options given below ?


Options are :

  • Create a reference Code Pipeline instance in the other account
  • Embed the access keys in the code pipeline process
  • Add a cross account role
  • Define a customer master key in KMS „ (Correct)

Answer : Define a customer master key in KMS „

You are developing an application for your company. They need to ensure that the JSON data generated by the application Is stored In a backend store. Which of the following Is the ideal data store for this scenario?


Options are :

  • AWS Red Shift
  • AWS RDS MYSQL
  • AWS Dynamo Ds (Correct)
  • AWS Aurora

Answer : AWS Dynamo Ds

You just developed code in AWS Lambda that makes use of recursive functions. After several invocations, you are beginning to see throttling errors in the metrics. Which of the following should be done to resolve this issue?


Options are :

  • Place the recursive function in a separate package
  • Avoid using recursive code altogether (Correct)
  • Use the API gateway to call the recursive code.
  • Use versioning for the recursive function

Answer : Avoid using recursive code altogether

An application currently makes use of Dynamo DB tables. There is a requirement that a user can only view certain items in the table. How can this be accomplished?


Options are :

  • Make use of queries based on the sort key
  • Create a separate index on the table
  • Make use of queries based on the partition key
  • Use lAM polices with specific conditions (Correct)

Answer : Use lAM polices with specific conditions

A company has EC2 instances running in AWS. The EC2 instances are running via an Autoscaling solution. There is a lot of requests being lost because of the load on the servers. The Autoscaling solution is launching new instances to take the load but there are still some requests which are being lost. Which of the following is likely to provide the most costeffective solution to avoid losing recently submitted requests? Choose the correct answer from the options given below?


Options are :

  • Keep one extra EC2 instance always powered on in case a spike occurs
  • Pre-warm your Elastic Load Balancer
  • Use larger instances for your application
  • Use an SQS queue to decouple the application components (Correct)

Answer : Use an SQS queue to decouple the application components

You?re a developer at a company that needs to deploy an application using Elastic Beanstalk. There is a requirement to place a health check. config file for the environment. In which of the following location should this config file be placed to ensure it is part of the elastic beanstalk environment?


Options are :

  • In the .extensions folder
  • In the packages folder
  • In the application root folder
  • In the config folder (Correct)

Answer : In the config folder

An application needs to make use of a messaging system. The messages need to be processed in the order they are received and also no duplicates should be allowed. Which of the following would you use for this purpose?


Options are :

  • Consider using SNS
  • Enable FIFO on an existing SQS Standard Queue
  • Use the FIFO SQS Queues (Correct)
  • Add the .fifo extension to the Standard SOS Queue

Answer : Use the FIFO SQS Queues

An application is currently in production that makes calls to an AWS RDS Instance. The application consists of a reporting module and a transactional system. Due high load times , the response time for the application used to get very high. This was being attributed to the number of queries being fired against the database system. Which of the following can be used to resolve the response time for the application?


Options are :

  • Enable Multi-AZ for the database
  • Move the database to Dynamo DB
  • Place a cloud front distribution in front of the database
  • Enable Read Replicas for the database (Correct)

Answer : Enable Read Replicas for the database

When calling an API operation on an EC2 Instance , the following error message was returned A client error (Unauthorized Operation) occurred when calling the Run instances operation: You are not authorized to perform this operation. Encoded authorization failure message: oGsbAalV7wlfj8HzFbmkzlLlxyj_y9xwhlHk99U_cUqlFIeZnskWDjQlwSHStVfdCEyZlLGoccGp CiCl Jvowq6m Ni mO Which of the following can be used to get a human readable error message?


Options are :

  • Use the command aws sts decode-authorization-message (Correct)
  • Use the lAM Policy simulator, enter the error message to get the human read able format
  • Use the command aws get authorization-message
  • Use the command aws set authorization-message

Answer : Use the command aws sts decode-authorization-message

As a developer , you have enable server logging on an S3 bucket. You have a simple static web page with CSS pages uploaded to the bucket which is 1 MB in total size, After a duration of 2 weeks , you come back and see that the size of the bucket has increased to 50MB. Which of the following could be a reason for this?


Options are :

  • You have enabled CRR on the bucket as well . that is why the space is being consumed
  • This is the normal behavior since the logs are being delivered to the same bucket (Correct)
  • You have enabled Encryption on the bucket as well . that Is why the space is being consumed
  • Monitoring has been enabled for the bucket

Answer : This is the normal behavior since the logs are being delivered to the same bucket

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions