AWS DVA-C00 Certified Developer Associate Practice Exam Set 8

You?ve just created an AWS Lambda function. You?re running the function, but the output of the function is not as expected. You need to check and see what Is the issue? Which of the following can help the developer debug the issue with the Lambda function?


Options are :

  • Check Cloud watch logs
  • Check VPC Flow Logs
  • Check AWS Inspector
  • Check AWS Trusted Advisor (Correct)

Answer : Check AWS Trusted Advisor

You are a developer for your company. You are working on creating Cloud formation templates for different environments. You want to be able to base the creation of the environments on the values passed at runtime to the template. How can you achieve this?


Options are :

  • Specify a metadata section
  • Specify a transform section
  • Specify an Outputs section
  • Specify a parameters section (Correct)

Answer : Specify a parameters section

Your developing an application that is going to make use of Docker containers. Traffic needs to be routed based on demand to the application. Dynamic host port mapping would be used for the docker containers. Which of the following would you use for distribution of traffic to the docker containers?


Options are :

  • AWS Classic Load Balancer
  • AWS Route 53
  • AWS Network Load Balancer
  • AWS Application Load Balancer (Correct)

Answer : AWS Application Load Balancer

Your developing an application that is going to make use of Docker containers. You need to use an orchestration service on the AWS Cloud for managing the application. Which of the following service would you use for this purpose?


Options are :

  • AWS Code Deploy
  • AWS Cloud front
  • AWSSQS
  • AWS ECS (Correct)

Answer : AWS ECS

Your application is currently hosted in an Elastic beanstalk environment. Configuration changes need to be made to the environment. You have been told that the changes should not affect the current environment since downtime needs to be minimized. Which of the following Elastic Deployment mechanisms would you consider using?


Options are :

  • Rolling
  • immutable (Correct)
  • All at Once
  • Rolling with Additional Batch

Answer : immutable

Your company is planning on storing documents in an S3 bucket. The documents are sensitive, and employees should use Multi Factor authentication when trying to accessdocuments. Which of the following must be done to fulfill this requirement?


Options are :

  • Ensure that Encryption is enabled the bucket AWS serverside encryption
  • Ensure that the a bucket policy Is In place with a condition of ?aws :Multi Factor Auth Present?: ?true? with a Deny policy
  • Ensure that the a bucket policy is in place with a condition of aws: Multi Factor Auth Presenr : false? with a Deny policy (Correct)
  • Ensure that Encryption is enabled the bucket using KMS keys

Answer : Ensure that the a bucket policy is in place with a condition of aws: Multi Factor Auth Presenr : false? with a Deny policy

You?re are a developer for a company that has been hired to lead the application development for a company. The application needs to interact with a backend data store. The application would need to perform many complex join operations on the data store. Which of the following would be ideal data store for the application?


Options are :

  • AWSS3
  • AWS RDS (Correct)
  • AWS Red shift
  • AWS Dynamo DB

Answer : AWS RDS

Your application is making requests to a Dynamo DB table. Due to the certain surge of requests you are ic getting throttling errors in your application. Which of the following can be used to resolve such errors? Choose 2 answers from the options given below?


Options are :

  • Use exponential back off in your requests from the application (Correct)
  • Consider using global tables
  • Consider using multiple sort keys
  • Change the throughput capacity on the tables (Correct)

Answer : Use exponential back off in your requests from the application Change the throughput capacity on the tables

Your developing a set of Lambda functions for your application. The company mandates that all calls to Lambda functions be recorded. Which of the below service can help achieve this?


Options are :

  • AWS Trusted Advisor
  • AWS Cloud watch
  • AWS Cloud Trail (Correct)
  • AWS VPC Flow Logs

Answer : AWS Cloud Trail

You have just configured a Lambda function that sits behind the API gateway service. When you try to invoke the Lambda function via the API gateway service from Java script in your HTML page, you receive the following error. No „Access-Control-Allow-Origin? header is present on the requested resource. Origin „null? is therefore not allowed access What can be done to resolve this error?


Options are :

  • Enable CORS for the methods in the API gateway (Correct)
  • Change the lAM policy for the API gateway to enable anonymous access
  • Enable CORS for the lambda function
  • Change the lAM policy for the Lambda function to enable anonymous access

Answer : Enable CORS for the methods in the API gateway

Your developing an application which will make use of Kinesis Fire hose for streaming the records onto the Simple Storage Service. You company policy mandates that all data needs to be encrypted at rest. How can you achieve this with Kinesis Fire hose? Choose 2 answers for the options given below?


Options are :

  • Ensure that all data records are transferred via SSL
  • Install an SSL certificate in Kinesis Data Fire hose
  • Ensure that Kinesis streams are used to transfer the data from the producers (Correct)
  • Enable Encryption for a Kinesis Data Fire hose (Correct)

Answer : Ensure that Kinesis streams are used to transfer the data from the producers Enable Encryption for a Kinesis Data Fire hose

You?re developing an application that is going to be hosted in AWS Lambda. The function will make calls to a database. The security mandate is that all connection strings should be kept secure. Which of the following is the MOST secure way to Implement this?


Options are :

  • Use Lambda Environment variables
  • Put the database connection string in AWS Systems Manager Parameter Store (Correct)
  • Place the database connection string in the AWS Lambda function itself since all lambda functions are encrypted at rest
  • Put the database connection string in the app.json file

Answer : Put the database connection string in AWS Systems Manager Parameter Store

You?re developing an application that is going to be deployed in the Elastic beanstalk environment. You need to ensure that the data that gets generated by the application persists even If the environment is torn down. How can you accomplish this? Choose 3 answers from the options given below.


Options are :

  • Consider storing the data in an Elastic File System (Correct)
  • Consider storing the data in 53 (Correct)
  • Consider storing the data in a Dynamo DB table
  • Leave the data as It Is. because Elastic beanstalk will automatically persist the storage

Answer : Consider storing the data in an Elastic File System Consider storing the data in 53

You need to setup a Restful API service in AWS that would be serviced via the following url s:/ldemocompny.com/custom ?I D= 1 So customers should be able to get their details whilst providing the ID to the API. Which of the following would you define to fulfill this requirement? Choose 2 answers from the options given below?


Options are :

  • Expose the GET method in the Lambda function
  • An API gateway with a Lambda function to process the customer information (Correct)
  • A Lambda function and expose the Lambda function to the customers. Pass the ID as a parameter to the function
  • Expose the GET method in the API Gateway (Correct)

Answer : An API gateway with a Lambda function to process the customer information Expose the GET method in the API Gateway

A company is developing an application which interacts with an existing DynamoDB table. There is now a security mandate that all data must be encrypted at rest. How can you achieve this requirement? Choose 2 answers from the options given below?


Options are :

  • Enable your application to use the SDK to decrypt the data
  • Create a new table with Encryption Enabled . (Correct)
  • Copy the data from the existing table to the new table (Correct)
  • Enable Encryption for the existing table

Answer : Create a new table with Encryption Enabled . Copy the data from the existing table to the new table

An application is being designed to make use of Dynamo DB. As per the requirements , the table will accept items which are of 6 KB of size per second, The number of requests per second is estimated to be around 10. If strong consistency Is required , what should be the read capacity set for the table?


Options are :

  • 5
  • 10
  • 20 (Correct)
  • 40

Answer : 20

Your company is planning on using the Simple Storage service to host objects that will be accessed by users. In order to ensure optimal performance when requests are made to get the objects from the bucket, which of the following Is the right way to use define the keys for optimal performance?


Options are :

  • demo aws bucket l sampie/ image l .jpg
  • demo aws bucket/201 9-14-03-1 5-00-00/Image l .jpg
  • demoawsbucket/sample/232a-201 9-14-03-15-00-00 image 1.jpg
  • dem oawsbucketl232a-201 9-14-03-15-00-00/ I mage l .jpg (Correct)

Answer : dem oawsbucketl232a-201 9-14-03-15-00-00/ I mage l .jpg

Your application currently makes use of AWS Kinesis streams. The data rate of the application is now increasing due to the increased number of producers. Which of the following can be done to keep up with the Increased data rate?


Options are :

  • Increase the number of partition keys in the stream
  • Enable server-side encryption
  • Increase the number of shards (Correct)
  • Increase the sequence numbers

Answer : Increase the number of shards

You?ve been hired as a developer to work on an application. This application will be making use of an AWS RDS database and Elastic Cache. A requirement is present which states that the cache should always have the most recent data that is present in the database and should not contain stale data. What strategy for Elastic Cache can the Developer use to implement this?


Options are :

  • Error retries
  • Lazy loading
  • Exponential back off
  • Write..through (Correct)

Answer : Write..through

You are a team lead for the development of an application that will be hosted in AWS. The application will consist of a front end which will allow users to upload files. Part of the application will consist of sending and processing of messages by a backend service. You have been told to reduce the cost for the backend service but also ensure efficiency. Which of the following would you consider in the implementation of the backend service? Choose 2 answers from the options given below


Options are :

  • Create an SQS queue to handle the processing of messages (Correct)
  • Create an SNS topics to handle the processing of messages
  • Create a Lambda function to process the messages from the queue (Correct)
  • Create an EC2 Instance to process the messages from the queue

Answer : Create an SQS queue to handle the processing of messages Create a Lambda function to process the messages from the queue

Your team needs to create a custom Elastic Beanstalk environment. The application requires an instance that needs a lot of custom software installed. Which of the following is the Ideal way to prepare this environment?


Options are :

  • Create multiple environments
  • Ensure that you choose a Web server environment
  • Create a custom AMI (Correct)
  • Ensure that you choose a Worker environment

Answer : Create a custom AMI

Your company is developing an application that will primarily be used by users on their mobile devices. The users need to have the ability to authenticate themselves via identity providers through Security Assertion Markup Language 2.0 . Which of the following service should be used for user management?


Options are :

  • AWS STS with lAM
  • AWS AM pools
  • AWS Security pools
  • AWS Cognito Identity pools . (Correct)

Answer : AWS Cognito Identity pools .

You are currently managing deployments for a Lambda application via Code Deploy. You have a new version of the Lambda function in place. You have been told that all traffic needs to be shifted instantaneously to the new function. Which deployment technique would you employ in Code Deploy?


Options are :

  • Linear
  • All-at-Once (Correct)
  • Gradual
  • Canary

Answer : All-at-Once

You?ve deployed an application using AWS Lambda and the API gateway service. You need to deploy a newer version of the application. Management has instructed that the newer version be tested by a few users first before being fully deployed? How can you accomplish this In the easiest way possible?


Options are :

  • Create another resource and method. Deploy the API. Give the users the new URL
  • Create a canary release in the API gateway service (Correct)
  • Create a new version of the existing Lambda function and a new API gateway. Give the users the new LJRL
  • Create a new Lambda function and a new API gateway. Give the users the new URL

Answer : Create a canary release in the API gateway service

A company currently has an application that works with Dynamo DB. The application is a high revenue generating application for the company. Their current response time for their read workloads Is In the order of milliseconds. But to bump up hits to their pages, they want to reduce the response time to microseconds. Which of the following would you suggest to fulfill this requirement?


Options are :

  • Consider deploying an Elastic Cache in front of Dynamo DB
  • Consider using Dynamo DB acceleration (Correct)
  • Consider using a higher throughput for the tables
  • Consider using Dynamo DB global tables

Answer : Consider using Dynamo DB acceleration

You?ve been hired as a developer to work on an application. This application is hosted on an EC2 Instance and Interacts with an SQS queue. It?s been notIced that when messages are being pulled by the application. a lot of empty responses are being returned. What change can you make to ensure that the application uses the SQS queue effectively.


Options are :

  • Uselongpoling (Correct)
  • Use short polling
  • Implement exponential backoff
  • Set a custom visibility timeout

Answer : Uselongpoling

You?re a developer for a company that is developing a .net based application. This application will be hosted in AWS. There Is a need to encrypt data. Currently the company does not have a key store for managing encryption. Which of the following could the developer use in this code for encrypting data?


Options are :

  • Use S3 client-side encryption to work with encryption keys
  • Use the AWS KMS service to generate data keys (Correct)
  • Use the AWS Config service to generate data keys
  • Use 53 Server-side encryption to work with encryption keys

Answer : Use the AWS KMS service to generate data keys

Your company currently used Puppet as its configuration management software. You are the development lead and now have to deploy an application for development onto AWS. You have to leverage your company?s existing scripts on Puppet for deployment of the environment Which of the following would be the best service for deployment of the application?


Options are :

  • AWS Elastic beanstalk
  • AWS Ops work (Correct)
  • AWS Red shift
  • AWS Dynamo DB

Answer : AWS Ops work

You have a set of developers that need to work with applications hosted on the Elastic Beanstalk environment. You need to ensure they can work with the beanstalk environments but not give them access to the AWS Console. How can you achieve this in the BEST way possible?


Options are :

  • Ask them to manage the environments via an EC2 Instance
  • Ask them to manage the environments via the SDK
  • Ask them to manage the environments via an ECS cluster
  • Ask them to manage the environments via the ES CLI (Correct)

Answer : Ask them to manage the environments via the ES CLI

You?re the team lead for an application. You have been instructed to make use of Jenkins for your Cl/CD pipeline and other AWS Services for deployment purposes. Which of the following would you consider fulfilling this requirement?


Options are :

  • Use the AWS Code Build service
  • Configure the Access Keys on the EC2 Instance to access Code Pipeline
  • Configure an EC2 Instance with Jenkins Installed (Correct)
  • Configure an lAM Role for EC2 to access Code Pipeline (Correct)

Answer : Configure an EC2 Instance with Jenkins Installed Configure an lAM Role for EC2 to access Code Pipeline

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions