AWS DVA-C01 Certified Developer Associate Practice Exam Set 1

You?ve been hired to develop a gaming application for a large company. The application will be developed using AWS resources. You need to ensure the right services are used during the development and subsequent deployment of the application. Which of the following would you consider Incorporating to ensure leader boards can be maintained accurately in the application?


Options are :

  • AWS Elastic Beanstalk
  • AWS Elastic Cache Mem cached
  • AWS Ops work
  • AWS Elastic Cache - Red is (Correct)

Answer : AWS Elastic Cache - Red is

Which of the following combination of services can be used for development and hosting of the REST full service? Choose 2 answers from the options below ?


Options are :

  • AWS Lambda and AWS API gateway (Correct)
  • AWS 53 and Cloud front
  • AWS SQS and Cloud front
  • AWS EC2 and AWS Elastic Load Balancer (Correct)

Answer : AWS Lambda and AWS API gateway AWS EC2 and AWS Elastic Load Balancer

Your current log analysis application takes more than four hours to generate a report of the top 10 users of your web application. You have been asked to implement a system that can report this information in real time, ensure that the report Is always up to date, and handle increases in the number of requests to your web application. Choose the option that is cost-effective and can fulfill the requirements?


Options are :

  • Create a multi-AZ Amazon RDS My SQL cluster, post the logging data to run a map reduce job to retrieve the required information on user counts.
  • Post your log data to an Amazon Kinesis data stream, and subscribe your logprocessing application so that is configured to process your logging data. (Correct)
  • Publish your log data to an Amazon S3 bucket. Use AWS Cloud Formation to create an Auto Scaling group scale your post-processing application which is configured to pull down your log files stored an Amazon S3.
  • Publish your data to Cloud Watch Logs. and configure your application to Auto scale to handle the load on demand.

Answer : Post your log data to an Amazon Kinesis data stream, and subscribe your logprocessing application so that is configured to process your logging data.

Which of the following is the right sequence of hooks that get called in AWS Code Deploy?


Options are :

  • Before lnstall->After Install->Validate Service-> Application Start
  • Application Stop-> Before lnstall >After I nstal l->Application Start (Correct)
  • Before lnstall->After Install-> Application Stop-> Application Start
  • Before install-> Application Stop-> Validate Service-> Application Start

Answer : Application Stop-> Before lnstall >After I nstal l->Application Start

You?ve been instructed to develop a mobile application that will make use of AWS services. You need to decide on a data store to store the user sessions. Which of the following would be an Ideal data store for session management?


Options are :

  • AWSRDSW
  • AWS Red shift
  • AWS Simple Storage Service
  • AWS Dynam005 (Correct)

Answer : AWS Dynam005

Your company is planning on using the Simple Storage service to host objects that will be accessed by users. There is a speculation that there would be roughly 3000 GET requests per second. Which of the following is the right way to use object keys for optimal performance?


Options are :

  • example aws bucket/sample/photol .jpg
  • exampleawsbucketl232a-201 9-14-03-1 5-00-00/photo l .jpg (Correct)
  • example aws bucket/201 9-14-03-1 5-00-CO/photo 1 .jpg
  • example aws bucket/sample/232a-201 9-14-03-1 5-O0-OOphotol .jpg

Answer : exampleawsbucketl232a-201 9-14-03-1 5-00-00/photo l .jpg

You?re developing an application that is going to make use of Amazon Kinesis. Due to the high throughput, you decide to have multiple shards for the streams. Which of the following is TRUE when it comes to processing data across multiple shards?


Options are :

  • Order of data is not possible at all in Kinesis streams
  • You need to use Kinesis fire hose to guarantee the order of data
  • You cannot guarantee the order of data across multiple shards. Its possible only within a shard
  • Order of data is possible across all shards in a stream . (Correct)

Answer : Order of data is possible across all shards in a stream .

You?ve developed an application script that needs to be bootstrapped into instances that are launched via an Auto scaling Group. How would you achieve this in the east way possible?


Options are :

  • Place the script in the metadata for the instance
  • Create a Lambda function to install the script
  • Place the script in the Liser data for the Instance (Correct)
  • Place a scheduled task on the instance that starts as soon as the Instance is launched

Answer : Place the script in the Liser data for the Instance

Company B is writing 10 items to the products table every second. Each item is 15.5Kb in size. What would be the required provisioned write throughput for best performance? Choose the correct answer from the options below?


Options are :

  • 10 (Correct)
  • 155
  • 160
  • 16

Answer : 10

You are developing a function that will be hosted in AWS Lambda. The function will be developed in .Net. There are a number of external libraries that are needed for the code to run. Which of the following Is the best practice when it comes to working with external dependencies for AWS Lambda?


Options are :

  • Selectively only include the libraries that are required (Correct)
  • Make sure the libraries are installed in the beginning of the function
  • Place the entire SDK dependencies In Amazon 53
  • Make sure that the dependencies are put In the root folder

Answer : Selectively only include the libraries that are required

An application has been making use of AWS Dynamo DB for its back-end data store. The size of the table has now grown to 20 GB , and the scans on the table are causing throttling errors. Which of the following should now be implemented to avoid such errors?


Options are :

  • Large Page size
  • Parallel Scans (Correct)
  • Reduced page size
  • Sequential scans

Answer : Parallel Scans

You1ve been asked to develop an application on the AWS Cloud. The application will be used to store confidential documents in an S3 bucket. You need to ensure that the bucket is defined in such a way that it does not accept objects that are not encrypted?


Options are :

  • Ensure that a condition Is set In an lAM policy.
  • Enable CORS for the underlying bucket
  • Ensure a condition is set in the bucket policy (Correct)
  • Enable MFA for the underlying bucket

Answer : Ensure a condition is set in the bucket policy

You?ve been asked to develop an application on the AWS Cloud. The application will involve picking up videos from users and placing them in an ideal and durable data store. Which of the following would be an ideal data store, ensuring that components are properly decoupled?


Options are :

  • AWS Simple Storage Service (Correct)
  • AWS Glacier
  • EBS Volumes
  • AWS Dynamo DB

Answer : AWS Simple Storage Service

You?ve developed a set of scripts using AWS Lambda. These scripts need to access EC2 Instances in a VPC. Which of the following needs to be done to ensure that the AWS Lambda function can access the resources In the VPC. Choose 2 answers from the options given below ?


Options are :

  • Ensure that the subnet ID?s are mentioned when configuring the Lambda function (Correct)
  • Ensure that the NACL IDs are mentioned when configuring the Lambda function
  • Ensure that the Security Group ID?S are mentioned when configuring the Lambda function (Correct)
  • Ensure that the VPC Flow Log ID?S are mentioned when configuring the Lambda function

Answer : Ensure that the subnet ID?s are mentioned when configuring the Lambda function Ensure that the Security Group ID?S are mentioned when configuring the Lambda function

As a developer you have created a Lambda function that is used to work with a bucket in Amazon S3. The Lambda function is not working as expected. You need to debug the issue and understand what?s the underlying Issue. How can you accomplish this?


Options are :

  • Use AWS Cloud watch metrics
  • Use AWS Cloud trail logs
  • Put logging statements In your code (Correct)
  • Set the Lambda function debugging level to verbose

Answer : Put logging statements In your code

An application is being developed that is going to write data to a Dynamo DB table. You have to setup the read and write throughput for the table. Data is going to be read at the rate of 300 items every 30 seconds. Each item is of size 6KB. The reads can be eventual consistent reads. What should be the read capacity that needs to be set on the table?


Options are :

  • 6
  • 10 (Correct)
  • 20
  • 30

Answer : 10

You?re developing an application that will be hosted on an EC2 Instance. This will be part of an Auto scaling Group. The application needs to get the private IP of the instance so that it can send it across to a controller- based application. Which of the following can be done to achieve this?


Options are :

  • Make the application run IF Config
  • Query the Instance Meta Data (Correct)
  • Query the Instance User Data
  • Have an Admin get the IP address from the console

Answer : Query the Instance Meta Data

Your company is planning on using the Simple Storage service to host objects that will be accessed by users. There is a speculation that there would be roughly 3000 GET requests per second. Which of the following could be used to ensure optimal performance? Choose 2 answers from the options given below?


Options are :

  • Use a Cloud front distribution in front of the 53 bucket
  • Enable Cross Region Replication for the bucket
  • Use hash key prefixes for the object keys (Correct)
  • Enable versioning for the objects

Answer : Use hash key prefixes for the object keys

Your company currently stores its objects in S3. The current request rate is around 2000 GET requests per second. There is now a mandate for objects to be encrypted at rest. So you enable encryption using KMS. There are now performance issues being encountered. What could be the main reason behind this?


Options are :

  • Amazon S3 will now throttle the requests since they are now being encrypted using KMS
  • You need to also enable CORS to ensure optimal performance
  • You are now exceeding the throttle limits for KMS API calls (Correct)
  • You need to also enable version ing to ensure optimal performance

Answer : You are now exceeding the throttle limits for KMS API calls

Your application currently interacts with a Dynamo DB table. Records are inserted into the table via the application. There Is now a requirement to ensure that whenever Items are updated In the Dynamo DB primary table, another record is inserted into a secondary table. Which of the below feature should be used when developing such a solution?


Options are :

  • AWS Dynamo DB Encryption
  • AWS Dynamo DS Accelerator
  • AWS Table Accelerator
  • AWS Dynamo DB Streams (Correct)

Answer : AWS Dynamo DB Streams

Your company has asked you to maintain an application using Elastic Beanstalk. At times , you normally hit the application version limit when deploying new versions of the application. Which of the following Is the most effective way to manage this issue?


Options are :

  • Create an application lifecycle policy (Correct)
  • Create multiple environments and deploy the different versions to different environments
  • Delete the application versions manually
  • Create multiple applications and deploy the different versions to different applications

Answer : Create an application lifecycle policy

Your mobile application includes a photo-sharing service that is expecting tens of thousands of users at launch. You will leverage Amazon Simple Storage Service (S3) for storage of the user Images. and you must decide how to authenticate and authorize your users for access to these images. You also need to manage the storage of these images. Which two of the following approaches should you use? Choose two answers from the options below ?


Options are :

  • Use a key-based naming scheme comprised from the user IDs for all user objects in a single Amazon 53bucket. (Correct)
  • Authenticate your users at the application level, and use AWS Security Token Service (STS) to grant token- based authorization to S3 objects. (Correct)
  • Create an Amazon S3 bucket per user, and use your application to generate the 53 URI for the appropriatef? content.
  • Use AWS Identity and Access Management (lAM) user accounts as your application-level user database. offload the burden of authentication from your application code.
  • Authenticate your users at the application level, and send an SMS token message to the user. Create an Amazon 53 bucket with the same name as the SMS message token, and move the users objects to that bucket.

Answer : Use a key-based naming scheme comprised from the user IDs for all user objects in a single Amazon 53bucket. Authenticate your users at the application level, and use AWS Security Token Service (STS) to grant token- based authorization to S3 objects.

You are planning to use AWS Kinesis streams for an application being developed for a company. The company policy mandates that all data is stored at rest. How can you accomplish this in the easiest way possible for Kinesis streams?


Options are :

  • Enable server-side encryption for Kinesis streams (Correct)
  • Enable chent-side encryption for Kinesis streams
  • Use the AWS CLI to encrypt the data
  • Use the SDK for Kinesis to encrypt the data before being stored at rest

Answer : Enable server-side encryption for Kinesis streams

A Lambda function has been developed with the default settings and is using Node.js. The function makes calls to a Dynamo DB table. The code was first tested and executed on an EC2 Instance in the same language and took 300 seconds to execute. When the lambda function is executed , it is not adding the required rows to the Dynamo DB table. What needs to be changed in order to ensure that the Lambda function works as desired?


Options are :

  • Change the memory assigned to the function to 1 GB
  • Assign an lAM user to the Lambda function
  • Ensure that the underlying programming language is changed to python
  • Change the timeout for the function (Correct)

Answer : Change the timeout for the function

Your company has developed a web application and is hosting it in an Amazon S3 bucket configured for static website hosting. The application Is using the AWS SDK for JavaScript In the browser to access data stored in an Amazon Dynamo DB table. How can you ensure that API keys for access to your data in Dynamo DB are kept secure?


Options are :

  • Configure a web identity federation role within lAM to enable access to the correct DynamoDB resources and retrieve temporary credentials. (Correct)
  • Configure S3 bucket tags with your AWS access keys for your bucket hosing your website so that the application can query them for access.
  • Store AWS keys In global variables within your application and configure the application to use these credentials when making requests
  • Create an Amazon S3 role in lAM with access to the specific DynamoD5 tables, and assign it to the bucket hosting your website.

Answer : Configure a web identity federation role within lAM to enable access to the correct DynamoDB resources and retrieve temporary credentials.

Your application currently makes use of AWS Cognito for managing user identities. You want to analyze the information that is stored in AWS Cognito for your application. Which of the following features of AWS Cognito should you use for this purpose?


Options are :

  • Cognito Data
  • Cognito Events
  • Cognito Streams (Correct)
  • Cognito Callbacks

Answer : Cognito Streams

You are developing a mobile based application that needs to make use of an authentication service. There are a set of videos files which need to be accessed via unauthenticated access. How can you BEST achieve this using AWS?


Options are :

  • Create an lAM user with public access
  • Use AWS Cognito with unauthenticated access enabled (Correct)
  • Use AWS STS with SAML
  • Create an lAM group with public access

Answer : Use AWS Cognito with unauthenticated access enabled

Your team has a Code Commit repository in your account. You need to give access to a set of developer?s in another account access to your Code Commit repository. Which of the following is the most effective way to grant access?


Options are :

  • Create an lAM Group. add the lAM users and then provide access to the repository
  • Create AM users for each developer and provide access to the repository
  • Enable public access for the repository
  • Create a cross account role. give the role the privileges. Provide the role ARN to the developers (Correct)

Answer : Create a cross account role. give the role the privileges. Provide the role ARN to the developers

You are in charge of deploying an application that will be hosted on an EC2 Instance and sit behind an Elastic Load balancer. You have been requested to monitor the incoming connections to the Elastic Load Balancer. Which of the below options can suffice this requirement?


Options are :

  • Create a custom metric Cloud Watch filter on your load balancer
  • Enable access logs on the load balancer , (Correct)
  • Use AWS Cloud Trail with your load balancer
  • Use a Cloud Watch Logs Agent

Answer : Enable access logs on the load balancer ,

An application needs to make use of a messaging system. The messages need to be processed in the order they are received and also no duplicates should be allowed. Which of the following would you use for this purpose?


Options are :

  • Use the FlFO SQS Queues (Correct)
  • Enable FIFO on an existing SQS Standard Queue
  • Consider using SNS
  • Add the .FIFO extension to the Standard SOS Queue

Answer : Use the FlFO SQS Queues

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions