Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

DVA-C01 Questions and Answers

Note! Following DVA-C01 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is DVA-C02

DVA-C01 Questions and Answers

Question # 6

A Developer has created a software package to be deployed on multiple EC2 instances using IAM roles.

What actions could be performed to verify IAM access to get records from Amazon Kinesis Streams? (Select TWO.)

A.

Use the AWS CLI to retrieve the IAM group.

B.

Query Amazon EC2 metadata for in-line IAM policies.

C.

Request a token from AWS STS, and perform a describe action.

D.

Perform a get action using the –-dry-run argument.

E.

Validate the IAM role policy with the IAM policy simulator.

Full Access
Question # 7

An IAM role is attached to an Amazon EC2 instance that explicitly denies access to all Amazon S3 API actions. The EC2 instance credentials file specifies the IAM access key and secret access key, which allow full administrative access.

Given that multiple modes of IAM access are present for this EC2 instance, which of the following is correct?

A.

The EC2 instance will only be able to list the S3 buckets

B.

The EC2 instance will only be able to list the contents of one S3 bucket at a time

C.

The EC2 instance will be able to perform all actions on any S3 bucket

D.

The EC2 instance will not be able to perform any S3 action on any S3 bucket.

Full Access
Question # 8

A developer is building a highly secure healthcare application using .. application requires writing temporary data to /tmp storage on an AWS Lambda function.

How should the developer encrypt this data?

A.

Enable Amazon EBS volume encryption with an AWS KMS .. configuration so that all storage attached to the Lambda function is encrypted.

B.

Set up the Lambda function with a role and key policy to access an AWS KMS CMK Use the CMK to generate a data key used to encrypt all data prior to writing to /tmp storage

C.

Use OpenSSL to generate a symmetric encryption key on Lambda startup Use this key to encrypt the data prior to writing to /tmp

D.

Use an on-premises hardware security module (HSM) to generate keys where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function

Full Access
Question # 9

A three-tier application hosted on AWS uses Amazon RDS for MYSQL as its database. A developer must ensure the database credentials are stored and accessed securely.

What is the MOST secure way for the developer to achieve this?

A.

Store the credentials in a configuration file and commit it to the GIT repository.

B.

Store the credentials in AWS Secrets Manager and enable automatic secret rotation.

C.

Store the credentials using Amazon RDS and enable automatic rotation

D.

Store the credentials in code and handle credentials rotation within the application.

Full Access
Question # 10

A developer tested an application locally and then deployed it to AWS Lambda While testing the application remotely the Lambda function fails with an access denied message. How can this issue be addresksed?

A.

Update the Lambda function's execution role to include the missing permissions

B.

Update the Lambda function's resource policy to include the missing permissions

C.

Include an 1AM policy document at the root of the deployment package and redeploy the Lambda function.

D.

Redeploy the Lambda function using an account with access to the AdministratorAccess policy

Full Access
Question # 11

A company requires objects that are stored in Amazon S3 to be encrypted The company is currently using server-side encryption with AWS KMS managed encryption keys (SSE-KMS) A developer needs to optimize the cost-effectiveness of the encryption mechanism without negatively affecting performance

What should the developer do to meet these requirements?

A.

Change the encryption type to customer-provided keys.

B.

Configure the SJ bucket to use an S3 Bucket Key for SSE-KMS

C.

Use S3 bucket policies to limit the principals who can create objects

D.

Use a custom policy to limit the number of AWS KMS calls that are allowed

Full Access
Question # 12

A movie fan club hosts a serverless web application in an Amazon S3 bucket. The application uses an AWS Lambda function that is exposed by an Amazon API Gateway API. The function queries an Amazon DynamoDB table to list actors sorted by movie. In the DynamoDB table. Actor is the primary key, Movie is the sort key, and Role and Year are attributes.

In the web application, a developer wants to add a page that is named Phase 1 that lists only the movies that were released between 2008 and 2012. The developer needs to fetch the Phase 1 items in a way that minimizes the impact on the DynamoDB table.

Which solution will meet these requirements?

A.

Create a global secondary index (GSl) with the Year attribute as the sort key. Create a Lambda function to return the results from a new method in the API.

B.

Design a Lambda function that scans the DynamoDB table and filters the results for the Phase 1 items. Invoke the function from a new method in the API.

C.

Use a DynamoDB stream to send items that are filtered by Year to a new DynamoDB table. Invoke a Lambda function from a new method in the API.

D.

Set up an Amazon CloudFront distribution. Create a Lambda@Edge function to filter the items that are returned from the API request.

Full Access
Question # 13

A company is using Amazon Cognito user pools for sign-up and login functionality for a web application. The company is using Amazon RDS for the application's data persistence and is using Amazon API Gateway and AWS Lambda for the application's API functionality. Users must provide their first name, last name, email address, and phone number to sign up. All API endpoints have a Cognito user pool authorizer to guard against unauthenticated requests.

A developer wants to show a personalized welcome screen to users after they log in. The welcome screen needs to show the user's first name and the user's previous login date. According to company policy. developers who work on the web application cannot store any personally identifiable information in RDS instances.

Which solution should the developer implement to meet these requirements?

A.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the identity token in the Authorization header of the request. Extract the user name from the given_name claim and the user's universally unique identifier (UUID) from the sub claim inside the identity token. Use the UUID as the key to store and retrieve the previous login information from the database.

B.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the access token in the Authorization header of the request. Extract the user name from the given_name claim and the user's universally unique identifier (UUID) from the sub claim inside the access token. Use the UUID as the key to store and retrieve the previous login information from the database.

C.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the identity token in the Authorization header of the request. Extract the user name from the given_name claim and the user's universally unique identifier (UUID) from the iss claim inside the identity token. Use the UUID as the key to store and retrieve the previous login information from the database.

D.

After successful login, submit a Cognito request for user tokens. When redirecting to the welcome screen, provide the access token in the Authorization header of the request. Extract the user name from the given name claim and the user's universally unique identifier (UUID) from the iss claim inside the access token. Use the UUID as the key to store and retrieve the previous login information from the database.

Full Access
Question # 14

An application is running on a cluster of Amazon EC2 instance. While trying to read objects stored within a single Amazon S3 bucket that are encrypted with server-side encryption with AWS KMS managed keys (SSE-KMS), the application receives the following error:

Service : AWSKMS: Status Code: 400: Code : ThrottlingException

Which combination of steps should be taken to prevent this failure? (Select TWO.)

A.

Contact AWS Support to request an AWS KMS rate limit increase.

B.

Perform error retries with exponential backoff in the application code.

C.

Contact AWS Support to request a S3 rate limit increase.

D.

Import a customer master key (CMK) with a larger key size.

E.

Use more than one customer master key (CMK) to encrypt S3 data

Full Access
Question # 15

An e-commerce site allows returning users to log in to display customized web pages. The workflow is shown in the image below:

An application is running on EC2 instances. Amazon RDS is used for the database that stores user accounts and preferences. The website freezes or is slow to load while waiting for the login step to complete. The remaining components of the site are well-optimized.

Which of the following techniques will resolve this issue? (Select Two.)

A.

Implement the user login page as an asynchronous Lambda function.

B.

Use Amazon ElastiCache for MemCached to cache user data.

C.

Use Amazon Application Load Balancer to load balance the traffic to the website.

D.

Call the database asynchronously so the code can continue executing.

E.

Batch login requests from hundreds of users together as a single read request to the database.

Full Access
Question # 16

A company is migrating a single-server, on-premises web application to AWS. The company intends to use multiple servers behind an Elastic Load Balancer (ELB) to balance the load, and will also store session data in memory on the web server. The company does not want to lose that session data if a server fails or goes offline, and it wants to minimize user’s downtime.

Where should the company move session data to MOST effectively reduce downtime and make users’ session data more fault tolerant?

A.

An Amazon ElastiCache for Redis cluster

B.

A second Amazon EBS volume

C.

The web server’s primary disk

D.

An Amazon EC2 instance dedicated to session data

Full Access
Question # 17

A developer is creating a serverless application that uses an AWS Lambda function. The developer will use AWS Cloud Formation to deploy the application. The application will write logs to Amazon 3loudWatch Logs. The developer has created a log group in a Cloud Format ion template for the application to use. The developer needs to modify the CloudFormation template to make the name of the log [jroup available to the application at runtime.

Which solution will meet this requirement?

A.

Use the AWS:: Include transform in CloudFormation to provide the log group's name to the application.

B.

Pass the log group's name to the application in the user data section of the CloudFormation template.

C.

Use the CloudFormation template's Mappings section to specify the log group's name for the application.

D.

Pass the log group's Amazon Resource Name (ARN) as an environment variable to the Lambda function.

Full Access
Question # 18

A developer is attempting to use the Amazon S3 PutObject API operation to upload an object to an S3 bucket that has default encryption enabled. The developer receives a 400 Bad Request error.

What is the MOST likely cause of this error?

A.

The API operation cannot access the encryption key

B.

The HTTP Content-Length header is missing.

C.

The object exceeds the maximum object size that is allowed.

D.

The S3 bucket exceeds the maximum storage capacity that is allowed

Full Access
Question # 19

A company has an internal website that gives users the ability to access contract Idata that is stored in an Amazon RDS DB instance The number of contracts has increased and several users have reported slow retrieval of the contract data

The company wants to set up a cache to improve the latency A developer must create a solution that ensures data resiliency The data must be encrypted and must be partitioned by department

Which solution will meet these requirements?

A.

Amazon ElastiCache for Memcached with cluster mode enabled

B.

Amazon ElastiCache for Redis with cluster mode enabled

C.

Amazon ElastiCache for Redis with cluster mode disabled

D.

Amazon ElastiCache for Memcached with cluster mode disabled

Full Access
Question # 20

A company has three AWS Lambda functions that are written in Node js The Lambda functions include a mix of custom code and open-source modules When bugs are occasionally detected in the open-source modules, all three Lambda functions must be patched.

What is the MOST operationally efficient solution to deploy a patched open-source library for all three Lambda functions?

A.

Create a custom AWS CloudFormation public registry extension Reference a GitHub repository that hosts the open-source modules m the extension Configure Formation to scan the repository once each day Write an AWS Serverless Application Model (AWS SAM) template to redeploy the three Lambda functions upon a scan notification change.

B.

Create an Amazon CloudFront distribution with an Amazon S3 bucket as the origin Upload the patched modules to Amazon S3 when needed Modify each Lambda function to download the patched modules from the CloudFront distribution during the cold start.

C.

Launch an Amazon EC2 instance Host a private open-source module registry on the EC2 instance Upload the modified open-source modules to the private registry when needed. Modify each Lambda function deployment script to download the modules from the private registry Redeploy the three new Lambda functions.

D.

Create a Lambda layer with the open-source modules Modify all three Lambda functions to depend on the layer Remove the open-source modules from each Lambda function Patch the Lambda layer with the modified open-source modules when needed Update the Lambda functions to reference the new layer version

Full Access
Question # 21

A developer from AnyCompany's AWS account needs access to the Example Corp AWS account AnyCompany uses an identity provider that is compatible with OpenID Connect.

What is the MOST secure way for Example Corp to allow developer access?

A.

Create a cross-account role and call the AssumeRole API operation

B.

Create a user in the Example Corp account and provide the access keys

C.

Create a user in the Example Corp account and provide the credentials

D.

Create a cross-account role and call the AssumeRoleWithWebldentity API operation

Full Access
Question # 22

A company has a three-tier application that is deployed in Amazon Elastic Container Service (Amazon ECS). The application is using an Amazon RDS for MySQL DB Instance The application performs more database reads than writes.

During times of peak usage. the application's performance degrades. When this performance degradation occurs, the DB instance's ReadLatency metric in Amazon CloudWatch increases suddenly

How should a developer modify the application to improve performance?

A.

Use Amazon ElastiCache to cache query results

B.

Scale the ECS cluster to contain more ECS instances

C.

Add read capacity units (RCUs) to the DB instance.

D.

Modify the ECS task definition to increase the task memory

Full Access
Question # 23

A developer is creating a role to access Amazon S3 buckets To create the role, the developer uses the AWS CLI create-role command. Which policy should be added to allow the Amazon EC2 service to assume the role?

A.

Managed policy

B.

Trust policy

C.

Inline policy

D.

Service control policy (SCP)

Full Access
Question # 24

A developer converted an existing program to an AWS Lambda function in the console. The program runs properly on a local laptop, but shows an "Unable to import module" error when tested in the Lambda console

Which of the following can fix the error?

A.

Install the missing module and specify the current directory as the target Create a ZIP file to include all files under the current directory, and upload the ZIP file.

B.

Install the missing module in a lib directory Create a ZIP file to include all files under the lib directory, and upload the ZIP file as a dependency file

C.

In the Lambda code invoke a Linux command to install the missing modules under the /usr/lib directory

D.

In the Lambda console, create a LD_LIBRARY_PATH environment and specify the value for the system library path.

Full Access
Question # 25

A developer is building a new application that uses an Amazon DynamoDB table. The specification states that all items that are older than 48 hours must be removed

Which solution will meet this requirement?

A.

Create a new attribute that has the Number data type Add a local secondary index (LSI) for this attribute and enable TTL

with an expiration of 48 hours In the application code, set the value of this attribute to the current timestamp for each new item that is being inserted.

B.

Create a new attribute that has the String data type Add a local secondary index (LSI) for this attribute and enable TTL

with an expiration of 48 hours In the application code, set the value of this attribute to the current timestamp for each new item that is being inserted.

C.

Create a new attribute that has the Number data type Enable TTL on the DynamoDB table for this attribute in the

application code set the value of this attribute to the current timestamp plus 48 hours for each new item that is being inserted

D.

Create a new attribute that has the String data type Enable TTL on the DynamoDB table for this attribute In the application

code set the value of this attribute to the current timestamp plus 48 hours for each new item that is being inserted

Full Access
Question # 26

A developer implemented a static website hosted in Amazon S3 that makes web service requests hosted in Amazon API Gateway AWS Lambda. The site is showing an error that reads

"No ' Access-Control-Allow Origin' header is present on the requested resource Origin 'null' is therefore not allowed access " What should the developer do to resolve this issue?

A.

Enable cross-origin resource sharing (CORS) on the S3 bucket

B.

Enable cross-origin resource sharing (CORS) for the method in API Gateway

C.

Add the Access-Control-Request-Method header to the request

D.

Add the Access-Control-Request-Headers header to the request

Full Access
Question # 27

A company's fleet of Amazon EC2 instances receives data from millions of users through an API. The servers batch the data, add an object for each user, and upload the objects to an S3 bucket to ensure high access rates The object attributes are Customer ID, Server ID, TS-Server (TimeStamp and Server ID) the size of the object, and a timestamp A developer wants to find all the objects for a given user collected during a specified time range

After creating an S3 object created event, how can the developer achieve this requirement^

A.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon DynamoDB record for every object with the Customer ID as the partition key and the Server ID as the sort key Retrieve all the records using the Customer ID and Server ID attributes

B.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon Redshift record for every object with the Customer ID as the partition key and TS-Server as the sort key Retrieve all the records using the Customer ID and TS-Server attributes

C.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon DynamoDB record for every object with the Customer ID as the partition key and TS-Server as the sort key Retrieve all the records using the Customer ID and TS-Server attributes

D.

Execute an AWS Lambda function in response to the S3 object creation events that creates an Amazon Redshift record for every object with the Customer ID as the partition key and the Server ID as the sort key. Retrieve all the records using the Customer ID and Server ID attributes.

Full Access
Question # 28

A company has a web application In an Amazon Elastic Container Service (Amazon ECS) cluster running hundreds of secure services in AWS Fargate containers. The services are in target groups routed by an Application Load Balancer (ALB) Application users log in to the website anonymously, but they must be authenticated using any OpenID Connect protocol-compatible identity provider (IdP) to access the secure services

Which authentication approach would meet these requirements with the LEAST amount of effort?

A.

Configure the services to use Amazon Cognito.

B.

Configure the ALB to use Amazon Cognito

C.

Configure the services to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP.

D.

Configure the Amazon ECS cluster to use AWS Security Token Service (AWS STS) with the OpenID Connect IdP

Full Access
Question # 29

A company has an AWS Lambda function that runs hourly, reads log files that are stored in Amazon S3, and forwards alerts to Amazon Simple Notification Service (Amazon SNS) topics based on content A developer wants to add a custom metric to the Lambda function to track the number of alerts of each type for each run The developer needs to log this information in Amazon CloudWatch in a metnc that is named Lambda/AlertCounts

How should the developer modify the Lambda function to meet this requirement with the LEAST operational overhead1?

A.

Add a print statement to standard out for each alert and the number of occurrences

B.

Add a call to the PutMetncData API operation Pass an array for alerts and the number of occurrences in the Values and Counts fields with a namespace of "Lambda/AlertCounts"

C.

Add a call to the PutMetncAlarm API operation Pass an array of alerts in the metrics member with the namespace of "Lambda/AlertCounts"

D.

Add a call to the PutDashboard API operation Pass an array of alerts in the metrics member with the namespace of "Lambda/AlertCounts"

Full Access
Question # 30

A development team is building a new application that will run on Amazon EC2 and use Amazon DynamoDB as a storage layer The developers all have assigned IAM user accounts in the same IAM group The developers currently can launch EC2 instances and they need to be able to launch EC2 instances with an instance role allowing access to Amazon DynamoDB.

Which AWS I AM changes are needed when creating an instance role to provide this functionality^

A.

Create an IAM permission policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows DynamoDB to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the IAM GetRole and IAM PassRole permissions for the role

B.

Create an IAM permissions policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows Amazon EC2 to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the IAM PassRole permission for the role

C.

Create an IAM permission policy attached to the role that allows access to Amazon EC2 Add a trust policy to the role that allows DynamoDB to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the IAM PassRole permission for the role

D.

Create an IAM permissions policy attached to the role that allows access to DynamoDB Add a trust policy to the role that allows Amazon EC2 to assume the role Attach a permissions policy to the development group in AWS IAM that allows developers to use the iam GetRole permission for the role.

Full Access
Question # 31

A developer is trying to monitor an application's status by running a cron job that returns 1 if the service is up and 0 if the service is down. The developer created code that uses an AWS CLI put-metric-alarm command to publish the custom metrics to Amazon CloudWatch and create an alarm However the developer is unable to create an alarm as the custom metrics do not appear m the CloudWatch console.

What is causing this issue?

A.

Sending custom metrics using the CLI is not supported

B.

The developer needs to use the put-metric-data command.

C.

The developer must use a unified CloudWatch agent to publish custom metrics

D.

The code is not running on an Amazon EC2 instance

Full Access
Question # 32

A developer Is working with a Docker application that needs to be quickly deployed using AWS without changing the infrastructure or configuring health checks. The application should be configured so that changes and updates can be made automatically without any downtime

Which solution will meet these requirements?

A.

Use AWS Elastic Beanstalk for application deployment and select an all-at-once update policy.

B.

Use AWS Elastic Beanstalk for application deployment and select a rolling deployment policy.

C.

Deploy the Docker container on an Amazon EC2 instance in an Auto Scaling group and configure a health check on the EC2 instance

D.

Deploy the Docker container using AWS Lambda and enable Amazon CloudWatch monitoring

Full Access
Question # 33

An application is processing clickslream data using Amazon Kinesis. The clickstream data feed into Kinesis experiences periodic spikes. The PutRecords API call occasionally fails and the logs show that the failed call returns the response shown below.

Which techniques will help mitigate this exception? (Select TWO.)

A.

Implement retries with exponential backoff

B.

Use a PutRecord API instead of PutRecords

C.

Reduce the frequency and/or size of the requests

D.

Use Amazon SNS instead of Kinesis.

E.

Reduce the number of KCL consumers.

Full Access
Question # 34

A developer is using AWS CodeDeploy to automate a company's application deployments to Amazon EC2.

Which application specification file properties are required to ensure the software deployments do not fail? {Select TWO.)

A.

The file must be a JSON-formatted file named appspec.json.

B.

The file must be a YAML-formatted file named appspec.yml

C.

The file must be stored in AWS CodeBuikJ and referenced from the application's source code.

D.

The file must be placed in the root of the directory structure of the application's source code.

E.

The file must be stored in Amazon S3 and referenced from the application's source code.

Full Access
Question # 35

A company is concerned that a malicious user could deploy unauthorized changes to the code for an AWS Lambda function. What can a developer do to ensure that only trusted code is deployed to Lambda?

A.

Turn on the trusted code option in AWS CodeDeploy. Add the CodeDeploy digital certificate to the Lambda package before deploying the package to Lambda

B.

Define the code signing configuration in the Lambda console Use AWS Signer to digitally sign the Lambda package before deploying the package to Lambda

C.

Link Lambda to AWS Key Management Service (AWS KMS) in the Lambda console. Use AWS KMS to digitally sign the Lambda package before deploying the package to Lambda.

D.

Set the KmsKeyArn property of the Lambda function to the Amazon Resource Name (ARN) of a trusted key before deploying the package to Lambda.

Full Access
Question # 36

A company has a serverless application that uses AWS Lambda functions and AWS Systems Manager parameters to store configuration data. The company moves the Lambda functions inside the VPC and into private subnets. The Lambda functions are now producing errors in their attempts to access Systems Manager parameters.

Which solution will allow the Lambda functions to access Systems Manager parameters inside the VPC?

A.

Configure security groups to allow access lo Systems Manager.

B.

Create an interface VPC endpoint for Systems Manager.

C.

Use an internet gateway from inside the VPC.

D.

Create a gateway VPC endpoint for Systems Manager.

Full Access
Question # 37

A company has an online order website that uses Amazon DynamoDB to store item inventory. A sample of the inventory object is as follows:

A developer needs to reduce all inventory prices by 100 as long as the resulting price would not be less than 500. What should the developer do to make this change with the LEAST number of calls to DynamoDB?

A.

Perform a DynamoDB Query operation with the Id. If the price is >= 600, perform an Updateltem operation to update the price.

B.

Perform a DynamoDB Updateltem operation with a condition expression of "Price >= 600".

C.

Perform a DynamoDB Updateltem operation with a condition expression of "ProductCategory IN <{"S": "Sporting Goods"}) and Price = 600".

Full Access
Question # 38

A developer has built an application running on AWS Lambda using AWS Serverless Application Model (AWS SAM).

What is the correct sequence of steps to successfully deploy the application?

A.

1. Build the SAM template in Amazon EC2.

2. Package the SAM template to Amazon EBS storage.

3. Deploy the SAM template from Amazon EBS.

B.

1. Build the SAM template locally.

2. Package the SAM template onto Amazon S3.

3. Deploy the SAM template from Amazon S3.

C.

1. Build the SAM template locally.

2. Deploy the SAM template from Amazon S3.

3. Package the SAM template for use.

D.

1. Build the SAM template locally.

2 Package the SAM template from AWS CodeCommit.

Full Access
Question # 39

A developer is writing a web application that allows users to sign in. The application will run on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances will run in an Auto Scaling group across multiple Availability Zones.

How can the developer ensure that users stay signed in when the Auto Scaling group is scaled down?

A.

Enable sticky sessions on the ALB target group.

B.

Create an Amazon DynamoDB table. Configure the application to use the DynamoDB table to store session state such as login status.

C.

Create an Amazon Elastic Block Store (Amazon EBS) volume. Use EBS Multi-Attach to attach the volume to all instances in the Auto Scaling group. Configure the application to use the volume to store session state such as login status.

D.

Enable deregistration delay on the ALB target group.

Full Access
Question # 40

A company that has multiple offices uses an Amazon DynamoDB table to store employee payroll information. Item attributes consist of employee names, office identifiers, and cumulative daily hours worked. The most frequently used query extracts a report of an alphabetical subset of employees for a specific office.

Which design of the DynamoDB table primary key will have the MINIMUM performance impact?

A.

Partition key on the office identifier and sort key on the employee name

B.

Partition key on the employee name and sort key on the office identifier

C.

Partition key on the employee name

D.

Partition key on the office identifier

Full Access
Question # 41

A company is building a serverless application that uses AWS Lambda. The application includes Lambda functions that are exposed by Amazon API Gateway The functions will use several large third-party libraries, and the build artifacts will exceed 50 MB in size.

Which combination of steps should a developer take to prepare and perform the deployment? (Select TWO.)

A.

Issue the aws lambda update-function-code CLI command with the -zip-file fileb://my-function.zip parameter

B.

Upload the build artifact to Amazon S3.

C.

Issue the aws cloudformation package CLI command.

D.

Issue the aws lambda update-function-code CLI command with the -s3-bucket and -s3-key parameters.

E.

Issue the aws lambda update-function-code CLI command with a parameter that points to the source code in AWS CodeCommit.

Full Access
Question # 42

A developer wants to implement authentication using Amazon Cognito user pools for an existing API in Amazon API Gateway. After creating the Amazon Cognito user pool, the developer tests the GET request to the API. Unauthenticated requests to the API return a 200 OK status response.

Which combination of additional steps are required to complete the authentication implementation? (Select TWO.)

A.

Create an Amazon Cognito authonzer in API Gateway and specify the Amazon Cognito user pool.

B.

Create an AWS Lambda authorizer in API Gateway and specify the Amazon Cognito user pool.

C.

Specify the authofizer in the GET method section of API Gateway and redeploy the API.

D.

Use Amazon Cognito user pools to make and authenticate the request to API Gateway.

E.

Create an Amazon Cognito authorizer in API Gateway and specify the Amazon Cognito identity pool.

Full Access
Question # 43

A company is expanding the compatibility of its photo-sharing mobile app to hundreds of additional devices with unique screen dimensions and resolutions. Ph are stored in Amazon S3 in their original format and resolution. The company uses an Amazon CloudFront distribution to serve the photos. The app includes th dimension and resolution of the display as GET parameters with every request.

A developer needs to implement a solution that optimizes the photos that are served to each device to reduce load time and increase photo quality.

Which solution will meet these requirements MOST cost-effectively?

A.

Use S3 Batch Operations to invoke an AWS Lambda function to create new variants of the photos with the required dimensions and resolutions. Cr........dynamic CloudFront origin that automatically maps the request of each device to the corresponding photo variant.

B.

Use S3 Batch Operations to invoke an AWS Lambda function to create new variants of the photos with the required dimensions and resolutions. Cre;..... Lambda@Edge function to route requests to the corresponding photo variant by using request headers.

C.

Create a Lambda@Edge function that optimizes the photos upon request and returns the photos as a response. Change the CloudFront TTL cache policy to the maximum value possible.

D.

Create a Lambda@Edge function that optimizes the photos upon request and returns the photos as a response. In the same function, store a copy to processed photos on Amazon S3 for subsequent requests.

Full Access
Question # 44

A developer is migrating to Amazon Cognito from a custom user management solution that stores user information in a database. The developer has created a…… Amazon Cognito user pool. The developer needs to migrate the existing user information to the user pool without forcing users to change their passwords.

Which solution will meet these requirements?

A.

Import users from a .csv file.

B.

Add an OpenID Connect (OIDC) identity provider to the user pool.

C.

Import users from a .json file.

D.

Import users with a user migration AWS Lambda trigger.

Full Access
Question # 45

A developer is migrating a Windows-based legacy application from on premises to AWS. The application will run on Amazon EC2 instances that run Amazon Linux. The application stores a large number of files in an NFS drive. The migration solution must minimize downtime and application code changes.

Which solution should the developer use to migrate the application data?

A.

Create an Amazon S3 bucket. Use the s3 sync command to upload the files to the S3 bucket.

B.

Create an Amazon Elastic Block Store (Amazon E8S) volume. Upload the files to the volume. Attach the volume to the EC2 instances.

C.

Create an Amazon Elastic File System (Amazon EFS) file system. Use AWS DataSync to transfer the files to Amazon EFS.

D.

Create an Amazon Elastic File System (Amazon EFS) file system. Mount the EFS file system from the legacy application. Copy the files to the EFS mount.

Full Access
Question # 46

A development team set up a pipeline to launch a test environment. The developers want to automate tests for their application. The team created an AWS CodePipeline stage to deploy the application to a test environment in batches using AWS Elastic Beanstalk. A later CodePipeline stage contains a single action that uses AWS CodeBuild to run numerous automated Selenium-based tests on the deployed application. The team must speed up the pipeline without removing any of the individual tests.

Which set of actions will MOST effectively speed up application deployment and testing?

A.

Set up an all-at-once deployment in Elastic Beanstalk. Run tests in parallel with multiple CodeBuild actions.

B.

Set up a rolling update in Elastic Beanstalk. Run tests in serial with a single CodeBuild action.

C.

Set up an immutable update in Elastic Beanstalk. Run tests in serial with a single CodeBuild action.

D.

Set up a traffic-splitting deployment in Elastic Beanstalk. Run tests in parallel with multiple CodeBuild actions.

Full Access
Question # 47

A developer is creating a photo website. Amazon Route 53 hosts the website's domain. The developer wants to store the application code and images in an Amazon S3 bucket. The developer also wants to jse Amazon CloudFront to deliver the images to users.

the developer has created the S3 bucket and a CloudFront distribution. The developer wants the images to be accessed only through the website's domain. Users must not use the S3 URLs.

Which solution will meet these requirements?

A.

Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Create an alias in Route 53 that points the website domain to the S3 bucket.

B.

Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Update the Route 53 records to point the website domain to the CloudFront domain name.

C.

Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the S3 bucket.

D.

Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the CloudFront domain name.

Full Access
Question # 48

A company is using an Amazon API Gateway REST API endpoint as a webhook lo publish events from an on-premises source control management (SCM) system to Amazon EventBridge. The company has configured an EventBridge rule to listen for the events and to control application deployment m a central AWS account. The company needs to receive the same events across multiple receiver AWS accounts

How can a developer meet these requirements without changing the configuration of the SCM system?

A.

Deploy the API Gateway REST API to all the required AWS accounts. Use the same custom domain name for all the gateway endpoints so that a single SCM webhook can be used for all events from all accounts.

B.

Deploy the API Gateway REST API to all the receiver AWS accounts Create as many SCM webhooks as the number of AWS accounts.

C.

Grant permission to the central AWS account for EventBridge to access the receiver AWS accounts. Add an EventBridge event bus on the receiver AWS accounts as the targets to the existing EventBridge rule

D.

Convert the API Gateway type from REST API to HTTP API

Full Access
Question # 49

A developer has created a Java application that makes HTTP requests directly to AWS services. Application logging shows 5xx HTTP response codes that occ irregular intervals. The errors are affecting users.

How should the developer update the application to improve the application's resiliency?

A.

Revise the request content in the application code.

B.

Use the AWS SDK for Java to interact with AWS APIs.

C.

Scale out the application so that more instances of the application are running.

D.

Add additional logging to the application code.

Full Access
Question # 50

A developer has an application container, an AWS Lambda function, and an Amazon Simple Queue Sen/ice (Amazon SOS) queue. The Lambda function uses the SOS queue as an event source. The Lambda function makes a call to a third-party machine learning API when the function is invoked. The response from the third-party API can take up to 60 seconds to return.

the Lambda function's timeout value is currently 65 seconds. The developer has noticed that the Lambda function sometimes processes duplicate messages from the SOS queue.

What should the developer do to ensure that the Lambda function does not process duplicate messages?

A.

Configure the Lambda function with a larger amount of memory.

B.

Configure an increase in the Lambda function's timeout value.

C.

Configure the SOS queue's delivery delay value to be greater than the maximum time it takes to call the third-party API.

D.

Configure the SOS queue's visibility timeout value to be greater than the maximum time it takes to call the third-party API.

Full Access
Question # 51

A developer is designing a serverless application for an ecommerce website. An Amazon API Gateway API exposes.....

user operations. The website features shopping carts for the users. The shopping carts must be stored for extended..... the front-end application.

The load on the application will vary significantly based on the time of day and the promotional sales that are offered..... scale automatically to meet these changing demands.

Which solution will meet these requirements?

A.

Store the data objects on an Amazon RDS DB instance. Cache the data objects in memory by using Amazon ElastiCache.

B.

Store the data objects on Amazon EC2 instances behind an Application Load Balancer. Use session affinity (sticky sessions) for each user's shopping cart.

C.

Store the data objects in Amazon S3 buckets. Cache the data objects by using Amazon CloudFront with the maximum TTL.

D.

Store the data objects in Amazon DynamoDB tables. Cache the data objects by using DynamoDB Accelerator (DAX).

Full Access
Question # 52

A Developer decides lo store highly secure data in Amazon S3 and wants to implement server-side encryption (SSF) with granular control of who can access the master key Company policy requires that the master key be created, rotated, and disabled easily when needed, all for security reasons.

Which solution should be used to moot these requirements?

A.

SSE with Amazon S3 managed keys (SSE-S3)

B.

SSFE with AWS KMS managed keys (SSE KMS)

C.

SSE with AWS Secrets Manager

D.

SSE with customer provided encryption keys

Full Access
Question # 53

A developer wants to build an application that will allow new users to register and create new user accounts. The application must also allow users with social media accounts to log in using their social media credentials.

Which AWS service or feature can be used to meet these requirements?

A.

AWS IAM

B.

Amazon Cognito identity pools

C.

Amazon Cognito user pools

D.

AWS Directory Service

Full Access
Question # 54

A company needs to distribute firmware updates to its customers around the world.

Which service will allow easy and secure control of the access to the downloads at the lowest cost?

A.

Use Amazon CloudFront with signed URLs for Amazon S3

B.

Create a dedicated Amazon CloudFront Distribution for each customer

C.

Use Amazon CloudFront with AWS Lambda@Edge

D.

Use Amazon API Gateway and AWS Lambda to control access to an S3 bucket

Full Access
Question # 55

A Developer is creating a template that uses AWS CloudFormation to deploy an application. This application is serverless and uses Amazon API Gateway, Amazon DynamoDB, and AWS Lambda.

Which tool should the Developer use to define simplified syntax for expressing serverless resources?

A.

CloudFormation serverless intrinsic functions

B.

AWS serverless express

C.

An AWS serverless application model

D.

A CloudFormation serverless plugin

Full Access
Question # 56

An AWS Lambda function must access an external site by using a regularly rotated user name and password. These items must be kept securely and cannot be stored in the function code.

What combination of AWS services can be used to accomplish this? (Choose two.)

A.

AWS Certificate Manager (ACM)

B.

AWS Systems Manager Parameter Store

C.

AWS Trusted Advisor

D.

AWS KMS

E.

Amazon GuardDuty

Full Access
Question # 57

A company is running a Docker application on Amazon ECS. The application must scale based on user load in the last 15 seconds.

How should a Developer instrument the code so that the requirement can be met?

A.

Create a high-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 30 seconds

B.

Create a high-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 5 seconds

C.

Create a standard-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 30 seconds

D.

Create a standard-resolution custom Amazon CloudWatch metric for user activity data, then publish data every 5 seconds

Full Access
Question # 58

A developer wants to ensure the Amazon EC2 instances in AWS Elastic Beanstalk execute a certain set of commands before the application is ready to use Which Elastic Beanstalk feature will allow the developer to accomplish this?

A.

Rolling update

B.

Immutable update

C.

User data

D.

ebextensions

Full Access
Question # 59

A Developer wants to upload data to Amazon S3 and must encrypt the data in transit.

Which of the following solutions will accomplish this task? (Choose two.)

A.

Set up hardware VPN tunnels to a VPC and access S3 through a VPC endpoint

B.

Set up Client-Side Encryption with an AWS KMS-Managed Customer Master Key

C.

Set up Server-Side Encryption with AWS KMS-Managed Keys

D.

Transfer the data over an SSL connection

E.

Set up Server-Side Encryption with S3-Managed Keys

Full Access
Question # 60

An AWS Lambda function generates a 3MB JSON file and then uploads it to an Amazon S3 bucket daily. The file contains sensitive information, so the Developer must ensure that it is encrypted before uploading to the bucket.

Which of the following modifications should the Developer make to ensure that the data is encrypted before uploading it to the bucket?

A.

Use the default AWS KMS customer master key for S3 in the Lambda function code.

B.

Use the S3 managed key and call the GenerateDataKey API to encrypt the file.

C.

Use the GenerateDateKey API, then use that data key to encrypt the file in the Lambda function code.

D.

Use a custom KMS customer master key created for S3 in the Lambda function code.

Full Access
Question # 61

A Developer is developing an application that manages financial transactions. To improve security, multi-factor authentication (MFA) will be required as part of the login protocol.

What services can the Developer use to meet these requirements?

A.

Amazon DynamoDB to store MFA session data, and Amazon SNS to send MFA codes

B.

Amazon Cognito with MFA

C.

AWS Directory Service

D.

AWS IAM with MFA enabled

Full Access
Question # 62

You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some point you find out that other sites have been linking to the photos on your site, causing loss to your business.

What is an effective method to mitigate this?

A.

Store photos on an EBS volume of the web server

B.

Remove public read access and use signed URLs with expiry dates.

C.

Use CloudFront distributions for static content.

D.

Block the IPs of the offending websites in Security Groups.

Full Access
Question # 63

An organization is using Amazon API Gateway to provide a public API called "Survey" for collecting user feedback posts about its products The survey API has "DEV" and "PROD" stages and consists of one resource "/feedback" which allows users to retrieve/create/update single feedback posts.

Aversion-controlled Swagger file is used to define a new API that retrieves multiple feedback posts To add the new API resource "/listFeedbackForProduct" the developer makes changes to the Swagger file defining an API uploads the fie to the organization's version control system, and uses the API Gateway Import API feature to apply the changes to the Survey API After successful import the developer runs the tests against the DEV stage and finds that resource VlistFeedbackForProduct" is not available.

What is MOST likely the reason for resource not being available?

A.

Even though the Swagger import was successful, resource creation failed afterwards

B.

There is a propagation delay of several minutes in creating API Gateway resources after import

C.

The developer needs to restart the API Gateway stage after import in order to apply the changes.

D.

The developer needs to create a new deployment after import in order to deploy the changes

Full Access
Question # 64

A developer is creating an application to process a large number of requests Requests must be processed in order, and each request should be processed only once How should Amazon SQS be deployed to achieve this?

A.

Configure First in First out (FIFO) delivery in a standard Amazon SQS queue to process requests.

B.

Use an SQS FIFO queue to process requests

C.

Use the SetOrder attribute to ensure sequential request processing

D.

Convert the standard queue to a FIFO queue by renaming the queue to use the fifo suffix.

Full Access
Question # 65

A company is building a compute-intensive application that will run on a fleet of Amazon EC2 instances. The application uses attached Amazon EBS disks for storing data. The application will process sensitive information and all the data must be encrypted.

What should a developer do to ensure the data is encrypted on disk without impacting performance?

A.

Configure the Amazon EC2 instance fleet to use encrypted EBS volumes for storing data

B.

Add logic to write all data to an encrypted Amazon S3 bucket

C.

Add a custom encryption algorithm to the application that will encrypt and decrypt all data

D.

Create a new Amazon Machine Image (AMI) with an encrypted root volume and store the data to ephemeral disks.

Full Access
Question # 66

A developer is writing a new serverless application for a company. Several other developers must collaborate on the code for this application, and the company expects frequent changes to the code. The developer needs to deploy the code from source control to AWS Lambda with the fewest number of manual steps.

Which strategy for the build and deployment should the developer use to meet these requirements?

A.

Build the code locally, and then upload the code into the source control system. When a release is needed, run AWS CodePipeline to extract the uploaded build and deploy the resources.

B.

Use the AWS Serverless Application Model (AWS SAM) CLI to build and deploy the application from the developer's local machine with the latest version checked out locally.

C.

Use AWS CodeBuild and AWS CodePipeline to invoke builds and corresponding deployments when configured source controlled branches have pull requests merged into them

D.

Use the Lambda console to upload a .zip file of the application that is created by the AWS Serverless Application Model (AWS SAM) CLI build command.

Full Access
Question # 67

A developer is working on an AWS Lambda function that accesses Amazon DynamoDB The Lambda function must retrieve an item and update some of its attributes. or create the item if it does not exist The Lambda function has access to the primary key.

Which IAM permissions should the developer request for the Lambda function to achieve this functionality?

A.

dynaracdb:DeleteItem

dynamodb:GetItem

dynamcdb:Putltem

B.

dynamodb:Updateltem

dynamcdb:Getltem

dynamodb:DescribeTable

C.

dynamcdb:GetRecords

dynamcdb:Putltem

dynamodb:updateTable

D.

dynamodb:Updateltem

dynamodb:Getltem

dynamodb:Putltem

Full Access
Question # 68

A developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB In the local development environment, the application has used IAM access keys The application is now ready for deployment onto an ECS duster.

How should the application authenticate with AWS services in production?

A.

Configure an ECS task IAM role for the application to use

B.

Refactor the application to call AWS STS AssumeRole based on an instance role

C.

Configure AWS access key/secret access key environment variables with new credentials

D.

Configure the credentials file with a new access key/secret access key

Full Access
Question # 69

A Developer created a new AWS account and must create a scalable AWS Lambda function that meets the following requirements for concurrent execution:

  • Average execution time of 100 seconds
  • 50 requests per second

Which step must be taken prior to deployment to prevent errors?

A.

Implement dead-letter queues to capture invocation errors

B.

Add an event source from Amazon API Gateway to the Lambda function

C.

Implement error handling within the application code

D.

Contact AWS Support to increase the concurrent execution limits

Full Access
Question # 70

An application is being developed to audit several AWS accounts. The application will run in Account A and must access AWS services in Accounts B and C.

What is the MOST secure way to allow the application to call AWS services in each audited account?

A.

Configure cross-account roles in each audited account. Write code in Account A that assumes those roles

B.

Use S3 cross-region replication to communicate among accounts, with Amazon S3 event notifications to trigger Lambda functions

C.

Deploy an application in each audited account with its own role. Have Account A authenticate with the application

D.

Create an IAM user with an access key in each audited account. Write code in Account A that uses those access keys

Full Access
Question # 71

A developer is writing a web application that must share secure documents with end users The documents are stored in a private Amazon S3 bucket The application must allow only authenticated users to download specific documents when requested, and only for a duration of 15 minutes

How can the developer meet these requirements?

A.

Copy the documents to a separate S3 bucket that has a lifecycle policy for deletion after 15 minutes

B.

Create a presigned S3 URL using the AWS SDK with an expiration time of 15 minutes

C.

Use server-side encryption with AWS KMS managed keys (SSE-KMS) and download the documents using HTTPS

D.

Modify the S3 bucket policy to only allow specific users to download the documents Revert the change after 15 minutes.

Full Access
Question # 72

The upload of a 15 GB object to Amazon S3 fails. The error message reads: “Your proposed upload exceeds the maximum allowed object size.”

What technique will allow the Developer to upload this object?

A.

Upload the object using the multi-part upload API.

B.

Upload the object over an AWS Direct Connect connection.

C.

Contact AWS Support to increase the object size limit.

D.

Upload the object to another AWS region.

Full Access
Question # 73

A developer has built an application running on AWS Lambda using AWS Serverless Application Model (AWS SAM). What is the correct order of execution to successfully deploy the application?

A.

1 Build the SAM template in Amazon EC2

2 Package the SAM template to Amazon EBS storage

3. Deploy the SAM template from Amazon EBS.

B.

1 Build the SAM template locally

2 Package the SAM template onto Amazon S3

3. Deploy the SAM template from Amazon S3.

C.

1 Build the SAM template locally

2. Deploy the SAM template from Amazon S3.

3 Package the SAM template for use

D.

1 Build the SAM template locally

2 Package the SAM template from AWS CodeCommit.

3 Deploy the SAM template to CodeCommit

Full Access
Question # 74

A development team wants to immediately build and deploy an application whenever there is a change to the source code. Which approaches could be used to trigger the deployment? (Select TWO.)

A.

Store the source code in an Amazon S3 bucket Configure AWS CodePipeline to start whenever a file in the bucket changes

B.

Store the source code in an encrypted Amazon EBS volume Configure AWS CodePipeline to start whenever a file in the volume changes

C.

Store the source code in an AWS CodeCommit repository Configure AWS CodePipeline to start whenever a change is committed to the repository.

D.

Store the source code in an Amazon S3 bucket Configure AWS CodePipeline to start every 15 minutes

E.

Store the source code in an Amazon EC2 instance's ephemeral storage. Configure the instance to start AWS CodePipeline whenever there are changes to the source code

Full Access
Question # 75

A company is migrating from a monolithic architecture to a microservices-based architecture. The Developers need to refactor the application so that the many microservices can asynchronously communicate with each other without impacting performance.

Use of which managed AWS services will enable asynchronous message passing? (Choose two.)

A.

Amazon SQS

B.

Amazon Cognito

C.

Amazon Kinesis

D.

Amazon SNS

E.

Amazon ElastiCache

Full Access
Question # 76

NO:

A developer is setting up Amazon API Gateway for their company's products The API will be used by registered developers to query and update their environments. The company wants to limit the amount of requests end users can send for both cost and security reasons Management wants to offer registered developers the option of buying larger packages that allow for more requests.

How can the developer accomplish this with the LEAST amount of overhead management?

A.

Enable throttling for the API Gateway stage. Set a value for both the rate and burst capacity. If a registered user chooses a larger package, create a stage for them, adjust the values, and share the new URL with them.

B.

Set up Amazon CloudWatch API logging in API Gateway Create a filter based on the user and requestTime fields and create an alarm on this filter Write an AWS Lambda function to analyze the values and requester information, and respond accordingly Set up the function as the target for the alarm If a registered user chooses a larger package, update the Lambda code with the values.

C.

Enable Amazon CloudWatch metrics for the API Gateway stage Set up CloudWatch alarms based off the Count metric and the ApiName, Method, Resource, and Stage dimensions to alerts when request rates pass the threshold Set the alarm action to Deny If a registered user chooses a larger package create a user-specific alarm and adjust the values

D.

Set up a default usage plan, specify values for the rate and burst capacity, and associate it with a stage, if a registered user chooses a larger package, create a custom plan with the appropriate values and associate the plan with the user

Full Access
Question # 77

A developer needs to create an application that supports Security Assertion Markup Language (SAML) and Facebook authentication It must also allow access to AWS services, such as Amazon DynamoDB.

Which AWS service or feature will meet these requirements with the LEAST amount of additional coding?

A.

AWSAppSync

B.

Amazon Cognito identity pools

C.

Amazon Cognito user pools

D.

Amazon Lambda@Edge

Full Access
Question # 78

A Developer is building a three-tier web application that should be able to handle a minimum of 5000 requests per minute. Requirements state that the web tier should be completely stateless while the application maintains session state for the users.

How can session data be externalized, keeping latency at the LOWEST possible value?

A.

Create an Amazon RDS instance, then implement session handling at the application level to leverage a database inside the RDS database instance for session data storage

B.

Implement a shared file system solution across the underlying Amazon EC2 instances, then implement session handling at the application level to leverage the shared file system for session data storage

C.

Create an Amazon ElastiCache Memcached cluster, then implement session handling at the application level to leverage the cluster for session data storage

D.

Create an Amazon DynamoDB table, then implement session handling at the application level to leverage the table for session data storage

Full Access
Question # 79

An on-premises legacy application is caching data files locally and writing shared images to local disks.

What is necessary to allow for horizontal scaling when migrating the application to AWS?

A.

Modify the application to have both shared images and caching data written to Amazon EBS.

B.

Modify the application to read and write cache data on Amazon S3, and also store shared images on S3.

C.

Modify the application to use Amazon S3 for serving shared images; cache data can then be written to local disks.

D.

Modify the application to read and write cache data on Amazon S3, while continuing to write shared images to local disks.

Full Access
Question # 80

A developer is preparing a deployment package using AWS Cloud Formation. The package consists of two separate templates: one for the infrastructure and one for the application. The application has to be inside the VPC that is created from the infrastructure template

How can the application stack refer to the VPC created from the infrastructure template?

A.

Use the Ret function to import the VPC into the application stack from the infrastructure template

B.

Use the export flag in the infrastructure template, and then use the Fn::lmportValue function in the application template

C.

Use the DependsOn attribute to specify that the application instance depends on the VPC in the application template

D.

Use the Fn::GetAtt function to include the attribute of the VPC in the application template.

Full Access
Question # 81

A startup s photo-sharing site is deployed in a VPC. An ELB distributes web traffic across two subnets. ELB session stickiness is configured to use the AWS-generated session cookie, with a session TTL of 5 minutes. The webserver Auto Scaling Group is configured as: min-size=4, max-size=4.

The startups preparing for a public launch, by running load-testing software installed on a single EC2 instance running in us-west-2a. After 60 minutes of load-testing, the webserver logs show:

Which recommendations can help ensure load-testing HTTP requests are evenly distributed across the four webservers? Choose 2 answers

A.

Launch and run the load-tester EC2 instance from us-east-1 instead.

B.

Re-configure the load-testing software to re-resolve DNS for each web request.

C.

Use a 3rd-party load-testing service which offers globally-distributed test clients.

D.

Configure ELB and Auto Scaling to distribute across us-west-2a and us-west-2c.

E.

Configure ELB session stickiness to use the app-specific session cookie.

Full Access
Question # 82

An application reads data from an Amazon DynamoDB table. Several times a day, for a period of 15 seconds, the application receives multiple ProvisionedThroughputExceeded errors.

How should this exception be handled?

A.

Create a new global secondary index for the table to help with the additional requests.

B.

Retry the failed read requests with exponential backoff.

C.

Immediately retry the failed read requests.

D.

Use the DynamoDB “UpdateItem” API to increase the provisioned throughput capacity of the table.

Full Access
Question # 83

Which of the following statements about SWF are true? Choose 3 answers

A.

SWF tasks are assigned once and never duplicated

B.

SWF requires an S3 bucket for workflow storage

C.

SWF workflow executions can last up to a year

D.

SWF triggers SNS notifications on task assignment

E.

SWF uses deciders and workers to complete tasks

F.

SWF requires at least 1 EC2 instance per domain

Full Access
Question # 84

A Developer is writing a Linux-based application to run on AWS Elastic Beanstalk. Application requirements state that the application must maintain full capacity during updates while minimizing cost.

Which type of Elastic Beanstalk deployment policy should the Developer specify for the environment?

A.

Immutable

B.

Rolling

C.

All at Once

D.

Rolling with additional batch

Full Access
Question # 85

A Developer is designing a fault-tolerant environment where client sessions will be saved.

How can the Developer ensure that no sessions are lost if an Amazon EC2 instance fails?

A.

Use sticky sessions with an Elastic Load Balancer target group.

B.

Use Amazon SQS to save session data.

C.

Use Amazon DynamoDB to perform scalable session hadling.

D.

Use Elastic Load Balancer connection draining to stop sending requests to failing instances.

Full Access
Question # 86

company needs a fully-managed source control service that will work in AWS. The service must ensure that revision control synchronizes multiple distributed repositories by exchanging sets of changes peer-to-peer. All users need to work productively even when not connected to a network.

Which source control service should be used?

A.

Subversion

B.

AWS CodeBuild

C.

AWS CodeCommit

D.

AWS CodeStar

Full Access
Question # 87

Company B provides an online image recognition service and utilizes SQS to decouple system components for scalability The SQS consumers poll the imaging queue as often as possible to keep end-to-end throughput as high as possible. However, Company B is realizing that polling in tight loops is burning CPU cycles and increasing costs with empty responses.

How can Company B reduce the number of empty responses?

A.

Set the imaging queue visibility Timeout attribute to 20 seconds

B.

Set the Imaging queue ReceiveMessageWaitTimeSeconds attribute to 20 seconds

C.

Set the imaging queue MessageRetentionPeriod attribute to 20 seconds

D.

Set the DelaySeconds parameter of a message to 20 seconds

Full Access
Question # 88

A game stores user game data in an Amazon DynamoDB table. Individual users should not have access to other users’ game data. How can this be accomplished?

A.

Encrypt the game data with individual user keys.

B.

Restrict access to specific items based on certain primary key values.

C.

Stage data in SQS queues to inject metadata before accessing DynamoDB.

D.

Read records from DynamoDB and discard irrelevant data client-side.

Full Access
Question # 89

A Developer is creating a mobile application that will not require users to log in.

What is the MOST efficient method to grant users access to AWS resources?

A.

Use an identity provider to securely authenticate with the application.

B.

Create an AWS Lambda function to create an IAM user when a user accesses the application.

C.

Create credentials using AWS KMS and apply these credentials to users when using the application.

D.

Use Amazon Cognito to associate unauthenticated users with an IAM role that has limited access to resources.

Full Access
Question # 90

A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available.

Which of the following could create this situation? (Select two.)

A.

The traces are reaching X-Ray, but the Developer does not have access to view the records.

B.

The X-Ray daemon is not installed on the EC2 instance.

C.

The X-Ray endpoint specified in the application configuration is incorrect.

D.

The instance role does not have “xray:BatchGetTraces” and “xray:GetTraceGraph” permissions.

E.

The instance role does not have “xray:PutTraceSegments” and “xray:PutTelemetryRecords” permissions.

Full Access
Question # 91

You are inserting 1000 new items every second in a DynamoDB table. Once an hour these items are analyzed and then are no longer needed. You need to minimize provisioned throughput, storage, and API calls.

Given these requirements, what is the most efficient way to manage these Items after the analysis?

A.

Retain the items in a single table

B.

Delete items individually over a 24 hour period

C.

Delete the table and create a new table per hour

D.

Create a new table per hour

Full Access