Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

DVA-C02 Questions and Answers

Question # 6

A developer is using AWS AppConfig to manage feature flags for an application. The developer needs to enable a new premium feature only for a specific group of users based on the IDs of the users. Which solution will meet these requirements with the LEAST development effort?

A.

Use a single AWS AppConfig feature flag without any variants. Implement user ID checks in the application to control access to the premium feature.

B.

Create separate AWS AppConfig feature flags for each user group. Assign values to the feature flags.

C.

Create an AWS AppConfig feature flag. Define multiple variants. Set up rules to target the specific user group based on the IDs of the users.

D.

Configure AWS AppConfig to use an external database to store user IDs. Retrieve the user IDs during flag evaluation.

Full Access
Question # 7

A company built a new application in the AWS Cloud. The company automated the bootstrapping of new resources with an Auto Scaling group by using AWS Cloudf-ormation templates. The bootstrap scripts contain sensitive data.

The company needs a solution that is integrated with CloudFormation to manage the sensitive data in the bootstrap scripts.

Which solution will meet these requirements in the MOST secure way?

A.

Put the sensitive data into a CloudFormation parameter. Encrypt the CloudFormation templates by using an AWS Key Management Service (AWS KMS) key.

B.

Put the sensitive data into an Amazon S3 bucket Update the CloudFormation templates to download the object from Amazon S3 during bootslrap.

C.

Put the sensitive data into AWS Systems Manager Parameter Store as a secure string parameter. Update the CloudFormation templates to use dynamic references to specify template values.

D.

Put the sensitive data into Amazon Elastic File System (Amazon EPS) Enforce EFS encryption after file system creation. Update the CloudFormation templates to retrieve data from Amazon EFS.

Full Access
Question # 8

A developer is running an application on an Amazon EC2 instance. When the application tries to read an Amazon S3 bucket, the application fails. The developer notices that the associated IAM role is missing the S3 read permission. The developer needs to give the application the ability to read the S3 bucket. Which solution will meet this requirement with the LEAST application disruption?

A.

Add the permission to the role. Terminate the existing EC2 instance. Launch a new EC2 instance.

B.

Add the permission to the role so that the change will take effect automatically.

C.

Add the permission to the role. Hibernate and restart the existing EC2 instance.

D.

Add the permission to the S3 bucket. Restart the EC2 instance.

Full Access
Question # 9

A company is using Amazon API Gateway to invoke a new AWS Lambda function The company has Lambda function versions in its PROD and DEV environments. In each environment, there is a Lambda function alias pointing to the corresponding Lambda function version API Gateway has one stage that is configured to point at the PROD alias

The company wants to configure API Gateway to enable the PROD and DEV Lambda function versions to be simultaneously and distinctly available

Which solution will meet these requirements?

A.

Enable a Lambda authorizer for the Lambda function alias in API Gateway Republish PROD and create a new stage for DEV Create API Gateway stage variables for the PROD and DEV stages. Point each stage variable to the PROD Lambda authorizer to the DEV Lambda authorizer.

B.

Set up a gateway response in API Gateway for the Lambda function alias. Republish PROD and create a new stage for DEV. Create gateway responses in API Gateway for PROD and DEV Lambda aliases

C.

Use an environment variable for the Lambda function alias in API Gateway. Republish PROD and create a new stage for development. Create API gateway environment variables for PROD and DEV stages. Point each stage variable to the PROD Lambda function alias to the DEV Lambda function alias.

D.

Use an API Gateway stage variable to configure the Lambda function alias Republish PROD and create a new stage for development Create API Gateway stage variables for PROD and DEV stages Point each stage variable to the PROD Lambda function alias and to the DEV Lambda function alias

Full Access
Question # 10

A company is using the AWS Serverless Application Model (AWS SAM) to develop a social media application. A developer needs a quick way to test AWS Lambda functions locally by using test event payloads. The developer needs the structure of these test event payloads to match the actual events that AWS services create.

A.

Create shareable test Lambda events. Use these test Lambda events for local testing.

B.

Store manually created test event payloads locally. Use the sam local invoke command with the file path to the payloads.

C.

Store manually created test event payloads in an Amazon S3 bucket. Use the sam local invoke command with the S3 path to the payloads.

D.

Use the sam local generate-event command to create test payloads for local testing.

Full Access
Question # 11

A developer is testing an application that invokes an AWS Lambda function asynchronously. During the testing phase the Lambda function fails to process after two retries.

How can the developer troubleshoot the failure?

A.

Configure AWS CloudTrail logging to investigate the invocation failures.

B.

Configure Dead Letter Queues by sending events to Amazon SQS for investigation.

C.

Configure Amazon Simple Workflow Service to process any direct unprocessed events.

D.

Configure AWS Config to process any direct unprocessed events.

Full Access
Question # 12

A developer is creating an application that uses an Amazon DynamoDB table. The developer needs to develop code that reads all records that were added to the table during the previous day. creates HTML reports, and pushes the reports into third-party storage. The item size varies from 1 KB to 4 KB, and the index structure is defined with the date. The developer needs to minimize the read capacity that the application requires from the DynamoDB table.

Which DynamoDB API operation should the developer use in the code to meet these requirements?

A.

Query

B.

Scan

C.

BatchGetltem

D.

Getltem

Full Access
Question # 13

A team is developing an application that is deployed on Amazon EC2 instances. During testing, the team receives an error. The EC2 instances are unable to access an Amazon S3 bucket.

Which steps should the team take to troubleshoot this issue? (Select TWO.)

A.

Check whether the policy that is assigned to the JAM role that is attached to the EC2 instances grants access to Amazon S3.

B.

Check the S3 bucket policy to validate the access permissions for the S3 bucket.

C.

Check whether the policy that is assigned to the 1AM user that is attached to the EC2 instances grants access to Amazon S3.

D.

Check the S3 Lifecycle policy to validate the permissions that are assigned to the S3 bucket.

E.

Check the security groups that are assigned to the EC2 instances. Make sure that a rule is not blocking the access to Amazon S3.

Full Access
Question # 14

A retail company runs a sales analytics application that uses an AWS Lambda function to process transaction data that is stored in Amazon DocumentDB. The application aggregates daily sales data across 500 stores and uses the data to generate reports for senior managers.

Application users report that the application is taking longer to generate reports and that their requests sometimes time out. A developer investigates and notices that the application ' s average response time for report generation has increased from 3 seconds to over 25 seconds.

The developer needs to identify the application ' s performance bottlenecks.

Which solution will meet this requirement with the LEAST operational overhead?

A.

Enable AWS X-Ray tracing for the Lambda function and DocumentDB cluster. Implement custom subsegments to track query execution to identify slow-performing queries.

B.

Add Amazon CloudWatch Logs error streaming. Create custom CloudWatch metrics based on the logs. Create a CloudWatch dashboard that shows Lambda metrics.

C.

Modify the Lambda function to use DocumentDB connection pooling. Implement async/await patterns for database operations.

D.

Add logging statements within the Lambda function to output query execution times and database connection attempts. Store IDs in Amazon CloudWatch Logs. Use CloudWatch Logs Insights to analyze the logs.

Full Access
Question # 15

A developer is configuring an applications deployment environment in AWS CodePipeine. The application code is stored in a GitHub repository. The developer wants to ensure that the repository package ' s unit tests run in the new deployment environment. The deployment has already set the pipeline ' s source provider to GitHub and has specified the repository and branch to use in the deployment.

When combination of steps should the developer take next to meet these requirements with the least the LEAST overhead ' (Select TWO).

A.

Create an AWS CodeCommt project. Add the repository package ' s build and test commands to the protects buildspec

B.

Create an AWS CodeBuid project. Add the repository package ' s build and test commands to the projects buildspec

C.

Create an AWS CodeDeploy protect. Add the repository package ' s build and test commands to the project ' s buildspec

D.

Add an action to the source stage. Specify the newly created project as the action provider. Specify the build attract as the actions input artifact.

E.

Add a new stage to the pipeline alter the source stage. Add an action to the new stage. Speedy the newly created protect as the action provider. Specify the source artifact as the action ' s input artifact.

Full Access
Question # 16

A company has an Amazon API Gateway REST API that integrates with an AWS Lambda function. The API ' s development stage references a development alias of the Lambda function named " dev " . A developer needs to make a production alias of the Lambda function named " prod " available through the API. Which solution meets these requirements?

A.

Create a new method on the API. Name the method production. Configure the method to include a stage variable that points to the " prod " Lambda function alias.

B.

Create a new method on the API. Name the method production. Configure an integration request on the API ' s development stage that points to the " prod " Lambda function alias.

C.

Deploy the API to a new stage named production. Configure the stage to include a stage variable that points to the " prod " Lambda function alias.

D.

Deploy the API to a new stage named production. Configure an integration request on the API ' s production stage that points to the " prod " Lambda function alias.

Full Access
Question # 17

Users of a web-based music application are experiencing latency issues on one of the application ' s most popular pages. A developer identifies that the issue is caused by the slow load time of specific widgets that rank and sort various songs and albums.

The developer needs to ensure that the widgets load more quickly by using built-in, in-memory ranking and sorting techniques. The developer must ensure that the data remains up to date.

Which solution will meet these requirements with the LEAST latency ?

A.

Provision an Amazon ElastiCache (Memcached) cluster. Implement a lazy-loading caching strategy.

B.

Provision an Amazon ElastiCache (Redis OSS) cluster. Implement a write-through caching strategy.

C.

Provision an Amazon ElastiCache (Memcached) cluster. Implement a write-through caching strategy.

D.

Provision an Amazon ElastiCache (Redis OSS) cluster. Implement a lazy-loading caching strategy.

Full Access
Question # 18

A developer is updating an Amazon API Gateway REST API to have a mock endpoint. The developer wants to update the integration request mapping template so the endpoint will respond to mock integration requests with specific HTTP status codes based on various conditions.

A.

{ if( $input.params(‘integration’) == " mock " ) " statusCode " : 404 else " statusCode " : 500 end }

B.

{ if( $input.params( ' scope ' ) == " internal " ) " statusCode " : 200 else " statusCode " : 500 end }

C.

{ if( $input.path( " integration " ) ) " statusCode " : 200 else " statusCode " :404 end }

D.

{ if( $context.integration.status ) " statusCode " : 200 else " statusCode " : 500 end }

Full Access
Question # 19

A company wants to push a new UI for its application to users in a staging environment before the company gradually rolls out the UI to 10% of the company’s production users in a single AWS Region. The company needs a solution that can target the company’s audience based on user attributes. The solution must validate the configuration before deployment. The solution also must have an option for instant rollback without redeploying code. Which solution will meet these requirements?

A.

Use environment variables and deploy new UI versions for each environment to change feature flags.

B.

Use AWS AppConfig feature flags that have environment-scoped configurations, staged rollouts, and instant rollback.

C.

Store environment flags in AWS Systems Manager Parameter Store. Configure the application to call for parameters at runtime.

D.

Run a custom feature flag service on an Application Load Balancer (ALB). Configure the application to query the flag service to target the company’s audience and perform percentage rollouts.

Full Access
Question # 20

A company has implemented AWS CodeDeploy as part of its continuous integration and continuous delivery (CI/CD) stack in the cloud. The company sets up automatic rollbacks while initiating an in-place deployment of a new version of its web application on Amazon EC2 instances. Which result occurs if the deployment of the new version fails validation?

A.

CodeDeploy automatically restores the last known successful deployment from a snapshot that is stored in Amazon S3.

B.

CodeDeploy switches the Amazon Route 53 alias records back to the last known successful green deployment and terminates the failed blue deployment.

C.

CodeDeploy redeploys the last known stable version of the application as a new deployment with a new deployment ID.

D.

AWS CodePipeline promotes the most recent deployment that has a SUCCEEDED status to production.

Full Access
Question # 21

A company runs an application on AWS The application uses an AWS Lambda function that is configured with an Amazon Simple Queue Service (Amazon SQS) queue called high priority queue as the event source A developer is updating the Lambda function with another SQS queue called low priority queue as the event source The Lambda function must always read up to 10 simultaneous messages from the high priority queue before processing messages from low priority queue. The Lambda function must be limited to 100 simultaneous invocations.

Which solution will meet these requirements ' ?

A.

Set the event source mapping batch size to 10 for the high priority queue and to 90 for the low priority queue

B.

Set the delivery delay to 0 seconds for the high priority queue and to 10 seconds for the low priority queue

C.

Set the event source mapping maximum concurrency to 10 for the high priority queue and to 90 for the low priority queue

D.

Set the event source mapping batch window to 10 for the high priority queue and to 90 for the low priority queue

Full Access
Question # 22

A company is working on a new serverless application. A developer needs to find an automated way to deploy AWS Lambda functions and the dependent Infrastructure with minimum coding effort. The application also needs to be reliable.

Which method will meet these requirements with the LEAST operational overhead?

A.

Build the application by using shell scripts to create .zip files for each Lambda function. Manually upload the .zip files to the AWS Management Console.

B.

Build the application by using the AWS Serverless Application Model (AWS SAM). Use a continuous integration and continuous delivery (CI/CD) pipeline and the SAM CLI to deploy the Lambda functions.

C.

Build the application by using shell scripts to create .zip files for each Lambda function. Upload the .zip files. Deploy the .zip files as Lambda functions by using the AWS CLI in a continuous integration and continuous delivery (CI/CD) pipeline.

D.

Build a container for each Lambda function. Store the container images in AWS CodeArtifact. Deploy the containers as Lambda functions by using the AWS CLI in a continuous integration and continuous delivery (CI/CD) pipeline.

Full Access
Question # 23

A company has a serverless application that uses Amazon API Gateway backed by AWS Lambda proxy integration. The company is developing several backend APIs. The company needs a landing page to provide an overview of navigation to the APIs.

A developer creates a new /LandingPage resource and a new GET method that uses mock integration.

What should the developer do next to meet these requirements?

A.

Configure the integration request mapping template with Content-Type of text/html and statusCode of 200. Configure the integration response mapping template with Content-Type of application/json. In the integration response mapping template, include the LandingPage HTML code that references the APIs.

B.

Configure the Integration request mapping template with Content-Type of application/json. In the integration request mapping template, include the LandingPage HMTL code that references the APIs. Configure the integration response mapping template with Content-Type of text/html and statusCode of 200.

C.

Configure the integration request mapping template with Content-Type of application/json and statusCode of 200. Configure the integration response mapping template with Content-Type of text/html. In the integration response mapping template, include the LandingPage HTML code that references the APIs.

D.

Configure the integration request mapping template with Content-Type of text/html. In the integration request mapping template, include the LandingPage HTML code that references the APIs. Configure the integration response mapping template with Content-Type of application/json and statusCode of 200.

Full Access
Question # 24

A developer is building an application that uses an Amazon RDS for PostgreSQL database. To meet security requirements, the developer needs to ensure that data is encrypted at rest. The developer must be able to rotate the encryption keys on demand.

A.

Use an AWS KMS managed encryption key to encrypt the database.

B.

Create a symmetric customer managed AWS KMS key. Use the key to encrypt the database.

C.

Create a 256-bit AES-GCM encryption key. Store the key in AWS Secrets Manager, and enable managed rotation. Use the key to encrypt the database.

D.

Create a 256-bit AES-GCM encryption key. Store the key in AWS Secrets Manager. Configure an AWS Lambda function to perform key rotation. Use the key to encrypt the database.

Full Access
Question # 25

A developer supports an application that accesses data in an Amazon DynamoDB table. One of the item attributes is expirationDate in the timestamp format. The application uses this attribute to find items, archive them, and remove them from the table based on the timestamp value

The application will be decommissioned soon, and the developer must find another way to implement this functionality. The developer needs a solution that will require the least amount of code to write.

Which solution will meet these requirements?

A.

Enable TTL on the expirationDate attribute in the table. Create a DynamoDB stream. Create an AWS Lambda function to process the deleted items. Create a DynamoDB trigger for the Lambda function.

B.

Create two AWS Lambda functions one to delete the items and one to process the items Create a DynamoDB stream Use the Deleteltem API operation to delete the items based on the expirationDate attribute Use the GetRecords API operation to get the items from the DynamoDB stream and process them

C.

Create two AWS Lambda functions, one to delete the items and one to process the items. Create an Amazon EventBndge scheduled rule to invoke the Lambda Functions Use the Deleteltem API operation to delete the items based on the expirationDate attribute. Use the GetRecords API operation to get the items from the DynamoDB table and process them.

D.

Enable TTL on the expirationDate attribute in the table Specify an Amazon Simple Queue Service (Amazon SQS > dead-letter queue as the target to delete the items Create an AWS Lambda function to process the items

Full Access
Question # 26

A company uses AWS X-Ray to monitor a serverless application. The components of the application have different request rates. The user interactions and transactions are important to trace, but they are low in volume. The background processes such as application health checks, polling, and connection maintenance generate high volumes of read-only requests.

Currently, the default X-Ray sampling rules are universal for all requests. Only the first request per second and some additional requests are recorded. This setup is not helping the company review the requests based on service or request type.

A developer must configure rules to trace requests based on service or request properties. The developer must trace the user interactions and transactions without wasting effort recording minor background tasks.

Which solution will meet these requirements?

A.

Disable sampling for high-volume read-only requests. Sample at a lower rate for all requests that handle user interactions or transactions.

B.

Disable sampling and trace all requests for requests that handle user interactions or transactions. Sample high-volume read-only requests at a higher rate.

C.

Disable sampling and trace all requests for requests that handle user interactions or transactions. Sample high-volume read-only requests at a lower rate.

D.

Disable sampling for high-volume read-only requests. Sample at a higher rate for all requests that handle user interactions or transactions.

Full Access
Question # 27

A company developed an API application on AWS by using Amazon CloudFront, Amazon API Gateway, and AWS Lambda. The API has a

minimum of four requests every second. A developer notices that many API users run the same query by using the POST method. The developer

wants to cache the POST request to optimize the API resources.

Which solution will meet these requirements?

A.

Configure the CloudFront cache. Update the application to return cached content based upon the default request headers.

B.

Override the cache method in the selected stage of API Gateway. Select the POST method.

C.

Save the latest request response in Lambda /tmp directory. Update the Lambda function to check the /tmp directory.

D.

Save the latest request in AWS Systems Manager Parameter Store. Modify the Lambda function to take the latest request response from Parameter Store.

Full Access
Question # 28

A developer is creating an AWS Lambda function that searches for items from an Amazon DynamoDB table that contains customer contact information. The DynamoDB table items have the customer ' s email_address as the partition key and additional properties such as customer_type, name, and job_title.

The Lambda function runs whenever a user types a new character into the customer_type text input. The developer wants the search to return partial matches of the email_address property for a particular customer_type value. The developer does not want to recreate the DynamoDB table.

What should the developer do to meet these requirements?

A.

Add a global secondary index (GSI) to the DynamoDB table with customer_type as the partition key and email_address as the sort key. Perform a query operation on the GSI by using the begins_with key condition expression with the email_address property.

B.

Add a global secondary index (GSI) to the DynamoDB table with email_address as the partition key and customer_type as the sort key. Perform a query operation on the GSI by using the begins_with key condition expression with the email_address property.

C.

Add a local secondary index (LSI) to the DynamoDB table with customer_type as the partition key and email_address as the sort key. Perform a query operation on the LSI by using the begins_with key condition expression with the email_address property.

D.

Add a local secondary index (LSI) to the DynamoDB table with job_title as the partition key and email_address as the sort key. Perform a query operation on the LSI by using the begins_with key condition expression with the email_address property.

Full Access
Question # 29

A developer is implementing an AWS Lambda function that will be invoked when an object is uploaded to Amazon S3. The developer wants to test the Lambda function in a local development machine before publishing the function to a production AWS account.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Upload an object to Amazon S3 by using the aws s3api put-object CLI command. Wait for the local Lambda invocation from the S3 event.

B.

Create a sample JSON text file for a put object S3 event. Invoke the Lambda function locally. Use the aws lambda invoke CLI command with the JSON file and Lambda function name as arguments.

C.

Use the sam local start-lambda CLI command to start Lambda. Use the sam local generate-event s3 put CLI command to create the Lambda test JSON file. Use the sam local invoke CLI command with the JSON file as the argument to invoke the Lambda function.

D.

Create a JSON string for the put object S3 event. In the AWS Management Console, use the JSON string to create a test event for the local Lambda function. Perform the test.

Full Access
Question # 30

A company hosts its application in the us-west-1 Region. The company wants to add redundancy in the us-east-1 Region. The application secrets are stored in AWS Secrets Manager in us-west-1. A developer needs to replicate the secrets to us-east-1.

Which solution will meet this requirement?

A.

Configure secret replication for each secret. Add us-east-1 as a replication Region. Choose an AWS KMS key in us-east-1 to encrypt the replicated secrets.

B.

Create a new secret in us-east-1 for each secret. Configure secret replication in us-east-1. Set the source to be the corresponding secret in us-west-1. Choose an AWS KMS key in us-west-1 to encrypt the replicated secrets.

C.

Create a replication rule for each secret. Set us-east-1 as the destination Region. Configure the rule to run during secret rotation. Choose an AWS KMS key in us-east-1 to encrypt the replicated secrets.

D.

Create a Secrets Manager lifecycle rule to replicate each secret to a new Amazon S3 bucket in us-west-1. Configure an S3 replication rule to replicate the secrets to us-east-1.

Full Access
Question # 31

A company is planning to use AWS CodeDeploy to deploy an application to AWS Lambda. During the deployment of a new version of the application, the company initially must expose only 10% of live traffic to the new version of the deployed application. Then, every 10 minutes, the company must route another 10% of live traffic to the new version of the deployed application until all live traffic is routed to the new version.

Which CodeDeploy predefined configuration will meet these requirements?

A.

CodeDeployDefault.OneAtATime

B.

CodeDeployDefault.LambdaCanary10Percent10Minutes

C.

CodeDeployDefault.LambdaLinear10PercentEvery10Minutes

D.

CodeDeployDefault.ECSLinear10PercentEvery3Minutes

Full Access
Question # 32

A developer manages an application that stores user objects in an Amazon S3 bucket without versioning enabled. The application has premium users and basic users.

After premium users upload objects, the premium users have unlimited downloads of their objects. Their objects are stored with a premium/ prefix. After basic users upload objects, the basic users can download their objects for 90 days. Their objects are stored with a basic/ prefix.

The developer needs to implement a solution to automatically delete objects for the basic users after 90 days.

Which solution will meet these requirements with the LEAST development effort?

A.

Create an AWS Lambda function that removes any objects in the S3 bucket that have the basic/ prefix and are more than 90 days old. Set up an Amazon EventBridge schedule to invoke the Lambda function every day.

B.

Set up an S3 Lifecycle rule that applies to the objects that have the premium/ prefix. Set the S3 Lifecycle rule action to expire the current version of the objects that have the premium/ prefix after 90 days.

C.

Set up an S3 Lifecycle rule that applies to the objects that have the basic/ prefix. Set the S3 Lifecycle rule action to expire the current version of the objects that have the basic/ prefix after 90 days.

D.

Create a rule for the S3 bucket to identify objects that have the basic/ prefix. Set the rule action to delete any objects that have object delete markers and unfinished multipart uploads after 90 days.

Full Access
Question # 33

A company has point-of-sale devices across thousands of retail shops that synchronize sales transactions with a centralized system. The system includes an Amazon API Gateway API that exposes an AWS Lambda function. The Lambda function processes the transactions and stores the transactions in Amazon RDS for MySQL. The number of transactions increases rapidly during the day and is near zero at night.

How can a developer increase the elasticity of the system MOST cost-effectively?

A.

Migrate from Amazon RDS to Amazon Aurora MySQL. Use an Aurora Auto Scaling policy to scale read replicas based on CPU consumption.

B.

Migrate from Amazon RDS to Amazon Aurora MySQL. Use an Aurora Auto Scaling policy to scale read replicas based on the number of database connections.

C.

Create an Amazon SQS queue. Publish transactions to the queue. Set the queue to invoke the Lambda function. Turn on enhanced fanout for the Lambda function.

D.

Create an Amazon SQS queue. Publish transactions to the queue. Set the queue to invoke the Lambda function. Set the reserved concurrency of the Lambda function to be less than the number of database connections.

Full Access
Question # 34

A company wants to use AWS AppConfig to gradually deploy a new feature to 15% of users to test the feature before a full deployment.

Which solution will meet this requirement with the LEAST operational overhead?

A.

Set up a custom script within the application to randomly select 15% of users. Assign a flag for the new feature to the selected users.

B.

Create separate AWS AppConfig feature flags for both groups of users. Configure the flags to target 15% of users.

C.

Create an AWS AppConfig feature flag. Define a variant for the new feature, and create a rule to target 15% of users.

D.

Use AWS AppConfig to create a feature flag without variants. Implement a custom traffic-splitting mechanism in the application code.

Full Access
Question # 35

A developer is investigating recent performance bottlenecks within a company ' s distributed web application that runs on various AWS services, including Amazon EC2 and Amazon DynamoDB.

How can the developer determine the length of time of the application ' s calls to the various downstream AWS services?

A.

Enable VPC Flow Logs and analyze them in Amazon OpenSearch Service.

B.

Use Amazon CloudWatch Logs to analyze application logs for the various calls.

C.

Enable detailed monitoring for the EC2 instances in Amazon CloudWatch.

D.

Implement AWS X-Ray with client handlers for the various downstream calls.

Full Access
Question # 36

A healthcare company develops a patient monitoring application that uses AWS AppSync and an AWS Lambda function. The application stores patient data in an Amazon DynamoDB database. The application processes real-time patient vital signs from thousands of IoT devices. The application must support queries from medical staff who access patient historical data. A developer notices significant latency when medical staff query patient histories, specifically for frequently-accessed records of patients currently under observation. The developer observes that the Lambda functions are consuming high read capacity units (RCUs) from DynamoDB. The developer needs to optimize the application ' s performance and maintain data consistency. Which solution will meet these requirements?

A.

Enable response caching in AppSync with a TTL value of 1 hour for all queries. Update the Lambda code to use in-memory caching.

B.

Increase the Lambda function memory allocation to maximum. Configure provisioned concurrency for the function.

C.

Create a caching Lambda function that aggregates patient data periodically and stores it in Amazon S3. Implement a read-through cache pattern.

D.

Implement in-memory caching by using Amazon ElastiCache for frequently-accessed patient records. Configure the Lambda functions to check the cache before querying the database. Set up cache invalidation when patient data is updated.

Full Access
Question # 37

A developer maintains an AWS Lambda function that is invoked synchronously through an API Gateway API. The Lambda function processes payments by calling a third-party platform. The Lambda function includes retry logic that will make five attempts for each invocation.

The third-party platform occasionally experiences outages that last 10–20 minutes. During outages, the Lambda function makes five retry attempts for each incoming request before failing. The request retry process generates thousands of wasted API calls and increases Lambda compute costs.

The developer needs a solution to detect third-party platform outages and to ensure that invocations of the Lambda function stop when a platform outage is detected. The developer must also ensure that the invocations resume when the platform is operational and accessible.

Which solution will meet these requirements?

A.

Configure a dead-letter queue to capture events after the Lambda function ' s five retry attempts are exhausted.

B.

Increase the Lambda function ' s timeout allocation and memory allocation so that retry attempts run longer.

C.

Add exponential backoff to the Lambda function ' s retry logic to space out retry attempts during failures.

D.

Implement a circuit breaker that stops invocations after failures exceed a threshold.

Full Access
Question # 38

A developer is building an application that processes a stream of user-supplied data. The data stream must be consumed by multiple Amazon EC2-based processing applications in parallel and in real time. Each processor must be able to resume without losing data if there is a service interruption. The application architect plans to add other processors in the near future and wants to minimize the amount of data duplication involved.

Which solution will satisfy these requirements?

A.

Publish the data to Amazon SQS.

B.

Publish the data to Amazon Data Firehose.

C.

Publish the data to Amazon EventBridge.

D.

Publish the data to Amazon Kinesis Data Streams.

Full Access
Question # 39

A developer is building an application that stores objects in an Amazon S3 bucket. The bucket does not have versioning enabled. The objects are accessed rarely after 1 week. However, the objects must be immediately available at all times.

The developer wants to optimize storage costs for the S3 bucket.

Which solution will meet this requirement?

A.

Create an S3 Lifecycle rule to expire objects after 7 days.

B.

Create an S3 Lifecycle rule to transition objects to S3 Standard-Infrequent Access (S3 Standard-IA) after 7 days.

C.

Create an S3 Lifecycle rule to transition objects to S3 Glacier Flexible Retrieval after 7 days.

D.

Create an S3 Lifecycle rule to delete objects that have delete markers.

Full Access
Question # 40

A company developed an API application on AWS by using Amazon CloudFront. Amazon API Gateway, and AWS Lambda. The API has a minimum of four requests every second A developer notices that many API users run the same query by using the POST method. The developer wants to cache the POST request to optimize the API resources.

Which solution will meet these requirements ' ?

A.

Configure the CloudFront cache Update the application to return cached content based upon the default request headers.

B.

Override the cache method in me selected stage of API Gateway Select the POST method.

C.

Save the latest request response in Lambda /tmp directory Update the Lambda function to check the /tmp directory

D.

Save the latest request m AWS Systems Manager Parameter Store Modify the Lambda function to take the latest request response from Parameter Store

Full Access
Question # 41

A company regularly receives route status updates from its delivery trucks as events in Amazon EventBridge. The company is building an API-based application in a VPC that will consume and process the events to create a delivery status dashboard. The API application must not be available by using public IP addresses because of security and compliance requirements.

How should the company send events from EventBridge to the API application?

A.

Create an AWS Lambda function that runs in the same VPC as the API application. Configure the function as an EventBridge target. Use the function to send events to the API.

B.

Create an internet-facing Application Load Balancer (ALB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the ALB as an EventBridge target.

C.

Create an internet-facing Network Load Balancer (NLB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the NLB as an EventBridge target.

D.

Use the application API endpoint in the VPC as a target for EventBridge. Send events directly to the application API endpoint from EventBridge.

Full Access
Question # 42

A company has a two-tier application that consists of a frontend application and an Amazon RDS for MySQL database. The frontend application retrieves data from the database. The data consists of postal codes and their associated geographic coordinates. The application performs many more database reads than writes. The application retrieves each postal code from the database thousands of times each day.

A developer must improve the performance of the application to decrease latency.

Which change should the developer make to the application to meet these requirements?

A.

Modify the application to use a lazy loading caching strategy with a small TTL value.

B.

Modify the application to use a write-behind caching strategy.

C.

Modify the application to use a write-through caching strategy.

D.

Modify the application to use a lazy loading caching strategy with a large TTL value.

Full Access
Question # 43

A developer has a legacy application that is hosted on-premises. Other applications hosted on AWS depend on the on-premises application for proper functioning. In case of any application errors, the developer wants to be able to use Amazon CloudWatch to monitor and troubleshoot all applications from one place.

How can the developer accomplish this?

A.

Install an AWS SDK on the on-premises server to automatically send logs to CloudWatch.

B.

Download the CloudWatch agent to the on-premises server. Configure the agent to use IAM user credentials with permissions for CloudWatch.

C.

Upload log files from the on-premises server to Amazon S3 and have CloudWatch read the files.

D.

Upload log files from the on-premises server to an Amazon EC2 instance and have the instance forward the logs to CloudWatch.

Full Access
Question # 44

A company needs to package and deploy an application that uses AWS Lambda to compress and decompress video clips. The application uses a video codec library that is larger than 250 MB. The application uses the library to compress the videos before storage and to decompress the videos upon retrieval.

A.

Create one Lambda function. Upload one zip file that contains code to handle video compression and decompression to the function. Include the codec library in the zip file.

B.

Create two Lambda functions. Upload one zip file that contains code to handle video compression to one function. Upload a second zip file that contains code for video decompression to the second function. Include the codec library in both zip files.

C.

Create two Lambda functions. Upload one zip file that contains code to handle video compression to one function. Upload a second zip file that contains code for video decompression to the second function. Create one Lambda layer for the codec library. Add the layer to both functions.

D.

Create two Lambda functions. Build one container image that contains code to handle video compression and a second image that contains video decompression code. Add the codec library to both images. Upload the images to Amazon ECR. Use the containers to create the Lambda functions.

Full Access
Question # 45

A company is providing read access to objects in an Amazon S3 bucket for different customers. The company uses 1AM permissions to restrict access to the S3 bucket. The customers can access only their own files.

Due to a regulation requirement, the company needs to enforce encryption in transit for interactions with Amazon S3.

Which solution will meet these requirements?

A.

Add a bucket policy to the S3 bucket to deny S3 actions when the aws:SecureTransport condition is equal to false.

B.

Add a bucket policy to the S3 bucket to deny S3 actions when the s3:x-amz-acl condition is equal to public-read.

C.

Add an 1AM policy to the 1AM users to enforce the usage of the AWS SDK.

D.

Add an 1AM policy to the 1AM users that allows S3 actions when the s3:x-amz-acl condition is equal to bucket-owner-read.

Full Access
Question # 46

A developer is creating an ecommerce workflow in an AWS Step Functions state machine that includes a HTTP Task state. The task passes shipping information and order details to an endpoint.

The developer needs to test the workflow to confirm that the HTTP headers and body are correct and that the responses meet expectations.

A.

Use the TestState API to invoke only the HTTP Task. Set the inspection level to TRACE.

B.

Use the TestState API to invoke the state machine. Set the inspection level to DEBUG.

C.

Use the data flow simulator to invoke only the HTTP Task. View the request and response data.

D.

Change the log level of the state machine to ALL. Run the state machine.

Full Access
Question # 47

An application uses an Amazon API Gateway API that is integrated with an AWS Lambda function. Specific API requests are returning the HTTP 504 (Gateway Timeout) error message. The Lambda function is configured with a 20-second timeout. The API Gateway integration is configured with a 15-second timeout and a rate of 10 requests every second. There are no errors in the logs for the Lambda function. Which solution will prevent the HTTP 504 error responses?

A.

Increase the reserved concurrency of the Lambda function.

B.

Increase the timeout of the Lambda function.

C.

Increase the timeout of the API Gateway integration.

D.

Increase the per-client throttling limit.

Full Access
Question # 48

A company is using Amazon RDS as the Backend database for its application. After a recent marketing campaign, a surge of read requests to the database increased the latency of data retrieval from the database.

The company has decided to implement a caching layer in front of the database. The cached content must be encrypted and must be highly available.

Which solution will meet these requirements?

A.

Amazon Cloudfront

B.

Amazon ElastiCache to Memcached

C.

Amazon ElastiCache for Redis in cluster mode

D.

Amazon DynamoDB Accelerate (DAX)

Full Access
Question # 49

An application uses AWS X-Ray to generate a large amount of trace data on an hourly basis. A developer wants to use filter expressions to limit the returned results through user-specified custom attributes.

How should the developer use filter expressions to filter the results in X-Ray?

A.

Add custom attributes as annotations in the segment document.

B.

Add custom attributes as metadata in the segment document.

C.

Add custom attributes as new segment fields in the segment document.

D.

Create new sampling rules that are based on custom attributes.

Full Access
Question # 50

A developer accesses AWS CodeCommit over SSH. The SSH keys configured to access AWS CodeCommit are tied to a user with the following permissions:

The developer needs to create/delete branches

Which specific IAM permissions need to be added based on the principle of least privilege?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

A developer is creating a new REST API by using Amazon API Gateway and AWS Lambda. The development team tests the API and validates responses for the known use cases before deploying the API to the production environment.

The developer wants to make the REST API available for testing by using API Gateway locally.

Which AWS Serverless Application Model Command Line Interface (AWS SAM CLI) subcommand will meet these requirements?

A.

Sam local invoke

B.

Sam local generate-event

C.

Sam local start-lambda

D.

Sam local start-api

Full Access
Question # 52

A developer is building two microservices that communicate by using an Amazon SQS queue. The messages exchanged between the microservices contain sensitive information . The developer must ensure that the messages are encrypted at rest .

Which solution will meet these requirements?

A.

Add a policy to the SQS queue that enforces the aws:SecureTransport condition.

B.

Configure the microservices to enable server-side encryption (SSE) within the message payloads.

C.

Enable server-side encryption (SSE) on the Amazon SQS queue and include the sensitive information in the message body.

D.

Transmit the sensitive information as message attributes instead of the message body.

Full Access
Question # 53

A developer has created a new IAM user that has the s3:PutObject permission to write to a specific Amazon S3 bucket. The S3 bucket uses server-side encryption with AWS KMS–managed keys (SSE-KMS) as the default encryption. When an application uses the access key and secret key of the IAM user to call the PutObject API operation, the application receives an Access Denied error.

What should the developer do to resolve this error?

A.

Update the policy of the IAM user to allow the s3:EncryptionConfiguration action.

B.

Update the bucket policy of the S3 bucket to allow the IAM user to upload objects.

C.

Update the policy of the IAM user to allow the kms:GenerateDataKey action.

D.

Update the ACL of the S3 bucket to allow the IAM user to upload objects.

Full Access
Question # 54

A developer has written the following IAM policy to provide access to an Amazon S3 bucket:

Which access does the policy allow regarding the s3:GetObject and s3:PutObject actions?

A.

Access on all buckets except the “DOC-EXAMPLE-BUCKET” bucket

B.

Access on all buckets that start with “DOC-EXAMPLE-BUCKET” except the “DOC-EXAMPLE-BUCKET/secrets” bucket

C.

Access on all objects in the “DOC-EXAMPLE-BUCKET” bucket along with access to all S3 actions for objects in the “DOC-EXAMPLE-BUCKET” bucket that start with “secrets”

D.

Access on all objects in the “DOC-EXAMPLE-BUCKET” bucket except on objects that start with “secrets”

Full Access
Question # 55

A developer is creating an application that includes an Amazon API Gateway REST API in the us-east-2 Region. The developer wants to use Amazon CloudFront and a custom domain name for the API. The developer has acquired an SSL/TLS certificate for the domain from a third-party provider.

How should the developer configure the custom domain for the application?

A.

Import the SSL/TLS certificate into AWS Certificate Manager (ACM) in the same Region as the API. Create a DNS A record for the custom domain.

B.

Import the SSL/TLS certificate into CloudFront. Create a DNS CNAME record for the custom domain.

C.

Import the SSL/TLS certificate into AWS Certificate Manager (ACM) in the same Region as the API. Create a DNS CNAME record for the custom domain.

D.

Import the SSL/TLS certificate into AWS Certificate Manager (ACM) in the us-east-1 Region. Create a DNS CNAME record for the custom domain.

Full Access
Question # 56

A company has an Amazon API Gateway REST API that integrates with an AWS Lambda function. The API’s development stage references a Lambda development alias named dev.

A developer needs to make a production alias of the Lambda function named prod available through the API.

Which solution meets these requirements?

A.

Create a new method on the API named production. Configure the method to include a stage variable that points to the prod Lambda alias.

B.

Create a new method on the API named production. Configure an integration request on the development stage that points to the prod Lambda alias.

C.

Deploy the API to a new stage named production. Configure the stage to include a stage variable that points to the prod Lambda alias.

D.

Deploy the API to a new stage named production. Configure an integration request on the production stage that points directly to the prod Lambda alias.

Full Access
Question # 57

A developer wants to insert a record into an Amazon DynamoDB table as soon as a new file is added to an Amazon S3 bucket.

Which set of steps would be necessary to achieve this?

A.

Create an event with Amazon EventBridge that will monitor the S3 bucket and then insert the records into DynamoDB.

B.

Configure an S3 event to invoke an AWS Lambda function that inserts records into DynamoDB.

C.

Create an AWS Lambda function that will poll the S3 bucket and then insert the records into DynamoDB.

D.

Create a cron job that will run at a scheduled time and insert the records into DynamoDB.

Full Access
Question # 58

A developer needs to migrate an online retail application to AWS to handle an anticipated increase in traffic. The application currently runs on two servers: one server for the web application and another server for the database. The web server renders webpages and manages session state in memory. The database server hosts a MySQL database that contains order details. When traffic to the application is heavy, the memory usage for the web server approaches 100% and the application slows down considerably.

The developer has found that most of the memory increase and performance decrease is related to the load of managing additional user sessions. For the web server migration, the developer will use Amazon EC2 instances with an Auto Scaling group behind an Application Load Balancer.

Which additional set of changes should the developer make to the application to improve the application ' s performance?

A.

Use an EC2 instance to host the MySQL database. Store the session data and the application data in the MySQL database.

B.

Use Amazon ElastiCache for Memcached to store and manage the session data. Use an Amazon RDS for MySQL DB instance to store the application data.

C.

Use Amazon ElastiCache for Memcached to store and manage the session data and the application data.

D.

Use the EC2 instance store to manage the session data. Use an Amazon RDS for MySQL DB instance to store the application data.

Full Access
Question # 59

A company runs a web application on Amazon EC2 instances behind an Application Load Balancer. The application uses Amazon DynamoDB as its database. The company wants to ensure high performance for reads and writes.

Which solution will meet these requirements MOST cost-effectively?

A.

Configure auto-scaling for the DynamoDB table with a target utilization of 70%. Set the minimum and maximum capacity units based on the expected workload.

B.

Use DynamoDB on-demand capacity mode for the table. Specify a maximum throughput higher than the expected peak read and write capacity units.

C.

Use DynamoDB provisioned throughput mode for the table. Create an Amazon CloudWatch alarm on the ThrottledRequests metric. Invoke an AWS Lambda function to increase provisioned capacity.

D.

Create an Amazon DynamoDB Accelerator (DAX) cluster. Configure the application to use the DAX endpoint.

Full Access
Question # 60

A company is preparing to migrate an application to the company ' s first AWS environment Before this migration, a developer is creating a proof-of-concept application to validate a model for building and deploying container-based applications on AWS.

Which combination of steps should the developer take to deploy the containerized proof-of-concept application with the LEAST operational effort? (Select TWO.)

A.

Package the application into a zip file by using a command line tool Upload the package to Amazon S3

B.

Package the application into a container image by using the Docker CLI. Upload the image to Amazon Elastic Container Registry (Amazon ECR)

C.

Deploy the application to an Amazon EC2 instance by using AWS CodeDeploy.

D.

Deploy the application to Amazon Elastic Kubernetes Service (Amazon EKS) on AWS Fargate

E.

Deploy the application to Amazon Elastic Container Service (Amazon ECS) on AWS Fargate

Full Access
Question # 61

A developer has created an AWS Lambda function to provide notification through Amazon Simple Notification Service (Amazon SNS) whenever a file is uploaded to Amazon S3 that is larger than 50 MB. The developer has deployed and tested the Lambda function by using the CLI. However, when the event notification is added to the S3 bucket and a 3.000 MB file is uploaded, the Lambda function does not launch.

Which of the following Is a possible reason for the Lambda function ' s inability to launch?

A.

The S3 event notification does not activate for files that are larger than 1.000 MB.

B.

The resource-based policy for the Lambda function does not have the required permissions to be invoked by Amazon S3.

C.

Lambda functions cannot be invoked directly from an S3 event.

D.

The S3 bucket needs to be made public.

Full Access
Question # 62

A developer is creating an AWS Lambda function in VPC mode An Amazon S3 event will invoke the Lambda function when an object is uploaded into an S3 bucket The Lambda function will process the object and produce some analytic results that will be recorded into a file Each processed object will also generate a log entry that will be recorded into a file.

Other Lambda functions. AWS services, and on-premises resources must have access to the result files and log file. Each log entry must also be appended to the same shared log file. The developer needs a solution that can share files and append results into an existing file.

Which solution should the developer use to meet these requirements?

A.

Create an Amazon Elastic File System (Amazon EFS) file system. Mount the EFS file system in Lambda. Store the result files and log file in the mount point. Append the log entries to the log file.

B.

Create an Amazon Elastic Block Store (Amazon EBS) Multi-Attach enabled volume Attach the EBS volume to all Lambda functions. Update the Lambda function code to download the log file, append the log entries, and upload the modified log file to Amazon EBS

C.

Create a reference to the /tmp local directory. Store the result files and log file by using the directory reference. Append the log entry to the log file.

D.

Create a reference to the /opt storage directory Store the result files and log file by using the directory reference Append the log entry to the log file

Full Access
Question # 63

An ecommerce company is developing a serverless application to track user activities. The company needs to track each type of activity with a timestamp and a unique product ID. The company also must track actions that are associated with each activity, such as product views, shopping cart actions, purchases, and checkout processes.

The company is planning a marketing campaign based on each user ' s activity. A developer needs to implement a partitioning strategy for an Amazon DynamoDB table to meet the data storage and access requirements for the application. The strategy must maximize provisioned throughput efficiency while minimizing the risk of throttling.

Which solution will meet these requirements?

A.

Create a composite primary key. Set the user ID as the partition key and the timestamp as the sort key.

B.

Create a composite primary key. Set the product ID as the partition key and the associated actions as the sort key.

C.

Use the product ID as the partition key. Create an Application Auto Scaling policy to update the table’s provisioned throughput when the table exceeds its capacity usage target.

D.

Create an AWS Lambda function that adds a counter attribute that increases by one for each new record. Use the counter attribute as the partition key.

Full Access
Question # 64

A developer at a company needs to create a small application mat makes the same API call once each flay at a designated time. The company does not have infrastructure in the AWS Cloud yet, but the company wants to implement this functionality on AWS.

Which solution meets these requirements in the MOST operationally efficient manner?

A.

Use a Kubermetes cron job that runs on Amazon Elastic Kubemetes Sen/ice (Amazon EKS)

B.

Use an Amazon Linux crontab scheduled job that runs on Amazon EC2

C.

Use an AWS Lambda function that is invoked by an Amazon EventBridge scheduled event.

D.

Use an AWS Batch job that is submitted to an AWS Batch job queue.

Full Access
Question # 65

A developer needs to perform geographic load testing of an API. The developer must deploy resources to multiple AWS Regions to support the load testing of the API.

How can the developer meet these requirements without additional application code?

A.

Create and deploy an AWS Lambda function in each desired Region. Configure the Lambda function to create a stack from an AWS CloudFormation template in that Region when the function is invoked.

B.

Create an AWS CloudFormation template that defines the load test resources. Use the AWS CLI create-stack-set command to create a stack set in the desired Regions.

C.

Create an AWS Systems Manager document that defines the resources. Use the document to create the resources in the desired Regions.

D.

Create an AWS CloudFormation template that defines the load test resources. Use the AWS CLI deploy command to create a stack from the template in each Region.

Full Access
Question # 66

A developer is building a new application on AWS. The application uses an AWS Lambda function that retrieves information from an Amazon DynamoDB table. The developer hardcoded the DynamoDB table name into the Lambda function code. The table name might change over time. The developer does not want to modify the Lambda code if the table name changes.

Which solution will meet these requirements MOST efficiently?

A.

Create a Lambda environment variable to store the table name. Use the standard method for the programming language to retrieve the variable.

B.

Store the table name in a file. Store the file in the /tmp folder. Use the SDK for the programming language to retrieve the table name.

C.

Create a file to store the table name. Zip the file and upload the file to the Lambda layer. Use the SDK for the programming language to retrieve the table name.

D.

Create a global variable that is outside the handler in the Lambda function to store the table name.

Full Access
Question # 67

A developer is running an application on an Amazon EC2 instance. When the application attempts to read from an Amazon S3 bucket, the request fails. The developer determines that the IAM role associated with the EC2 instance is missing the required Amazon S3 read permissions.

The developer must grant the application access to read from the S3 bucket with the LEAST application disruption .

Which solution will meet this requirement?

A.

Add the permission to the IAM role. Terminate the EC2 instance and launch a new instance.

B.

Add the permission to the IAM role so that the change takes effect automatically.

C.

Add the permission to the IAM role. Hibernate and restart the EC2 instance.

D.

Add the permission to the S3 bucket and restart the EC2 instance.

Full Access
Question # 68

A company is creating a new application that gives users the ability to upload and share short video files. The average size of the video files is 10 MB. After a user uploads a file, a message needs to be placed into an Amazon Simple Queue Service (Amazon SQS) queue so the file can be processed. The files need to be accessible for processing within 5 minutes.

Which solution will meet these requirements MOST cost-effectively?

A.

Write the files to Amazon S3 Glacier Deep Archive. Add the S3 location of the files to the SQS queue.

B.

Write the files to Amazon S3 Standard. Add the S3 location of the files to the SQS queue.

C.

Write the files to an Amazon Elastic Block Store (Amazon EBS) General Purpose SSD volume. Add the EBS location of the files to the SQS queue.

D.

Write messages that contain the contents of the uploaded files to the SQS queue.

Full Access
Question # 69

A company is migrating its PostgreSQL database into the AWS Cloud. The company wants to use a database that will secure and regularly rotate database credentials. The company wants a solution that does not require additional programming overhead.

Which solution will meet these requirements?

A.

Use Amazon Aurora PostgreSQL tor the database. Store the database credentials in AWS Systems Manager Parameter Store Turn on rotation.

B.

Use Amazon Aurora PostgreSQL for the database. Store the database credentials in AWS Secrets Manager Turn on rotation.

C.

Use Amazon DynamoDB for the database. Store the database credentials in AWS Systems Manager Parameter Store Turn on rotation.

D.

Use Amazon DynamoDB for the database. Store the database credentials in AWS Secrets Manager Turn on rotation.

Full Access
Question # 70

A company had an Amazon RDS for MySQL DB instance that was named mysql-db. The DB instance was deleted within the past 90 days.

A developer needs to find which IAM user or role deleted the DB instance in the AWS environment.

Which solution will provide this information?

A.

Retrieve the AWS CloudTrail events for the resource mysql-db where the event name is DeleteDBInstance. Inspect each event.

B.

Retrieve the Amazon CloudWatch log events from the most recent log stream within the rds/mysql-db log group. Inspect the log events.

C.

Retrieve the AWS X-Ray trace summaries. Filter by services with the name mysql-db. Inspect the ErrorRootCauses values within each summary.

D.

Retrieve the AWS Systems Manager deletions inventory. Filter the inventory by deletions that have a TypeName value of RDS. Inspect the deletion details.

Full Access
Question # 71

A company is building a serverless application composed of multiple AWS Lambda functions. The company wants to accelerate feature development without adding staff or reducing quality . The solution must improve unit tests and code reviews , integrate with the existing IDE , and require no new infrastructure .

Which solution will meet these requirements?

A.

Use AWS CodeBuild with custom scripts for unit tests and Amazon CodeGuru Reviewer for code reviews.

B.

Use Amazon CodeGuru for code reviews and a custom Lambda-based solution for unit tests.

C.

Use AWS CodeBuild for tests and rely on manual pull request reviews.

D.

Use Amazon Q Developer Pro to generate unit tests and perform code reviews directly in the IDE.

Full Access
Question # 72

A developer deploys an AWS Lambda function that writes data to Amazon DynamoDB. Amazon CloudWatch metrics show that some Lambda invocations result in errors. However, no CloudWatch log entries exist for the function. The function source code includes logging statements before the write operation.

What should the developer do to resolve the missing CloudWatch Logs entries?

A.

Grant the Lambda execution role permission to write logs to Amazon CloudWatch Logs.

B.

Enable CloudWatch Lambda Insights and redeploy the function.

C.

Enable AWS X-Ray active tracing for the function.

D.

Add CloudWatch as a trusted identity in the Lambda execution role.

Full Access
Question # 73

A developer maintains a serverless application that uses an Amazon API Gateway REST API to invoke an AWS Lambda function by using a non-proxy integration. The Lambda function returns data, which is stored in Amazon DynamoDB.

Several application users begin to receive intermittent errors from the API. The developer examines Amazon CloudWatch Logs for the Lambda function and discovers several ProvisionedThroughputExceededException errors.

The developer needs to resolve the errors and ensure that the errors do not reoccur.

A.

Use provisioned capacity mode for the DynamoDB table, and assign sufficient capacity units. Configure the Lambda function to retry requests with exponential backoff.

B.

Update the REST API to send requests on an Amazon SQS queue. Configure the Lambda function to process requests from the queue.

C.

Configure a usage plan for the REST API.

D.

Update the REST API to invoke the Lambda function asynchronously.

Full Access
Question # 74

A developer must securely access a secret during a build process in an AWS CodeBuild project that has an IAM role. The secret must remain encrypted at rest and must be passed to the buildspec.yml file without appearing in build logs .

Which solution will meet these requirements with the LEAST operational overhead ?

A.

Store the secret in AWS Secrets Manager. Reference the secret in the env section of the buildspec.yml file by using secrets-manager. Grant the CodeBuild IAM role least-privilege access.

B.

Store the secret in an encrypted Amazon S3 bucket and download it during the build.

C.

Store the secret in AWS Systems Manager Parameter Store and reference it in the env section by using parameter-store.

D.

Retrieve the parameter manually in a pre-build phase and mask it in the build logs.

Full Access
Question # 75

A company has built an AWS Lambda function to convert large image files into output files that can be used in a third-party viewer application The company recently added a new module to the function to improve the output of the generated files However, the new module has increased the bundle size and has increased the time that is needed to deploy changes to the function code.

How can a developer increase the speed of the Lambda function deployment?

A.

Use AWS CodeDeploy to deploy the function code

B.

Use Lambda layers to package and load dependencies.

C.

Increase the memory size of the function.

D.

Use Amazon S3 to host the function dependencies

Full Access
Question # 76

A developer is working on an ecommerce application that stores data in an Amazon RDS for MySQL cluster. The developer needs to implement a caching layer for the application to retrieve information about the most viewed products.

Which solution will meet these requirements?

A.

Edit the RDS for MySQL cluster by adding a cache node. Configure the cache endpoint instead of the cluster endpoint in the application.

B.

Create an Amazon ElastiCache (Redis OSS) cluster. Update the application code to use the ElastiCache (Redis OSS) cluster endpoint.

C.

Create an Amazon DynamoDB Accelerator (DAX) cluster in front of the RDS for MySQL cluster. Configure the application to connect to the DAX endpoint instead of the RDS endpoint.

D.

Configure the RDS for MySQL cluster to add a standby instance in a different Availability Zone. Configure the application to read the data from the standby instance.

Full Access
Question # 77

A company has an application that runs across multiple AWS Regions. The application is experiencing performance issues at irregular intervals. A developer must use AWS X-Ray to implement distributed tracing for the application to troubleshoot the root cause of the performance issues.

What should the developer do to meet this requirement?

A.

Use the X-Ray console to add annotations for AWS services and user-defined services

B.

Use Region annotation that X-Ray adds automatically for AWS services Add Region annotation for user-defined services

C.

Use the X-Ray daemon to add annotations for AWS services and user-defined services

D.

Use Region annotation that X-Ray adds automatically for user-defined services Configure X-Ray to add Region annotation for AWS services

Full Access
Question # 78

A social media application is experiencing high volumes of new user requests after a recent marketing campaign. The application is served by an Amazon RDS for MySQL instance. A solutions architect examines the database performance and notices high CPU usage and many " too many connections " errors that lead to failed requests on the database. The solutions architect needs to address the failed requests.

Which solution will meet this requirement?

A.

Deploy an Amazon DynamoDB Accelerator (DAX) cluster. Configure the application to use the DAX cluster.

B.

Deploy an RDS Proxy. Configure the application to use the RDS Proxy.

C.

Migrate the database to an Amazon RDS for PostgreSQL instance.

D.

Deploy an Amazon ElastiCache (Redis OSS) cluster. Configure the application to use the ElastiCache cluster.

Full Access
Question # 79

A developer is creating an AWS Lambda function that needs credentials to connect to an Amazon RDS for MySQL database. An Amazon S3 bucket currently stores the credentials. The developer needs to improve the existing solution by implementing credential rotation and secure storage. The developer also needs to provide integration with the Lambda function.

Which solution should the developer use to store and retrieve the credentials with the LEAST management overhead?

A.

Store the credentials in AWS Systems Manager Parameter Store. Select the database that the parameter will access. Use the default AWS Key Management Service (AWS KMS) key to encrypt the parameter. Enable automatic rotation for the parameter. Use the parameter from Parameter Store on the Lambda function to connect to the database.

B.

Encrypt the credentials with the default AWS Key Management Service (AWS KMS) key. Store the credentials as environment variables for the Lambda function. Create a second Lambda function to generate new credentials and to rotate the credentials by updating the environment variables of the first Lambda function. Invoke the second Lambda function by using an Amazon EventBridge rule that runs on a schedule. Update the database to use the new c

C.

Store the credentials in AWS Secrets Manager. Set the secret type to Credentials for Amazon RDS database. Select the database that the secret will access. Use the default AWS Key Management Service (AWS KMS) key to encrypt the secret. Enable automatic rotation for the secret. Use the secret from Secrets Manager on the Lambda function to connect to the database.

D.

Encrypt the credentials by using AWS Key Management Service (AWS KMS). Store the credentials in an Amazon DynamoDB table. Create a second Lambda function to rotate the credentials. Invoke the second Lambda function by using an Amazon EventBridge rule that runs on a schedule. Update the DynamoDB table. Update the database to use the generated credentials. Retrieve the credentials from DynamoDB with the first Lambda function. Connect to the d

Full Access
Question # 80

A company is developing a weather forecast application that displays forecasts for cities within a single country. Weather data is stored in an Amazon DynamoDB table named Forecasts with attributes CityId, Temperature, and ForecastDate.

The application is read heavy . Most read requests target the current day’s forecast for a small number of very large cities . The company must design a partition key strategy that ensures the most even distribution of read traffic .

Which solution will meet these requirements?

A.

Use CityId with a calculated suffix as the partition key and ForecastDate as the sort key.

B.

Use a numeric index as the partition key and ForecastDate as the sort key.

C.

Use ForecastDate as the partition key and CityId as the sort key.

D.

Use ForecastDate with a calculated suffix as the partition key and CityId as the sort key.

Full Access
Question # 81

A developer is building a solution to give an application that runs on an ecommerce platform the ability to send notifications. The application needs to call an API to send thousands of notifications each second to an HTTP endpoint. The notifications must be delivered in order. The developer must be able to filter out some of the notifications before sending them to the endpoint. Which solution will meet these requirements?

A.

Create an Amazon Data Firehose stream that uses Direct PUT as the source. Set the URL of the HTTP endpoint as the destination.

B.

Create an Amazon SQS standard queue and an Amazon SNS FIFO topic. Create an AWS Lambda function and use the HTTP client to send the notifications. Set the SQS queue as the event source for the Lambda function and attach filter criteria.

C.

Create an Amazon SNS topic in high throughput mode. Subscribe the URL of the HTTP endpoint to the SNS topic. Configure a subscription filter policy.

D.

Create an Amazon EventBridge rule. Create an EventBridge pipe and set the rule as the target. Configure a filter for the pipe. Set the URL of the HTTP endpoint as the rule ' s API destination endpoint.

Full Access
Question # 82

A developer is planning to migrate on-premises company data to Amazon S3. The data must be encrypted, and the encryption Keys must support automate annual rotation. The company must use AWS Key Management Service (AWS KMS) to encrypt the data.

When type of keys should the developer use to meet these requirements?

A.

Amazon S3 managed keys

B.

Symmetric customer managed keys with key material that is generated by AWS

C.

Asymmetric customer managed keys with key material that generated by AWS

D.

Symmetric customer managed keys with imported key material

Full Access
Question # 83

A company deploys a new application to AWS. The company is streaming application logs to Amazon CloudWatch Logs. The company ' s development team must receive notification by email when the word " ERROR " appears in any log lines. A developer sets up an Amazon SNS topic and subscribes the development team to the topic.

What should the developer do next to meet the requirements?

A.

Select the appropriate log group. Create a CloudWatch metric filter with " ERROR " as the search term. Create an alarm on this metric that notifies the SNS topic when the metric is 1 or higher.

B.

In CloudWatch Logs Insights, select the appropriate log group. Create a metric query to search for the term " ERROR " in the logs. Create an alarm on this metric that notifies the SNS topic when the metric is 1 or higher.

C.

Select the appropriate log group. Create an SNS subscription filter with " ERROR " as the filter pattern. Select the SNS topic as the destination.

D.

Create a CloudWatch alarm that includes " ERROR " as a filter pattern, a log group dimension that defines the appropriate log group, and a destination that notifies the SNS topic.

Full Access
Question # 84

A developer maintains a serverless application that uses AWS Lambda to process financial transaction files uploaded to an Amazon S3 bucket. A Lambda function is scheduled to run once per hour to process the files.

As file uploads increase, the Lambda function occasionally exceeds the 15-minute execution limit . The developer must handle higher file volumes, reduce processing time, and prevent duplicate file processing .

Which solution will meet these requirements?

A.

Configure Amazon S3 event notifications to invoke the Lambda function for each uploaded file. Track processed file identifiers in Amazon DynamoDB.

B.

Move the application logic to a single Amazon EC2 instance to process files more efficiently.

C.

Use Amazon EventBridge Scheduler to run the Lambda function every 5 minutes to scan the S3 bucket.

D.

Continuously poll the S3 bucket from Lambda and rely on each object’s LastModified timestamp.

Full Access
Question # 85

A company operates a web-based loan processing application. The application ' s UI was implemented in JavaScript. The frontend transmits application data securely by using HTTPS to Amazon API Gateway, which initiates an AWS Lambda function in private subnets. The Lambda function interacts with third-party credit check APIs that require persistent API keys. The company enforces strict policies to ensure that personally identifiable information (PII) and sensitive credentials are never exposed in client code, request paths, headers, or logs. The company needs a solution to manage the API keys that the Lambda function needs to use. Which solution will meet this requirement in the MOST secure way?

A.

Store the API keys as encrypted environment variables by using an AWS KMS key. Configure the execution role of the Lambda function to have permissions to securely decrypt the environment variables at runtime.

B.

Pass the API keys to the Lambda function by including the keys as URL query parameters in each HTTPS request.

C.

Bundle the API keys inside the minified client-side JavaScript.

D.

Store the API keys as resource metadata tags on the Lambda function. Configure the Lambda function to read its own tags at startup by using the AWS SDK.

Full Access
Question # 86

A developer is managing an application that uploads user files to an Amazon S3 bucket named companybucket. The company wants to maintain copies of all the files uploaded by users for compliance purposes, while ensuring users still have access to the data through the application.

Which IAM permissions should be applied to users to ensure they can create but not remove files from the bucket?

A.

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:GetObject " , " s3:PutObject " , " s3:DeleteObject " ], " Resource " : [ " arn:aws:s3:::companybucket " ]}] }

B.

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:CreateBucket " , " s3:GetBucketLocation " ], " Resource " : " arn:aws:s3:::companybucket " }]}

C.

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:GetObject " , " s3:PutObject " , " s3:DeleteObject " , " s3:PutObjectRetention " ], " Resource " : " arn:aws:s3:::companybucket " }]}

D.

{ " Version " : " 2012-10-17 " , " Statement " : [{ " Sid " : " statement1 " , " Effect " : " Allow " , " Action " : [ " s3:GetObject " , " s3:PutObject " ], " Resource " : [ " arn:aws:s3:::companybucket " ]}] }

Full Access
Question # 87

A developer has an application that makes batch requests directly to Amazon DynamoDB by using the BatchGetItem low-level API operation. The responses frequently return values in the UnprocessedKeys element.

Which actions should the developer take to increase the resiliency of the application when the batch response includes values in UnprocessedKeys? (Choose two.)

A.

Retry the batch operation immediately.

B.

Retry the batch operation with exponential backoff and randomized delay.

C.

Update the application to use an AWS software development kit (AWS SDK) to make the requests.

D.

Increase the provisioned read capacity of the DynamoDB tables that the operation accesses.

E.

Increase the provisioned write capacity of the DynamoDB tables that the operation accesses.

Full Access
Question # 88

A developer is setting up a deployment pipeline. The pipeline includes an AWS CodeBuild build stage that requires access to a database to run integration tests. The developer is using a buildspec.yml file to configure the database connection. Company policy requires automatic rotation of all database credentials.

Which solution will handle the database credentials MOST securely?

A.

Retrieve the credentials from variables that are hardcoded in the buildspec.yml file. Configure an AWS Lambda function to rotate the credentials.

B.

Retrieve the credentials from an environment variable that is linked to a SecureString parameter in AWS Systems Manager Parameter Store. Configure Parameter Store for automatic rotation.

C.

Retrieve the credentials from an environment variable that is linked to an AWS Secrets Manager secret. Configure Secrets Manager for automaticrotation.

D.

Retrieve the credentials from an environment variable that contains the connection string in plaintext. Configure an Amazon EventBridge event to rotate the credentials.

Full Access
Question # 89

A developer is migrating an application to Amazon Elastic Kubernetes Service (Amazon EKS). The developer migrates the application to Amazon Elastic Container Registry (Amazon ECR) with an EKS cluster.

As part of the application migration to a new backend, the developer creates a new AWS account. The developer makes configuration changes to the application to point the application to the new AWS account and to use new backend resources. The developer successfully tests the changes within the application by deploying the pipeline.

The Docker image build and the pipeline deployment are successful, but the application is still connecting to the old backend. The developer finds that the application ' s configuration is still referencing the original EKS cluster and not referencing the new backend resources.

Which reason can explain why the application is not connecting to the new resources?

A.

The developer did not successfully create the new AWS account.

B.

The developer added a new tag to the Docker image.

C.

The developer did not update the Docker image tag to a new version.

D.

The developer pushed the changes to a new Docker image tag.

Full Access
Question # 90

A company has an ecommerce application. To track product reviews, the company ' s development team uses an Amazon DynamoDB table.

Every record includes the following

• A Review ID a 16-digrt universally unique identifier (UUID)

• A Product ID and User ID 16 digit UUlDs that reference other tables

• A Product Rating on a scale of 1-5

• An optional comment from the user

The table partition key is the Review ID. The most performed query against the table is to find the 10 reviews with the highest rating for a given product.

Which index will provide the FASTEST response for this query " ?

A.

A global secondary index (GSl) with Product ID as the partition key and Product Rating as the sort key

B.

A global secondary index (GSl) with Product ID as the partition key and Review ID as the sort key

C.

A local secondary index (LSI) with Product ID as the partition key and Product Rating as the sort key

D.

A local secondary index (LSI) with Review ID as the partition key and Product ID as the sort key

Full Access
Question # 91

A developer is creating a new batch application that will run on an Amazon EC2 instance. The application requires read access to an Amazon S3 bucket. The developer needs to follow security best practices to grant S3 read access to the application.

Which solution meets these requirements?

A.

Add the permissions to an 1AM policy. Attach the policy to a role. Attach the role to the EC2 instance profile.

B.

Add the permissions inline to an 1AM group. Attach the group to the EC2 instance profile.

C.

Add the permissions to an 1AM policy. Attach the policy to a user. Attach the user to the EC2 instance profile.

D.

Add the permissions to an 1AM policy. Use 1AM web identity federation to access the S3 bucket with the policy.

Full Access
Question # 92

A developer wants to deploy a new version of an AWS Elastic Beanstalk application. During deployment, the application must maintain full capacity and avoid service interruption. Additionally, the developer must minimize the cost of additional resources that support the deployment.

Which deployment method should the developer use to meet these requirements?

A.

All at once

B.

Rolling with additional batch

C.

Blue/green

D.

Immutable

Full Access
Question # 93

A developer is deploying a new application to Amazon Elastic Container Service (Amazon ECS). The developer needs to securely store and retrieve different types of variables. These variables include authentication information for a remote API, the URL for the API, and credentials. The authentication information and API URL must be available to all current and future deployed versions of the application across development, testing, and production environments.

How should the developer retrieve the variables with the FEWEST application changes?

A.

Update the application to retrieve the variables from AWS Systems Manager Parameter Store. Use unique paths in Parameter Store for each variable in each environment. Store the credentials in AWS Secrets Manager in each environment.

B.

Update the application to retrieve the variables from AWS Key Management Service (AWS KMS). Store the API URL and credentials as unique keys for each environment.

C.

Update the application to retrieve the variables from an encrypted file that is stored with the application. Store the API URL and credentials in unique files for each environment.

D.

Update the application to retrieve the variables from each of the deployed environments. Define the authentication information and API URL in the ECS task definition as unique names during the deployment process.

Full Access
Question # 94

A developer is building a multi-tenant application using AWS Lambda, Amazon S3, and Amazon DynamoDB. Each S3 object prefix represents a tenant name, and DynamoDB uses the tenant name as the partition key.

The developer must prevent cross-tenant data access during processing.

Which combination of actions will meet this requirement? (Select THREE.)

A.

Create a data access IAM role that allows the sts:TagSession action.

B.

Allow the Lambda execution role to assume the data access role.

C.

Configure IAM policies on the data access role to allow S3 and DynamoDB access only when resource attributes match the tenant session tag.

D.

Create a resource-based policy on DynamoDB based on principal tags.

E.

Create a resource control policy (RCP) for the S3 bucket.

F.

Configure the Lambda function to assume the data access role and pass the tenant name as a session tag.

Full Access
Question # 95

A social media application stores millions of video clips in Amazon S3 and serves them to users across the world. The traffic to the application varies, but access often increases suddenly to more than 10,000 PUT requests and GET requests each second. As the application has grown in popularity, users report poor quality of video streaming. Which solution will provide the LARGEST improvement in performance?

A.

Create an Amazon Route 53 geolocation routing policy.

B.

Duplicate content in multiple AWS Regions by using S3 Cross-Region Replication.

C.

Use S3 Intelligent-Tiering to move data based on access patterns.

D.

Create an Amazon CloudFront distribution with Amazon S3 as an origin.

Full Access
Question # 96

A developer creates an AWS Lambda function to publish messages to an Amazon SNS topic. All message content must be encrypted in transit and at rest between AWS Lambda and Amazon SNS.

A portion of the Lambda execution role policy is shown:

" Effect " : " Allow " ,

" Action " : " sns:Publish " ,

" Resource " : " arn:aws:sns:us-east-1:1234567890:secure-topic "

Which combination of steps should the developer take to meet these requirements? (Select TWO.)

A.

Enable server-side encryption on the SNS topic.

B.

Add a Deny statement to the Lambda execution role with a condition of " aws:SecureTransport " : " true " .

C.

Create a VPC endpoint for Amazon SNS.

D.

Add a StringEquals condition of " sns:Protocol " : " https " to the Lambda execution role.

E.

Add a Deny statement to the Lambda execution role with a condition of " aws:SecureTransport " : " false " .

Full Access
Question # 97

A company’s website runs on an Amazon EC2 instance and uses Auto Scaling to scale the environment during peak times. Website users across the world ate experiencing high latency flue lo sialic content on theEC2 instance. even during non-peak hours.

When companion of steps mill resolves the latency issue? (Select TWO)

A.

Double the Auto Scaling group ' s maximum number of servers

B.

Host the application code on AWS lambda

C.

Scale vertically by resizing the EC2 instances

D.

Create an Amazon Cloudfront distribution to cache the static content

E.

Store the application’s sialic content in Amazon S3

Full Access
Question # 98

A company is planning to deploy an application on AWS behind an Elastic Load Balancing (ELB) load balancer. The application uses an HTTP/HTTPS listener and must access the client IP addresses.

Which load-balancing solution meets these requirements?

A.

Use an Application Load Balancer and the X-Forwarded-For headers.

B.

Use a Network Load Balancer (NLB). Enable proxy protocol support on the NLB and the target application.

C.

Use an Application Load Balancer. Register the targets by the instance ID.

D.

Use a Network Load Balancer and the X-Forwarded-For headers.

Full Access
Question # 99

A developer is migrating a containerized application from an on-premises environment to an Amazon ECS cluster.

In the on-premises environment, the container uses a Docker file to store the application. Service dependency configurations such as databases, caches, and storage volumes are stored in a docker-compose.yml file.

Both files are located at the top level of the code base that the developer needs to containerize. When the developer deploys the code to Amazon ECS, the instructions from the Docker file are carried out. However, none of the configurations from docker-compose.yml are applied.

The developer needs to resolve the error and ensure the configurations are applied.

A.

Store the file path for the docker-compose.yml file as a Docker label. Add the label to the ECS cluster ' s container details.

B.

Add the details from the docker-compose.yml file to an ECS task definition. Associate the task with the ECS cluster.

C.

Create a namespace in the ECS cluster. Associate the docker-compose.yml file to the namespace.

D.

Update the service type of the ECS cluster to REPLICA, and redeploy the stack.

Full Access
Question # 100

A company is building an ecommerce application. The company stores the application ' s static content in an Amazon S3 bucket. The application stores data that includes personally identifiable information (PII). The application makes dynamic requests in JSON format through an Amazon CloudFront distribution to an Amazon API Gateway REST API. The REST API invokes an AWS Lambda function that stores and queries data in Amazon DynamoDB.

The company must ensure that all PII data is encrypted at rest in DynamoDB. The company must also protect specific data fields more granularly. The company must ensure that the specified fields are encrypted at the edge. The specified fields must remain encrypted throughout the full stack of the application.

Which solution will meet these requirements?

A.

Configure a Lambda@Edge function to identify and encrypt the sensitive fields. Associate the function with the CloudFront distribution.

B.

Create an RSA key pair. Configure the CloudFront distribution to use field-level encryption directly.

C.

Create an AWS KMS key. Update the Lambda function to encrypt the data before inserting the data into DynamoDB. Configure the function to decrypt the data after retrieval.

D.

Create a new resource on the existing REST API and add a new POST method to the new resource. Configure the POST method to invoke the Lambda function and an AWS KMS key to encrypt the sensitive data fields.

Full Access
Question # 101

A company is running Amazon EC2 instances in multiple AWS accounts. A developer needs to implement an application that collects all the lifecycle events of the EC2 instances. The application needs to store the lifecycle events in a single Amazon Simple Queue Service (Amazon SQS) queue in the company ' s main AWS account for further processing.

Which solution will meet these requirements?

A.

Configure Amazon EC2 to deliver the EC2 instance lifecycle events from all accounts to the Amazon EventBridge event bus of the main account. Add an EventBridge rule to the event bus of the main account that matches all EC2 instance lifecycle events. Add the SQS queue as a target of the rule.

B.

Use the resource policies of the SQS queue in the main account to give each account permissions to write to that SQS queue. Add to the Amazon EventBridge event bus of each account an EventBridge rule that matches all EC2 instance lifecycle events. Add the SQS queue in the main account as a target of the rule.

C.

Write an AWS Lambda function that scans through all EC2 instances in the company accounts to detect EC2 instance lifecycle changes. Configure the Lambda function to write a notification message to the SQS queue in the main account if the function detects an EC2 instance lifecycle change. Add an Amazon EventBridge scheduled rule that invokes the Lambda function every minute.

D.

Configure the permissions on the main account event bus to receive events from all accounts. Create an Amazon EventBridge rule in each account to send all the EC2 instance lifecycle events to the main account event bus. Add an EventBridge rule to the main account event bus that matches all EC2 instance lifecycle events. Set the SQS queue as a target for the rule.

Full Access
Question # 102

An application uses Amazon API Gateway integrated with an AWS Lambda function. Some API requests return HTTP 504 (Gateway Timeout) errors.

The Lambda function timeout is set to 20 seconds . The API Gateway integration timeout is 15 seconds . There are no errors in the Lambda logs.

Which solution will prevent the HTTP 504 errors?

A.

Increase the reserved concurrency of the Lambda function.

B.

Increase the timeout of the Lambda function.

C.

Increase the timeout of the API Gateway integration.

D.

Increase the per-client throttling limit.

Full Access
Question # 103

A developer is designing a fault-tolerant environment where client sessions will be saved.

How can the developer ensure that no sessions are lost if an Amazon EC2 instance fails?

A.

Use sticky sessions with an Elastic Load Balancer target group.

B.

Use Amazon SOS to save session data.

C.

Use Amazon DynamoDB to perform scalable session handling.

D.

Use Elastic Load Balancer connection draining to stop sending requests to failing instances.

Full Access
Question # 104

A developer owns and supports an application that has database credentials stored in environment variables for AWS Lambda functions. The developer needs an alternate storage method for the credentials instead of using plaintext environment variables. Which solution will handle the credentials MOST securely?

A.

Store the database credentials as a secret in AWS Secrets Manager. Set the secret ' s Amazon Resource Name (ARN) as the value of an environment variable. Use the AWS Parameters and Secrets Lambda Extension to retrieve the credentials in the Lambda function.

B.

Use base64 encoding for the database credentials. Include the database credentials in the Lambda function ' s source code as part of a build process. Update the Lambda function ' s code to decode the credentials before the credentials are used.

C.

Store the database credentials as a string-type parameter in AWS Systems Manager Parameter Store. Set the parameter ' s Amazon Resource Name (ARN) as the value of an environment variable. Use the AWS Parameters and Secrets Lambda Extension to retrieve the credentials in the Lambda function.

D.

Use AWS CloudFormation to deploy the application. Ensure that the NoEcho property is set to true for the parameters that contain the database credentials.

Full Access
Question # 105

A developer is designing a new feature for an existing application. The new feature uses an AWS Lambda function. The developer wants to test the Lambda function safely in a development AWS account and a testing AWS account before deploying the function into a production AWS account. The developer must roll back the function if issues are found. Which solution will meet these requirements with the LEAST operational overhead?

A.

Create new Lambda function versions and aliases for the development, testing, and production accounts. After successful testing, update the production alias to point to the function. Roll back to the most recent stable function version if issues are discovered.

B.

Deploy the Lambda function to the development, testing, and production accounts separately after successfully testing the function in each environment.

C.

Use Lambda layers to separate the code and the libraries that are associated with each AWS account. Deploy and test the Lambda function with each Lambda layer in each environment.

D.

Update the Lambda function code to use environment variables for the development, testing, and production accounts. Use the environment variables to make code updates available to specific environments.

Full Access
Question # 106

A developer has created an AWS Lambda function that is written in Python. The Lambda function reads data from objects in Amazon S3 and writes data to an Amazon DynamoDB table.

The function is successfully invoked from an S3 event notification when an object is created. However, the function fails when it attempts to write to the DynamoDB table.

What is the MOST likely cause of this issue?

A.

The Lambda function ' s concurrency limit has been exceeded.

B.

The DynamoDB table requires a global secondary index (GSI) to support writes.

C.

The Lambda function does not have IAM permissions to write to DynamoDB.

D.

The DynamoDB table is not running in the same Availability Zone as the Lambda function.

Full Access
Question # 107

A company wants to share information with a third party. The third party has an HTTP API endpoint that the company can use to share the information. The company has the required API key to access the HTTP API.

The company needs a way to manage the API key by using code. The integration of the API key with the application code cannot affect application performance.

Which solution will meet these requirements MOST securely?

A.

Store the API credentials in AWS Secrets Manager. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.

B.

Store the API credentials in a local code variable. Push the code to a secure Git repository. Use the local code variable at runtime to make the API call.

C.

Store the API credentials as an object in a private Amazon S3 bucket. Restrict access to the S3 object by using IAM policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.

D.

Store the API credentials in an Amazon DynamoDB table. Restrict access to the table by using resource-based policies. Retrieve the API credentials at runtime by using the AWS SDK. Use the credentials to make the API call.

Full Access
Question # 108

A developer needs to use a code template to create an automated deployment of an application onto Amazon EC2 instances. The template must be configured to repeat deployment, installation, and updates of resources for the application. The template must be able to create identical environments and roll back to previous versions.

Which solution will meet these requirements?

A.

Use AWS Amplify for automatic deployment templates. Use a traffic-splitting deployment to copy any deployments. Modify any resources created by Amplify, if necessary.

B.

Use AWS CodeBuild for automatic deployment. Upload the required AppSpec file template. Save the appspec.yml file in the root directory folder of the revision. Specify the deployment group that includes the EC2 instances for the deployment.

C.

Use AWS CloudFormation to create an infrastructure template in JSON format to deploy the EC2 instances. Use Cloud Formation helper scripts to install the necessary software and to start the application. Call the scripts directly from the template.

D.

Use AWS AppSync to deploy the application. Upload the template as a GraphQL schema. Specify the EC2 instances for deployment of the application. Use resolvers as a version control mechanism and to make any updates to the deployments.

Full Access
Question # 109

A developer creates an Amazon S3 bucket to store project status files that are uploaded hourly. The developer also creates an AWS Lambda function that will be used to process the project status files. What should the developer do to invoke the function with the LEAST amount of AWS infrastructure?

A.

Create an Amazon EventBridge rule to invoke the function every 5 minutes and scan for new objects.

B.

Create an S3 event notification to invoke the function when a new object is created in the S3 bucket.

C.

Create an S3 event notification that publishes a message to an Amazon SNS topic. Subscribe the function to the SNS topic.

D.

Create an S3 event notification that adds a message to an Amazon SQS queue. Configure the function to poll the queue.

Full Access
Question # 110

A company has a large amount of data in an Amazon DynamoDB table. A large batch of data is appended to the table once each day. The company wants a solution that will make all the existing and future data in DynamoDB available for analytics on a long-term basis.

Which solution meets these requirements with the LEAST operational overhead?

A.

Configure DynamoDB incremental exports to Amazon S3.

B.

Configure Amazon DynamoDB Streams to write records to Amazon S3.

C.

Configure Amazon EMR to copy DynamoDB data to Amazon S3.

D.

Configure Amazon EMR to copy DynamoDB data to Hadoop Distributed File System (HDFS).

Full Access
Question # 111

A developer is building an application that uses Amazon DynamoDB. The developer wants to retrieve multiple specific items from the database with a single API call. Which DynamoDB API call will meet these requirements with the MINIMUM impact on the database?

A.

BatchGetltem

B.

Getltem

C.

Scan

D.

Query

Full Access
Question # 112

In a move toward using microservices, a company ' s management team has asked all development teams to build their services so that API requests depend only on that service ' s data store. One team is building a Payments service which has its own database; the service needs data that originates in the Accounts database. Both are using Amazon DynamoDB.

What approach will result in the simplest, decoupled, and reliable method to get near-real time updates from the Accounts database?

A.

Use AWS Glue to perform frequent ETL updates from the Accounts database to the Payments database.

B.

Use Amazon ElastiCache in Payments, with the cache updated by triggers in the Accounts database.

C.

Use Amazon Data Firehose to deliver all changes from the Accounts database to the Payments database.

D.

Use Amazon DynamoDB Streams to deliver all changes from the Accounts database to the Payments database.

Full Access
Question # 113

A company needs to rapidly prototype a web application. However, the company has not yet designed the complete architecture.

A developer uses AWS Lambda functions to build three endpoints. A frontend team wants to test the endpoints while the team prototypes the frontend.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Set up a Lambda function URL for each endpoint. Use the function URLs for testing.

B.

Set up an Amazon API Gateway REST API to have a Lambda proxy integration. Use the REST API endpoint URL for testing.

C.

Set up an AWS AppSync API to have a Lambda resolver. Use a GraphQL endpoint for testing.

D.

Set up an Amazon ECS container that runs an open source web proxy and Lambda code. Use the web proxy endpoint for testing.

Full Access
Question # 114

A developer needs to set up an API to provide access to an application and its resources. The developer has a TLS certificate. The developer must have the ability to change the default base URL of the API to a custom domain name. The API users are distributed globally. The solution must minimize API latency.

A.

Create an Amazon CloudFront distribution that uses an AWS Lambda@Edge function to process API requests. Import the TLS certificate into AWS Certificate Manager and CloudFront. Add the custom domain name as an alias resource record set that is for the CloudFront distribution.

B.

Create an Amazon API Gateway REST API. Use the private endpoint type. Import the TLS certificate into AWS Certificate Manager. Create a custom domain name for the REST API. Route traffic to the custom domain name. Disable the default endpoint for the REST API.

C.

Create an Amazon API Gateway REST API. Use the edge-optimized endpoint type. Import the TLS certificate into AWS Certificate Manager. Create a custom domain name for the REST API. Route traffic to the custom domain name. Disable the default endpoint for the REST API.

D.

Create an Amazon CloudFront distribution that uses CloudFront Functions to process API requests. Import the TLS certificate into AWS Certificate Manager and CloudFront. Add the custom domain name as an alias resource record set that is for the CloudFront distribution.

Full Access
Question # 115

A developer is building a multi-tenant application that uses an AWS Lambda function and an Amazon S3 bucket. An S3 event notification invokes the Lambda function when a new file is uploaded to the S3 bucket. The function reads each new file from the S3 bucket, processes the file, and writes data to an Amazon DynamoDB table. Each file in the S3 bucket has a prefix that corresponds with the name of the tenant that owns the file. Items in the DynamoDB table use tenant name as the partition key.

The developer must reduce the risk that file data will leak across tenants during processing.

Which combination of actions will meet this requirement? (Select THREE.)

A.

Create a data access IAM role. Allow the Lambda function to assume the data access role. Configure the role to allow the sts:TagSession action.

B.

Create a data access IAM role. Allow the Lambda function execution role to assume the data access role.

C.

Configure a policy for the data access IAM role to allow access to DynamoDB and Amazon S3 only for data that corresponds with the tenant session tag.

D.

Create a resource-based policy for the DynamoDB table to restrict access based on the principal tag of the IAM role that the Lambda function assumes.

E.

Create a resource control policy (RCP) that allows access to the S3 bucket by using the aws:PrincipalTag global condition key.

F.

Configure the Lambda function to assume the data access IAM role that has the tenant name as a session tag. Use the assumed role credentials to access data.

Full Access
Question # 116

A developer is working on an application that handles 10 MB documents that contain highly sensitive data. The application will use AWS KMS to perform client-side encryption.

What steps must be followed?

A.

Invoke the Encrypt API, passing the plaintext data that must be encrypted, then reference the customer managed key ARN in the KeyId parameter.

B.

Invoke the GenerateRandom API to get a data encryption key, then use the data encryption key to encrypt the data.

C.

Invoke the GenerateDataKey API to retrieve the encrypted version of the data encryption key to encrypt the data.

D.

Invoke the GenerateDataKey API to retrieve the plaintext version of the data encryption key to encrypt the data.

Full Access
Question # 117

An application runs on multiple EC2 instances behind an ELB.

Where is the session data best written so that it can be served reliably across multiple requests?

A.

Write data to Amazon ElastiCache

B.

Write data to Amazon Elastic Block Store

C.

Write data to Amazon EC2 instance Store

D.

Wide data to the root filesystem

Full Access
Question # 118

A data visualization company wants to strengthen the security of its core applications The applications are deployed on AWS across its development staging, pre-production, and production environments. The company needs to encrypt all of its stored sensitive credentials The sensitive credentials need to be automatically rotated Aversion of the sensitive credentials need to be stored for each environment

Which solution will meet these requirements in the MOST operationally efficient way?

A.

Configure AWS Secrets Manager versions to store different copies of the same credentials across multiple environments

B.

Create a new parameter version in AWS Systems Manager Parameter Store for each environment Store the environment-specific credentials in the parameter version.

C.

Configure the environment variables in the application code Use different names for each environment type

D.

Configure AWS Secrets Manager to create a new secret for each environment type. Store the environment-specific credentials in the secret

Full Access
Question # 119

A developer is writing an application that will retrieve sensitive data from a third-party system. The application will format the data into a PDF file. The PDF file could be more than 1 MB. The application will encrypt the data to disk by using AWS Key Management Service (AWS KMS). The application will decrypt the file when a user requests to download it. The retrieval and formatting portions of the application are complete.

The developer needs to use the GenerateDataKey API to encrypt the PDF file so that the PDF file can be decrypted later. The developer needs to use an AWS KMS symmetric customer managed key for encryption.

Which solutions will meet these requirements?

A.

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

B.

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API and a symmetric encryption algorithm to encrypt the file.

C.

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

D.

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API

Full Access
Question # 120

A developer wants to deploy a new version of an AWS Elastic Beanstalk application. During deployment the application must maintain full capacity and avoid service interruption. Additionally, the developer must minimize the cost of additional resources that support the deployment.

Which deployment method should the developer use to meet these requirements?

A.

All at once

B.

Rolling with additional batch

C.

Bluegreen

D.

Immutable

Full Access
Question # 121

A company is building a micro services app1 cation that consists of many AWS Lambda functions. The development team wants to use AWS Serverless Application Model (AWS SAM) templates to automatically test the Lambda functions. The development team plans to test a small percentage of traffic that is directed to new updates before the team commits to a full deployment of the application.

Which combination of steps will meet these requirements in the MOST operationally efficient way? (Select TWO.)

A.

Use AWS SAM CLI commands in AWS CodeDeploy lo invoke the Lambda functions to lest the deployment

B.

Declare the EventlnvokeConfig on the Lambda functions in the AWS SAM templates with OnSuccess and OnFailure configurations.

C.

Enable gradual deployments through AWS SAM templates.

D.

Set the deployment preference type to Canary10Percen130Minutes Use hooks to test the deployment.

E.

Set the deployment preference type to Linear10PefcentEvery10Minutes Use hooks to test the deployment.

Full Access
Question # 122

A company has deployed infrastructure on AWS. A development team wants to create an AWS Lambda function that will retrieve data from an Amazon Aurora database. The Amazon Aurora database is in a private subnet in company ' s VPC. The VPC is named VPC1. The data is relational in nature. The Lambda function needs to access the data securely.

Which solution will meet these requirements?

A.

Create the Lambda function. Configure VPC1 access for the function. Attach a security group named SG1 to both the Lambda function and the database. Configure the security group inbound and outbound rules to allow TCP traffic on Port 3306.

B.

Create and launch a Lambda function in a new public subnet that is in a new VPC named VPC2. Create a peering connection between VPC1 and VPC2.

C.

Create the Lambda function. Configure VPC1 access for the function. Assign a security group named SG1 to the Lambda function. Assign a second security group named SG2 to the database. Add an inbound rule to SG1 to allow TCP traffic from Port 3306.

D.

Export the data from the Aurora database to Amazon S3. Create and launch a Lambda function in VPC1. Configure the Lambda function query the data from Amazon S3.

Full Access
Question # 123

A developer is designing a serverless application with two AWS Lambda functions to process photos. One Lambda function stores objects in an Amazon S3 bucket and stores the associated metadata in an Amazon DynamoDB table. The other Lambda function fetches the objects from the S3 bucket by using the metadata from the DynamoDB table. Both Lambda functions use the same Python library to perform complex computations and are approaching the quota for the maximum size of zipped deployment packages.

What should the developer do to reduce the size of the Lambda deployment packages with the LEAST operational overhead?

A.

Package each Python library in its own .zip file archive. Deploy each Lambda function with its own copy of the library.

B.

Create a Lambda layer with the required Python library. Use the Lambda layer in both Lambda functions.

C.

Combine the two Lambda functions into one Lambda function. Deploy the Lambda function as a single .zip file archive.

D.

Download the Python library to an S3 bucket. Program the Lambda functions to reference the object URLs.

Full Access
Question # 124

A company operates on-premises data centers that run an image processing service composed of containerized applications on Kubernetes clusters . All applications share access to a common NFS file system for data storage.

The company is running out of NFS capacity and must migrate to AWS quickly. The Kubernetes clusters must be highly available on AWS.

Which combination of actions will meet these requirements? (Select TWO.)

A.

Transfer the data from the NFS share to an Amazon EBS volume. Upload the container images to Amazon ECR.

B.

Transfer the data from the NFS share to an Amazon EFS file system. Upload the container images to Amazon ECR.

C.

Create an Amazon ECS cluster and configure each node to mount the Amazon EBS volume.

D.

Create an Amazon EKS cluster and configure each node to mount the Amazon EBS volume.

E.

Create an Amazon EKS cluster and configure each node to mount the Amazon EFS file system.

Full Access
Question # 125

A developer created an AWS Lambda function that performs a series of operations that involve multiple AWS services. The function ' s duration time is higher than normal. To determine the cause of the issue, the developer must investigate traffic between the services without changing the function code

Which solution will meet these requirements?

A.

Enable AWS X-Ray active tracing in the Lambda function Review the logs in X-Ray

B.

Configure AWS CloudTrail View the trail logs that are associated with the Lambda function.

C.

Review the AWS Config logs in Amazon Cloud Watch.

D.

Review the Amazon CloudWatch logs that are associated with the Lambda function.

Full Access
Question # 126

A developer is building a financial application on AWS that processes sensitive cardholder data and personally identifiable information (PII). The developer needs a solution to encrypt all application data in transit and data at rest. The solution must ensure that the developer can manage encryption keys. Which solution will meet these requirements?

A.

Use AWS KMS to implement envelope encryption by using the AWS Encryption SDK.

B.

Store encryption keys as a SecureString parameter in AWS Systems Manager Parameter Store. Fetch the keys at application startup. Use standard HTTPS for calls.

C.

Store encryption keys directly in AWS Secrets Manager. Create an AWS Lambda function to automatically handle encryption.

D.

Upload sensitive data directly from the application to an Amazon S3 bucket. Configure the S3 bucket to use server-side encryption with Amazon S3 managed keys (SSE-S3) as the default encryption.

Full Access
Question # 127

A development team uses AWS Elastic Beanstalk for application deployment. The development team has configured the application version lifecycle policy to limit the number of application versions to 25. However, even with the application version lifecycle policy, the source bundle is deleted from the Amazon S3 source bucket.

What should the development team do in the Elastic Beanstalk application version lifecycle settings to retain the source code in the S3 bucket?

A.

Enable versioning on the source bundle S3 bucket.

B.

Disable the S3 bucket lifecycle policy to avoid the archiving of the source bundle.

C.

Update the Elastic Beanstalk application version lifecycle policy to increase the version quota to 50.

D.

Update the Elastic Beanstalk application version lifecycle policy to retain the source bundle in Amazon S3.

Full Access
Question # 128

A developer created a Node.js-based AWS Lambda function by using a container image of an AWS OS-only base image. There is a new security patch for Node.js that must be patched to the new Lambda function.

Which solution will meet this requirement?

A.

Set the runtime update mode of the Lambda function to Auto.

B.

Patch the runtime version by redeploying the same version of the Lambda function.

C.

Rebuild the Lambda container code with the latest version of the AWS OS base image. Publish a new version of the Lambda function.

D.

Rebuild the Lambda container code with the latest Node.js patch version. Publish a new version of the Lambda function.

Full Access
Question # 129

A developer is building an application that needs to access the values of secrets that are in AWS Secrets Manager. The secret IDs are passed to the application code through environment variables. The secrets are encrypted by a customer managed AWS KMS key.

Which combination of permissions is required to retrieve the values of these secrets? (Select TWO.)

A.

secretsmanager:GetSecretValue

B.

secretsmanager:DescribeSecret

C.

secretsmanager:ListSecrets

D.

kms:Decrypt

E.

kms:Encrypt

Full Access
Question # 130

A developer is setting up infrastructure by using AWS Cloud Formation. If an error occurs when the resources described in the CloudFormation template are provisioned, successfully provisioned resources must be preserved. The developer must provision and update the CloudFormation stack by using the AWS CLI.

Which solution will meet these requirements?

A.

Add an --enable-terminal ion-protection command line option to the create-stack command and the update-stack command.

B.

Add a -disable-roll back command line option to the create-stack command and the update-stack command

C.

Add a —parameters ParameterKey=P reserve Resources. ParameterVaIue=True command line option to the create-stack command and the update-stack command.

D.

Add a -tags Key=PreserveResources.VaIue=True command line option to the create-stack command and the update-stack command.

Full Access
Question # 131

A company is developing a serverless application by using AWS Lambda functions. One of the Lambda functions needs to access an Amazon RDS DB instance. The DB instance is in a private subnet inside a VPC.

The company creates a role that includes the necessary permissions to access the DB instance. The company then assigns the role to the Lambda function. A developer must take additional action to give the Lambda function access to the DB instance.

What should the developer do to meet these requirements?

A.

Assign a public IP address to the DB instance. Modify the security group of the DB instance to allow inbound traffic from the IP address of the Lambda function.

B.

Set up an AWS Direct Connect connection between the Lambda function and the DB instance.

C.

Configure an Amazon CloudFront distribution to create a secure connection between the Lambda function and the DB instance.

D.

Configure the Lambda function to connect to the private subnets in the VPC. Add security group rules to allow traffic to the DB instance from the Lambda function.

Full Access
Question # 132

A developer is deploying an application on Amazon EC2 instances that run in Account A. The application needs to read data from an existing Amazon Kinesis data stream in Account B.

Which actions should the developer take to provide the application with access to the stream? (Select TWO.)

A.

Update the instance profile role in Account A with stream read permissions.

B.

Create an IAM role with stream read permissions in Account B.

C.

Add a trust policy to the instance profile role and IAM role in Account B to allow the instance profile role to assume the IAM role.

D.

Add a trust policy to the instance profile role and IAM role in Account B to allow reads from the stream.

E.

Add a resource-based policy in Account B to allow read access from the instance profile role.

Full Access
Question # 133

An application adds a processing date to each transaction that it receives. The application writes each transaction to an Amazon DynamoDB table by using the PutItem operation. Each transaction has a unique ID (transactionID). Sometimes the application receives transactions more than once. A developer notices that duplicate transactions in DynamoDB have the latest processing date instead of the date when the transaction was first received. Duplicate records happen infrequently, and most transactions are unique. What is the MOST cost-effective solution that the developer can implement to ensure that PutItem does not update an existing record?

A.

Call the GetItem operation first to confirm that the record does not exist. Then call PutItem.

B.

Enable the TTL attribute on the DynamoDB table.

C.

Implement a conditional put by using the attribute_exists(transactionID) condition expression.

D.

Implement a conditional put by using the attribute_not_exists(transactionID) condition expression.

Full Access
Question # 134

A developer is monitoring an application that runs on an Amazon EC2 Instance. The developer has configured a custom Amazon CloudWatch metric with data granularity of 1 second. It any issues occur, the developer wants to be notified within 30 seconds by Amazon Simple Notification Service (Amazon SNS).

What should the developer do to meet this requirement?

A.

Configure a high-resolution CloudWatch alarm.

B.

Set up a custom CloudWatch dashboard.

C.

Use Amazon CloudWatch Logs Insights.

D.

Change to a default CloudWatch metric.

Full Access
Question # 135

A developer is designing an AWS Lambda function that creates temporary files that are less than 10 MB during invocation. The temporary files will be accessed and modified multiple times during invocation. The developer has no need to save or retrieve these files in the future.

Where should the temporary files be stored?

A.

the /tmp directory

B.

Amazon Elastic File System (Amazon EFS)

C.

Amazon Elastic Block Store (Amazon EBS)

D.

Amazon S3

Full Access
Question # 136

A developer must use multi-factor authentication (MFA) to access data in an Amazon S3 bucket that is in another AWS account. Which AWS Security Token Service (AWS STS) API operation should the developer use with the MFA information to meet this requirement?

A.

AssumeRoleWithWebidentity

B.

GetFederationToken

C.

AssumeRoleWithSAML

D.

AssumeRole

Full Access
Question # 137

A social media application stores millions of video clips in Amazon S3 and serves them to users worldwide. Traffic is highly variable and can spike to more than 10,000 PUT and GET requests per second . Users report poor video streaming quality .

Which solution will provide the LARGEST improvement in performance ?

A.

Configure an Amazon Route 53 geolocation routing policy.

B.

Use Amazon S3 Cross-Region Replication.

C.

Use S3 Intelligent-Tiering.

D.

Create an Amazon CloudFront distribution with Amazon S3 as the origin.

Full Access
Question # 138

A developer is working on an ecommerce application that stores data in an Amazon RDS for MySQL cluster The developer needs to implement a caching layer for the application to retrieve information about the most viewed products.

Which solution will meet these requirements?

A.

Edit the RDS for MySQL cluster by adding a cache node. Configure the cache endpoint instead of the duster endpoint in the application.

B.

Create an Amazon ElastiCache (Redis OSS) cluster. Update the application code to use the ElastiCache (Redis OSS) cluster endpoint.

C.

Create an Amazon DynamoDB Accelerator (DAX) cluster in front of the RDS for MySQL cluster. Configure the application to connect to the DAX endpoint instead of the RDS endpoint.

D.

Configure the RDS for MySQL cluster to add a standby instance in a different Availability Zone. Configure the application to read the data from the standby instance.

Full Access
Question # 139

A software company is launching a multimedia application. The application will allow guest users to access sample content before the users decide if they want to create an account to gain full access. The company wants to implement an authentication process that can identify users who have already created an account. The company also needs to keep track of the number of guest users who eventually create an account.

Which combination of steps will meet these requirements? {Select TWO.)

A.

Create an Amazon Cognito user pool. Configure the user pool to allow unauthenticated users. Exchange user tokens for temporary credentials that allow authenticated users to assume a role.

B.

Create an Amazon Cognito identity pool. Configure the identity pool to allow unauthenticated users. Exchange unique identity for temporary credentials that allow all users to assume a role.

C.

Create an Amazon CloudFront distribution. Configure the distribution to allow unauthenticated users. Exchange user tokens for temporary credentials that allow all users to assume a role.

D.

Create a role for authenticated users that allows access to all content. Create a role for unauthenticated users that allows access to only the sample content.

E.

Allow all users to access the sample content by default. Create a role for authenticated users that allows access to the other content.

Full Access
Question # 140

An application makes requests to an Amazon DynamoDB table that is configured with provisioned throughput. The table has a partition key of UserID .

A developer needs to identify items in the table that have a status attribute of " Inactive " . The developer must add a specific email address to the appropriate attribute for all inactive items. The developer attempts to use an AWS Lambda function to update the table items. However, the function fails with the following error: ConditionalCheckFailedException .

How can the developer resolve this error?

A.

Update the condition expression section of the request to check whether the status attribute equals " Inactive " before making the update request.

B.

Update the condition expression section of the request to check whether the email attribute exists in the item before making the update request.

C.

Include error-handling logic in the Lambda function to retry the update operation when a ConditionalCheckFailedException error occurs.

D.

Update the condition expression in the request to check whether the email address is in the expected format before making the update request.

Full Access
Question # 141

A developer manages a website that distributes its content by using Amazon CloudFront. The website ' s static artifacts are stored in an Amazon S3 bucket.

The developer deploys some changes and can see the new artifacts in the S3 bucket. However, the changes do not appear on the webpage that the CloudFront distribution delivers.

How should the developer resolve this issue?

A.

Configure S3 Object Lock to update to the latest version of the files every time an S3 object is updated.

B.

Configure the S3 bucket to clear all old objects from the bucket before new artifacts are uploaded.

C.

Set CloudFront to invalidate the cache after the artifacts have been deployed to Amazon S3.

D.

Set CloudFront to modify the distribution origin after the artifacts have been deployed to Amazon S3.

Full Access
Question # 142

A company has an application that is deployed on AWS Elastic Beanstalk. The application generates user-specific PDFs and stores the PDFs in an Amazon S3 bucket. The application then uses Amazon Simple Email Service (Amazon SES) to send the PDFs by email to subscribers.

Users no longer access the PDFs 90 days after the PDFs are generated. The S3 bucket is not versioned and contains many obsolete PDFs.

A developer must reduce the number of files in the S3 bucket by removing PDFs that are older than 90 days.

Which solution will meet this requirement with the LEAST development effort?

A.

Update the application code. In the code, add a rule to scan all the objects in the S3 bucket every day and to delete objects after 90 days.

B.

Create an AWS Lambda function. Program the Lambda function to scan all the objects in the S3 bucket every day and to delete objects after 90 days.

C.

Create an S3 Lifecycle rule for the S3 bucket to expire objects after 90 days.

D.

Partition the S3 objects with a < year > / < month > / < day > key prefix. Create an AWS Lambda function to remove objects that have prefixes that have reached the expiration date.

Full Access
Question # 143

A company requires that all applications running on Amazon EC2 use 1AM roles to gam access to AWS services. A developer is modifying an application that currently relies on 1AM user access keys stored in environment variables to access Amazon DynamoDB tables using boto, the AWS SDK for Python.

The developer associated a role with the same permissions as the 1AM user to the EC2 instance, then deleted the 1AM user. When the application was restarted, the AWS

Access Denied Exception messages started appearing in the application logs. The developer was able to use their personal account on the server to run DynamoDB API commands using the AWS CLI.

What is the MOST likely cause of the exception?

A.

1AM policies might take a few minutes to propagate to resources.

B.

Disabled environment variable credentials are still being used by the application.

C.

The AWS SDK does not support credentials obtained using an instance role.

D.

The instance ' s security group does not allow access to http://169.254.169.254.

Full Access
Question # 144

A development team wants to run their container workloads on Amazon ECS. Each application container needs to share data with another container to collect logs and metrics.

What should the development team do to meet these requirements?

A.

Create two pod specifications. Make one to include the application container and the other to include the other container. Link the two pods together.

B.

Create two task definitions. Make one to include the application container and the other to include the other container. Mount a shared volume between the two tasks.

C.

Create one task definition. Specify both containers in the definition. Mount a shared volume between those two containers.

D.

Create a single pod specification. Include both containers in the specification. Mount a persistent volume to both containers.

Full Access
Question # 145

A developer is re-architecting a caching solution that currently uses an Amazon ElastiCache (Redis OSS) cluster that has cluster mode enabled to store product information. The existing solution experiences significant load. All cached product data expires at the same time, which results in additional pressure on the backend database and poor performance for end users. The developer must resolve the performance issues in a way that maintains data freshness.

Which solution will meet these requirements?

A.

Increase the TTL of the product data in the cache.

B.

Increase the number of replica nodes. Disable cluster mode.

C.

Add a slight variance to the TTL setting by using a randomly generated time value.

D.

Increase the number of shards. Decrease the number of replica nodes in the cluster.

Full Access
Question # 146

A developer is creating an AWS Lambda function that consumes messages from an Amazon Simple Queue Service (Amazon SQS) standard queue. The developer notices that the Lambda function processes some messages multiple times.

How should developer resolve this issue MOST cost-effectively?

A.

Change the Amazon SQS standard queue to an Amazon SQS FIFO queue by using the Amazon SQS message deduplication ID.

B.

Set up a dead-letter queue.

C.

Set the maximum concurrency limit of the AWS Lambda function to 1

D.

Change the message processing to use Amazon Kinesis Data Streams instead of Amazon SQS.

Full Access
Question # 147

A company runs an application that currently uploads content to an unencrypted Amazon S3 bucket. The S3 bucket contains millions of objects that total more than 2 TB in size. A new company policy requires all data to be encrypted. The company creates an AWS KMS key to use for encryption.

Which solution will meet this requirement MOST cost-effectively?

A.

Modify the properties of the S3 bucket. Enable default encryption, select SSE-KMS, and specify the Amazon Resource Name (ARN) of the provided KMS key.

B.

Create an S3 bucket policy that denies any PutObject requests that do not include the x-amz-server-side-encryption header that specifies the Amazon Resource Name (ARN) of the provided KMS key. Apply this policy to the bucket.

C.

Configure an Amazon S3 Batch Operations job. Choose the source bucket that contains the unencrypted objects. Select the COPY operation. Specify the source bucket as the destination. In the copy operation parameters, specify the Amazon Resource Name (ARN) of the provided KMS key.

D.

Develop a script by using the AWS SDK. Configure the script to iterate through all objects in the bucket and download each object locally. Ensure that the script then re-uploads each object to the same object key name and specifies server-side encryption with the KMS key during the re-upload.

Full Access
Question # 148

A company ' s application uses an Amazon API Gateway REST API and AWS Lambda functions to upload media files to and fetch media files from a standard Amazon S3 Standard bucket. The company runs a nightly job on an Amazon EC2 instance to create dashboards and other visualizations for application users. The job usually runs for 1 to 2 hours.

A developer observes request throttling while the function is running. The application generates multiple 429 exceptions in the Lambda function logs when files do not process successfully. The developer needs to resolve the issue and ensure that all of the application ingests all files.

Which solution will meet these requirements?

A.

Enable S3 Transfer Acceleration on the bucket. Use the appropriate endpoint.

B.

Call the CreateMultipartUpload API in the Lambda functions to upload the files in pieces.

C.

Implement the retry with a backoff pattern in the Lambda functions.

D.

Set up an S3 Lifecycle policy to automatically move the media files to the S3 Intelligent-Tiering storage class.

Full Access
Question # 149

A developer is working on an ecommerce website The developer wants to review server logs without logging in to each of the application servers individually. The website runs on multiple Amazon EC2 instances, is written in Python, and needs to be highly available

How can the developer update the application to meet these requirements with MINIMUM changes?

A.

Rewrite the application to be cloud native and to run on AWS Lambda, where the logs can be reviewed in Amazon CloudWatch

B.

Set up centralized logging by using Amazon OpenSearch Service, Logstash, and OpenSearch Dashboards

C.

Scale down the application to one larger EC2 instance where only one instance is recording logs

D.

Install the unified Amazon CloudWatch agent on the EC2 instances Configure the agent to push the application logs to CloudWatch

Full Access
Question # 150

A food-delivery company has an application that uses an Amazon DynamoDB table for customer orders. The table uses on-demand capacity mode . The table uses order_date as the partition key and a composite sort key of customerId#orderId.

During peak order periods, write operations to the table are being throttled .

What should a developer do to resolve this issue?

A.

Use a sequential number for the partition key and continue to use orderId as the sort key.

B.

Change the table to provisioned capacity mode and increase write capacity units.

C.

Migrate the table to Amazon Aurora.

D.

Use customerId as the partition key and orderId as the sort key.

Full Access
Question # 151

A developer is creating an application that must transfer expired items from Amazon DynamoDB to Amazon S3. The developer sets up the DynamoDB table to automatically delete items after a specific TTL. The application must process the items in DynamoDB and then must store the expired items in Amazon S3. The entire process, including item processing and storage in Amazon S3, will take 5 minutes.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Configure DynamoDB Accelerator (DAX) lo query for expired items based on the TTL Save the results to Amazon S3.

B.

Configure DynamoDB Streams to invoke an AWS Lambda function. Program the Lambda function to process the items and to store the expired items in Amazon S3.

C.

Deploy a custom application on an Amazon Elastic Container Service (Amazon ECS) cluster on Amazon EC2 instances. Program the custom application to process the items and to store the expired items in Amazon S3.

D.

Create an Amazon EventBridge rule to invoke an AWS Lambda function. Program the Lambda function to process The items and to store the expired items in Amazon S3.

Full Access
Question # 152

A developer is troubleshooting a three-tier application, which is deployed on Amazon EC2 instances. There is a connectivity problem between the application servers and the database servers.

Which AWS services or tools should be used to identify the faulty component? (Select TWO.)

A.

AWS CloudTrail

B.

AWS Trusted Advisor

C.

Amazon VPC Flow Logs

D.

Network access control lists

E.

AWS Config rules

Full Access
Question # 153

A developer is trying to make API calls using the AWS SDK. The IAM user credentials used by the application require multi-factor authentication for all API calls.

Which method should the developer use to access the multi-factor authentication-protected API?

A.

GetFederationToken

B.

GetCallerIdentity

C.

GetSessionToken

D.

DecodeAuthorizationMessage

Full Access
Question # 154

A developer created an AWS Lambda function to process data in an application. The function pulls large objects from an Amazon S3 bucket, processes the data, and loads the processed data into a second S3 bucket. Application users have reported slow response times. The developer checks the logs and finds that Lambda function invocations run much slower than expected. The function itself is simple and has a small deployment package. The function initializes quickly. The developer needs to improve the performance of the application. Which solution will meet this requirement with the LEAST operational overhead?

A.

Store the data in an Amazon EFS file system. Mount the file system to a local directory in the function.

B.

Create an Amazon EventBridge rule to schedule invocations of the function every minute.

C.

Configure the function to use ephemeral storage. Upload the objects and process data in the /tmp directory.

D.

Create a Lambda layer to package the function dependencies. Add the layer to the function.

Full Access
Question # 155

A developer updates an AWS Lambda function that an Amazon API Gateway API uses. The API is the backend for a web application.

The developer needs to test the updated Lambda function before deploying the Lambda function to production. The testing must not affect any production users of the web application.

Which solution will meet these requirements in the MOST operationally efficient way?

A.

Create a canary release deployment for the existing API stage. Deploy the API to the existing stage. Test the updated Lambda function by using the existing URL.

B.

Update the API Gateway API endpoint type to private. Deploy the changes to the existing API stage. Test the API by using the existing URL.

C.

Create a new test API stage in API Gateway. Add stage variables to deploy the updated Lambda function to only the test stage. Test the updated Lambda function by using the new stage URL.

D.

Create a new AWS CloudFormation stack to deploy a copy of the entire production API and Lambda function. Use the stack ' s API URL to test the updated Lambda function.

Full Access
Question # 156

A developer is working on a web application that runs on Amazon ECS and uses an Amazon DynamoDB table to store data. The application performs a large number of read requests against a small set of the table data.

How can the developer improve the performance of these requests? (Select TWO.)

A.

Create an Amazon ElastiCache cluster. Configure the application to cache data in the cluster.

B.

Create a DynamoDB Accelerator (DAX) cluster. Configure the application to use the DAX cluster for DynamoDB requests.

C.

Configure the application to make strongly consistent read requests against the DynamoDB table.

D.

Increase the read capacity of the DynamoDB table.

E.

Enable DynamoDB adaptive capacity.

Full Access
Question # 157

A software company is migrating a single-page application from on-premises servers to the AWS Cloud by using AWS Amplify Hosting. The application relies on an API that was created with an existing GraphQL schema. The company needs to migrate the API along with the application.

Which solution will meet this requirement with the LEAST amount of configuration?

A.

Create a new API by using the Amplify CLI ' s amplify import api command. Select REST as the service to use. Add the existing schema to the new API.

B.

Create a new API in Amazon API Gateway by using the existing schema. Use the Amplify CLI ' s amplify add api command. Select the API as the application ' s backend environment.

C.

Create a new API in AWS AppSync by using the existing schema. Use the Amplify CLI ' s amplify import api command. Select the API as the application ' s backend environment.

D.

Create a new API by using the Amplify CLI ' s amplify add api command. Select GraphQL as the service to use. Add the existing schema to the new API.

Full Access
Question # 158

A company recently deployed an AWS Lambda function. A developer notices an increase in the function throttle metrics in Amazon CloudWatch.

What are the MOST operationally efficient solutions to reduce the function throttling? (Select TWO.)

A.

Migrate the function to Amazon EKS.

B.

Increase the maximum age of events in Lambda.

C.

Increase the function’s reserved concurrency.

D.

Add the lambda:GetFunctionConcurrency action to the execution role.

E.

Request a service quota change for increased concurrency.

Full Access
Question # 159

A development team wants to build a continuous integration/continuous delivery (CI/CD) pipeline. The team is using AWS CodePipeline to automate the code build and deployment. The team wants to store the program code to prepare for the CI/CD pipeline.

Which AWS service should the team use to store the program code?

A.

AWS CodeDeploy

B.

AWS CodeArtifact

C.

AWS CodeCommit

D.

Amazon CodeGuru

Full Access
Question # 160

A development team is creating a serverless application that uses AWS Lambda functions. The team wants to streamline a testing workflow by sharing test events across multiple developers within the same AWS account. The team wants to ensure all developers can use consistent test events without compromising security.

A.

Export test events as JSON files. Store the files in an Amazon S3 bucket. Configure granular IAM permissions to allow the developers to access the S3 bucket.

B.

Store test events in an Amazon DynamoDB table. Create an AWS Lambda function to retrieve shared test events for the developers.

C.

Configure test events to be shareable. Configure granular IAM permissions to allow the developers to access shared test events.

D.

Set up a Git repository to store test events. Provide the developers with access to the repository.

Full Access
Question # 161

A developer is integrating Amazon ElastiCache in an application. The cache will store data from a database. The cached data must populate real-time dashboards. Which caching strategy will meet these requirements?

A.

A read-through cache

B.

A write-behind cache

C.

A lazy-loading cache

D.

A write-through cache

Full Access
Question # 162

A developer is reviewing an AWS Step Functions state machine to process files that are uploaded to an Amazon S3 bucket. The state machine is created by an AWS CloudFormation template. The state machine includes three sequential AWS Lambda functions. The state machine runs when new objects are uploaded to the S3 bucket. Full logging to Amazon CloudWatch and AWS X-Ray is enabled in the template.

When the developer reviews the state machine output, the developer sees that the logs include sensitive information. The developer must prevent the logs from storing sensitive information.

Which solution will meet this requirement?

A.

Update the StateMachine properties of the logging configuration in the CloudFormation template to Level: ERROR. Redeploy the template.

B.

Update the StateMachine properties of the logging configuration in the CloudFormation template to Level: FATAL. Redeploy the template.

C.

Update the StateMachine properties of the logging configuration in the CloudFormation template to IncludeExecutionData: false. Redeploy the template.

D.

Update the StateMachine properties of the tracing configuration in the CloudFormation template to Enabled: false. Redeploy the template.

Full Access
Question # 163

A company is creating a new feature for existing software. Before the company fully releases a new version of the software, the company wants to test the feature.

The company needs to gather feedback about the feature from a small group of users while the current software version remains deployed. If the testing validates the feature, the company needs to deploy the new software version to all other users at the same time.

Which deployment strategy will meet these requirements?

A.

All-at-once deployment

B.

Canary deployment

C.

In-place deployment

D.

Linear deployment

Full Access
Question # 164

A company is building a serverless application on AWS. The application uses Amazon API Gateway and AWS Lambda. The company wants to deploy the application to its development, test, and production environments.

Which solution will meet these requirements with the LEAST development effort?

A.

Use API Gateway stage variables and create Lambda aliases to reference environment-specific resources.

B.

Use Amazon ECS to deploy the application to the environments.

C.

Duplicate the code for each environment. Deploy the code to a separate API Gateway stage.

D.

Use AWS Elastic Beanstalk to deploy the application to the environments.

Full Access
Question # 165

A company maintains an application responsible for processing several thousand external callbacks each day. The company’s system administrators want to know how many callbacks are being received on a rolling basis, and they want this data available for 10 days.

The company also wants the ability to issue automated alerts if the number of callbacks exceeds the defined thresholds.

What is the MOST cost-effective way to address the need to track and alert on these statistics?

A.

Push callback data to an Amazon RDS database that can be queried to show historical data and to alert on exceeded thresholds.

B.

Push callback data to AWS X-Ray and use AWS Lambda to query, display, and alert on exceeded thresholds.

C.

Push callback data to Amazon Kinesis Data Streams and invoke an AWS Lambda function that stores data in Amazon DynamoDB and sends the required alerts.

D.

Push callback data to Amazon CloudWatch as a custom metric and use the CloudWatch alerting mechanisms to alert system administrators.

Full Access
Question # 166

A mobile app stores blog posts in an Amazon DynacnoDB table Millions of posts are added every day and each post represents a single item in the table. The mobile app requires only recent posts. Any post that is older than 48 hours can be removed.

What is the MOST cost-effective way to delete posts that are older man 48 hours?

A.

For each item add a new attribute of type String that has a timestamp that is set to the blog post creation time. Create a script to find old posts with a table scan and remove posts that are order than 48 hours by using the Balch Write ltem API operation. Schedule a cron job on an Amazon EC2 instance once an hour to start the script.

B.

For each item add a new attribute of type. String that has a timestamp that its set to the blog post creation time. Create a script to find old posts with a table scan and remove posts that are Oder than 48 hours by using the Batch Write item API operating. Place the script in a container image. Schedule an Amazon Elastic Container Service (Amazon ECS) task on AWS Far gate that invokes the container every 5 minutes.

C.

For each item, add a new attribute of type Date that has a timestamp that is set to 48 hours after the blog post creation time. Create a global secondary index (GSI) that uses the new attribute as a sort key. Create an AWS Lambda function that references the GSI and removes expired items by using the Batch Write item API operation Schedule me function with an Amazon CloudWatch event every minute.

D.

For each item add a new attribute of type. Number that has timestamp that is set to 48 hours after the blog post. creation time Configure the DynamoDB table with a TTL that references the new attribute.

Full Access
Question # 167

A company runs an analytics application that creates daily reports. The company stores the reports in an Amazon S3 bucket that has versioning enabled. The application stores several drafts of each report every day as S3 object versions before submitting a final report for the day.

The company needs a solution to delete draft reports that are older than 1 year. The company accesses draft reports frequently for the first month. After 1 month, the company accesses draft reports rarely during the next 11 months. Draft reports must be accessible within minutes.

Which solution will meet these requirements MOST cost-effectively?

A.

Add an expiration action for object versions that have been noncurrent for over 30 days. Add a noncurrent version transition action that uses a storage class of GLACIER_IR for object versions that have been noncurrent for over a year.

B.

Add an expiration action for versions that have been noncurrent for over 30 days. Add a noncurrent version transition action that uses a storage class of DEEP_ARCHIVE for objects that have been noncurrent for over a year.

C.

Add a noncurrent version transition action that uses a storage class of GLACIER_IR for objects that have been noncurrent for over 30 days. Add an expiration action for objects that have been noncurrent for more than 1 year.

D.

Add a noncurrent version transition action that uses a storage class of DEEP_ARCHIVE for objects that have been noncurrent for over 30 days. Add an expiration action for objects that have been noncurrent for more than 1 year.

Full Access
Question # 168

A company has an existing application that has hardcoded database credentials A developer needs to modify the existing application The application is deployed in two AWS Regions with an active-passive failover configuration to meet company’s disaster recovery strategy

The developer needs a solution to store the credentials outside the code. The solution must comply With the company ' s disaster recovery strategy

Which solution Will meet these requirements in the MOST secure way?

A.

Store the credentials in AWS Secrets Manager in the primary Region. Enable secret replication to the secondary Region Update the application to use the Amazon Resource Name (ARN) based on the Region.

B.

Store credentials in AWS Systems Manager Parameter Store in the primary Region. Enable parameter replication to the secondary Region. Update the application to use the Amazon Resource Name (ARN) based on the Region.

C.

Store credentials in a config file. Upload the config file to an S3 bucket in me primary Region. Enable Cross-Region Replication (CRR) to an S3 bucket in the secondary region. Update the application to access the config file from the S3 bucket based on the Region.

D.

Store credentials in a config file. Upload the config file to an Amazon Elastic File System (Amazon EFS) file system. Update the application to use the Amazon EFS file system Regional endpoints to access the config file in the primary and secondary Regions.

Full Access
Question # 169

A developer created reusable code that several AWS Lambda functions need to use. The developer bundled the code into a .zip archive. The developer needs to deploy the code to AWS and update the Lambda functions to use the code.

Which solution will meet this requirement in the MOST operationally efficient way?

A.

Upload the .zip archive to Amazon S3. Configure an import path on the Lambda functions to point to the .zip archive.

B.

Create a new Lambda function that contains and runs the shared code. Update the existing Lambda functions to invoke the new Lambda function synchronously.

C.

Create a Lambda layer that contains the .zip archive. Attach the Lambda layer to the Lambda functions.

D.

Create a Lambda container image that includes the shared code. Use the container image as a Lambda base image for all the functions.

Full Access
Question # 170

A developer writes an AWS Lambda function that processes new object uploads to an Amazon S3 bucket. The Lambda function runs for approximately 30 seconds. The function runs as expected under normal load conditions. Other Lambda functions in the AWS account also run as expected.

Occasionally, up to 500 new objects are written to the bucket every minute. Each new object write invokes the processing Lambda function during the high-volume periods through an event notification.

The developer must ensure that the processing function continues to run as expected during the high-volume periods.

Which solution will meet this requirement?

A.

Modify the function ' s timeout setting.

B.

Add an additional Lambda layer to optimize the code execution.

C.

Configure a reserved concurrency quota for the function.

D.

Decrease the function ' s memory allocation.

Full Access
Question # 171

A developer is building a web and mobile application and needs a solution to deploy the application code. The solution must be compatible with the developer ' s Git source control repository. When the developer adds a new branch, the solution must create a separate deployment.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Push the code to an Amazon ECR repository. Deploy the application on Amazon ECS. Set up a GitHub Actions workflow to create new branches.

B.

Use AWS Elastic Beanstalk to deploy the application. Create new branches by uploading the application’s source bundle code to create new application versions.

C.

Deploy the application code to an AWS Lambda function. Publish a new version of the Lambda function and point an alias to the new version. Create a new branch in GitHub that connects to the Lambda alias.

D.

Use AWS Amplify to deploy the application. Use feature branch deployments to connect and manage Git branches.

Full Access
Question # 172

A developer has an application that pushes files from an on-premises local server to an Amazon S3 bucket. The application uses an AWS access key and a secret key that are stored on the server for authentication. The application calls AWS STS to assume a role with access to perform the S3 PUT operation to upload the file.

The developer is migrating the server to an Amazon EC2 instance. The EC2 instance is configured with an IAM instance profile in the same AWS account that owns the S3 bucket.

What is the MOST secure solution for the developer to use to migrate the automation code?

A.

Remove the code that calls the STS AssumeRole operation. Use the same access key and secret key from the server to access the S3 bucket.

B.

Remove the access key and the secret key. Use the STS AssumeRole operation to add permissions to access the S3 bucket.

C.

Remove the access key, the secret key, and the code that calls the STS AssumeRole operation. Use an IAM instance profile role that grants access to the S3 bucket.

D.

Remove the access key, the secret key, and the code that calls the STS AssumeRole operation. Create a new access key and secret key. Use the new keys to access the S3 bucket.

Full Access
Question # 173

A developer is building an application on a fleet of Amazon EC2 Linux instances that run Apache web server. The application needs to send API calls that contain sensitive customer data to a second Linux fleet that also runs Apache within a peered VPC in the same AWS account and AWS Region as the original cluster. All sensitive data must be encrypted in transit. Instances in both fleets have Amazon EBS volumes attached.

Which solution will meet these requirements in the MOST operationally efficient way?

A.

Create a security group in each VPC that allows traffic only from the other fleet ' s security group. Assign each security group to the corresponding instances.

B.

Create an AWS Site-to-Site VPN connection between the two peered VPCs. Pass the sensitive data in the API calls through the Site-to-Site VPN connection.

C.

Create a customer managed key in AWS KMS to encrypt all EBS volumes. Create an IAM instance profile that has permission to use the customer managed key and attach the key to all instances in both fleets.

D.

Request a valid certificate through AWS Certificate Manager (ACM) and redeploy both fleets as AWS Nitro Enclaves. Use the ACM for Nitro Enclaves Amazon Machine Image (AMI) and specify the requested certificate for all instances.

Full Access
Question # 174

A company maintains a REST service using Amazon API Gateway and the API Gateway native API key validation. The company recently launched a new registration page, which allows users to sign up for the service. The registration page creates a new API key using CreateApiKey and sends the new key to the user. When the user attempts to call the API using this key. the user receives a 403 Forbidden error. Existing users are unaffected and can still call the API.

What code updates will grant these new users access to the API?

A.

The createDeploymer.t method must be called so the API can be redeployed to include the newly created API key.

B.

The updateAuthorizer method must be called to update the API ' s authorizer to include the newly created API key

C.

The importApiKeys method must be called to import all newly created API keys into the current stage of the API.

D.

The createUsagePlanKey method must be called to associate the newly created API key with the correct usage plan.

Full Access
Question # 175

A company is building a serverless application on AWS. The application uses an AWS Lambda function to process customer orders 24 hours a day, 7 days a week. The Lambda function calls an external vendor ' s HTTP API to process payments.

During load tests, a developer discovers that the external vendor payment processing API occasionally times out and returns errors. The company expects that some payment processing API calls will return errors.

The company wants the support team to receive notifications in near real time only when the payment processing external API error rate exceed 5% of the total number of transactions in an hour. Developers need to use an existing Amazon Simple Notification Service (Amazon SNS) topic that is configured to notify the support team.

Which solution will meet these requirements?

A.

Write the results of payment processing API calls to Amazon CloudWatch. Use Amazon CloudWatch Logs Insights to query the CloudWatch logs. Schedule the Lambda function to check the CloudWatch logs and notify the existing SNS topic.

B.

Publish custom metrics to CloudWatch that record the failures of the external payment processing API calls. Configure a CloudWatch alarm to notify the existing SNS topic when error rate exceeds the specified rate.

C.

Publish the results of the external payment processing API calls to a new Amazon SNS topic. Subscribe the support team members to the new SNS topic.

D.

Write the results of the external payment processing API calls to Amazon S3. Schedule an Amazon Athena query to run at regular intervals. Configure Athena to send notifications to the existing SNS topic when the error rate exceeds the specified rate.

Full Access
Question # 176

A developer needs to troubleshoot an AWS Lambda function in a development environment. The Lambda function is configured in VPC mode and needs to connect to an existing Amazon RDS for SOL Server DB instance. The DB instance is deployed in a private subnet and accepts connections by using port 1433.

When the developer tests the function, the function reports an error when it tries to connect to the database.

Which combination of steps should the developer take to diagnose this issue? (Select TWO.)

A.

Check that the function ' s security group has outbound access on port 1433 to the DB instance ' s security group. Check that the DB instance ' s security group has inbound access on port 1433 from the function ' s security group.

B.

Check that the function ' s security group has Inbound access on port 1433 from the DB Instance ' s security group. Check that the DB instance ' s security group has outbound access on port 1433 to the function ' s security group.

C.

Check that the VPC is set up for a NAT gateway. Check that the DB instance has the public access option turned on.

D.

Check that the function ' s execution role permissions include rds:DescribeDBInstances, rds: ModifyDB Instance, and rds:DescribeDBSecurityGroups for the DB instance.

E.

Check that the function ' s execution rote permissions include ec2: CreateNetworklnterface. ec2: DescribeNetworklnterfaces. and ec2: DeleteNetworklnterface.

Full Access
Question # 177

A company has an AWS Step Functions state machine named myStateMachine. The company configured a service role for Step Functions. The developer must ensure that only the myStateMachine state machine can assume the service role.

Which statement should the developer add to the trust policy to meet this requirement?

A.

" Condition " : { " ArnLike " : { " aws:SourceArn " : " urn:aws:states:ap-south-1:111111111111:stateMachine:myStateMachine " } }

B.

" Condition " : { " ArnLike " : { " aws:SourceArn " : " arn:aws:states:ap-south-1:*:stateMachine:myStateMachine " } }

C.

" Condition " : { " StringEquals " : { " aws:SourceAccount " : " 111111111111 " } }

D.

" Condition " : { " StringNotEquals " : { " aws:SourceArn " : " arn:aws:states:ap-south-1:111111111111:stateMachine:myStateMachine " } }

Full Access
Question # 178

A developer warns to add request validation to a production environment Amazon API Gateway API. The developer needs to test the changes before the API is deployed to the production environment. For the lest the developer will send test requests to the API through a testing tool.

Which solution will meet these requirements with the LEAST operational overhead?

A.

Export the existing API to an OpenAPI file. Create a new API Import the OpenAPI file Modify the new API to add request validation. Perform the tests Modify the existing API to add request validation. Deploy the existing API to production.

B.

Modify the existing API to add request validation. Deploy the updated API to a new API Gateway stage Perform the tests Deploy the updated API to the API Gateway production stage.

C.

Create a new API Add the necessary resources and methods including new request validation. Perform the tests Modify the existing API to add request validation. Deploy the existing API to production.

D.

Clone the exiting API Modify the new API lo add request validation. Perform the tests Modify the existing API to add request validation Deploy the existing API to production.

Full Access
Question # 179

A team of developed is using an AWS CodePipeline pipeline as a continuous integration and continuous delivery (CI/CD) mechanism for a web application. A developer has written unit tests to programmatically test the functionality of the application code. The unit tests produce a test report that shows the results of each individual check. The developer now wants to run these tests automatically during the CI/CD process.

A.

Write a Git pre-commit hook that runs the test before every commit. Ensure that each developer who is working on the project has the pre-commit hook instated locally. Review the test report and resolve any issues before pushing changes to AWS CodeCommit.

B.

Add a new stage to the pipeline. Use AWS CodeBuild as the provider. Add the new stage after the stage that deploys code revisions to the test environment. Write a buildspec that fails the CodeBuild stage if any test does not pass. Use the test reports feature of Codebuild to integrate the report with the CodoBuild console. View the test results in CodeBuild Resolve any issues.

C.

Add a new stage to the pipeline. Use AWS CodeBuild at the provider. Add the new stage before the stage that deploys code revisions to the test environment. Write a buildspec that fails the CodeBuild stage it any test does not pass. Use the test reports feature of CodeBuild to integrate the report with the CodeBuild console. View the test results in codeBuild Resolve any issues.

D.

Add a new stage to the pipeline. Use Jenkins as the provider. Configure CodePipeline to use Jenkins to run the unit tests. Write a Jenkinsfile that fails the stage if any test does not pass. Use the test report plugin for Jenkins to integrate the repot with the Jenkins dashboard. View the test results in Jenkins. Resolve any issues.

Full Access
Question # 180

A developer has an application that stores data in an Amazon S3 bucket. The application uses an HTTP API to store and retrieve objects. When the PutObject API operation adds objects to the S3 bucket the developer must encrypt these objects at rest by using server-side encryption with Amazon S3 managed keys (SSE-S3).

Which solution will meet this requirement?

A.

Create an AWS Key Management Service (AWS KMS) key. Assign the KMS key to the S3 bucket.

B.

Set the x-amz-server-side-encryption header when invoking the PutObject API operation.

C.

Provide the encryption key in the HTTP header of every request.

D.

Apply TLS to encrypt the traffic to the S3 bucket.

Full Access