ExamGecko
Home Home / Amazon / CLF-C01

Amazon CLF-C01 Practice Test - Questions Answers, Page 58

Question list
Search
Search

List of questions

Search

Related questions











A developer uses a single AWS CloudFormation template to configure the test environment and the production environment for an application The developer handles environment-specific requirements in the CloudFormation template. The developer decides to update the Amazon EC2 Auto Scaling launch template with new Amazon Machine Images (AMIs) for each environment The CloudFormation update for the new AMIs is successful in the test environment but the update fails in the production environment.

What are the possible causes of the CloudFormation update failure in the production environment?

(Select TWO )

A.
The new AMIs do not fulfill the specified conditions in the CloudFormation template
A.
The new AMIs do not fulfill the specified conditions in the CloudFormation template
Answers
B.
The service quota for the number of EC2 vCPUs in the AWS Region has been exceeded. .
B.
The service quota for the number of EC2 vCPUs in the AWS Region has been exceeded. .
Answers
C.
The security group that is specified in the CloudFormation template does not exist
C.
The security group that is specified in the CloudFormation template does not exist
Answers
D.
CloudFormation does not recognize the template change as an update
D.
CloudFormation does not recognize the template change as an update
Answers
E.
CloudFormation does not have sufficient 1AM permissions to make the changewww.VCEplus.is o
E.
CloudFormation does not have sufficient 1AM permissions to make the changewww.VCEplus.is o
Answers
Suggested answer: A, B

Given the source code for an AWS Lambda function in the local file store, py containing a handler function called get_store and the following AWS CloudFormation template:

What should be done to prepare the template so that it can be deployed using the AWS CLI command aws cloudforroation deploy?

A.
Use aws cloudformacion compile to base64 encode and embed the source file into a modified CloudFormation template.
A.
Use aws cloudformacion compile to base64 encode and embed the source file into a modified CloudFormation template.
Answers
B.
Use aws cloudformacion package to upload the source code to an Amazon S3 bucket and produce a modified CloudFormation template
B.
Use aws cloudformacion package to upload the source code to an Amazon S3 bucket and produce a modified CloudFormation template
Answers
C.
Use aws lambda zip to package the source file together with the CloudFormation template and deploy the resulting zip archive
C.
Use aws lambda zip to package the source file together with the CloudFormation template and deploy the resulting zip archive
Answers
D.
Use aws serveriess create-package to embed the source file directly into the existing CloudFormation template
D.
Use aws serveriess create-package to embed the source file directly into the existing CloudFormation template
Answers
Suggested answer: B

A developer has a legacy application that is hosted on-premises Other applications hosted on AWS depend on the on-premises application for proper functioning In case of any application errors, the developer wants to be able to use Amazon CloudWatch to monitor and troubleshoot all applications from one place. How can the developer accomplish this?

A.
Install an AWS SDK on the on-premises server to automatically send logs to CloudWatch.
A.
Install an AWS SDK on the on-premises server to automatically send logs to CloudWatch.
Answers
B.
Download the CloudWatch agent to the on-premises server Configure the agent to use I AM user credentials with permissions for CloudWatch
B.
Download the CloudWatch agent to the on-premises server Configure the agent to use I AM user credentials with permissions for CloudWatch
Answers
C.
Upload log files from the on-premises server to Amazon S3 and have CloudWatch read the files.
C.
Upload log files from the on-premises server to Amazon S3 and have CloudWatch read the files.
Answers
D.
Upload log files from the on-premises server to an Amazon EC2 instance and have the instance forward the logs to CloudWatch
D.
Upload log files from the on-premises server to an Amazon EC2 instance and have the instance forward the logs to CloudWatch
Answers
Suggested answer: B

A developer is building a serverless application that is based on AWS Lambd a. The developer initializes the AWS software development kit (SDK) outside of the Lambda handler function. What is the PRIMARY benefit of this action?

A.
Improves legibility and stylistic convention
A.
Improves legibility and stylistic convention
Answers
B.
Takes advantage of runtime environment reuse
B.
Takes advantage of runtime environment reuse
Answers
C.
Provides better error handling
C.
Provides better error handling
Answers
D.
Creates a new SDK instance for each invocation
D.
Creates a new SDK instance for each invocation
Answers
Suggested answer: B

A company has an application where reading objects from Amazon S3 is based on the type of user.

The user types are registered user and guest user. The company has 25.000 users and is growing.

Information is pulled from an S3 bucket depending on the user type.

Which approaches are recommended to provide access to both user types? (Select TWO.)

A.
Provide a different access key and secret access key in the application code for registered users and guest users to provide read access to the objects.
A.
Provide a different access key and secret access key in the application code for registered users and guest users to provide read access to the objects.
Answers
B.
Use S3 bucket policies to restrict read access to specific IAM users
B.
Use S3 bucket policies to restrict read access to specific IAM users
Answers
C.
Use Amazon Cognito to provide access using authenticated and unauthenticated roles
C.
Use Amazon Cognito to provide access using authenticated and unauthenticated roles
Answers
D.
Create a new 1AM user for each user and grant read access
D.
Create a new 1AM user for each user and grant read access
Answers
E.
Use the AWS 1AM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) AssumeRole action depending on the type of user and provide read access to Amazon S3 using theassumed role.
E.
Use the AWS 1AM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) AssumeRole action depending on the type of user and provide read access to Amazon S3 using theassumed role.
Answers
Suggested answer: C, E

A developer must extend an existing application that is based on the AWS Serverless Application Model (AWS SAM) The developer has used the AWS SAM CLI to create the project. The project contains different AWS Lambda functions. Which combination of commands must the developer use to redeploy the AWS SAM application?

(Select TWO.)

A.
sam mit
A.
sam mit
Answers
B.
sam validate
B.
sam validate
Answers
C.
sam build
C.
sam build
Answers
D.
sam deploy
D.
sam deploy
Answers
E.
sam publish
E.
sam publish
Answers
Suggested answer: C, D

A company created an application to consume and process dat a. The application uses Amazon Simple Queue Service (Amazon SQS) and AWS Lambda functions.

The application is currently working as expected, but it occasionally receives several messages that it cannot process properly The company needs to clear these messages to prevent the queue from becoming blocked A developer must implement a solution that makes queue processing always operational. The solution must give the company the ability to defer the messages with errors and save these messages for further analysis What is the MOST operationally efficient solution that meets these requirements?

A.
Configure Amazon CloudWatch Logs to save the error messages to a separate log stream
A.
Configure Amazon CloudWatch Logs to save the error messages to a separate log stream
Answers
B.
Create a new SQS queue. Set the new queue as a dead-letter queue for the application queue Configure the Maximum Receives setting.
B.
Create a new SQS queue. Set the new queue as a dead-letter queue for the application queue Configure the Maximum Receives setting.
Answers
C.
Change the SQS queue to a FIFO queue Configure the message retention penod to 0 seconds
C.
Change the SQS queue to a FIFO queue Configure the message retention penod to 0 seconds
Answers
D.
Configure an Amazon CloudWatch alarm for Lambda function errors Publish messages to an Amazon Simple Notification Service (Amazon SNS) topic to notify administrator users
D.
Configure an Amazon CloudWatch alarm for Lambda function errors Publish messages to an Amazon Simple Notification Service (Amazon SNS) topic to notify administrator users
Answers
Suggested answer: B

A company is using Amazon RDS as the backend database for its application After a recent marketing campaign, a surge of read requests to the database increased the latency of data retrieval from the database. The company has decided to implement a caching layer in front of the database. The cached content must be encrypted and must be highly available Which solution will meet these requirements?

A.
Amazon CloudFront
A.
Amazon CloudFront
Answers
B.
Amazon ElastiCache for Memcached
B.
Amazon ElastiCache for Memcached
Answers
C.
Amazon ElastiCache for Redis in cluster mode
C.
Amazon ElastiCache for Redis in cluster mode
Answers
D.
Amazon DynamoDB Accelerator (DAX)
D.
Amazon DynamoDB Accelerator (DAX)
Answers
Suggested answer: C

A developer needs to create an application that supports Security Assertion Markup Language (SAML) and authentication with social media providers. It must also allow access to AWS services such as Amazon DynamoDB. Which AWS service or feature will meet these requirements with the LEAST amount of additional coding?

A.
AWS AppSync
A.
AWS AppSync
Answers
B.
Amazon Cognito identrtv pools
B.
Amazon Cognito identrtv pools
Answers
C.
Amazon Cognito user pools
C.
Amazon Cognito user pools
Answers
D.
Amazon Lambda@Edge
D.
Amazon Lambda@Edge
Answers
Suggested answer: B

An application running on Amazon EC2 opens connections to an Amazon RDS SQL Server database The developer does not want to store the user name and password for the database in the code. The developer would also like to automatically rotate the credentials.

What is the MOST secure way to store and access the database credentials?

A.
Create an IAM role that has permissions to access the database Attach the role to the EC2 instance
A.
Create an IAM role that has permissions to access the database Attach the role to the EC2 instance
Answers
B.
Use AWS Secrets Manager to store the credentials Retrieve the credentials from Secrets Manager as needed
B.
Use AWS Secrets Manager to store the credentials Retrieve the credentials from Secrets Manager as needed
Answers
C.
Store the credentials in an encrypted text file in an Amazon S3 bucket Configure the EC2 instance's user data to download the credentials from Amazon S3 as the instance boots.
C.
Store the credentials in an encrypted text file in an Amazon S3 bucket Configure the EC2 instance's user data to download the credentials from Amazon S3 as the instance boots.
Answers
D.
Store the user name and password credentials directly in the source code No further action is needed because the source code is stored in a private repository
D.
Store the user name and password credentials directly in the source code No further action is needed because the source code is stored in a private repository
Answers
Suggested answer: B
Total 944 questions
Go to page: of 95