ExamGecko
Home Home / Amazon / CLF-C01

Amazon CLF-C01 Practice Test - Questions Answers, Page 62

Question list
Search
Search

List of questions

Search

Related questions











A developer has created an AWS Lambda function lo provide notification through Amazon Simple Notification Service (Amazon SNS) whenever a file is uploaded to Amazon S3 that is larger than 50 MB The developer has deployed and tested the Lambda function by using the CI I However, when the event notification is added to the S3 bucket and a 3.000 MB file is uploaded, the Lambda function does not launch Which of the following is a possible reason for the Lambda function's inability to launch?

A.
The S3 event notification does not activate for files that are larger than 1.000 MB
A.
The S3 event notification does not activate for files that are larger than 1.000 MB
Answers
B.
The resource based policy for the Lambda function does not have the required permissions to be invoked by Amazon S3
B.
The resource based policy for the Lambda function does not have the required permissions to be invoked by Amazon S3
Answers
C.
Lambda functions cannot be invoked directly from an S3 event.
C.
Lambda functions cannot be invoked directly from an S3 event.
Answers
D.
The S3 bucket needs to be made public
D.
The S3 bucket needs to be made public
Answers
Suggested answer: B

An ecommerce application is running behind an Application Load Balancer. A developer observes some unexpected load on the application during non-peak hours. The developer wants to analyze patterns for the client IP addresses that use the application Which HTTP header should the developer use for this analysis?

A.
The X-Forwarded-Proto header
A.
The X-Forwarded-Proto header
Answers
B.
The X-Forwarded-Host header
B.
The X-Forwarded-Host header
Answers
C.
The X Forwarded For header
C.
The X Forwarded For header
Answers
D.
The X-Forwarded-Port header
D.
The X-Forwarded-Port header
Answers
Suggested answer: C

A company is running a web application that is using Amazon Cognito for authentication The company does not want to use multi-factor authentication (MFA) for all the visitors every time, but the company's security team has concerns about compromised credentials The development team needs to configure mandatory MFA only when suspicious sign in attempts are detected. Which Amazon Cognito feature will meet these requirements?

A.
Short message service (SMS) text message MFA
A.
Short message service (SMS) text message MFA
Answers
B.
Advanced security metrics
B.
Advanced security metrics
Answers
C.
Time-based one-time password (TOTP) software token MFA
C.
Time-based one-time password (TOTP) software token MFA
Answers
D.
Adaptive authentication
D.
Adaptive authentication
Answers
Suggested answer: D

An application is using Amazon DynamoDB as its data store, and should be able to read 100 items per second as strongly consistent reads Each item is 5 KB in size. To what value should the table's provisioned read throughput be set?

A.
50 read capacity units
A.
50 read capacity units
Answers
B.
100 read capacity units
B.
100 read capacity units
Answers
C.
200 read capacity units
C.
200 read capacity units
Answers
D.
500 read capacity units
D.
500 read capacity units
Answers
Suggested answer: C

A developer is receiving kttp 400 : ThrorclingExceprion errors intermittently when calling the Amazon CloudWatch API. When a call (ails, no data is retrieved What best practice should first be applied to address this issue?

A.
Contact AWS Support for a limit increase.
A.
Contact AWS Support for a limit increase.
Answers
B.
Use the AWS CLI to get the metrics
B.
Use the AWS CLI to get the metrics
Answers
C.
Analyze the applications and remove the API call
C.
Analyze the applications and remove the API call
Answers
D.
Retry the call with exponential backoff
D.
Retry the call with exponential backoff
Answers
Suggested answer: D

A developer needs to build and deploy a serverless application that has an API that mobile clients will use. The API will use Amazon DynamoDB and Amazon OpenSearch Service (Amazon Elasticsearch Service) as data sources Responses that are sent to the clients will contain aggregated data from both data sources The developer must minimize the number of API endpoints and must minimize the number of API calls that are required to retrieve the necessary data Which solution should the developer use to meet these requirements?

A.
GraphQI. API on AWS AppSync
A.
GraphQI. API on AWS AppSync
Answers
B.
REST API on Amazon API Gateway
B.
REST API on Amazon API Gateway
Answers
C.
GraphGL API on an Amazon EC2 instance
C.
GraphGL API on an Amazon EC2 instance
Answers
D.
REST API on AWS Elastic Beanstalk
D.
REST API on AWS Elastic Beanstalk
Answers
Suggested answer: B

A company wants to migrate an existing on-premises web application to AWS. The existing technology stacks consist of configuration files, application code that connects to a MySQL database by using a language-specific MySQL API, and a source code repository that holds configuration files and program code A developer uses an Amazon RDS for MySQL DB instance as the target database The developer uses a container as the compute engine for the web application program code The developer wants to configure the database connection from the web application code to the new RDS for MySQL DB instance without refactoring the existing code The developer also must maximize security for the storage of the database user name and password pair that the application code uses Which combination of steps should the developer take to meet these requirements? (Select TWO )

A.
Use the RDS software development kit (SDK) to construct a database client.
A.
Use the RDS software development kit (SDK) to construct a database client.
Answers
B.
Keep the existing database connectivity API code unchanged Change the database connection string URL to the endpoint of the RDS for MySQL DB instance
B.
Keep the existing database connectivity API code unchanged Change the database connection string URL to the endpoint of the RDS for MySQL DB instance
Answers
C.
Store the database's user name and password pair in the configuration files
C.
Store the database's user name and password pair in the configuration files
Answers
D.
Use AWS Secrets Manager to store the database's user name and password pair Use the GetSecretValue API operation to retrieve the user name and password pair when the application makes MySQL DB API calls
D.
Use AWS Secrets Manager to store the database's user name and password pair Use the GetSecretValue API operation to retrieve the user name and password pair when the application makes MySQL DB API calls
Answers
E.
Use the environment variables of the container definition to pass the database's user name and password pair to the application code
E.
Use the environment variables of the container definition to pass the database's user name and password pair to the application code
Answers
Suggested answer: B, D

Which of the following security resources are supplied by AWS? (Select TWO.)

A.
Trusted Advisor checks
A.
Trusted Advisor checks
Answers
B.
Service intrusion metrics
B.
Service intrusion metrics
Answers
C.
Penetration testing
C.
Penetration testing
Answers
D.
Educational webinars
D.
Educational webinars
Answers
E.
Peer-to-peer file-sharing detection
E.
Peer-to-peer file-sharing detection
Answers
Suggested answer: A, C

A retail company is migrating its IT infrastructure applications from on premises to the AWS Cloud.

Which costs will the company eliminate with this migration? (Select TWO.)

A.
Cost of data center operations
A.
Cost of data center operations
Answers
B.
Cost of application licensing
B.
Cost of application licensing
Answers
C.
Cost of marketing campaigns
C.
Cost of marketing campaigns
Answers
D.
Cost of physical server hardware
D.
Cost of physical server hardware
Answers
E.
Cost of network management
E.
Cost of network management
Answers
Suggested answer: A, D

Explanation:

Explanation:

Which AWS services can use AWS WAF to protect against common web exploitations? (Select TWO.)

A.
Amazon Route 53
A.
Amazon Route 53
Answers
B.
Amazon CloudFront
B.
Amazon CloudFront
Answers
C.
AWS Transfer Family
C.
AWS Transfer Family
Answers
D.
AWS Site-to-Site VPN
D.
AWS Site-to-Site VPN
Answers
E.
Amazon API Gateway
E.
Amazon API Gateway
Answers
Suggested answer: B, E

Explanation:

Explanation:

AWS WAF can be deployed on Amazon CloudFront, the Application Load Balancer (ALB), Amazon API Gateway, and AWS AppSync. As part of Amazon CloudFront it can be part of your Content Distribution Network (CDN) protecting your resources and content at the Edge locations.

Total 944 questions
Go to page: of 95