ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











Company C is currently hosting their corporate site in an Amazon S3 bucket with Static Website Hosting enabled. Currently, when visitors go to http://www.companyc.com the index.html page is returned. Company C now would like a new page welcome.html to be returned when a visitor enters http://www.companyc.com in the browser.

Which of the following steps will allow Company C to meet this requirement? Choose 2 answers

A.
Upload an html page named welcome.html to their S3 bucket
A.
Upload an html page named welcome.html to their S3 bucket
Answers
B.
Create a welcome subfolder in their S3 bucket
B.
Create a welcome subfolder in their S3 bucket
Answers
C.
Set the Index Document property to welcome.html
C.
Set the Index Document property to welcome.html
Answers
D.
Move the index.html page to a welcome subfolder
D.
Move the index.html page to a welcome subfolder
Answers
E.
Set the Error Document property to welcome.html
E.
Set the Error Document property to welcome.html
Answers
Suggested answer: A, C

Explanation:

https://docs.aws.amazon.com/AmazonS3/latest/dev/WebsiteHosting.html

https://docs.aws.amazon.com/AmazonS3/latest/dev/HostingWebsiteOnS3Setup.html

What type of block cipher does Amazon S3 offer for server side encryption?

A.
Triple DES
A.
Triple DES
Answers
B.
Advanced Encryption Standard
B.
Advanced Encryption Standard
Answers
C.
Blowfish
C.
Blowfish
Answers
D.
RC5
D.
RC5
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html

If an application is storing hourly log files from thousands of instances from a high traffic web site, which naming scheme would give optimal performance on S3?

A.
Sequential
A.
Sequential
Answers
B.
instanceID_log-HH-DD-MM-YYYY
B.
instanceID_log-HH-DD-MM-YYYY
Answers
C.
instanceID_log-YYYY-MM-DD-HH
C.
instanceID_log-YYYY-MM-DD-HH
Answers
D.
HH-DD-MM-YYYY-log_instanceID
D.
HH-DD-MM-YYYY-log_instanceID
Answers
E.
YYYY-MM-DD-HH-log_instanceID
E.
YYYY-MM-DD-HH-log_instanceID
Answers
Suggested answer: B

Explanation:

Reference: https://acloud.guru/forums/aws-certified-developer-associate/discussion/-KU2dEtJb-LI5lSbH_S4/if-an-application-is-storing-hourly-log-files-from-thousands-of-instances-from-a

Which of the following statements about SQS is true?

A.
Messages will be delivered exactly once and messages will be delivered in First in, First out order
A.
Messages will be delivered exactly once and messages will be delivered in First in, First out order
Answers
B.
Messages will be delivered exactly once and message delivery order is indeterminate
B.
Messages will be delivered exactly once and message delivery order is indeterminate
Answers
C.
Messages will be delivered one or more times and messages will be delivered in First in, First out order
C.
Messages will be delivered one or more times and messages will be delivered in First in, First out order
Answers
D.
Messages will be delivered one or more times and message delivery order is indeterminate
D.
Messages will be delivered one or more times and message delivery order is indeterminate
Answers
Suggested answer: D

Explanation:

https://aws.amazon.com/sqs/features/

A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in users can only access an S3 keyspace specific to the user.

Which two approaches can satisfy the objectives? Choose 2 answers

A.
The application authenticates against LDAP. The application then calls the IAM Security Service to login to IAM using the LDAP credentials. The application can use the IAM temporary credentials to access the appropriate S3 bucket.
A.
The application authenticates against LDAP. The application then calls the IAM Security Service to login to IAM using the LDAP credentials. The application can use the IAM temporary credentials to access the appropriate S3 bucket.
Answers
B.
The application authenticates against LDAP, and retrieves the name of an IAM role associated with the user. The application then calls the IAM Security Token Service to assume that IAM Role. The application can use the temporary credentials to access the appropriate S3 bucket.
B.
The application authenticates against LDAP, and retrieves the name of an IAM role associated with the user. The application then calls the IAM Security Token Service to assume that IAM Role. The application can use the temporary credentials to access the appropriate S3 bucket.
Answers
C.
The application authenticates against IAM Security Token Service using the LDAP credentials. The application uses those temporary AWS security credentials to access the appropriate S3 bucket.
C.
The application authenticates against IAM Security Token Service using the LDAP credentials. The application uses those temporary AWS security credentials to access the appropriate S3 bucket.
Answers
D.
Develop an identity broker which authenticates against LDAP, and then calls IAM Security Token Service to get IAM federated user credentials. The application calls the identity broker to get IAM federated user credentials with access to the appropriate S3 bucket.
D.
Develop an identity broker which authenticates against LDAP, and then calls IAM Security Token Service to get IAM federated user credentials. The application calls the identity broker to get IAM federated user credentials with access to the appropriate S3 bucket.
Answers
E.
Develop an identity broker which authenticates against IAM Security Token Service to assume an IAM Role to get temporary AWS security credentials. The application calls the identity broker to get AWS temporary security credentials with access to the appropriate S3 bucket.
E.
Develop an identity broker which authenticates against IAM Security Token Service to assume an IAM Role to get temporary AWS security credentials. The application calls the identity broker to get AWS temporary security credentials with access to the appropriate S3 bucket.
Answers
Suggested answer: B, D

Explanation:

https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_request.html

Company B provides an online image recognition service and utilizes SQS to decouple system components for scalability The SQS consumers poll the imaging queue as often as possible to keep end-to-end throughput as high as possible. However, Company B is realizing that polling in tight loops is burning CPU cycles and increasing costs with empty responses. How can Company B reduce the number of empty responses?

A.
Set the imaging queue visibility Timeout attribute to 20 seconds
A.
Set the imaging queue visibility Timeout attribute to 20 seconds
Answers
B.
Set the Imaging queue ReceiveMessageWaitTimeSeconds attribute to 20 seconds
B.
Set the Imaging queue ReceiveMessageWaitTimeSeconds attribute to 20 seconds
Answers
C.
Set the imaging queue MessageRetentionPeriod attribute to 20 seconds
C.
Set the imaging queue MessageRetentionPeriod attribute to 20 seconds
Answers
D.
Set the DelaySeconds parameter of a message to 20 seconds
D.
Set the DelaySeconds parameter of a message to 20 seconds
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-short-andlong-polling.html

An Amazon S3 bucket, "myawsbucket” is configured with website hosting in Tokyo region, what is the region-specific website endpoint?

A.
www.myawsbucket.ap-northeast-1.amazonaws.com
A.
www.myawsbucket.ap-northeast-1.amazonaws.com
Answers
B.
myawsbucket.s3-website-ap-northeast-1.amazonawscom
B.
myawsbucket.s3-website-ap-northeast-1.amazonawscom
Answers
C.
myawsbucket.amazonaws.com
C.
myawsbucket.amazonaws.com
Answers
D.
myawsbucket.tokyo.amazonaws.com
D.
myawsbucket.tokyo.amazonaws.com
Answers
Suggested answer: B

Explanation:

Depending on your Region, your Amazon S3 website endpoint follows one of these two formats. s3-website dash (-) Region - http://bucket-name.s3-website-Region.amazonaws.com s3-website dot (.) Region - http://bucket-name.s3- website.Region.amazonaws.com

https://docs.aws.amazon.com/AmazonS3/latest/dev/WebsiteEndpoints.html

You are inserting 1000 new items every second in a DynamoDB table. Once an hour these items are analyzed and then are no longer needed. You need to minimize provisioned throughput, storage, and API calls. Given these requirements, what is the most efficient way to manage these Items after the analysis?

A.
Retain the items in a single table
A.
Retain the items in a single table
Answers
B.
Delete items individually over a 24 hour period
B.
Delete items individually over a 24 hour period
Answers
C.
Delete the table and create a new table per hour
C.
Delete the table and create a new table per hour
Answers
D.
Create a new table per hour
D.
Create a new table per hour
Answers
Suggested answer: C

You have written an application that uses the Elastic Load Balancing service to spread traffic to several web servers. Your users complain that they are sometimes forced to login again in the middle of using your application, after they have already logged in. This is not behavior you have designed.

What is a possible solution to prevent this happening?

A.
Use instance memory to save session state.
A.
Use instance memory to save session state.
Answers
B.
Use instance storage to save session state.
B.
Use instance storage to save session state.
Answers
C.
Use EBS to save session state
C.
Use EBS to save session state
Answers
D.
Use ElastiCache to save session state.
D.
Use ElastiCache to save session state.
Answers
E.
Use Glacier to save session slate.
E.
Use Glacier to save session slate.
Answers
Suggested answer: D

Explanation:

https://aws.amazon.com/caching/session-management/

You run an ad-supported photo sharing website using S3 to serve photos to visitors of your site. At some point you find out that other sites have been linking to the photos on your site, causing loss to your business. What is an effective method to mitigate this?

A.
Store photos on an EBS volume of the web server
A.
Store photos on an EBS volume of the web server
Answers
B.
Remove public read access and use signed URLs with expiry dates.
B.
Remove public read access and use signed URLs with expiry dates.
Answers
C.
Use CloudFront distributions for static content.
C.
Use CloudFront distributions for static content.
Answers
D.
Block the IPs of the offending websites in Security Groups.
D.
Block the IPs of the offending websites in Security Groups.
Answers
Suggested answer: B

Explanation:

https://aws.amazon.com/getting-started/projects/building-fast-session-caching-with-amazonelasticache-for-redis/1/

Total 608 questions
Go to page: of 61