ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











A Developer wants to find a list of items in a global secondary index from an Amazon DynamoDB table. Which DynamoDB API call can the Developer use in order to consume the LEAST number of read capacity units?

A.
Scan operation using eventually-consistent reads
A.
Scan operation using eventually-consistent reads
Answers
B.
Query operation using strongly-consistent reads
B.
Query operation using strongly-consistent reads
Answers
C.
Query operation using eventually-consistent reads
C.
Query operation using eventually-consistent reads
Answers
D.
Scan operation using strongly-consistent reads
D.
Scan operation using strongly-consistent reads
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/bp-query-scan.html

An AWS Lambda function generates a 3MB JSON file and then uploads it to an Amazon S3 bucket daily. The file contains sensitive information, so the Developer must ensure that it is encrypted before uploading to the bucket. Which of the following modifications should the Developer make to ensure that the data is encrypted before uploading it to the bucket?

A.
Use the default AWS KMS customer master key for S3 in the Lambda function code.
A.
Use the default AWS KMS customer master key for S3 in the Lambda function code.
Answers
B.
Use the S3 managed key and call the GenerateDataKey API to encrypt the file.
B.
Use the S3 managed key and call the GenerateDataKey API to encrypt the file.
Answers
C.
Use the GenerateDateKey API, then use that data key to encrypt the file in the Lambda function code.
C.
Use the GenerateDateKey API, then use that data key to encrypt the file in the Lambda function code.
Answers
D.
Use a custom KMS customer master key created for S3 in the Lambda function code.
D.
Use a custom KMS customer master key created for S3 in the Lambda function code.
Answers
Suggested answer: C

A company needs to secure its existing website running behind an Elastic Load Balancer. The website’s Amazon EC2 instances are CPU-constrained. What should be done to secure the website while not increasing the CPU load on the EC2 web servers? (Select TWO.)

A.
Configure an Elastic Load Balancer with SSL pass-through.
A.
Configure an Elastic Load Balancer with SSL pass-through.
Answers
B.
Configure SSL certificates on an Elastic Load Balancer.
B.
Configure SSL certificates on an Elastic Load Balancer.
Answers
C.
Configure an Elastic Load Balancer with a Loadable Storage System.
C.
Configure an Elastic Load Balancer with a Loadable Storage System.
Answers
D.
Install SSL certificates on the EC2 instances.
D.
Install SSL certificates on the EC2 instances.
Answers
E.
Configure an Elastic Load Balancer with SSL termination.
E.
Configure an Elastic Load Balancer with SSL termination.
Answers
Suggested answer: B, E

How should custom libraries be utilized in AWS Lambda?

A.
Host the library on Amazon S3 and reference to it from the Lambda function.
A.
Host the library on Amazon S3 and reference to it from the Lambda function.
Answers
B.
Install the library locally and upload a ZIP file of the Lambda function.
B.
Install the library locally and upload a ZIP file of the Lambda function.
Answers
C.
Import the necessary Lambda blueprint when creating the function.
C.
Import the necessary Lambda blueprint when creating the function.
Answers
D.
Modify the function runtime to include the necessary library.
D.
Modify the function runtime to include the necessary library.
Answers
Suggested answer: D

Explanation:

Explanation:

Reference: https://docs.aws.amazon.com/lambda/latest/dg/env_variables.html

In a move toward using microservices, a company’s Management team has asked all Development teams to build their services so that API requests depend only on that service’s data store. One team is building a Payments service which has its own database; the service needs data that originates in the Accounts database. Both are using Amazon DynamoDB. What approach will result in the simplest, decoupled, and reliable method to get near-real time updates from the Accounts database?

A.
Use Amazon Glue to perform frequent ETL updates from the Accounts database to the Payments database.
A.
Use Amazon Glue to perform frequent ETL updates from the Accounts database to the Payments database.
Answers
B.
Use Amazon ElastiCache in Payments, with the cache updated by triggers in the Accounts database.
B.
Use Amazon ElastiCache in Payments, with the cache updated by triggers in the Accounts database.
Answers
C.
Use Amazon Kinesis Data Firehouse to deliver all changes from the Accounts database to the Payments database.
C.
Use Amazon Kinesis Data Firehouse to deliver all changes from the Accounts database to the Payments database.
Answers
D.
Use Amazon DynamoDB Streams to deliver all changes from the Accounts database to the Payments database.
D.
Use Amazon DynamoDB Streams to deliver all changes from the Accounts database to the Payments database.
Answers
Suggested answer: D

Explanation:

Explanation:

Reference: https://aws.amazon.com/blogs/database/how-to-perform-ordered-data-replicationbetweenapplications-by-using-amazon-dynamodb-streams/

A Developer is designing a fault-tolerant environment where client sessions will be saved.

How can the Developer ensure that no sessions are lost if an Amazon EC2 instance fails?

A.
Use sticky sessions with an Elastic Load Balancer target group.
A.
Use sticky sessions with an Elastic Load Balancer target group.
Answers
B.
Use Amazon SQS to save session data.
B.
Use Amazon SQS to save session data.
Answers
C.
Use Amazon DynamoDB to perform scalable session hadling.
C.
Use Amazon DynamoDB to perform scalable session hadling.
Answers
D.
Use Elastic Load Balancer connection draining to stop sending requests to failing instances.
D.
Use Elastic Load Balancer connection draining to stop sending requests to failing instances.
Answers
Suggested answer: C

A Developer is writing an imaging micro service on AWS Lambd a. The service is dependent on several libraries that are not available in the Lambda runtime environment. Which strategy should the Developer follow to create the Lambda deployment package?

A.
Create a ZIP file with the source code and all dependent libraries.
A.
Create a ZIP file with the source code and all dependent libraries.
Answers
B.
Create a ZIP file with the source code and a script that installs the dependent libraries at runtime.
B.
Create a ZIP file with the source code and a script that installs the dependent libraries at runtime.
Answers
C.
Create a ZIP file with the source code. Stage the dependent libraries on an Amazon S3 bucket indicated by the Lambda environment variable LD_LIBRARY_PATH
C.
Create a ZIP file with the source code. Stage the dependent libraries on an Amazon S3 bucket indicated by the Lambda environment variable LD_LIBRARY_PATH
Answers
D.
Create a ZIP file with the source code and a buildspec.yaml file that installs the dependent libraries on AWS Lambda.
D.
Create a ZIP file with the source code and a buildspec.yaml file that installs the dependent libraries on AWS Lambda.
Answers
Suggested answer: B

A Developer is writing a serverless application that requires that an AWS Lambda function be invoked every 10 minutes. What is an automated and serverless way to trigger the function?

A.
Deploy an Amazon EC2 instance based on Linux, and edit its /etc/crontab file by adding a command to periodically invoke the Lambda function.
A.
Deploy an Amazon EC2 instance based on Linux, and edit its /etc/crontab file by adding a command to periodically invoke the Lambda function.
Answers
B.
Configure an environment variable named PERIOD for the Lambda function. Set the value to 600.
B.
Configure an environment variable named PERIOD for the Lambda function. Set the value to 600.
Answers
C.
Create an Amazon CloudWatch Events rule that triggers on a regular schedule to invoke the Lambda function.
C.
Create an Amazon CloudWatch Events rule that triggers on a regular schedule to invoke the Lambda function.
Answers
D.
Create an Amazon SNS topic that has a subscription to the Lambda function with a 600-second timer.
D.
Create an Amazon SNS topic that has a subscription to the Lambda function with a 600-second timer.
Answers
Suggested answer: C

Explanation:

Explanation:

Reference: https://aws.amazon.com/blogs/architecture/a-serverless-solution-for-invoking-awslambda-at-asub-minute-frequency/

company needs a fully-managed source control service that will work in AWS. The service must ensure that revision control synchronizes multiple distributed repositories by exchanging sets of changes peer-to-peer. All users need to work productively even when not connected to a network.

Which source control service should be used?

A.
Subversion
A.
Subversion
Answers
B.
AWS CodeBuild
B.
AWS CodeBuild
Answers
C.
AWS CodeCommit
C.
AWS CodeCommit
Answers
D.
AWS CodeStar
D.
AWS CodeStar
Answers
Suggested answer: C

An application running on Amazon EC2 instances must access objects within an Amaon S3 busket that are encrypted using server-side encryption using AWS KMS encryption keys (SSE-KMS). The application must have access to the customer master key (CMK) to decrypt the objects.

Which combination of steps will grant the application access? (Select TWO.)

A.
Write an S3 bucket policy that grants the bucket access to the key.
A.
Write an S3 bucket policy that grants the bucket access to the key.
Answers
B.
Grant access to the key in the IAM EC2 role attached to the application’s EC2 instances.
B.
Grant access to the key in the IAM EC2 role attached to the application’s EC2 instances.
Answers
C.
Write a key policy that enables IAM policies to grant access to the key.
C.
Write a key policy that enables IAM policies to grant access to the key.
Answers
D.
Grant access to the key in the S3 bucket’s ACL
D.
Grant access to the key in the S3 bucket’s ACL
Answers
E.
Create a Systems Manager parameter that exposes the KMS key to the EC2 instances.
E.
Create a Systems Manager parameter that exposes the KMS key to the EC2 instances.
Answers
Suggested answer: B, C

Explanation:

https://aws.amazon.com/premiumsupport/knowledge-center/decrypt-kms-encrypted-objects-s3/IAM role needs access to the keys to decrypt the object and key policies must allow role access to the key. Key policies are the primary way to control access to customer master keys (CMKs) in AWS KMS.

You need the permission to decrypt the AWS KMS key. When a user sends a GET request, Amazon S3 checks if the AWS Identity and Access Management (IAM) user or role that sent the request is authorized to decrypt the key associated with the object. If the IAM user or role belongs to the same AWS account as the key, then the permission to decrypt must be granted on the AWS KMS key’s policy.

Total 608 questions
Go to page: of 61