ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











An application displays a status dashboard. The status is updated by 1 KB messages from an SQS queue. Although the status changes infrequently, the Developer must minimize the time between the message arrival in the queue and the dashboard update.

What technique provides the shortest delay in updating the dashboard?

A.
Retrieve the messages from the queue using long polling every 20 seconds.
A.
Retrieve the messages from the queue using long polling every 20 seconds.
Answers
B.
Reduce the size of the messages by compressing them before sending.
B.
Reduce the size of the messages by compressing them before sending.
Answers
C.
Retrieve the messages from the queue using short polling every 10 seconds.
C.
Retrieve the messages from the queue using short polling every 10 seconds.
Answers
D.
Reduce the size of each message payload by sending it in two parts.
D.
Reduce the size of each message payload by sending it in two parts.
Answers
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/ko_kr/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqsshort-and-long-polling.html#sqs-short-long-polling-differences

A company is using AWS CodePipeline to deliver one of its applications. The delivery pipeline is triggered by changes to the master branch of an AWS CodeCommit repository and uses AWS CodeBuild to implement the test and build stages of the process and AWS CodeDeploy to deploy the application.

The pipeline has been operating successfully for several months and there have been no modifications. Following a recent change to the application’s source code, AWS CodeDeploy has not deployed the updates application as expected. What are the possible causes? (Choose two.)

A.
The change was not made in the master branch of the AWS CodeCommit repository.
A.
The change was not made in the master branch of the AWS CodeCommit repository.
Answers
B.
One of the earlier stages in the pipeline failed and the pipeline has terminated.
B.
One of the earlier stages in the pipeline failed and the pipeline has terminated.
Answers
C.
One of the Amazon EC2 instances in the company’s AWS CodePipeline cluster is inactive.
C.
One of the Amazon EC2 instances in the company’s AWS CodePipeline cluster is inactive.
Answers
D.
The AWS CodePipeline is incorrectly configured and is not executing AWS CodeDeploy.
D.
The AWS CodePipeline is incorrectly configured and is not executing AWS CodeDeploy.
Answers
E.
AWS CodePipeline does not have permissions to access AWS CodeCommit.
E.
AWS CodePipeline does not have permissions to access AWS CodeCommit.
Answers
Suggested answer: A, B

A social media company is using Amazon Cognito in order to synchronize profiles across different mobile devices, to enable end users to have a seamless experience. Which of the following configurations can be used to silently notify users whenever an update is available on all other devices?

A.
Modify the user pool to include all the devices which keep them in sync.
A.
Modify the user pool to include all the devices which keep them in sync.
Answers
B.
Use the SyncCallback interface to receive notifications on the application.
B.
Use the SyncCallback interface to receive notifications on the application.
Answers
C.
Use an Amazon Cognito stream to analyze the data and push the notifications.
C.
Use an Amazon Cognito stream to analyze the data and push the notifications.
Answers
D.
Use the push synchronization feature with the appropriate IAM role.
D.
Use the push synchronization feature with the appropriate IAM role.
Answers
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/cognito/latest/developerguide/push-sync.html

A website’s page load times are gradually increasing as more users access the system at the same time. Analysis indicates that a user profile is being loaded from a database in all the web pages being visited by each user and this is increasing the database load and the page load latency. To address this issue the Developer decides to cache the user profile data. Which caching strategy will address this situation MOST efficiently?

A.
Create a new Amazon EC2 Instance and run a NoSQL database on it. Cache the profile data within this database using the write-through caching strategy.
A.
Create a new Amazon EC2 Instance and run a NoSQL database on it. Cache the profile data within this database using the write-through caching strategy.
Answers
B.
Create an Amazon ElastiCache cluster to cache the user profile data. Use a cache-aside caching strategy.
B.
Create an Amazon ElastiCache cluster to cache the user profile data. Use a cache-aside caching strategy.
Answers
C.
Use a dedicated Amazon RDS instance for caching profile data. Use a write-through caching strategy.
C.
Use a dedicated Amazon RDS instance for caching profile data. Use a write-through caching strategy.
Answers
D.
Create an ElastiCache cluster to cache the user profile data. Use a write-through caching strategy.
D.
Create an ElastiCache cluster to cache the user profile data. Use a write-through caching strategy.
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/AmazonElastiCache/latest/mem-ug/Strategies.html

An application needs to use the IP address of the client in its processing. The application has been moved into AWS and has been placed behind an Application Load Balancer (ALB). However, all the client IP addresses now appear to be the same. The application must maintain the ability to scale horizontally.

Based on this scenario, what is the MOST cost-effective solution to this problem?

A.
Remove the application from the ALB. Delete the ALB and change Amazon Route 53 to direct traffic to the instance running the application.
A.
Remove the application from the ALB. Delete the ALB and change Amazon Route 53 to direct traffic to the instance running the application.
Answers
B.
Remove the application from the ALB. Create a Classic Load Balancer in its place. Direct traffic to the application using the HTTP protocol.
B.
Remove the application from the ALB. Create a Classic Load Balancer in its place. Direct traffic to the application using the HTTP protocol.
Answers
C.
Alter the application code to inspect the X-Forwarded-For header. Ensure that the code can work properly if a list of IP addresses is passed in the header.
C.
Alter the application code to inspect the X-Forwarded-For header. Ensure that the code can work properly if a list of IP addresses is passed in the header.
Answers
D.
Alter the application code to inspect a custom header. Alter the client code to pass the IP address in the custom header.
D.
Alter the application code to inspect a custom header. Alter the client code to pass the IP address in the custom header.
Answers
Suggested answer: C

A development team is using AWS Elastic Beanstalk to deploy a two-tier application that consists of a load-balanced web tier and an Amazon RDS database tier in production. The team would like to separate the RDS instance from the Elastic Beanstalk.

How can this be accomplished?

A.
Use the Elastic Beanstalk CLI to disassociate the database.
A.
Use the Elastic Beanstalk CLI to disassociate the database.
Answers
B.
Use the AWS CLI to disassociate the database.
B.
Use the AWS CLI to disassociate the database.
Answers
C.
Change the deployment policy to disassociate the database.
C.
Change the deployment policy to disassociate the database.
Answers
D.
Recreate a new Elastic Beanstalk environment without Amazon RDS.
D.
Recreate a new Elastic Beanstalk environment without Amazon RDS.
Answers
Suggested answer: D

Explanation:

https://aws.amazon.com/premiumsupport/knowledge-center/decouple-rds-from-beanstalk/

According to best practice, how should access keys be managed in AWS? (Choose two.)

A.
Use the same access key in all applications for consistency.
A.
Use the same access key in all applications for consistency.
Answers
B.
Delete all access keys for the account root user.
B.
Delete all access keys for the account root user.
Answers
C.
Leave unused access keys in the account for tracking purposes.
C.
Leave unused access keys in the account for tracking purposes.
Answers
D.
Embed and encrypt access keys in code for continuous deployment.
D.
Embed and encrypt access keys in code for continuous deployment.
Answers
E.
Use Amazon IAM roles instead of access keys where possible.
E.
Use Amazon IAM roles instead of access keys where possible.
Answers
Suggested answer: B, E

The development team is working on an API that will be served from Amazon API gateway. The API will be served from three environments: development, test, and production. The API Gateway is configured to use 237 GB of cache in all three stages.

Which is the MOST cost-efficient deployment strategy?

A.
Create a single API Gateway with all three stages.
A.
Create a single API Gateway with all three stages.
Answers
B.
Create three API Gateways, one for each stage in a single AWS account.
B.
Create three API Gateways, one for each stage in a single AWS account.
Answers
C.
Create an API Gateway in three separate AWS accounts.
C.
Create an API Gateway in three separate AWS accounts.
Answers
D.
Enable the cache for development and test environments only when needed.
D.
Enable the cache for development and test environments only when needed.
Answers
Suggested answer: D

An application running on an Amazon Linux EC2 instance needs to manage the AWS infrastructure.

How can the EC2 instance be configured to make AWS API calls securely?

A.
Sign the AWS CLI command using the signature version 4 process.
A.
Sign the AWS CLI command using the signature version 4 process.
Answers
B.
Run the aws configure AWS CLI command and specify the access key id and secret access key.
B.
Run the aws configure AWS CLI command and specify the access key id and secret access key.
Answers
C.
Specify a role for the EC2 instance with the necessary privileges.
C.
Specify a role for the EC2 instance with the necessary privileges.
Answers
D.
Pass the access key id and secret access key as parameters for each AWS CLI command.
D.
Pass the access key id and secret access key as parameters for each AWS CLI command.
Answers
Suggested answer: C

A company is migrating from a monolithic architecture to a microservices-based architecture. The Developers need to refactor the application so that the many microservices can asynchronously communicate with each other without impacting performance.

Use of which managed AWS services will enable asynchronous message passing? (Choose two.)

A.
Amazon SQS
A.
Amazon SQS
Answers
B.
Amazon Cognito
B.
Amazon Cognito
Answers
C.
Amazon Kinesis
C.
Amazon Kinesis
Answers
D.
Amazon SNS
D.
Amazon SNS
Answers
E.
Amazon ElastiCache
E.
Amazon ElastiCache
Answers
Suggested answer: A, D
Total 608 questions
Go to page: of 61