ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











A company is using Amazon RDS MySQL instances for its application database tier and Apache Tomcat servers for its web tier. Most of the database queries from web applications are repeated read requests. Use of which AWS service would increase in performance by adding in-memory store for repeated read queries?

A.
Amazon RDS Multi-AZ
A.
Amazon RDS Multi-AZ
Answers
B.
Amazon SQS
B.
Amazon SQS
Answers
C.
Amazon ElastiCache
C.
Amazon ElastiCache
Answers
D.
Amazon RDS read replica
D.
Amazon RDS read replica
Answers
Suggested answer: C

To include objects defined by the AWS Serverless Application Model (SAM) in an AWS CloudFormation template, in addition to Resources, what section MUST be included in the document root?

A.
Conditions
A.
Conditions
Answers
B.
Globals
B.
Globals
Answers
C.
Transform
C.
Transform
Answers
D.
Properties
D.
Properties
Answers
Suggested answer: C

Explanation:

https://github.com/awslabs/serverless-application-model/blob/master/versions/2016-10-31.md

https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/samspecification-template-anatomy.html

A Developer is making changes to a custom application that is currently using AWS Elastic Beanstalk. After the Developer completes the changes, what solutions will update the Elastic Beanstalk environment with the new application version? (Choose two.)

A.
Package the application code into a .zip file, and upload, then deploy the packaged application from the AWS Management Console
A.
Package the application code into a .zip file, and upload, then deploy the packaged application from the AWS Management Console
Answers
B.
Package the application code into a .tar file, create a new application version from the AWS Management Console, then update the environment by using AWS CLI
B.
Package the application code into a .tar file, create a new application version from the AWS Management Console, then update the environment by using AWS CLI
Answers
C.
Package the application code into a .tar file, and upload and deploy the packaged application from the AWS Management Console
C.
Package the application code into a .tar file, and upload and deploy the packaged application from the AWS Management Console
Answers
D.
Package the application code into a .zip file, create a new application version from the packaged application by using AWS CLI, then update the environment by using AWS CLI
D.
Package the application code into a .zip file, create a new application version from the packaged application by using AWS CLI, then update the environment by using AWS CLI
Answers
E.
Package the application code into a .zip file, create a new application version from the AWS Management Console, then rebuild the environment by using AWS CLI
E.
Package the application code into a .zip file, create a new application version from the AWS Management Console, then rebuild the environment by using AWS CLI
Answers
Suggested answer: C, D

A Developer is going to deploy an AWS Lambda function that requires significant CPU utilization.

Which approach will MINIMIZE the average runtime of the function?

A.
Deploy the function into multiple AWS Regions
A.
Deploy the function into multiple AWS Regions
Answers
B.
Deploy the function into multiple Availability Zones
B.
Deploy the function into multiple Availability Zones
Answers
C.
Deploy the function using Lambda layers
C.
Deploy the function using Lambda layers
Answers
D.
Deploy the function with its memory allocation set to the maximum amount
D.
Deploy the function with its memory allocation set to the maximum amount
Answers
Suggested answer: D

A Developer is publishing critical log data to a log group in Amazon CloudWatch Lops, which was created 2 months ago. The Developer must encrypt the log data using an AWS KMS customer master key (CMK) so future data can be encrypted to comply with me company's security policy How can the Developer meet this requirement?

A.
Use the Cloud Watch Logs console and enable the encrypt feature on the log group.
A.
Use the Cloud Watch Logs console and enable the encrypt feature on the log group.
Answers
B.
Use the AWS CLI create-log-group command and specify the key Amazon Resource Name (ARN)
B.
Use the AWS CLI create-log-group command and specify the key Amazon Resource Name (ARN)
Answers
C.
Use the KMs console and associate the CMK with the log group
C.
Use the KMs console and associate the CMK with the log group
Answers
D.
Use the AWS CLI associate-Kms-key command and specify the key Amazon Resource Name (ARN)
D.
Use the AWS CLI associate-Kms-key command and specify the key Amazon Resource Name (ARN)
Answers
Suggested answer: C

A company wants to containerize an existing three-tier web application and deploy it to Amazon ECS Fargate. The application is using session data to keep track of user activities. Which approach would provide the BEST user experience?

A.
Provision a Redic cluster in Amazon ElasticCache and save the session data in the cluster
A.
Provision a Redic cluster in Amazon ElasticCache and save the session data in the cluster
Answers
B.
Create a session table in Amazon Redshift and save the session data in the database table.
B.
Create a session table in Amazon Redshift and save the session data in the database table.
Answers
C.
Enable session stickness in the existing Network Load Balancer and manage the session data in the container.
C.
Enable session stickness in the existing Network Load Balancer and manage the session data in the container.
Answers
D.
Use an Amazon S3 bucket as data store and save the session data in the bucket.
D.
Use an Amazon S3 bucket as data store and save the session data in the bucket.
Answers
Suggested answer: C

A company has implemented AWS CodeDeploy as part of its cloud native CI/CD stack The company enables automatic rollbacks while deploying a new version of a popular web application from in place to Amazon EC2. What occurs it the deployment of the new version fails due to code regression?

A.
The last known good deployment is automatically restored using the snapshot stored in Amazon S3
A.
The last known good deployment is automatically restored using the snapshot stored in Amazon S3
Answers
B.
CodeDeploy switches the Amazon Route 53 alias records back to the known good green deployment and terminates the failed blue deployment
B.
CodeDeploy switches the Amazon Route 53 alias records back to the known good green deployment and terminates the failed blue deployment
Answers
C.
A new deployment of the last known good version of the application is deployed with a new deployment ID
C.
A new deployment of the last known good version of the application is deployed with a new deployment ID
Answers
D.
AWS CodePipeline promotes the most recent deployment with a SUCCEEDED status to production
D.
AWS CodePipeline promotes the most recent deployment with a SUCCEEDED status to production
Answers
Suggested answer: B

A Developer needs to deploy an application running on AWS Fargate using Amazon ECS. The application has environment variables that must be passed to a container tor the application to initialize How should the environment variables be passed to the container?

A.
Define an array that includes the environment variables under the environment parameter within the service definition
A.
Define an array that includes the environment variables under the environment parameter within the service definition
Answers
B.
Define an array that includes the environment variables under the environment parameter within the task definition
B.
Define an array that includes the environment variables under the environment parameter within the task definition
Answers
C.
Define an array that includes the environment variables under the entrypoint parameter within the task definition
C.
Define an array that includes the environment variables under the entrypoint parameter within the task definition
Answers
D.
Define in array that includes the environment variables under the entryPoint parameter within the service definition
D.
Define in array that includes the environment variables under the entryPoint parameter within the service definition
Answers
Suggested answer: B

A Developer decides lo store highly secure data in Amazon S3 and wants to implement server-side encryption (SSF) with granular control of who can access the master key Company policy requires that the master key be created, rotated, and disabled easily when needed, all for security reasons.

Which solution should be used to moot these requirements?

A.
SSE with Amazon S3 managed keys (SSE-S3)
A.
SSE with Amazon S3 managed keys (SSE-S3)
Answers
B.
SSFE with AWS KMS managed keys (SSE KMS)
B.
SSFE with AWS KMS managed keys (SSE KMS)
Answers
C.
SSE with AWS Secrets Manager
C.
SSE with AWS Secrets Manager
Answers
D.
SSE with customer provided encryption keys
D.
SSE with customer provided encryption keys
Answers
Suggested answer: B

A developer has created a new AWS IAM user that has s3 putobject permission to write to a specific Amazon bucket. This S3 bucket uses server-side encryption with AWS KMS managed keys (SEE-KMS) as the encryption. Using the access key and secret key of the IAM user, the application received an access denied error when calling the PutObject API. How can this issue be resolved?

A.
Update the policy of the IAM user to allow the s3 Encrypt action.
A.
Update the policy of the IAM user to allow the s3 Encrypt action.
Answers
B.
Update the bucket policy of the S3 bucket to allow the IAM user to upload objects
B.
Update the bucket policy of the S3 bucket to allow the IAM user to upload objects
Answers
C.
Update the policy of the IAM user to allow the kms GenerateDatakey action
C.
Update the policy of the IAM user to allow the kms GenerateDatakey action
Answers
D.
Update the ACL of the bucket to allow the IAM user to upload objects
D.
Update the ACL of the bucket to allow the IAM user to upload objects
Answers
Suggested answer: C
Total 608 questions
Go to page: of 61