ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











A company experienced partial downtime during the last deployment of a new application AWS Elastic Beanstalk split the environment's Amazon EC2 instances into batches and deployed a new version one batch at a time after taking them out of service. Therefore, full capacity was not maintained during deployment.

The developer plans to release a new version of the application, and is looking for a policy that will maintain full capacity and minimize the impact of the failed deployment Which deployment policy should the developer use?

A.
Immutable
A.
Immutable
Answers
B.
All at Once
B.
All at Once
Answers
C.
Rolling
C.
Rolling
Answers
D.
Rolling with an Additional Batch
D.
Rolling with an Additional Batch
Answers
Suggested answer: A

An application ingests a large number of small messages and stores them in a database. The application uses AWS Lambd a. A development team is making changes to the application's processing logic. In testing, it is taking more than 15 minutes to process each message. The team is concerned the current backend may time out.

Which changes should be made to the backend system to ensure each message is processed in the MOST scalable way1?

A.
Add the messages to an Amazon SQS queue Set up an Amazon EC2 instance to poll the queue and process messages as they arrive.
A.
Add the messages to an Amazon SQS queue Set up an Amazon EC2 instance to poll the queue and process messages as they arrive.
Answers
B.
Add the messages to an Amazon SQS queue. Set up Amazon EC2 instances in an Auto Scaling group to poll the queue and process the messages as they arrive.
B.
Add the messages to an Amazon SQS queue. Set up Amazon EC2 instances in an Auto Scaling group to poll the queue and process the messages as they arrive.
Answers
C.
Create a support ticket to increase the Lambda timeout to 60 minutes to allow for increased processing time
C.
Create a support ticket to increase the Lambda timeout to 60 minutes to allow for increased processing time
Answers
D.
Change the application to directly insert the body of the message into an Amazon RDS database.
D.
Change the application to directly insert the body of the message into an Amazon RDS database.
Answers
Suggested answer: A

A company is developing a web application that allows its employees to upload a profile picture to a private Amazon S3 bucket There is no size limit for the profile pictures, which should be displayed every time an employee logs in. For security reasons, the pictures cannot be publicly accessible.

What is a viable long-term solution for this scenario''

A.
Generate a presigned URL when a picture is uploaded Save the URL in an Amazon DynamoDB table Return the URL to the browser when the employee logs in
A.
Generate a presigned URL when a picture is uploaded Save the URL in an Amazon DynamoDB table Return the URL to the browser when the employee logs in
Answers
B.
Save the picture's S3 key in an Amazon DynamoDB table Create an Amazon S3 VPC endpoint to allow the employees to download pictures once they log in.
B.
Save the picture's S3 key in an Amazon DynamoDB table Create an Amazon S3 VPC endpoint to allow the employees to download pictures once they log in.
Answers
C.
Encode a picture using base64 Save the base64 string in an Amazon DynamoDB table Allow the browser to retrieve the string and convert it to a picture
C.
Encode a picture using base64 Save the base64 string in an Amazon DynamoDB table Allow the browser to retrieve the string and convert it to a picture
Answers
D.
Save the picture's S3 key in an Amazon DynamoDB table. Use a function to generate a presigned URL every time an employee logs in. Return the URL to the browser.
D.
Save the picture's S3 key in an Amazon DynamoDB table. Use a function to generate a presigned URL every time an employee logs in. Return the URL to the browser.
Answers
Suggested answer: B

Explanation:

Reference: https://aws.amazon.com/premiumsupport/knowledge-center/s3-private-connectionnoauthentication/

A developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB In the local development environment, the application has used IAM access keys The application is now ready for deployment onto an ECS duster.

How should the application authenticate with AWS services in production?

A.
Configure an ECS task IAM role for the application to use
A.
Configure an ECS task IAM role for the application to use
Answers
B.
Refactor the application to call AWS STS AssumeRole based on an instance role
B.
Refactor the application to call AWS STS AssumeRole based on an instance role
Answers
C.
Configure AWS access key/secret access key environment variables with new credentials
C.
Configure AWS access key/secret access key environment variables with new credentials
Answers
D.
Configure the credentials file with a new access key/secret access key
D.
Configure the credentials file with a new access key/secret access key
Answers
Suggested answer: A

A company wants to migrate an imaging service to Amazon EC2 while following security best practices. The images are sourced and read from a non-public Amazon S3 bucket. What should a developer do to meet these requirements?

A.
Create an IAM user with read-only permissions for the S3 bucket Temporarily store the user credentials in the Amazon EBS volume of the EC2 instance
A.
Create an IAM user with read-only permissions for the S3 bucket Temporarily store the user credentials in the Amazon EBS volume of the EC2 instance
Answers
B.
Create an IAM user with read-only permissions for the S3 bucket. Temporarily store the user credentials in the user data of the EC2 instance.
B.
Create an IAM user with read-only permissions for the S3 bucket. Temporarily store the user credentials in the user data of the EC2 instance.
Answers
C.
Create an EC2 service role with read-only permissions for the S3 bucket Attach the role to the EC2 instance
C.
Create an EC2 service role with read-only permissions for the S3 bucket Attach the role to the EC2 instance
Answers
D.
Create an S3 service role with read-only permissions for the S3 bucket Attach the role to the EC2 instance
D.
Create an S3 service role with read-only permissions for the S3 bucket Attach the role to the EC2 instance
Answers
Suggested answer: A

A developer wants to send multi-value headers to an AWS Lambda function that is registered as a target with an Application Load Balancer (ALB). What should the developer do to achieve this?

A.
Place the Lambda function and target group in the same account
A.
Place the Lambda function and target group in the same account
Answers
B.
Send the request body to the Lambda function with a size less than 1 MB 0
B.
Send the request body to the Lambda function with a size less than 1 MB 0
Answers
C.
Include the Base64 encoding status status code, status description, and headers in the Lambda function
C.
Include the Base64 encoding status status code, status description, and headers in the Lambda function
Answers
D.
Enable the multi-value headers on the ALB
D.
Enable the multi-value headers on the ALB
Answers
Suggested answer: D

An ecommerce startup is preparing for an annual sales event As the traffic to the company's application increases, the development team wants to be notified when the Amazon EC2 instance's CPU utilization exceeds 80%. Which solution will meet this requirement?

A.
Create a custom Amazon CloudWatch alarm that sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%.
A.
Create a custom Amazon CloudWatch alarm that sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%.
Answers
B.
Create a custom AWS CloudTrail alarm that sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%
B.
Create a custom AWS CloudTrail alarm that sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%
Answers
C.
Create a cron job on the EC2 instance that executes the --describe-instance-information command on the host instance every 15 minutes and sends the results to an Amazon SNS topic
C.
Create a cron job on the EC2 instance that executes the --describe-instance-information command on the host instance every 15 minutes and sends the results to an Amazon SNS topic
Answers
D.
Create an AWS Lambda function that queries the AWS CloudTrail logs for the CPUUtihzation metric every 15 minutes and sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%
D.
Create an AWS Lambda function that queries the AWS CloudTrail logs for the CPUUtihzation metric every 15 minutes and sends a notification to an Amazon SNS topic when the CPU utilization exceeds 80%
Answers
Suggested answer: C

An application running on Amazon EC2 opens connections to an Amazon RDS SQL Server database The developer does not want to store the user name and password for the database in the code. The developer would also like to automatically rotate the credentials.

What is the MOST secure way to store and access the database credentials?

A.
Create an IAM role that has permissions to access the database Attach the role to the EC2 instance
A.
Create an IAM role that has permissions to access the database Attach the role to the EC2 instance
Answers
B.
Use AWS Secrets Manager to store the credentials. Retrieve the credentials from Secrets Manager as needed
B.
Use AWS Secrets Manager to store the credentials. Retrieve the credentials from Secrets Manager as needed
Answers
C.
Store the credentials in an encrypted text file in an Amazon S3 bucket Configure the EC2 instance's user data to download the credentials from Amazon S3 as the instance boots
C.
Store the credentials in an encrypted text file in an Amazon S3 bucket Configure the EC2 instance's user data to download the credentials from Amazon S3 as the instance boots
Answers
D.
Store the user name and password credentials directly in the source code. No further action is needed because the source code is stored in a private repository.
D.
Store the user name and password credentials directly in the source code. No further action is needed because the source code is stored in a private repository.
Answers
Suggested answer: B

An application needs to encrypt data that is written to Amazon S3 where the keys are managed in an on-premises data center and the encryption is handled by S3. Which type of encryption should be used?

A.
Use server-side encryption with Amazon S3-managed keys
A.
Use server-side encryption with Amazon S3-managed keys
Answers
B.
Use server-side encryption with AWS KMS-managed keys.
B.
Use server-side encryption with AWS KMS-managed keys.
Answers
C.
Use client-side encryption with customer master keys
C.
Use client-side encryption with customer master keys
Answers
D.
Use server-side encryption with customer-provided keys
D.
Use server-side encryption with customer-provided keys
Answers
Suggested answer: A


A software engineer developed an AWS Lambda function in Node.js to do some CPU-intensive data processing. With the default settings, the Lambda function takes about 5 minutes to complete. Which approach should a developer take to increase the speed of completion''

A.
Instead of using Node js. rewrite the Lambda function using Python
A.
Instead of using Node js. rewrite the Lambda function using Python
Answers
B.
Instead of packaging the libraries in the ZIP file with the function move them to a Lambda layer and use the layer with the function.
B.
Instead of packaging the libraries in the ZIP file with the function move them to a Lambda layer and use the layer with the function.
Answers
C.
Allocate the maximum available CPU units lo the function
C.
Allocate the maximum available CPU units lo the function
Answers
D.
Increase the available memory to the function.
D.
Increase the available memory to the function.
Answers
Suggested answer: D
Total 608 questions
Go to page: of 61