ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











A development team uses AWS Elastic Beanstalk to deploy a Java-based web application. The team wants to ensure that the changes to the source code and the configuration are always deployed on new instances The team configures the Elastic Beanstalk environment to use immutable updates.

However an error occurs the first time a change is deployed with the new update policy What is the MOST likely cause of this issue?

A.
Immutable updates are not supported for Java-based applications
A.
Immutable updates are not supported for Java-based applications
Answers
B.
The account has reached its on-demand instance limit
B.
The account has reached its on-demand instance limit
Answers
C.
Immutable updates are only supported for m4 large and larger instance types.
C.
Immutable updates are only supported for m4 large and larger instance types.
Answers
D.
The developer must also modify the ebextensions/immutable-updates config file to enable immutable updates
D.
The developer must also modify the ebextensions/immutable-updates config file to enable immutable updates
Answers
Suggested answer: A

How does Envelope Encryption work in AWS KMS?

A.
The Customer Master Key is used to encrypidecrypt a data key The Plaintext Data Key is used to encrypt customer data.
A.
The Customer Master Key is used to encrypidecrypt a data key The Plaintext Data Key is used to encrypt customer data.
Answers
B.
Two encryption keys are used The Customer Master Key encrypts customer data. The Data Key is used to re-encrypt the encrypted data.
B.
Two encryption keys are used The Customer Master Key encrypts customer data. The Data Key is used to re-encrypt the encrypted data.
Answers
C.
Two encryption keys are used The Data Key encrypts customer data The Customer Master Key is used to re-encrypt the encrypted data
C.
Two encryption keys are used The Data Key encrypts customer data The Customer Master Key is used to re-encrypt the encrypted data
Answers
D.
The Customer Master Key is used to encrypt'decrypt a data key. The Encrypted Data Key is used to encrypt customer data.
D.
The Customer Master Key is used to encrypt'decrypt a data key. The Encrypted Data Key is used to encrypt customer data.
Answers
Suggested answer: A

A company is using Amazon API Gateway to manage its public-facing API. The CISO requires that the APIs be used by test account users only. What is the MOST secure way to restrict API access to users of this particular AWS account?

A.
Client-side SSL certificates for authentication
A.
Client-side SSL certificates for authentication
Answers
B.
API Gateway resource policies
B.
API Gateway resource policies
Answers
C.
Cross-origin resource sharing (CORS)
C.
Cross-origin resource sharing (CORS)
Answers
D.
Usage plans
D.
Usage plans
Answers
Suggested answer: D

An IAM role is attached to an Amazon EC2 instance that explicitly denies access to all Amazon S3 API actions. The EC2 instance credentials file specifies the IAM access key and secret access key, which allow full administrative access. Given that multiple modes of IAM access are present for this EC2 instance, which of the following is correct?

A.
The EC2 instance will only be able to list the S3 buckets
A.
The EC2 instance will only be able to list the S3 buckets
Answers
B.
The EC2 instance will only be able to list the contents of one S3 bucket at a time
B.
The EC2 instance will only be able to list the contents of one S3 bucket at a time
Answers
C.
The EC2 instance will be able to perform all actions on any S3 bucket
C.
The EC2 instance will be able to perform all actions on any S3 bucket
Answers
D.
The EC2 instance will not be able to perform any S3 action on any S3 bucket.
D.
The EC2 instance will not be able to perform any S3 action on any S3 bucket.
Answers
Suggested answer: C

A developer is using Amazon DynamoDB to store application data . The developer wants to further improve application performance by reducing response limes for read and write operations. Which DynamoDB feature should be used to meet these requirement?

A.
Amazon DynamoDB Streams
A.
Amazon DynamoDB Streams
Answers
B.
Amazon DynamoDB Accelerator
B.
Amazon DynamoDB Accelerator
Answers
C.
Amazon DynamoDB global tables
C.
Amazon DynamoDB global tables
Answers
D.
Amazon DynamoDB transactions
D.
Amazon DynamoDB transactions
Answers
Suggested answer: B

Explanation:

https://aws.amazon.com/ko/blogs/database/amazon-dynamodb-accelerator-dax-a-readthroughwrite-through-cache-for-dynamodb/

An application contains two components one component to handle HI IP requests, and another component to handle background processing tasks Bach component must scale independently The developer wants to deploy this application using AWS Elastic Beanstalk.

How should this application be deployed, based on these requirements?

A.
Deploy the application in a single Elastic Beanstalk environment
A.
Deploy the application in a single Elastic Beanstalk environment
Answers
B.
Deploy each component in a separate Elastic Beanstalk environment
B.
Deploy each component in a separate Elastic Beanstalk environment
Answers
C.
Use multiple Elastic Beanstalk environments for the HTTP component but one environment for thebackground task component
C.
Use multiple Elastic Beanstalk environments for the HTTP component but one environment for thebackground task component
Answers
D.
Use multiple Elastic Beanstalk environments for the background task component but one environment tor the HTTP component
D.
Use multiple Elastic Beanstalk environments for the background task component but one environment tor the HTTP component
Answers
Suggested answer: A

Given the following AWS CloudFormation template:

What is the MOST efficient way to reference the new Amazon S3 bucket from another AWS CloudFormation template?

A.
Add an Export declaration to the outputs section of the original template and use ImportValue in other templates.
A.
Add an Export declaration to the outputs section of the original template and use ImportValue in other templates.
Answers
B.
Add Exported: True to the ContentBucket in the original template and use ImportResource in other templates.
B.
Add Exported: True to the ContentBucket in the original template and use ImportResource in other templates.
Answers
C.
Create a custom AWS CloudFormation resource that gets the bucket name from the ContentBucket resource of the first stack.
C.
Create a custom AWS CloudFormation resource that gets the bucket name from the ContentBucket resource of the first stack.
Answers
D.
Use Fn: : Include to include the existing template in other template and use the ContentBucket resource directly
D.
Use Fn: : Include to include the existing template in other template and use the ContentBucket resource directly
Answers
Suggested answer: D

A developer implemented a static website hosted in Amazon S3 that makes web service requests hosted in Amazon API Gateway AWS Lambd a. The site is showing an error that reads "No ' Access-Control-Allow Origin' header is present on the requested resource Origin 'null' is therefore not allowed access " What should the developer do to resolve this issue?

A.
Enable cross-origin resource sharing (CORS) on the S3 bucket
A.
Enable cross-origin resource sharing (CORS) on the S3 bucket
Answers
B.
Enable cross-origin resource sharing (CORS) for the method in API Gateway
B.
Enable cross-origin resource sharing (CORS) for the method in API Gateway
Answers
C.
Add the Access-Control-Request-Method header to the request
C.
Add the Access-Control-Request-Method header to the request
Answers
D.
Add the Access-Control-Request-Headers header to the request
D.
Add the Access-Control-Request-Headers header to the request
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-cors-console.html

A developer is creating a role to access Amazon S3 buckets To create the role, the developer uses the AWS CLI create-role command. Which policy should be added to allow the Amazon EC2 service to assume the role?

A.
Managed policy
A.
Managed policy
Answers
B.
Trust policy
B.
Trust policy
Answers
C.
Inline policy
C.
Inline policy
Answers
D.
Service control policy (SCP)
D.
Service control policy (SCP)
Answers
Suggested answer: B

Explanation:

A JSON policy document in which you define the principals that you trust to assume the role. A role trust policy is a required resource-based policy that is attached to a role in IAM. The principals that you can specify in the trust policy include users, roles, accounts, and services.

https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_terms-and-concepts.html

An application is experiencing performance issues based on increased demand. This increased demand is on read-only historical records pulled from an Amazon RDS-hosted database with custom views and queries. A developer improve performance without changing the database structure.

Which approach will improve performance and MINIMIZE management overhead?

A.
Deploy Amazon DynamoDB, move all the data, and point to DynamoDB.
A.
Deploy Amazon DynamoDB, move all the data, and point to DynamoDB.
Answers
B.
Deploy Amazon ElasticCache for Redis and cache the data for the application.
B.
Deploy Amazon ElasticCache for Redis and cache the data for the application.
Answers
C.
Deploy Memcached on Amazon EC2 and cache the data for the application.
C.
Deploy Memcached on Amazon EC2 and cache the data for the application.
Answers
D.
Deploy Amazon DynamoDB Accelerator (DAX) on Amazon RDS to improve cache performance
D.
Deploy Amazon DynamoDB Accelerator (DAX) on Amazon RDS to improve cache performance
Answers
Suggested answer: B
Total 608 questions
Go to page: of 61