ExamGecko
Home / Amazon / DVA-C01 / List of questions
Ask Question

Amazon DVA-C01 Practice Test - Questions Answers, Page 39

List of questions

Question 381

Report
Export
Collapse

A developer is building an application that runs behind an application Load Balancer (ALB). The application is configured as the origin for an Amazon CloudFront distribution. Users will log in to the application using their social media accounts.

How can the developer authenticate and authorize users?

Validate the user by inspecting the tokens using AWS Lambda authorizers on the ALB
Validate the user by inspecting the tokens using AWS Lambda authorizers on the ALB
Configure the ALB to use Amazon Cognito as one of the authentication providers
Configure the ALB to use Amazon Cognito as one of the authentication providers
Configure Cloudfront to use Amazon Cognito as one of the authentication providers
Configure Cloudfront to use Amazon Cognito as one of the authentication providers
Authorize the users by calling the Amazon Cognito API in the AWS Lambda authorizer on the ALB
Authorize the users by calling the Amazon Cognito API in the AWS Lambda authorizer on the ALB
Suggested answer: C
asked 16/09/2024
Anthony Zaborski
48 questions

Question 382

Report
Export
Collapse

An application development team decides to use AWS X Ray to monitor application code to analyze performance and perform r cause analysis What does the team need to do to begin using X Ray? (Select TWO )

Log instrumentation output into an Amazon SQS queue
Log instrumentation output into an Amazon SQS queue
Use a visualization tool to view application traces
Use a visualization tool to view application traces
Instrument application code using the AWS SDK
Instrument application code using the AWS SDK
Install the X-Ray agent on the application servers
Install the X-Ray agent on the application servers
Create an Amazon DynamoDB table to store the trace logs
Create an Amazon DynamoDB table to store the trace logs
Suggested answer: D, E
asked 16/09/2024
None None
40 questions

Question 383

Report
Export
Collapse

A developer is using AWS CodeDeploy to deploy an application running on Amazon EC2. The developer wants to change the file permissions for a specific deployment file. Which lifecycle event should a developer use to meet this requirement?

Afterlnstall
Afterlnstall
DownloadBundle
DownloadBundle
Beforelnstall
Beforelnstall
ValtdateService
ValtdateService
Suggested answer: A
asked 16/09/2024
Henny Smit
36 questions

Question 384

Report
Export
Collapse


A developer must increase read performance from an unencrypted Amazon S3 bucket. The application requires 100.000 read requests each second Cost-effectiveness is a priority. What would be the SIMPLEST approach to implement these requirements?

Create 20 or more prefixes in Amazon S3 Place files by prefixes. Read in parallel by prefixes
Create 20 or more prefixes in Amazon S3 Place files by prefixes. Read in parallel by prefixes
Create 20 of more AWS accounts Create a bucket in each account Read in parallel by bucket
Create 20 of more AWS accounts Create a bucket in each account Read in parallel by bucket
Deploy Memcached on Amazon EC2 Cache the files in memory Retrieve from the Memcached cache
Deploy Memcached on Amazon EC2 Cache the files in memory Retrieve from the Memcached cache
Copy all files to Amazon DynamoDB Index the files with S3 metadata Retrieve from DynamoDB
Copy all files to Amazon DynamoDB Index the files with S3 metadata Retrieve from DynamoDB
Suggested answer: A
asked 16/09/2024
ERIC MERRILL
41 questions

Question 385

Report
Export
Collapse

A company runs its APIs using Amazon API Gateway in front of AWS Lambda functions The company wants to add logging at the API level Each API must have production and development environments The developer wants to enable different logging levels in both environments.

How can these requirements be met?

Set up a stage for each environment In each stage, point to different Lambda functions that implement the logging logic m the code Access the logs in Amazon CloudWatch Logs
Set up a stage for each environment In each stage, point to different Lambda functions that implement the logging logic m the code Access the logs in Amazon CloudWatch Logs
Set up a stage for each environment In each stage, define a different logging level according to the logging requirements Access the logs in Amazon CloudWatch Logs
Set up a stage for each environment In each stage, define a different logging level according to the logging requirements Access the logs in Amazon CloudWatch Logs
Set up a stage and use the same Lambda functions In Amazon CloudWatch Logs set up a filter based on the log level according to the logging requirements
Set up a stage and use the same Lambda functions In Amazon CloudWatch Logs set up a filter based on the log level according to the logging requirements
Set up a stage for each environment In each stage, define a variable for the log level Set the value according to the logging requirements.
Set up a stage for each environment In each stage, define a variable for the log level Set the value according to the logging requirements.
Suggested answer: A
asked 16/09/2024
Clive Roberts
47 questions

Question 386

Report
Export
Collapse

A developer is building a highly secure healthcare application using .. application requires writing temporary data to /tmp storage on an AWS Lambda function. How should the developer encrypt this data?

Enable Amazon EBS volume encryption with an AWS KMS .. configuration so that all storage attached to the Lambda function is encrypted.
Enable Amazon EBS volume encryption with an AWS KMS .. configuration so that all storage attached to the Lambda function is encrypted.
Set up the Lambda function with a role and key policy to access an AWS KMS CMK Use the CMK to generate a data key used to encrypt all data prior to writing to /tmp storage
Set up the Lambda function with a role and key policy to access an AWS KMS CMK Use the CMK to generate a data key used to encrypt all data prior to writing to /tmp storage
Use OpenSSL to generate a symmetric encryption key on Lambda startup Use this key to encrypt the data prior to writing to /tmp
Use OpenSSL to generate a symmetric encryption key on Lambda startup Use this key to encrypt the data prior to writing to /tmp
Use an on-premises hardware security module (HSM) to generate keys where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function
Use an on-premises hardware security module (HSM) to generate keys where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function
Suggested answer: D
asked 16/09/2024
Fatima Giordano
49 questions

Question 387

Report
Export
Collapse

A large company has its application components distributed across.. company needs to collect and visualize trace data across these accounts. What should be used to meet these requirements?

AWS X-Ray
AWS X-Ray
Amazon CloudWatch
Amazon CloudWatch
Amazon VPC flow logs
Amazon VPC flow logs
Amazon Elasticsearch Service
Amazon Elasticsearch Service
Suggested answer: A
asked 16/09/2024
Amin Dashti
51 questions

Question 388

Report
Export
Collapse

An application running on multiple Amazon EC2 instances pulls messages ...SQS queue. A requirement for the application is that all messages must be encrypted at rest. Developers are instructed to use methods that allow for centralized .. possible support requirements whenever possible. Which of the following solution supports these requirements?

Encrypt individual messages by using client-side encryption with customer managed keys, then write to the SQS queue.
Encrypt individual messages by using client-side encryption with customer managed keys, then write to the SQS queue.
Encrypt individual messages by using SQS Extended Client and the Amazon S3 encryption client.
Encrypt individual messages by using SQS Extended Client and the Amazon S3 encryption client.
Create an SQS queue, and encrypt the queue by using server-side encryption with AWS KMS
Create an SQS queue, and encrypt the queue by using server-side encryption with AWS KMS
Create an SQS queue and encrypt the queue by using client-side encryption
Create an SQS queue and encrypt the queue by using client-side encryption
Suggested answer: C
asked 16/09/2024
Muhammad Gul
41 questions

Question 389

Report
Export
Collapse

A developer needs to modify an application architecture to meet new functional requirements.

Application data is stored in Amazon DynamoDB and processed for analysis in a rightly batch. The system analysts do not want to wait unit the next day to view the processed data and have asked to have it available in near-real time. Which application architect pattern would enables the data to be processed as it is received?

Evert driven
Evert driven
Client served driven
Client served driven
Fan-out driven
Fan-out driven
Schedule driven
Schedule driven
Suggested answer: A
asked 16/09/2024
Wojciech Oleksiak
37 questions

Question 390

Report
Export
Collapse

A three-tier application hosted on AWS uses Amazon RDS for MYSQL as its database. A developer must ensure the database credentials are stored and accessed securely. What is the MOST secure way for the developer to achieve this?

Store the credentials in a configuration file and commit it to the GIT repository.
Store the credentials in a configuration file and commit it to the GIT repository.
Store the credentials in AWS Secrets Manager and enable automatic secret rotation.
Store the credentials in AWS Secrets Manager and enable automatic secret rotation.
Store the credentials using Amazon RDS and enable automatic rotation
Store the credentials using Amazon RDS and enable automatic rotation
Store the credentials in code and handle credentials rotation within the application.
Store the credentials in code and handle credentials rotation within the application.
Suggested answer: A
asked 16/09/2024
ANNA RIBALTA
28 questions
Total 608 questions
Go to page: of 61
Search

Related questions