ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











A developer is building an application that runs behind an application Load Balancer (ALB). The application is configured as the origin for an Amazon CloudFront distribution. Users will log in to the application using their social media accounts.

How can the developer authenticate and authorize users?

A.
Validate the user by inspecting the tokens using AWS Lambda authorizers on the ALB
A.
Validate the user by inspecting the tokens using AWS Lambda authorizers on the ALB
Answers
B.
Configure the ALB to use Amazon Cognito as one of the authentication providers
B.
Configure the ALB to use Amazon Cognito as one of the authentication providers
Answers
C.
Configure Cloudfront to use Amazon Cognito as one of the authentication providers
C.
Configure Cloudfront to use Amazon Cognito as one of the authentication providers
Answers
D.
Authorize the users by calling the Amazon Cognito API in the AWS Lambda authorizer on the ALB
D.
Authorize the users by calling the Amazon Cognito API in the AWS Lambda authorizer on the ALB
Answers
Suggested answer: C

An application development team decides to use AWS X Ray to monitor application code to analyze performance and perform r cause analysis What does the team need to do to begin using X Ray? (Select TWO )

A.
Log instrumentation output into an Amazon SQS queue
A.
Log instrumentation output into an Amazon SQS queue
Answers
B.
Use a visualization tool to view application traces
B.
Use a visualization tool to view application traces
Answers
C.
Instrument application code using the AWS SDK
C.
Instrument application code using the AWS SDK
Answers
D.
Install the X-Ray agent on the application servers
D.
Install the X-Ray agent on the application servers
Answers
E.
Create an Amazon DynamoDB table to store the trace logs
E.
Create an Amazon DynamoDB table to store the trace logs
Answers
Suggested answer: D, E

A developer is using AWS CodeDeploy to deploy an application running on Amazon EC2. The developer wants to change the file permissions for a specific deployment file. Which lifecycle event should a developer use to meet this requirement?

A.
Afterlnstall
A.
Afterlnstall
Answers
B.
DownloadBundle
B.
DownloadBundle
Answers
C.
Beforelnstall
C.
Beforelnstall
Answers
D.
ValtdateService
D.
ValtdateService
Answers
Suggested answer: A


A developer must increase read performance from an unencrypted Amazon S3 bucket. The application requires 100.000 read requests each second Cost-effectiveness is a priority. What would be the SIMPLEST approach to implement these requirements?

A.
Create 20 or more prefixes in Amazon S3 Place files by prefixes. Read in parallel by prefixes
A.
Create 20 or more prefixes in Amazon S3 Place files by prefixes. Read in parallel by prefixes
Answers
B.
Create 20 of more AWS accounts Create a bucket in each account Read in parallel by bucket
B.
Create 20 of more AWS accounts Create a bucket in each account Read in parallel by bucket
Answers
C.
Deploy Memcached on Amazon EC2 Cache the files in memory Retrieve from the Memcached cache
C.
Deploy Memcached on Amazon EC2 Cache the files in memory Retrieve from the Memcached cache
Answers
D.
Copy all files to Amazon DynamoDB Index the files with S3 metadata Retrieve from DynamoDB
D.
Copy all files to Amazon DynamoDB Index the files with S3 metadata Retrieve from DynamoDB
Answers
Suggested answer: A

A company runs its APIs using Amazon API Gateway in front of AWS Lambda functions The company wants to add logging at the API level Each API must have production and development environments The developer wants to enable different logging levels in both environments.

How can these requirements be met?

A.
Set up a stage for each environment In each stage, point to different Lambda functions that implement the logging logic m the code Access the logs in Amazon CloudWatch Logs
A.
Set up a stage for each environment In each stage, point to different Lambda functions that implement the logging logic m the code Access the logs in Amazon CloudWatch Logs
Answers
B.
Set up a stage for each environment In each stage, define a different logging level according to the logging requirements Access the logs in Amazon CloudWatch Logs
B.
Set up a stage for each environment In each stage, define a different logging level according to the logging requirements Access the logs in Amazon CloudWatch Logs
Answers
C.
Set up a stage and use the same Lambda functions In Amazon CloudWatch Logs set up a filter based on the log level according to the logging requirements
C.
Set up a stage and use the same Lambda functions In Amazon CloudWatch Logs set up a filter based on the log level according to the logging requirements
Answers
D.
Set up a stage for each environment In each stage, define a variable for the log level Set the value according to the logging requirements.
D.
Set up a stage for each environment In each stage, define a variable for the log level Set the value according to the logging requirements.
Answers
Suggested answer: A

A developer is building a highly secure healthcare application using .. application requires writing temporary data to /tmp storage on an AWS Lambda function. How should the developer encrypt this data?

A.
Enable Amazon EBS volume encryption with an AWS KMS .. configuration so that all storage attached to the Lambda function is encrypted.
A.
Enable Amazon EBS volume encryption with an AWS KMS .. configuration so that all storage attached to the Lambda function is encrypted.
Answers
B.
Set up the Lambda function with a role and key policy to access an AWS KMS CMK Use the CMK to generate a data key used to encrypt all data prior to writing to /tmp storage
B.
Set up the Lambda function with a role and key policy to access an AWS KMS CMK Use the CMK to generate a data key used to encrypt all data prior to writing to /tmp storage
Answers
C.
Use OpenSSL to generate a symmetric encryption key on Lambda startup Use this key to encrypt the data prior to writing to /tmp
C.
Use OpenSSL to generate a symmetric encryption key on Lambda startup Use this key to encrypt the data prior to writing to /tmp
Answers
D.
Use an on-premises hardware security module (HSM) to generate keys where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function
D.
Use an on-premises hardware security module (HSM) to generate keys where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function
Answers
Suggested answer: D

A large company has its application components distributed across.. company needs to collect and visualize trace data across these accounts. What should be used to meet these requirements?

A.
AWS X-Ray
A.
AWS X-Ray
Answers
B.
Amazon CloudWatch
B.
Amazon CloudWatch
Answers
C.
Amazon VPC flow logs
C.
Amazon VPC flow logs
Answers
D.
Amazon Elasticsearch Service
D.
Amazon Elasticsearch Service
Answers
Suggested answer: A

An application running on multiple Amazon EC2 instances pulls messages ...SQS queue. A requirement for the application is that all messages must be encrypted at rest. Developers are instructed to use methods that allow for centralized .. possible support requirements whenever possible. Which of the following solution supports these requirements?

A.
Encrypt individual messages by using client-side encryption with customer managed keys, then write to the SQS queue.
A.
Encrypt individual messages by using client-side encryption with customer managed keys, then write to the SQS queue.
Answers
B.
Encrypt individual messages by using SQS Extended Client and the Amazon S3 encryption client.
B.
Encrypt individual messages by using SQS Extended Client and the Amazon S3 encryption client.
Answers
C.
Create an SQS queue, and encrypt the queue by using server-side encryption with AWS KMS
C.
Create an SQS queue, and encrypt the queue by using server-side encryption with AWS KMS
Answers
D.
Create an SQS queue and encrypt the queue by using client-side encryption
D.
Create an SQS queue and encrypt the queue by using client-side encryption
Answers
Suggested answer: C

A developer needs to modify an application architecture to meet new functional requirements.

Application data is stored in Amazon DynamoDB and processed for analysis in a rightly batch. The system analysts do not want to wait unit the next day to view the processed data and have asked to have it available in near-real time. Which application architect pattern would enables the data to be processed as it is received?

A.
Evert driven
A.
Evert driven
Answers
B.
Client served driven
B.
Client served driven
Answers
C.
Fan-out driven
C.
Fan-out driven
Answers
D.
Schedule driven
D.
Schedule driven
Answers
Suggested answer: A

A three-tier application hosted on AWS uses Amazon RDS for MYSQL as its database. A developer must ensure the database credentials are stored and accessed securely. What is the MOST secure way for the developer to achieve this?

A.
Store the credentials in a configuration file and commit it to the GIT repository.
A.
Store the credentials in a configuration file and commit it to the GIT repository.
Answers
B.
Store the credentials in AWS Secrets Manager and enable automatic secret rotation.
B.
Store the credentials in AWS Secrets Manager and enable automatic secret rotation.
Answers
C.
Store the credentials using Amazon RDS and enable automatic rotation
C.
Store the credentials using Amazon RDS and enable automatic rotation
Answers
D.
Store the credentials in code and handle credentials rotation within the application.
D.
Store the credentials in code and handle credentials rotation within the application.
Answers
Suggested answer: A
Total 608 questions
Go to page: of 61