ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











A developer is building an application that reads 90 Items of data each second from an Amazon DynamoDB table. Each item Is 3 KB m size. The table is configured to use eventually consistent reads How many read capacity units should the developer provision for the table?

A.
25
A.
25
Answers
B.
35
B.
35
Answers
C.
45
C.
45
Answers
D.
85
D.
85
Answers
Suggested answer: C

A company process incoming documents from an Amazon S3 bucket. Users upload documents to an S3 bucket using a web user interface. Upon receiving files in S3, and AWS Lambda function is invoked to process the files, but the Lambda function times out intermittently.

If the Lambda function is configured with the default settings, what will happen to the S3 event when there is a timeout exception?

A.
Notification of a failed S3 event is sent as an email through Amazon SNS.
A.
Notification of a failed S3 event is sent as an email through Amazon SNS.
Answers
B.
The S3 event is sent to the default Deed Letter Queue.
B.
The S3 event is sent to the default Deed Letter Queue.
Answers
C.
The S3 event is processed unit it is successful.
C.
The S3 event is processed unit it is successful.
Answers
D.
The S3 event is discarded after the event is retried twice.
D.
The S3 event is discarded after the event is retried twice.
Answers
Suggested answer: D

A developer has launched an application that calls an API by way of Amazon API Gateway. It offers information that changes several times a day, but is not updated in real time. The application has become so popular that the API endpoint is overloaded and that traffic to the endpoint must be reduced.

What can the developer do to address the performance issues?

A.
Enable API caching in Amazon ElastiCache.
A.
Enable API caching in Amazon ElastiCache.
Answers
B.
Enable an Auto Scaling group on the endpoint service and database.
B.
Enable an Auto Scaling group on the endpoint service and database.
Answers
C.
Create an additional API Gateway and use an Application Load Balancer
C.
Create an additional API Gateway and use an Application Load Balancer
Answers
Suggested answer: A

A developer wants to secure sensitive configuration date such as passwords, database strings, and application license codes. Access to this sensitive information must be tracked for future audit purposes.

A.
In an encrypted file on the source code bundle; grant the application access with Amazon IAM
A.
In an encrypted file on the source code bundle; grant the application access with Amazon IAM
Answers
B.
In the Amazon EC2 Systems Manager Parameter Store; grant the application access with IAM
B.
In the Amazon EC2 Systems Manager Parameter Store; grant the application access with IAM
Answers
C.
On an Amazon EBS encrypted volume attach the volume to an Amazon EC2 instance to access the data
C.
On an Amazon EBS encrypted volume attach the volume to an Amazon EC2 instance to access the data
Answers
D.
As on object in on Amazon S3 bucket, grant on Amazon EC2 instance access with on IAM rob.
D.
As on object in on Amazon S3 bucket, grant on Amazon EC2 instance access with on IAM rob.
Answers
Suggested answer: B

A developer has built an application using Amazon Cognito for authentication and authorization.

After a user is successfully logged in to the application, the application creates a user record in an Amazon DynamoDB table. What is the correct flow to authenticate the user and create a record in the DynamoDB table?

A.
Authenticate and get a token from an Amazon Cognito user pool. Use the token to access DynamoDB.
A.
Authenticate and get a token from an Amazon Cognito user pool. Use the token to access DynamoDB.
Answers
B.
Authenticate and get a token from an Amazon Cognito identity pool. Use the token to access DynamoDB.
B.
Authenticate and get a token from an Amazon Cognito identity pool. Use the token to access DynamoDB.
Answers
C.
Authenticate and get a token from an Amazon Cognito user pool Exchange the token for AWS credentials with an Amazon Cognito identity pool. Use the credential to access DynamoDB.
C.
Authenticate and get a token from an Amazon Cognito user pool Exchange the token for AWS credentials with an Amazon Cognito identity pool. Use the credential to access DynamoDB.
Answers
D.
Authenticate and get a token from an Amazon Cognito identity pool. Exchange the token for AWS credentials with an Amazon Cognito user pool. Use the credentials to access DynamoDB
D.
Authenticate and get a token from an Amazon Cognito identity pool. Exchange the token for AWS credentials with an Amazon Cognito user pool. Use the credentials to access DynamoDB
Answers
Suggested answer: B

A developer has designed a customer, facing application that is running on an Amazon EC2 instance.

The application logs every request made to it. The application usually runs seamlessly, but a spike in traffic generates several logs that cause the disk to fill up and eventually run out of memory Company policy requires old to be centralized for analysis.

Which long-term solution should the developer employ to prevent the issue from reoccurring?

A.
Install the Amazon CloudWatch agent on the instance to send the logs to CloudWatch. Delete the logs from the instance once they are sent to CloudWatch.
A.
Install the Amazon CloudWatch agent on the instance to send the logs to CloudWatch. Delete the logs from the instance once they are sent to CloudWatch.
Answers
B.
Enable AWS Auto Scaling on Amazon Elastic Block Store (Amazon EBS) to automatically add volumes to the instance when it reaches a specified threshold.
B.
Enable AWS Auto Scaling on Amazon Elastic Block Store (Amazon EBS) to automatically add volumes to the instance when it reaches a specified threshold.
Answers
C.
Enable AWS Auto Scaling on Amazon Elastic Block Store (Amazon EBS) a outomatically add volume to the instance when it reaches a specified threshold.
C.
Enable AWS Auto Scaling on Amazon Elastic Block Store (Amazon EBS) a outomatically add volume to the instance when it reaches a specified threshold.
Answers
D.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule to pull the logs from the instance. Configure the rule to delete the logs they have been pulled.
D.
Create an Amazon EventBridge (Amazon CloudWatch Events) rule to pull the logs from the instance. Configure the rule to delete the logs they have been pulled.
Answers
Suggested answer: D

A company recently experienced some unexpected downtime. After investigating, the company determines that a developer mistakenly terminated several production Amazon EC2 instances. What should the company do to BEST protect against accidental terminations in the future.

A.
Enable EC2 termination protection on all production instances unless approval has been given through AWS Resource Access Manager.
A.
Enable EC2 termination protection on all production instances unless approval has been given through AWS Resource Access Manager.
Answers
B.
Modify the developer group’s permissions policy to deny them access to delete production instances unless approved has been given through AWS Resource Access Manager.
B.
Modify the developer group’s permissions policy to deny them access to delete production instances unless approved has been given through AWS Resource Access Manager.
Answers
C.
Modify the developer group’s permission policy to require multi-factor authentication (MFA) only production instances are being delete Enable EC2 termination protection on production instances.
C.
Modify the developer group’s permission policy to require multi-factor authentication (MFA) only production instances are being delete Enable EC2 termination protection on production instances.
Answers
D.
Enable EC2 termination protection on production instances. Deny the developer group’s permissions policy access to terminate instance. Create a new role that developer can assume when termination is necessary.
D.
Enable EC2 termination protection on production instances. Deny the developer group’s permissions policy access to terminate instance. Create a new role that developer can assume when termination is necessary.
Answers
Suggested answer: A

A developer works in an environment with multiple AWS accounts that have AWS Lambda functions processing the same 100 KB payloads. The developer wants to centralize the point of origin of the payloads to one account and have all the Lambda functions be invoked whenever the initiating event occurs in the parent account.

How can the developer design the workflow in the MOST efficient way, so all the multi-account Lambda functions get invoked when the event occurs?

A.
Create a Lambda function in the parent account and use cross-account IAM roles with the AWS Security Token Service (AWS STS) AssumeRole API call to make AWS Lambda invoke the API call to invoke all the cross-account Lambda functions.
A.
Create a Lambda function in the parent account and use cross-account IAM roles with the AWS Security Token Service (AWS STS) AssumeRole API call to make AWS Lambda invoke the API call to invoke all the cross-account Lambda functions.
Answers
B.
Subscribe all the multi-account Lambda functions to an Amazon SNS topic and make a SNS Publish API call with the payload to the SNS topic.
B.
Subscribe all the multi-account Lambda functions to an Amazon SNS topic and make a SNS Publish API call with the payload to the SNS topic.
Answers
C.
Set up an Amazon SQS queue with the queue policy permitting the ReceiveMessage action for multi-account Lambda functions. Then send the payload to the SQS queue using the sqs:SendMessage permission and poll the queue using multi-account Lambda functions.
C.
Set up an Amazon SQS queue with the queue policy permitting the ReceiveMessage action for multi-account Lambda functions. Then send the payload to the SQS queue using the sqs:SendMessage permission and poll the queue using multi-account Lambda functions.
Answers
D.
Use a worker on an Amazon EC2 instance to poll for the payload event. Invoke all Lambda functions using the Lambda Invoke API after using cross-account IAM roles with the AWS Security Token Service (AWS STS) AssumeRole API call.
D.
Use a worker on an Amazon EC2 instance to poll for the payload event. Invoke all Lambda functions using the Lambda Invoke API after using cross-account IAM roles with the AWS Security Token Service (AWS STS) AssumeRole API call.
Answers
Suggested answer: B

Explanation:

https://aws.amazon.com/es/blogs/compute/cross-account-integration-with-amazon-sns/

A developer is creating a serverless web application and maintains different branches of code The developer wants to avoid updating the Amazon API Gateway target endpoint each time a new code push is performed What solution would allow me developer to perform a code push efficiently, without the need to update the API Gateway?

A.
Associate different AWS Lambda functions to an API Gateway target endpoint
A.
Associate different AWS Lambda functions to an API Gateway target endpoint
Answers
B.
Create different stages in API Gateway, then associate API Gateway with aws Lambda
B.
Create different stages in API Gateway, then associate API Gateway with aws Lambda
Answers
C.
Create aliases and versions In AWS Lambda.
C.
Create aliases and versions In AWS Lambda.
Answers
D.
Tag the AWS Lambda functions with different names
D.
Tag the AWS Lambda functions with different names
Answers
Suggested answer: B

When using the AWS Encryption SDK now does the developer keep track of the data encryption keys used to encrypt data?

A.
The developer must manually Keep track of the data encryption keys used for each data object
A.
The developer must manually Keep track of the data encryption keys used for each data object
Answers
B.
The SDK encrypts the data encryption key and stores it (encrypted) as part of the returned ciphertext
B.
The SDK encrypts the data encryption key and stores it (encrypted) as part of the returned ciphertext
Answers
C.
The SDK stores the data encryption keys automatically m Amazon S3
C.
The SDK stores the data encryption keys automatically m Amazon S3
Answers
D.
The data encryption key is stored in the userdata for the EC2 instance
D.
The data encryption key is stored in the userdata for the EC2 instance
Answers
Suggested answer: B
Total 608 questions
Go to page: of 61