ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











A developer is creating a photo website. Amazon Route 53 hosts the website's domain. The developer wants to store the application code and images in an Amazon S3 bucket. The developer also wants to jse Amazon CloudFront to deliver the images to users. the developer has created the S3 bucket and a CloudFront distribution. The developer wants the images to be accessed only through the website's domain. Users must not use the S3 URLs. Which solution will meet these requirements?

A.
Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Create an alias in Route 53 that points the website domain to the S3 bucket.
A.
Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Create an alias in Route 53 that points the website domain to the S3 bucket.
Answers
B.
Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Update the Route 53 records to point the website domain to the CloudFront domain name.
B.
Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Update the Route 53 records to point the website domain to the CloudFront domain name.
Answers
C.
Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the S3 bucket.
C.
Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the S3 bucket.
Answers
D.
Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the CloudFront domain name.
D.
Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the CloudFront domain name.
Answers
Suggested answer: A

A company is using continuous integral ion/continuous delivery (CI/CD) systems. A that run on premises. Which AWS service should the developer use to meet these requirements?

A.
AWSCIoud9
A.
AWSCIoud9
Answers
B.
AWS CodeBuild
B.
AWS CodeBuild
Answers
C.
AWS Elastic Beanstalk
C.
AWS Elastic Beanstalk
Answers
D.
AWS CodeDeploy
D.
AWS CodeDeploy
Answers
Suggested answer: D

A developer is using AWS CodeDeploy to automate a company's application deployments to Amazon EC2.

Which application specification file properties are required to ensure the software deployments do not fail? {Select TWO.)

A.
The file must be a JSON-formatted file named appspec.json.
A.
The file must be a JSON-formatted file named appspec.json.
Answers
B.
The file must be a YAML-formatted file named appspec.yml
B.
The file must be a YAML-formatted file named appspec.yml
Answers
C.
The file must be stored in AWS CodeBuikJ and referenced from the application's source code.
C.
The file must be stored in AWS CodeBuikJ and referenced from the application's source code.
Answers
D.
The file must be placed in the root of the directory structure of the application's source code.
D.
The file must be placed in the root of the directory structure of the application's source code.
Answers
E.
The file must be stored in Amazon S3 and referenced from the application's source code.
E.
The file must be stored in Amazon S3 and referenced from the application's source code.
Answers
Suggested answer: B, D

A developer is writing a new web application that will be deployed and managed with AWS Elastic Beanstalk. The application will include an Amazon RDS DB instance. What steps should the developer take to access the RDS DB instance from the code? (Select TWO.)

A.
Modify the endpoint name using either the AWS Management Console or AWS CLI
A.
Modify the endpoint name using either the AWS Management Console or AWS CLI
Answers
B.
Upload the driver to Amazon S3 and reference it in the code
B.
Upload the driver to Amazon S3 and reference it in the code
Answers
C.
Download the appropriate database driver and include it with the application.
C.
Download the appropriate database driver and include it with the application.
Answers
D.
Construct a connection string using the Elastic Beanstalk environment variables
D.
Construct a connection string using the Elastic Beanstalk environment variables
Answers
E.
Create a CNAME record referencing database instances ALIAS.
E.
Create a CNAME record referencing database instances ALIAS.
Answers
Suggested answer: C, D

A security review for a software company's application infrastructure shows that there is no test coverage in any of the company's deployment pipelines. A developer must fix this issue as soon as possible. The company has been integrating the AWS Cloud Development Kit (AWS CDK) into the deployment process. However, much of the pipeline still uses AWS CloudFormation templates. The developer needs to add test coverage to all the deployment code. Which solution will meet these requirements with the LEAST amount of configuration?

A.
Write unit tests by using the AWS CDK assertions module. Create CloudFormation template instances by using the module's Template class for the existing CloudFormation templates and the module's Capture class for the CDK stacks.
A.
Write unit tests by using the AWS CDK assertions module. Create CloudFormation template instances by using the module's Template class for the existing CloudFormation templates and the module's Capture class for the CDK stacks.
Answers
B.
Write unit tests by using the AWS CDK assertions module. Create CloudFormation template instances by using the module's Template.fromStringO method for the existing CloudFormation templates and the module's Template fromStackQ method for the CDK stacks.
B.
Write unit tests by using the AWS CDK assertions module. Create CloudFormation template instances by using the module's Template.fromStringO method for the existing CloudFormation templates and the module's Template fromStackQ method for the CDK stacks.
Answers
C.
Convert the CloudFormation templates into CDK stacks by using the AWS CDK Cfnlnclude construct. Write unit tests against the templates by using CloudFormation rule assertions.
C.
Convert the CloudFormation templates into CDK stacks by using the AWS CDK Cfnlnclude construct. Write unit tests against the templates by using CloudFormation rule assertions.
Answers
D.
Convert the CDK stacks into CloudFormation templates by using the AWS CDK Cfnlnclude construct Write unit tests against the templates by using CloudFormation rule assertions
D.
Convert the CDK stacks into CloudFormation templates by using the AWS CDK Cfnlnclude construct Write unit tests against the templates by using CloudFormation rule assertions
Answers
Suggested answer: A

A developer is creating a new batch application that will run on an Amazon EC2 instance. The application requires read access to an Amazon S3 bucket. The developer needs to follow security best practices to grant S3 read access to the application.

Which solution meets these requirements?

A.
Add the permissions to an 1AM policy. Attach the policy to a role Attach the role to the EC2 instance profile.
A.
Add the permissions to an 1AM policy. Attach the policy to a role Attach the role to the EC2 instance profile.
Answers
B.
Add the permissions inline to an 1AM group. Attach the group to the EC2 instance profile.
B.
Add the permissions inline to an 1AM group. Attach the group to the EC2 instance profile.
Answers
C.
Add the permissions to an 1AM policy. Attach the policy to a user Attach the user to the EC2 instance profile.
C.
Add the permissions to an 1AM policy. Attach the policy to a user Attach the user to the EC2 instance profile.
Answers
D.
Add the permissions to an 1AM policy. Use 1AM web identity federation to access the S3 bucket with the policy
D.
Add the permissions to an 1AM policy. Use 1AM web identity federation to access the S3 bucket with the policy
Answers
Suggested answer: A

A company has an application that provides blog hosting services to its customers. The application includes an Amazon DynamoDB table with a primary key The primary key consists of the customers' UserName as a partition key and the NumberOIBIogs as a sort key. The application stores the TotalReactionsOnBlogs as an attribute on the same DynamoDB table. A developer needs to implement an operation to retrieve the top 10 customers based on the greatest number of reactions on their blogs This operation must not consume the DynamoDB table's existing read capacity. What should the developer do to meet these requirements in the MOST operationally efficient manner?

A.
For the existing DynamoDB table, create a new global secondary index (GSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key.
A.
For the existing DynamoDB table, create a new global secondary index (GSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key.
Answers
B.
For the existing DynamoDB table, create a new local secondary index (LSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key
B.
For the existing DynamoDB table, create a new local secondary index (LSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key
Answers
C.
Back up and restore the DynamoDB table to a new DynamoDB table Create a new global secondary index (GSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key Delete the old DynamoDB table
C.
Back up and restore the DynamoDB table to a new DynamoDB table Create a new global secondary index (GSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key Delete the old DynamoDB table
Answers
D.
Back up and restore the DynamoDB table to a new DynamoDB table. Create a new local secondary index (LSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key. Delete the old DynamoDB table.
D.
Back up and restore the DynamoDB table to a new DynamoDB table. Create a new local secondary index (LSI) that has the UserName as a partition key and the TotalReactionsOnBlogs as a sort key. Delete the old DynamoDB table.
Answers
Suggested answer: B

A developer is creating an AWS CloudFormation template to deploy Amazon EC2 instances across multiple AWS accounts. The developer must choose the EC2 instances from a list of approved instance types. How can the developer incorporate the list of approved instance types in the CloudFormation template?

A.
Create a separate CloudFormation template for each EC2 instance type in the list
A.
Create a separate CloudFormation template for each EC2 instance type in the list
Answers
B.
In the Resources section of the CloudFormation template, create resources for each EC2 instance type in the list.
B.
In the Resources section of the CloudFormation template, create resources for each EC2 instance type in the list.
Answers
C.
In the CloudFormation template, create a separate parameter for each EC2 instance type in the list.
C.
In the CloudFormation template, create a separate parameter for each EC2 instance type in the list.
Answers
D.
In the CloudFormation template, create a parameter with the list of EC2 instance types as AllowedValues
D.
In the CloudFormation template, create a parameter with the list of EC2 instance types as AllowedValues
Answers
Suggested answer: B

A company is using an Amazon API Gateway REST API endpoint as a webhook lo publish events from an on-premises source control management (SCM) system to Amazon EventBridge. The company has configured an EventBridge rule to listen for the events and to control application deployment m a central AWS account. The company needs to receive the same events across multiple receiver AWS accounts How can a developer meet these requirements without changing the configuration of the SCM system?

A.
Deploy the API Gateway REST API to all the required AWS accounts. Use the same custom domain name for all the gateway endpoints so that a single SCM webhook can be used for all events from all accounts.
A.
Deploy the API Gateway REST API to all the required AWS accounts. Use the same custom domain name for all the gateway endpoints so that a single SCM webhook can be used for all events from all accounts.
Answers
B.
Deploy the API Gateway REST API to all the receiver AWS accounts Create as many SCM webhooks as the number of AWS accounts.
B.
Deploy the API Gateway REST API to all the receiver AWS accounts Create as many SCM webhooks as the number of AWS accounts.
Answers
C.
Grant permission to the central AWS account for EventBridge to access the receiver AWS accounts. Add an EventBridge event bus on the receiver AWS accounts as the targets to the existing EventBridge rule
C.
Grant permission to the central AWS account for EventBridge to access the receiver AWS accounts. Add an EventBridge event bus on the receiver AWS accounts as the targets to the existing EventBridge rule
Answers
D.
Convert the API Gateway type from REST API to HTTP API
D.
Convert the API Gateway type from REST API to HTTP API
Answers
Suggested answer: A

A developer needs to secure the static assets in a company's Amazon S3 bucket that is named DOCEXAMPLE- BUCKET. The company has an Amazon CtoudFront distribution that serves the S3 bucket's assets to the public. The developer has already created the origin access identity (OAI) and has associated the OAI with the distribution. The developer must write a bucket policy that allows only the CloudFront distribution to access the S3 bucket Which policy will meet this requirement MOST securely?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: C
Total 608 questions
Go to page: of 61