ExamGecko
Home Home / Amazon / DVA-C01

Amazon DVA-C01 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











A company is migrating its on-premises database to Amazon RDS for MySQL. The company has readheavy workloads, and wants to make sure it re-factors its code to achieve optimum read performance for its queries. How can this objective be met?

A.
Add database retries to effectively use RDS with vertical scaling
A.
Add database retries to effectively use RDS with vertical scaling
Answers
B.
Use RDS with multi-AZ deployment
B.
Use RDS with multi-AZ deployment
Answers
C.
Add a connection string to use an RDS read replica for read queries
C.
Add a connection string to use an RDS read replica for read queries
Answers
D.
Add a connection string to use a read replica on an EC2 instance.
D.
Add a connection string to use a read replica on an EC2 instance.
Answers
Suggested answer: C

A Developer is receiving HTTP 400: ThrottlingException errors intermittently when calling theAmazonCloudWatch API. When a call fails, no data is retrieved. What best practice should first be applied to address this issue?

A.
Contact AWS Support for a limit increase.
A.
Contact AWS Support for a limit increase.
Answers
B.
Use the AWS CLI to get the metrics
B.
Use the AWS CLI to get the metrics
Answers
C.
Analyze the applications and remove the API call
C.
Analyze the applications and remove the API call
Answers
D.
Retry the call with exponential backoff
D.
Retry the call with exponential backoff
Answers
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/cloudwatch_limits.html

A Developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB. In the local development environment, the application has used IAM access keys. The application is now ready for deployment onto an ECS cluster.

How should the application authenticate with AWS services in production?

A.
Configure an ECS task IAM role for the application to use
A.
Configure an ECS task IAM role for the application to use
Answers
B.
Refactor the application to call AWS STS AssumeRole based on an instance role
B.
Refactor the application to call AWS STS AssumeRole based on an instance role
Answers
C.
Configure AWS access key/secret access key environment variables with new credentials
C.
Configure AWS access key/secret access key environment variables with new credentials
Answers
D.
Configure the credentials file with a new access key/secret access key
D.
Configure the credentials file with a new access key/secret access key
Answers
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task_IAM_role.html#:~:targetText=Amazon%20ECS%20Task%20Role,Task%20Role%20trust%20relationship%20policy.

A Developer created a Lambda function for a web application backend. When testing the Lambda function from the AWS Lambda console, the Developer can see that the function is being executed, but there is no log data being generated in Amazon CloudWatch Logs, even after several minutes.

What could cause this situation?

A.
The Lambda function does not have any explicit log statements for the log data to send it to CloudWatch Logs.
A.
The Lambda function does not have any explicit log statements for the log data to send it to CloudWatch Logs.
Answers
B.
The Lambda function is missing CloudWatch Logs as a source trigger to send log data.
B.
The Lambda function is missing CloudWatch Logs as a source trigger to send log data.
Answers
C.
The execution role for the Lambda function is missing permissions to write log data to the CloudWatch Logs.
C.
The execution role for the Lambda function is missing permissions to write log data to the CloudWatch Logs.
Answers
D.
The Lambda function is missing a target CloudWatch Log group.
D.
The Lambda function is missing a target CloudWatch Log group.
Answers
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/lambda/latest/dg/lambda-monitoring.html

An application has hundreds of users. Each user may use multiple devices to access the application. The Developer wants to assign unique identifiers to these users regardless of the device they use.

Which of the following methods should be used to obtain unique identifiers?

A.
Create a user table in Amazon DynamoDB as key-value pairs of users and their devices. Use these keys as unique identifiers.
A.
Create a user table in Amazon DynamoDB as key-value pairs of users and their devices. Use these keys as unique identifiers.
Answers
B.
Use IAM-generated access key IDs for the users as the unique identifier, but do not store secret keys.
B.
Use IAM-generated access key IDs for the users as the unique identifier, but do not store secret keys.
Answers
C.
Implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.
C.
Implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.
Answers
D.
Assign IAM users and roles to the users. Use the unique IAM resource ID as the unique identifier.
D.
Assign IAM users and roles to the users. Use the unique IAM resource ID as the unique identifier.
Answers
Suggested answer: C

An application is designed to use Amazon SQS to manage messages from many independent senders. Each sender’s messages must be processed in the order they are received. Which SQS feature should be implemented by the Developer?

A.
Configure each sender with a unique MessageGroupId
A.
Configure each sender with a unique MessageGroupId
Answers
B.
Enable MessageDeduplicationIds on the SQS queue
B.
Enable MessageDeduplicationIds on the SQS queue
Answers
C.
Configure each message with unique MessageGroupIds.
C.
Configure each message with unique MessageGroupIds.
Answers
D.
Enable ContentBasedDeduplication on the SQS queue
D.
Enable ContentBasedDeduplication on the SQS queue
Answers
Suggested answer: A

A deployment package uses the AWS CLI to copy files into any S3 bucket in the account, using access keys stored in environment variables. The package is running on EC2 instances, and the instances have been modified to run with an assumed IAM role and a more restrictive policy that allows access to only one bucket.

After the change, the Developer logs into the host and still has the ability to write into all of the S3 buckets in that account. What is the MOST likely cause of this situation?

A.
An IAM inline policy is being used on the IAM role
A.
An IAM inline policy is being used on the IAM role
Answers
B.
An IAM managed policy is being used on the IAM role
B.
An IAM managed policy is being used on the IAM role
Answers
C.
The AWS CLI is corrupt and needs to be reinstalled
C.
The AWS CLI is corrupt and needs to be reinstalled
Answers
D.
The AWS credential provider looks for instance profile credentials last
D.
The AWS credential provider looks for instance profile credentials last
Answers
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/sdk-for-java/v1/developer-guide/credentials.html

A Developer is writing transactions into a DynamoDB table called “SystemUpdates” that has 5 write capacity units. Which option has the highest read throughput?

A.
Eventually consistent reads of 5 read capacity units reading items that are 4 KB in size
A.
Eventually consistent reads of 5 read capacity units reading items that are 4 KB in size
Answers
B.
Strongly consistent reads of 5 read capacity units reading items that are 4 KB in size
B.
Strongly consistent reads of 5 read capacity units reading items that are 4 KB in size
Answers
C.
Eventually consistent reads of 15 read capacity units reading items that are 1 KB in size
C.
Eventually consistent reads of 15 read capacity units reading items that are 1 KB in size
Answers
D.
Strongly consistent reads of 15 read capacity units reading items that are 1 KB in size
D.
Strongly consistent reads of 15 read capacity units reading items that are 1 KB in size
Answers
Suggested answer: B

Where should an Elastic Beanstalk configuration file named healthcheckur1.config be placed in the application source bundle?

A.
In the root of the application
A.
In the root of the application
Answers
B.
In the bin folder
B.
In the bin folder
Answers
C.
In healthcheckur1.config.ebextension under root
C.
In healthcheckur1.config.ebextension under root
Answers
D.
In the .ebextensions folder
D.
In the .ebextensions folder
Answers
Suggested answer: D

During non-peak hours, a Developer wants to minimize the execution time of a full Amazon DynamoDB table scan without affecting normal workloads. The workloads average half of the strongly consistent read capacity units during non-peak hours.

How would the Developer optimize this scan?

A.
Use parallel scans while limiting the rate
A.
Use parallel scans while limiting the rate
Answers
B.
Use sequential scans
B.
Use sequential scans
Answers
C.
Increase read capacity units during the scan operation
C.
Increase read capacity units during the scan operation
Answers
D.
Change consistency to eventually consistent during the scan operation
D.
Change consistency to eventually consistent during the scan operation
Answers
Suggested answer: A

Explanation:

https://aws.amazon.com/blogs/developer/rate-limited-scans-in-amazon-dynamodb/

Total 608 questions
Go to page: of 61