ExamGecko
Home / Amazon / DVA-C01 / List of questions
Ask Question

Amazon DVA-C01 Practice Test - Questions Answers, Page 9

List of questions

Question 81

Report
Export
Collapse

A company is migrating its on-premises database to Amazon RDS for MySQL. The company has readheavy workloads, and wants to make sure it re-factors its code to achieve optimum read performance for its queries. How can this objective be met?

Add database retries to effectively use RDS with vertical scaling
Add database retries to effectively use RDS with vertical scaling
Use RDS with multi-AZ deployment
Use RDS with multi-AZ deployment
Add a connection string to use an RDS read replica for read queries
Add a connection string to use an RDS read replica for read queries
Add a connection string to use a read replica on an EC2 instance.
Add a connection string to use a read replica on an EC2 instance.
Suggested answer: C
asked 16/09/2024
NEXAR DONADIO
33 questions

Question 82

Report
Export
Collapse

A Developer is receiving HTTP 400: ThrottlingException errors intermittently when calling theAmazonCloudWatch API. When a call fails, no data is retrieved. What best practice should first be applied to address this issue?

Contact AWS Support for a limit increase.
Contact AWS Support for a limit increase.
Use the AWS CLI to get the metrics
Use the AWS CLI to get the metrics
Analyze the applications and remove the API call
Analyze the applications and remove the API call
Retry the call with exponential backoff
Retry the call with exponential backoff
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/cloudwatch_limits.html

asked 16/09/2024
Roberto Pili
29 questions

Question 83

Report
Export
Collapse

A Developer is testing a Docker-based application that uses the AWS SDK to interact with Amazon DynamoDB. In the local development environment, the application has used IAM access keys. The application is now ready for deployment onto an ECS cluster.

How should the application authenticate with AWS services in production?

Configure an ECS task IAM role for the application to use
Configure an ECS task IAM role for the application to use
Refactor the application to call AWS STS AssumeRole based on an instance role
Refactor the application to call AWS STS AssumeRole based on an instance role
Configure AWS access key/secret access key environment variables with new credentials
Configure AWS access key/secret access key environment variables with new credentials
Configure the credentials file with a new access key/secret access key
Configure the credentials file with a new access key/secret access key
Suggested answer: A

Explanation:

https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task_IAM_role.html#:~:targetText=Amazon%20ECS%20Task%20Role,Task%20Role%20trust%20relationship%20policy.

asked 16/09/2024
Audrey Buan
32 questions

Question 84

Report
Export
Collapse

A Developer created a Lambda function for a web application backend. When testing the Lambda function from the AWS Lambda console, the Developer can see that the function is being executed, but there is no log data being generated in Amazon CloudWatch Logs, even after several minutes.

What could cause this situation?

The Lambda function does not have any explicit log statements for the log data to send it to CloudWatch Logs.
The Lambda function does not have any explicit log statements for the log data to send it to CloudWatch Logs.
The Lambda function is missing CloudWatch Logs as a source trigger to send log data.
The Lambda function is missing CloudWatch Logs as a source trigger to send log data.
The execution role for the Lambda function is missing permissions to write log data to the CloudWatch Logs.
The execution role for the Lambda function is missing permissions to write log data to the CloudWatch Logs.
The Lambda function is missing a target CloudWatch Log group.
The Lambda function is missing a target CloudWatch Log group.
Suggested answer: C

Explanation:

https://docs.aws.amazon.com/lambda/latest/dg/lambda-monitoring.html

asked 16/09/2024
Benjamin Colart
47 questions

Question 85

Report
Export
Collapse

An application has hundreds of users. Each user may use multiple devices to access the application. The Developer wants to assign unique identifiers to these users regardless of the device they use.

Which of the following methods should be used to obtain unique identifiers?

Create a user table in Amazon DynamoDB as key-value pairs of users and their devices. Use these keys as unique identifiers.
Create a user table in Amazon DynamoDB as key-value pairs of users and their devices. Use these keys as unique identifiers.
Use IAM-generated access key IDs for the users as the unique identifier, but do not store secret keys.
Use IAM-generated access key IDs for the users as the unique identifier, but do not store secret keys.
Implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.
Implement developer-authenticated identities by using Amazon Cognito, and get credentials for these identities.
Assign IAM users and roles to the users. Use the unique IAM resource ID as the unique identifier.
Assign IAM users and roles to the users. Use the unique IAM resource ID as the unique identifier.
Suggested answer: C
asked 16/09/2024
richard van der sligte
35 questions

Question 86

Report
Export
Collapse

An application is designed to use Amazon SQS to manage messages from many independent senders. Each sender’s messages must be processed in the order they are received. Which SQS feature should be implemented by the Developer?

Configure each sender with a unique MessageGroupId
Configure each sender with a unique MessageGroupId
Enable MessageDeduplicationIds on the SQS queue
Enable MessageDeduplicationIds on the SQS queue
Configure each message with unique MessageGroupIds.
Configure each message with unique MessageGroupIds.
Enable ContentBasedDeduplication on the SQS queue
Enable ContentBasedDeduplication on the SQS queue
Suggested answer: A
asked 16/09/2024
Biji Abraham
39 questions

Question 87

Report
Export
Collapse

A deployment package uses the AWS CLI to copy files into any S3 bucket in the account, using access keys stored in environment variables. The package is running on EC2 instances, and the instances have been modified to run with an assumed IAM role and a more restrictive policy that allows access to only one bucket.

After the change, the Developer logs into the host and still has the ability to write into all of the S3 buckets in that account. What is the MOST likely cause of this situation?

An IAM inline policy is being used on the IAM role
An IAM inline policy is being used on the IAM role
An IAM managed policy is being used on the IAM role
An IAM managed policy is being used on the IAM role
The AWS CLI is corrupt and needs to be reinstalled
The AWS CLI is corrupt and needs to be reinstalled
The AWS credential provider looks for instance profile credentials last
The AWS credential provider looks for instance profile credentials last
Suggested answer: B

Explanation:

https://docs.aws.amazon.com/sdk-for-java/v1/developer-guide/credentials.html

asked 16/09/2024
Rajeev Parameswaran
38 questions

Question 88

Report
Export
Collapse

A Developer is writing transactions into a DynamoDB table called “SystemUpdates” that has 5 write capacity units. Which option has the highest read throughput?

Eventually consistent reads of 5 read capacity units reading items that are 4 KB in size
Eventually consistent reads of 5 read capacity units reading items that are 4 KB in size
Strongly consistent reads of 5 read capacity units reading items that are 4 KB in size
Strongly consistent reads of 5 read capacity units reading items that are 4 KB in size
Eventually consistent reads of 15 read capacity units reading items that are 1 KB in size
Eventually consistent reads of 15 read capacity units reading items that are 1 KB in size
Strongly consistent reads of 15 read capacity units reading items that are 1 KB in size
Strongly consistent reads of 15 read capacity units reading items that are 1 KB in size
Suggested answer: B
asked 16/09/2024
Ed Robbins
28 questions

Question 89

Report
Export
Collapse

Where should an Elastic Beanstalk configuration file named healthcheckur1.config be placed in the application source bundle?

In the root of the application
In the root of the application
In the bin folder
In the bin folder
In healthcheckur1.config.ebextension under root
In healthcheckur1.config.ebextension under root
In the .ebextensions folder
In the .ebextensions folder
Suggested answer: D
asked 16/09/2024
Linda Jannina Sourander
38 questions

Question 90

Report
Export
Collapse

During non-peak hours, a Developer wants to minimize the execution time of a full Amazon DynamoDB table scan without affecting normal workloads. The workloads average half of the strongly consistent read capacity units during non-peak hours.

How would the Developer optimize this scan?

Use parallel scans while limiting the rate
Use parallel scans while limiting the rate
Use sequential scans
Use sequential scans
Increase read capacity units during the scan operation
Increase read capacity units during the scan operation
Change consistency to eventually consistent during the scan operation
Change consistency to eventually consistent during the scan operation
Suggested answer: A

Explanation:

https://aws.amazon.com/blogs/developer/rate-limited-scans-in-amazon-dynamodb/

asked 16/09/2024
Reatlehile Motaung
25 questions
Total 608 questions
Go to page: of 61
Search

Related questions