ExamGecko
Home / Amazon / DVA-C01 / List of questions
Ask Question

Amazon DVA-C01 Practice Test - Questions Answers, Page 18

List of questions

Question 171

Report
Export
Collapse

A customer wants to deploy its source code on an AWS Elastic Beanstalk environment. The customer needs to perform deployment with minimal outage and should only use existing instances to retain application access log. What deployment policy would satisfy these requirements?

Rolling
Rolling
All at once
All at once
Rolling with an additional batch
Rolling with an additional batch
Immutable
Immutable
Suggested answer: A
asked 16/09/2024
FUKUMOTO AYUMI
31 questions

Question 172

Report
Export
Collapse

A Developer has been asked to build a real-time dashboard web application to visualize the key prefixes and storage size of objects in Amazon S3 buckets. Amazon DynamoDB will be used to store the Amazon S3 metadata. What is the optimal and MOST cost-effective design to ensure that the real-time dashboard is kept up to date with the state of the objects in the Amazon S3 buckets?

Use an Amazon CloudWatch event backed by an AWS Lambda function. Issue an Amazon S3 API call to get a list of all Amazon S3 objects and persist the metadata within DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Use an Amazon CloudWatch event backed by an AWS Lambda function. Issue an Amazon S3 API call to get a list of all Amazon S3 objects and persist the metadata within DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Use Amazon S3 Event Notification backed by a Lambda function to persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Use Amazon S3 Event Notification backed by a Lambda function to persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Run a cron job within an Amazon EC2 instance to list all objects within Amazon S3 and persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Run a cron job within an Amazon EC2 instance to list all objects within Amazon S3 and persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Create a new Amazon EMR cluster to get all the metadata about Amazon S3 objects; persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Create a new Amazon EMR cluster to get all the metadata about Amazon S3 objects; persist the metadata into DynamoDB. Have the web application poll the DynamoDB table to reflect this change.
Suggested answer: A
asked 16/09/2024
Shivanth Jha
36 questions

Question 173

Report
Export
Collapse

A Developer must repeatedly and consistently deploy a serverless RESTful API on AWS.

Which techniques will work? (Choose two.)

Define a Swagger file. Use AWS Elastic Beanstalk to deploy the Swagger file.
Define a Swagger file. Use AWS Elastic Beanstalk to deploy the Swagger file.
Define a Swagger file. Use AWS CodeDeploy to deploy the Swagger file.
Define a Swagger file. Use AWS CodeDeploy to deploy the Swagger file.
Deploy a SAM template with an inline Swagger definition.
Deploy a SAM template with an inline Swagger definition.
Define a Swagger file. Deploy a SAM template that references the Swagger file.
Define a Swagger file. Deploy a SAM template that references the Swagger file.
Define an inline Swagger definition in a Lambda function. Invoke the Lambda function.
Define an inline Swagger definition in a Lambda function. Invoke the Lambda function.
Suggested answer: C, D

Explanation:

https://aws.amazon.com/about-aws/whats-new/2017/02/aws-serverless-application-model-awssam-supports-inline-swagger-and-aws-cloudformation-intrinsic-functions/ https://aws.amazon.com/about-aws/whats-new/2017/02/aws-serverless-application-model-awssam-supports-inline-swagger-and-aws-cloudformation-intrinsic-functions/

asked 16/09/2024
Louis Flink
32 questions

Question 174

Report
Export
Collapse

A set of APIs are exposed to customers using the Amazon API Gateway. These APIs have caching enabled on the API Gateway. Customers have asked for an option to invalidate this cache for each of the APIs. What action can be taken to allow API customers to invalidate the API Cache?

Ask customers to use AWS credentials to call the InvalidateCache API.
Ask customers to use AWS credentials to call the InvalidateCache API.
Ask customers to invoke an AWS API endpoint which invalidates the cache.
Ask customers to invoke an AWS API endpoint which invalidates the cache.
Ask customers to pass an HTTP header called Cache-Control:max-age=0.
Ask customers to pass an HTTP header called Cache-Control:max-age=0.
Ask customers to add a query string parameter called “INVALIDATE_CACHE” when making an API call.
Ask customers to add a query string parameter called “INVALIDATE_CACHE” when making an API call.
Suggested answer: C

Explanation:

https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Control

https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-caching.htmlInvalidate an API Gateway Cache Entry A client of your API can invalidate an existing cache entry and reload it from the integration endpoint for individual requests. The client must send a request thatcontains the Cache-Control: max-age=0 header. The client receives the response directly from theintegration endpoint instead of the cache, provided that the client is authorized to do so. This replaces the existing cache entry with the new response, which is fetched from the integrationendpoint.

asked 16/09/2024
Duncan Brundseaux
41 questions

Question 175

Report
Export
Collapse

A Developer uses AWS CodeDeploy to automate application deployment that connects to an external MySQL database. The Developer wants to securely access the encrypted secrets, such as API keys and database passwords. Which of the following solutions would involve the LEAST administrative effort?

Save the secrets in Amazon S3 with AWS KMS server-side encryption, and use a signed URL to access them by using the IAM role from Amazon EC2 instances.
Save the secrets in Amazon S3 with AWS KMS server-side encryption, and use a signed URL to access them by using the IAM role from Amazon EC2 instances.
Use the instance metadata to store the secrets and to programmatically access the secrets from EC2 instances.
Use the instance metadata to store the secrets and to programmatically access the secrets from EC2 instances.
Use the Amazon DynamoDB client-side encryption library to save the secrets in DynamoDB and to programmatically access the secrets from EC2 instances.
Use the Amazon DynamoDB client-side encryption library to save the secrets in DynamoDB and to programmatically access the secrets from EC2 instances.
Use AWS SSM Parameter Store to store the secrets and to programmatically access them by using the IAM role from EC2 instances.
Use AWS SSM Parameter Store to store the secrets and to programmatically access them by using the IAM role from EC2 instances.
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/systems-manager/latest/userguide/systems-manager-parameterstore.html

asked 16/09/2024
Joseph Lewis
46 questions

Question 176

Report
Export
Collapse

An application running on EC2 instances is storing data in an S3 bucket. Security policy mandates that all data must be encrypted in transit.

How can the Developer ensure that all traffic to the S3 bucket is encrypted?

Install certificates on the EC2 instances.
Install certificates on the EC2 instances.
Create a bucket policy that allows traffic where SecureTransport is true.
Create a bucket policy that allows traffic where SecureTransport is true.
Create an HTTPS redirect on the EC2 instances.
Create an HTTPS redirect on the EC2 instances.
Create a bucket policy that denies traffic where SecureTransport is false.
Create a bucket policy that denies traffic where SecureTransport is false.
Suggested answer: D

Explanation:

https://aws.amazon.com/blogs/security/how-to-use-bucket-policies-and-apply-defense-in-depth-tohelp-secure-your-amazon-s3-data/

asked 16/09/2024
FRANK THYS
38 questions

Question 177

Report
Export
Collapse

A company is developing a new online game that will run on top of Amazon ECS. Four distinct Amazon ECS services will be part of the architecture, each requiring specific permissions to various AWS services. The company wants to optimize the use of the underlying Amazon EC2 instances by bin packing the containers based on memory reservation. Which configuration would allow the Development team to meet these requirements MOST securely?

Create a new Identity and Access Management (IAM) instance profile containing the required permissions for the various ECS services, then associate that instance role with the underlying EC2 instances.
Create a new Identity and Access Management (IAM) instance profile containing the required permissions for the various ECS services, then associate that instance role with the underlying EC2 instances.
Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then configure each ECS service to reference the associated IAM role.
Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then configure each ECS service to reference the associated IAM role.
Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then, create an IAM group and configure the ECS cluster to reference that group.
Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then, create an IAM group and configure the ECS cluster to reference that group.
Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then configure each ECS task definition to referen?e the associated IAM role.
Create four distinct IAM roles, each containing the required permissions for the associated ECS service, then configure each ECS task definition to referen?e the associated IAM role.
Suggested answer: D

Explanation:

https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-placement-strategies.html.

asked 16/09/2024
Jerin Cherian
36 questions

Question 178

Report
Export
Collapse

A company needs to encrypt data at rest, but it wants to leverage an AWS managed service using its own master key. Which of the following AWS service can be used to meet these requirements?

SSE with Amazon S3
SSE with Amazon S3
SSE with AWS KMS
SSE with AWS KMS
Client-side encryption
Client-side encryption
AWS IAM roles and policies
AWS IAM roles and policies
Suggested answer: B
asked 16/09/2024
Nicola Grossi
38 questions

Question 179

Report
Export
Collapse

When a Developer tries to run an AWS CodeBuild project, it raises an error because the length of all environment variables exceeds the limit for the combined maximum of characters. What is the recommended solution?

Add the export LC_ALL=“en_US.utf8” command to the pre_build section to ensure POSIX localization.
Add the export LC_ALL=“en_US.utf8” command to the pre_build section to ensure POSIX localization.
Use Amazon Cognito to store key-value pairs for large numbers of environment variables.
Use Amazon Cognito to store key-value pairs for large numbers of environment variables.
Update the settings for the build project to use an Amazon S3 bucket for large numbers of environment variables.
Update the settings for the build project to use an Amazon S3 bucket for large numbers of environment variables.
Use AWS Systems Manager Parameter Store to store large numbers of environment variables.
Use AWS Systems Manager Parameter Store to store large numbers of environment variables.
Suggested answer: D
asked 16/09/2024
Muhammad Imran
41 questions

Question 180

Report
Export
Collapse

A Lambda function is packaged for deployment to multiple environments, including development, test, production, etc. Each environment has unique set of resources such as databases, etc. How can the Lambda function use the resources for the current environment?

Apply tags to the Lambda functions.
Apply tags to the Lambda functions.
Hardcore resources in the source code.
Hardcore resources in the source code.
Use environment variables for the Lambda functions.
Use environment variables for the Lambda functions.
Use separate function for development and production.
Use separate function for development and production.
Suggested answer: C
asked 16/09/2024
Bruce Baynes
27 questions
Total 608 questions
Go to page: of 61
Search

Related questions