Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Note! The DVA-C01 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the DVA-C02 Exam.

DVA-C01 AWS Certified Developer Associate Exam Questions and Answers

Questions 4

A company is building an application to track athlete performance using an Amazon DynamoDB table. Each item in the table is identified by a partition key (user_id) and a sort key (sport_name). The table design is shown below:

(Note: Not all table attributes are shown)

A Developer is asked to write a leaderboard application to display the top performers (user_id) based on the score for each sport_name.

What process will allow the Developer to extract results MOST efficiently from the DynamoDB table?

Options:

A.

Use a DynamoDB query operation with the key attributes of user_id and sport_name and order the results based on the score attribute.

B.

Create a global secondary index with a partition key of sport_name and a sort key of score, and get the results

C.

Use a DynamoDB scan operation to retrieve scores and user_id based on sport_name, and order the results based on the score attribute.

D.

Create a local secondary index with a primary key of sport_name and a sort key of score and get the results based on the score attribute.

Buy Now
Questions 5

A developer is developing an application that uses signed requests (Signature Version 4) to call other AWS services The developer has created a canonical request, has created the string to sign, and has calculated signing information

Which methods could the developer use to complete a signed request? (Select TWO)

Options:

A.

Add the signature to an HTTP header that is named Authorization

B.

Add the signature to a session cookie

C.

Add the signature to an HTTP header that 15 named Authentication

D.

Add the signature to a query string parameter that is named X-Amz-Signature

E.

Add the signature to an HTTP header that is named WWW-Authenticate

Buy Now
Questions 6

A development team uses AWS Elastic Beanstalk to deploy a Java-based web application. The team wants to ensure that the changes to the source code and the configuration are always deployed on new instances The team configures the Elastic Beanstalk environment to use immutable updates. However an error occurs the first time a change is deployed with the new update policy

What is the MOST likely cause of this issue?

Options:

A.

Immutable updates are not supported for Java-based applications

B.

The account has reached its on-demand instance limit

C.

Immutable updates are only supported for m4 large and larger instance types.

D.

The developer must also modify the ebextensions/immutable-updates config file to enable immutable updates

Buy Now
Questions 7

A developer needs to deploy a new version to an AWS Elastic Beanstalk application How can the developer accomplish this task?

Options:

A.

Upload and deploy the new application version in the Elastic Beanstalk console

B.

Use the eb init CLI command to deploy a new version '

C.

Terminate the current Elastic Beanstalk environment and create a new one

D.

Modify the ebextensions folder to add a source option to services

Buy Now
Questions 8

A company wants to migrate an existing web application to AWS. The application consists of two web servers and a MySQL database

The company wants the application to automatically scale in response to demand The company also wants to reduce its operational overhead for database backups and maintenance The company needs the ability to deploy multiple versions of the application concurrently

What is the MOST operationally efficient solution that meets these requirements?

Options:

A.

Deploy the application to AWS Elastic Beanstalk. Migrate the database to an Amazon RDS Multi-AZ DB instance

B.

Create an Amazon Machine Image (AMI) that contains the application code. Create an Auto Scaling group that is based on

the AMI Integrate the Auto Scaling group with an Application Load Balancer for the web servers. Migrate the database to a MySQL instance that runs on an Amazon EC2 instance.

C.

Deploy the application to AWS Elastic Beanstalk. Migrate the database to a MySQL instance that runs on an Amazon EC2

instance.

D.

Create an Amazon Machine Image (AMI) that contains the application code. Create an Auto Scaling group that is based on

the AMI. Integrate the Auto Scaling group with an Application Load Balancer for the web servers. Migrate the database to an Amazon RDS Multi-AZ DB Instance

Buy Now
Questions 9

A developer is writing an AWS Lambda function. The developer wants to log key events that occur during the Lambda function and include a unique identifier to associate the events with a specific function invocation.

Which of the following will help the developer accomplish this objective?

Options:

A.

Obtain the request identifier from the Lambda context object Architect the application to write logs to the console.

B.

Obtain the request identifier from the Lambda event object Architect the application to write logs to a file

C.

Obtain the request identifier from the Lambda event object Architect the application to write logs to the console

D.

Obtain the request identifier from the Lambda context object Architect the application to write logs to a file.

Buy Now
Questions 10

A developer must modify an Alexa skill backed by an AWS Lambda function to access an Amazon DynamoDB table in a second account A role in the second account has been created with permissions to access the table

How should the table be accessed?

Options:

A.

Modify the Lambda function execution role's permissions to include the new role

B.

Change the Lambda function execution role to be the new role

C.

Assume the new role in the Lambda function when accessing the table

D.

Store the access key and the secret key for the new role and use them when accessing the table

Buy Now
Questions 11

NO:

A developer is setting up Amazon API Gateway for their company's products The API will be used by registered developers to query and update their environments. The company wants to limit the amount of requests end users can send for both cost and security reasons Management wants to offer registered developers the option of buying larger packages that allow for more requests.

How can the developer accomplish this with the LEAST amount of overhead management?

Options:

A.

Enable throttling for the API Gateway stage. Set a value for both the rate and burst capacity. If a registered user chooses a larger package, create a stage for them, adjust the values, and share the new URL with them.

B.

Set up Amazon CloudWatch API logging in API Gateway Create a filter based on the user and requestTime fields and create an alarm on this filter Write an AWS Lambda function to analyze the values and requester information, and respond accordingly Set up the function as the target for the alarm If a registered user chooses a larger package, update the Lambda code with the values.

C.

Enable Amazon CloudWatch metrics for the API Gateway stage Set up CloudWatch alarms based off the Count metric and the ApiName, Method, Resource, and Stage dimensions to alerts when request rates pass the threshold Set the alarm action to Deny If a registered user chooses a larger package create a user-specific alarm and adjust the values

D.

Set up a default usage plan, specify values for the rate and burst capacity, and associate it with a stage, if a registered user chooses a larger package, create a custom plan with the appropriate values and associate the plan with the user

Buy Now
Questions 12

A company wants to containerize an existing three-tier web application and deploy it to Amazon ECS Fargate. The application is using session data to keep track of user activities.

Which approach would provide the BEST user experience?

Options:

A.

Provision a Redic cluster in Amazon ElasticCache and save the session data in the cluster

B.

Create a session table in Amazon Redshift and save the session data in the database table.

C.

Enable session stickness in the existing Network Load Balancer and manage the session data in the container.

D.

Use an Amazon S3 bucket as data store and save the session data in the bucket.

Buy Now
Questions 13

A Developer is trying to make API calls using SDK. The IAM user credentials used by the application require multi-factor authentication for all API calls.

Which method the Developer use to access the multi-factor authentication protected API?

Options:

A.

GetFederationToken

B.

GetCallerIdentity

C.

GetSessionToken

D.

DecodeAutherizationMessage

Buy Now
Questions 14

A developer is managing an application that uploads user files to an Amazon S3 bucket named companybucket. The company wants to maintain copies of all the files uploaded by users for compliance purposes, while ensuring users still have access to the data through the application.

Which IAM permissions should be applied to users to ensure they can create but not remove files from the bucket?

Options:

A.

DVA-C01 Question 14 Option 1

B.

14Text Description automatically generated

C.

14Text, letter Description automatically generated

D.

14Text Description automatically generated

Buy Now
Questions 15

A developer is debugging an AWS Lambda function behind an Amazon API Gateway. Whenever the API Gateway endpoint is called, HTTP status code 200 is returned even though AWS Lambda is recording a 4xx error.

What change needs to be made to return a proper error code through the API Gateway?

Options:

A.

Enable CORS in the API Gateway method settings.

B.

Use a Lambda proxy integration to return HTTP codes and headers.

C.

Enable API Gateway error pass-through.

D.

Return the value in the header X-Amzn-ErrorType.

Buy Now
Questions 16

A developer is storing JSON files in an Amazon S3 bucket. The developer wants to securely share an object with a specific group of people. How can the deveioper securely provide temporary access to the objects that are stored in the S3 bucket?

Options:

A.

Set object retention on the files. Use the AWS software development kit (SDK) to restore the object before subsequent requests. Provide the bucket's URL.

B.

Use the AWS software development kit (SDK) to generate a presigned URL. Provide the presigned URL.

C.

Set a bucket policy that restricts access after a period of time. Provide the bucket's S3 URL.

D.

Configure static web hosting on the S3 bucket. Provide the bucket's web URL.

Buy Now
Questions 17

A company uses Amazon DynamoDB as a data store for its order management system. The company frontend application stores orders in a DynamoDB table. The DynamoDB table is configured to send change events to a DynamoDB stream. The company uses an AWS Lambda function to log and process the incoming orders based on data from the DynamoDB stream.

An operational review reveals that the order quantity of incoming orders is sometimes set to 0. A developer needs to create a dashboard that will show how many unique customers this problem affects each day.

What should the developer do to implement the dashboard?

Options:

A.

Grant the Lambda function's execution role permissions to upload logs to Amazon CloudWatch Logs. Implement a CloudWatch Logs Insights query that selects the number of unique customers for orders with order quantity equal to 0 and groups the results in 1-day periods. Add the CloudWatch Logs Insights query to a CloudWatch dashboard.

B.

Use Amazon Athena to query AWS CloudTrail API logs for API calls. Implement an Athena query that selects the number of unique customers for orders with order quantity equal to 0 and groups the results in 1 -day periods. Add the Athena query to an Amazon CloudWatch dashboard.

C.

Configure the Lambda function to send events to Amazon EventBridge. Create an EventBridge rule that groups the number of unique customers for orders with order quantity equal to 0 in 1 -day periods. Add a CloudWatch dashboard as the target of the rule.

D.

Turn on custom Amazon CloudWatch metrics for the DynamoDB stream of the DynamoDB table. Create a CloudWatch alarm that groups the number of unique customers for orders with order quantity equal to 0 in 1-day periods. Add the CloudWatch alarm to a CloudWatch dashboard.

Buy Now
Questions 18

A developer is creating an AWS CloudFormation template to deploy Amazon EC2 instances across multiple AWS accounts. The developer must choose the EC2 instances from a list of approved instance types.

How can the developer incorporate the list of approved instance types in the CloudFormation template?

Options:

A.

Create a separate CloudFormation template for each EC2 instance type in the list

B.

In the Resources section of the CloudFormation template, create resources for each EC2 instance type in the list.

C.

In the CloudFormation template, create a separate parameter for each EC2 instance type in the list.

D.

In the CloudFormation template, create a parameter with the list of EC2 instance types as AllowedValues

Buy Now
Questions 19

A company has an ecommerce application. To track product reviews, the company's development team uses an Amazon DynamoDB table.

Every record includes the following:

• A Review ID, a 16-digit universally unique identifier (UUID)

• A Product ID and User ID. 16-digit UUIDs that reference other tables

• A Product Rating on a scale of 1—5 - An optional comment from the user

The table partition key is the Review ID. The most performed query against the table is to find the 10 reviews with the highest rating for a given product.

Which index will provide the FASTEST response tor this query?

Options:

A.

A global secondary index (GSI) with Product ID as the partition key and Product Rating as the sort key

B.

A global secondary index (GSI) with Product ID as the partition key and Review ID as the sort key

C.

A local secondary index (LSI) with Product ID as the partition key and Product Rating as the sort key

D.

A local secondary index (LSI) with Review ID as the partition key and Product ID as the sort key

Buy Now
Questions 20

A company is building an application for stock trading. The application needs sub-millisecond latency for processing trade requests. The company uses Amazon DynamoDB to store all the trading data that is used to process each trading request

A development team performs load testing on the application and finds that the data retrieval time is higher than expected. The development team needs a solution that reduces the data retrieval time with the least possible effort.

Which solution meets these requirements?

Options:

A.

Add local secondary indexes (LSIs) for the trading data

B.

Store the trading data in Amazon S3, and use S3 Transfer Acceleration.

C.

Add retries with exponential backoff for DynamoDB queries.

D.

Use DynamoDB Accelerator (DAX) to cache the trading data

Buy Now
Questions 21

A company is using AWS Elastic Beanstalk to deploy a three-tier application. The application uses an Amazon RDS DB instance as the database tier. The com wants to decouple the DB instance from the Elastic Beanstalk environment.

Which combination of steps should a developer take to meet this requirement? (Select TWO.)

Options:

A.

Create a new Elastic Beanstalk environment that connects to the DB instance.

B.

Create a new DB instance from a snapshot of the previous DB instance.

C.

Use the Elastic Beanstalk CLI to decouple the DB instance.

D.

Use the AWS CLI to decouple the DB instance.

E.

Modify the current Elastic Beanstalk environment to connect to the DB instance.

Buy Now
Questions 22

A developer has created a Java application that makes HTTP requests directly to AWS services. Application logging shows 5xx HTTP response codes that occ irregular intervals. The errors are affecting users.

How should the developer update the application to improve the application's resiliency?

Options:

A.

Revise the request content in the application code.

B.

Use the AWS SDK for Java to interact with AWS APIs.

C.

Scale out the application so that more instances of the application are running.

D.

Add additional logging to the application code.

Buy Now
Questions 23

A developer is creating a serverless web application and maintains different branches of code The developer wants to avoid updating the Amazon API Gateway target endpoint each time a new code push is performed What solution would allow me developer to perform a code push efficiently, without the need to update the API Gateway?

Options:

A.

Associate different AWS Lambda functions to an API Gateway target endpoint

B.

Create different stages in API Gateway, then associate API Gateway with aws Lambda

C.

Create aliases and versions In AWS Lambda.

D.

Tag the AWS Lambda functions with different names

Buy Now
Questions 24

A company has an AWS Lambda function that runs hourly, reads log files that are stored in Amazon S3, and forwards alerts to Amazon Simple Notification Service (Amazon SNS) topics based on content A developer wants to add a custom metric to the Lambda function to track the number of alerts of each type for each run The developer needs to log this information in Amazon CloudWatch in a metnc that is named Lambda/AlertCounts

How should the developer modify the Lambda function to meet this requirement with the LEAST operational overhead1?

Options:

A.

Add a print statement to standard out for each alert and the number of occurrences

B.

Add a call to the PutMetncData API operation Pass an array for alerts and the number of occurrences in the Values and Counts fields with a namespace of "Lambda/AlertCounts"

C.

Add a call to the PutMetncAlarm API operation Pass an array of alerts in the metrics member with the namespace of "Lambda/AlertCounts"

D.

Add a call to the PutDashboard API operation Pass an array of alerts in the metrics member with the namespace of "Lambda/AlertCounts"

Buy Now
Questions 25

A company has deployed an application on AWS Elastic Beanstalk The company has configured the Auto Scaling group that is associated with the Elastic Beanstalk environment to have five Amazon EC2 instances If the capacity is fewer than four EC2 instances during the deployment, application performance degrades The company is using the all-at-once deployment policy

What is the MOST cost-effective way to solve the deployment issue1?

Options:

A.

Change the Auto Scaling group to six desired instances

B.

Change the deployment policy to traffic splitting Specify an evaluation time of 1 hour.

C.

Change the deployment policy to rolling with additional batch Specify a batch size of 1

D.

Change the deployment policy to rolling Specify a batch size of 2.

Buy Now
Questions 26

A company is migrating a single-server, on-premises web application to AWS. The company intends to use multiple servers behind an Elastic Load Balancer (ELB) to balance the load, and will also store session data in memory on the web server. The company does not want to lose that session data if a server fails or goes offline, and it wants to minimize user’s downtime.

Where should the company move session data to MOST effectively reduce downtime and make users’ session data more fault tolerant?

Options:

A.

An Amazon ElastiCache for Redis cluster

B.

A second Amazon EBS volume

C.

The web server’s primary disk

D.

An Amazon EC2 instance dedicated to session data

Buy Now
Questions 27

An application adds a processing date to each transaction that it receives. The application writes each transaction to an Amazon DynamoDB table by using the Putitem operation. Each transaction has a unique ID (transactionlD). Sometimes the application receives transactions more than once.

A developer notices that duplicate transactions in DynamoDB have the latest processing date instead of the date when the transaction was first received. Duplicate records happen infrequently, and most of the transactions are unique.

What is the MOST cost-effective solution that the developer can implement to ensure that Putltem does not update an existing record?

Options:

A.

Call the Getltem operation first to confirm that the record does not exist. Then call Putltem

B.

Enable the TTL attribute on the DynamoDB table.

C.

Implement a conditional put by using the attribute_exists(transactionlD) condition expression.

D.

Implement a conditional put by using the attribute_not_exists(transactionlD) condition expression.

Buy Now
Questions 28

An e-commerce web application that shares session state on-premises is being migrated to AWS. The application must be fault tolerant, natively highly scalable, and any service interruption should not affect the user experience.

What is the best option to store the session state?

Options:

A.

Store the session state in Amazon ElastiCache

B.

Store the session state in Amazon CloudFront

C.

Store the session state in Amazon S3

D.

Enable session stickiness using elastic load balancers

Buy Now
Questions 29

A developer has launched an application that calls an API by way of Amazon API Gateway. It offers information that changes several times a day, but is not updated in real time. The application has become so popular that the API endpoint is overloaded and that traffic to the endpoint must be reduced.

What can the developer do to address the performance issues?

Options:

A.

Enable API caching in Amazon ElastiCache.

B.

Enable an Auto Scaling group on the endpoint service and database.

C.

Create an additional API Gateway and use an Application Load Balancer

Buy Now
Questions 30

A company has an internal website that gives users the ability to access contract Idata that is stored in an Amazon RDS DB instance The number of contracts has increased and several users have reported slow retrieval of the contract data

The company wants to set up a cache to improve the latency A developer must create a solution that ensures data resiliency The data must be encrypted and must be partitioned by department

Which solution will meet these requirements?

Options:

A.

Amazon ElastiCache for Memcached with cluster mode enabled

B.

Amazon ElastiCache for Redis with cluster mode enabled

C.

Amazon ElastiCache for Redis with cluster mode disabled

D.

Amazon ElastiCache for Memcached with cluster mode disabled

Buy Now
Questions 31

A developer has an AWS CodePipelme pipeline that invokes AWS CodeBuild in the build stage The developer wants to pass in a variable from CodePipeline so that the variable can be read in the CodeBuild buiidspec yml file

How can the developer accomplish this goal?

Options:

A.

Configure a unique CodePipelme vanable namespace and vanables as key-value pairs that define each of the variables required in CodeBuild

B.

Configure a CodePipelme environment vanable that contains a JSON document that defines each of the variables required in CodeBuild

C.

Configure an AWS CloudFormation stack set that contains a JSON document that defines each of the variables required in CodeBuild Reference the stack set from CodePipelme

D.

Configure an AWS CodeArtifact repository to store each environment variable Reference CodeArtifact from CodePipelme and CodeBuild

Buy Now
Questions 32

A developer receives the following error message when trying to launch or terminate an Amazon EC2 instance using a boto3 script.

DVA-C01 Question 32

What should the developer do to correct this error message?

Options:

A.

Assign an IAM role to the EC2 instance to allow necessary API calls on behalf of the client.

B.

Implement an exponential backoff algorithm for optimizing the number of API requests made to Amazon EC2.

C.

Increase the overall network bandwidth to handle higher API request rates.

D.

Upgrade to the latest AWS CLI version so that boto3 can handle higher request rates

Buy Now
Questions 33

A developer is building a new application that uses an Amazon DynamoDB table. The specification states that all items that are older than 48 hours must be removed

Which solution will meet this requirement?

Options:

A.

Create a new attribute that has the Number data type Add a local secondary index (LSI) for this attribute and enable TTL

with an expiration of 48 hours In the application code, set the value of this attribute to the current timestamp for each new item that is being inserted.

B.

Create a new attribute that has the String data type Add a local secondary index (LSI) for this attribute and enable TTL

with an expiration of 48 hours In the application code, set the value of this attribute to the current timestamp for each new item that is being inserted.

C.

Create a new attribute that has the Number data type Enable TTL on the DynamoDB table for this attribute in the

application code set the value of this attribute to the current timestamp plus 48 hours for each new item that is being inserted

D.

Create a new attribute that has the String data type Enable TTL on the DynamoDB table for this attribute In the application

code set the value of this attribute to the current timestamp plus 48 hours for each new item that is being inserted

Buy Now
Questions 34

A developer wants to send multi-value headers to an AWS Lambda function that is registered as a target with an Application Load Balancer (ALB).

What should the developer do to achieve this?

Options:

A.

Place the Lambda function and target group in the same account

B.

Send the request body to the Lambda function with a size less than 1 MB 0

C.

Include the Base64 encoding status status code, status description, and headers in the Lambda function

D.

Enable the multi-value headers on the ALB

Buy Now
Questions 35

An AWS Lambda function must read data from an Amazon RDS MySQL database in a VPC and also reach a public endpoint over the internet to get additional data.

Which steps must be taken to allow the function to access both the RDS resource and the public endpoint? (Select TWO.)

Options:

A.

Modify the default configuration for the Lambda function to associate it with an Amazon VPC private subnet.

B.

Modify the default network access control list to allow outbound traffic.

C.

Add a NAT Gateway to the VPC.

D.

Modify the default configuration of the Lambda function to associate it with a VPC public subnet.

E.

Add an environmental variable to the Lambda function to allow outbound internet access.

Buy Now
Questions 36

A Developer wants to use AWS X-Ray to trace a user request end-to-end throughput the software stack. The Developer made the necessary changes in the application tested it, and found that the application is able to send the traces to AWS X-Ray. However, when the application is deployed to an EC2 instance, the traces are not available.

Which of the following could create this situation? (Select two.)

Options:

A.

The traces are reaching X-Ray, but the Developer does not have access to view the records.

B.

The X-Ray daemon is not installed on the EC2 instance.

C.

The X-Ray endpoint specified in the application configuration is incorrect.

D.

The instance role does not have “xray:BatchGetTraces” and “xray:GetTraceGraph” permissions.

E.

The instance role does not have “xray:PutTraceSegments” and “xray:PutTelemetryRecords” permissions.

Buy Now
Questions 37

Which of the following are valid arguments for an SNS Publish request? Choose 3 answers

Options:

A.

TopicAm

B.

Subject

C.

Destination

D.

Format

E.

Message

F.

Language

Buy Now
Questions 38

A Developer uses AWS CodeDeploy to automate application deployment that connects to an external MySQL database. The Developer wants to securely access the encrypted secrets, such as API keys and database passwords.

Which of the following solutions would involve the LEAST administrative effort?

Options:

A.

Save the secrets in Amazon S3 with AWS KMS server-side encryption, and use a signed URL to access them by using the IAM role from Amazon EC2 instances.

B.

Use the instance metadata to store the secrets and to programmatically access the secrets from EC2 instances.

C.

Use the Amazon DynamoDB client-side encryption library to save the secrets in DynamoDB and to programmatically access the secrets from EC2 instances.

D.

Use AWS SSM Parameter Store to store the secrets and to programmatically access them by using the IAM role from EC2 instances.

Buy Now
Questions 39

A Developer is creating an application that needs to locate the public IPv4 address of the Amazon EC2 instance on which it runs. How can the application locate this information?

Options:

A.

Get the instance metadata by retrieving http://169.254.169.254/latest/metadata/.

B.

Get the instance user data by retrieving http://169.254.169.254/latest/userdata/.

C.

Get the application to run IFCONFIG to get the public IP address.

D.

Get the application to run IPCONFIG to get the public IP address.

Buy Now
Questions 40

company needs a fully-managed source control service that will work in AWS. The service must ensure that revision control synchronizes multiple distributed repositories by exchanging sets of changes peer-to-peer. All users need to work productively even when not connected to a network.

Which source control service should be used?

Options:

A.

Subversion

B.

AWS CodeBuild

C.

AWS CodeCommit

D.

AWS CodeStar

Buy Now
Questions 41

A company developed a set of APIs that are being served through the Amazon API Gateway. The API calls need to be authenticated based on OpenID identity providers such as Amazon or Facebook. The APIs should allow access based on a custom authorization model.

Which is the simplest and MOST secure design to use to build an authentication and authorization model for the APIs?

Options:

A.

Use Amazon Cognito user pools and a custom authorizer to authenticate and authorize users based on JSON Web Tokens.

B.

Build a OpenID token broker with Amazon and Facebook. Users will authenticate with these identify providers and pass the JSON Web Token to the API to authenticate each API call.

C.

Store user credentials in Amazon DynamoDB and have the application retrieve temporary credentials from AWS STS. Make API calls by passing user credentials to the APIs for authentication and authorization.

D.

Use Amazon RDS to store user credentials and pass them to the APIs for authentications and authorization.

Buy Now
Questions 42

Which of the following are valid SNS delivery transports? Choose 2 answers

Options:

A.

HTTP

B.

UDP

C.

SMS

D.

DynamoDB

E.

Named Pipes

Buy Now
Questions 43

Given the source code for an AWS Lambda function in the local store.py containing a handler function called get_store and the following AWS CloudFormation template:

DVA-C01 Question 43

What should be done to prepare the template so that it can be deployed using the AWS CLI command aws

cloudformation deploy?

Options:

A.

Use aws cloudformation compile to base64 encode and embed the source file into a modified

CloudFormation template.

B.

Use aws cloudformation package to upload the source code to an Amazon S3 bucket and produce a

modified CloudFormation template.

C.

Use aws lambda zip to package the source file together with the CloudFormation template and deploy

the resulting zip archive.

D.

Use aws serverless create-package to embed the source file directly into the existing

CloudFormation template.

Buy Now
Questions 44

A company has 25:000 employees and is growing The company is creating an application that will be accessible to its employees only A developer is using Amazon S3 to store images and Amazon RDS to store application data. The company requires that all employee information remain in the legacy Security Assertion Markup Language (SAML) employee directory only and is not interested in mirroring any employee information on AWS.

How can the developer provide authorized access for the employees who will be using this application so each employee can access their own application data only?

Options:

A.

Use Amazon VPC and keep all resources inside the VPC. and use a VPC link for the S3 bucket with the bucket policy.

B.

Use Amazon Cognito user pools, federate with the SAML provider and use user pool groups with an IAM policy

C.

Use an Amazon Cognito identity pool, federate with the SAML provider, and use an IAM condition key with a value for the cognito-identity.amazonaws com sub variable to grant access to the employees.

D.

Create a unique IAM role for each employee and have each employee assume the role to access the application so they can access their personal data only.

Buy Now
Questions 45

A developer is writing a new serverless application for a company. Several other developers must collaborate on the code for this application, and the company expects frequent changes to the code. The developer needs to deploy the code from source control to AWS Lambda with the fewest number of manual steps.

Which strategy for the build and deployment should the developer use to meet these requirements?

Options:

A.

Build the code locally, and then upload the code into the source control system. When a release is needed, run AWS CodePipeline to extract the uploaded build and deploy the resources.

B.

Use the AWS Serverless Application Model (AWS SAM) CLI to build and deploy the application from the developer's local machine with the latest version checked out locally.

C.

Use AWS CodeBuild and AWS CodePipeline to invoke builds and corresponding deployments when configured source controlled branches have pull requests merged into them

D.

Use the Lambda console to upload a .zip file of the application that is created by the AWS Serverless Application Model (AWS SAM) CLI build command.

Buy Now
Questions 46

A company has an application that uses Amazon Cognito user pools as an identity provider. The company must secure access to user records. The company I up multi-factor authentication (MFA). The company also wants to send a login activity notification by email every time a user logs in.

What is the MOST operationally efficient solution that meets this requirement?

Options:

A.

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon API Gateway to invoke the function. Call the API from the client side when login confirmation is received.

B.

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Add an Amazon Cognito post authentication Lambda trigger for the function.

C.

Create an AWS Lambda function that uses Amazon Simple Email Service (Amazon SES) to send the email notification. Create an Amazon CloudWatch Logs log subscription filter to invoke the function based on the login status.

D.

Configure Amazon Cognito to stream all logs to Amazon Kinesis Data Firehose. Create an AWS Lambda function to process the streamed logs and it send the email notification based on the login status of each user.

Buy Now
Questions 47

A company has a new application. The company needs to secure sensitive configuration data such as database connection strings, application license codes, and API keys that the application uses to access external resources. The company must track access to the configuration data for auditing purposes. The resources are managed outside the application.

The company is not required to manage rotation of the connection strings, license codes, and API keys in the application. The company must implement a solution to securely store the configuration data and to give the application access to the configuration data. The solution must comply with security best practices.

Which solution will meet these requirements MOST cost-effectively?

Options:

A.

Store the configuration data in an encrypted file on the source code bundle. Grant the application access by using IAM policies.

B.

Store the configuration data in AWS Systems Manager Parameter Store. Grant the application access by using IAM policies.

C.

Store the configuration data on an Amazon Elastic Block Store (Amazon EBS) encrypted volume. Attach the EBS volume to an Amazon EC2 instance to provide the application with access to the data.

D.

Store the configuration data in AWS Secrets Manager. Grant the application access by using IAM policies.

Buy Now
Questions 48

A developer uses server-side encryption with Amazon S3 managed encryption keys (SSE-S3) to store data in Amazon S3. The developer needs to decrypt and download the encrypted objects by using the GetObject API call.

What is the LEAST amount of information that the developer must provide in the API call to meet this requirement?

Options:

A.

The S3 object key only

B.

The S3 object key and the encryption key

C.

The S3 object key and the Amazon Resource Name (ARN) of the AWS Key Management Service (AWS KMS) key

D.

The S3 object key and a randomly salted Hash-based Message Authentication Code (HMAC) value of the encryption key

Buy Now
Questions 49

A developer is designing a serverless application that customers use to select seats for a concert venue. Customers send the ticket requests to an Amazon API Gateway API with an AWS Lambda function that acknowledges the order and generates an order ID. The application includes two additional Lambda functions: one for inventory management and one for payment processing. These two Lambda functions run in parallel and write the order to an Amazon Dynamo DB table.

The application must provide seats to customers according to the following requirements. If a seat is accidently sold more than once, the first order that the application received must get the seat. In these cases, the application must process the payment for only the first order. However, if the first order is rejected during payment processing, the second order must get the seat. In these cases, the application must process the payment for the second order.

Which solution will meet these requirements?

Options:

A.

Send the order ID to an Amazon Simple Notification Service (Amazon SNS) FIFO topic that fans out to one Amazon Simple Queue Service (Amazon SQS) FIFO queue for inventory management and another SQS FIFO queue for payment processing.

B.

Change the Lambda function that generates the order ID to initiate the Lambda function for inventory management. Then initiate the Lambda function for payment processing.

C.

Send the order ID to an Amazon Simple Notification Service (Amazon SNS) topic. Subscribe the Lambda functions for inventory management and payment processing to the topic.

D.

Deliver the order ID to an Amazon Simple Queue Service (Amazon SQS) queue. Configure the Lambda functions for inventory management and payment processing to poll the queue.

Buy Now
Questions 50

A developer is writing an application that will run on Amazon EC2 instances in an Auto Scaling group. The developer wants to externalize the session state to support the application. Miich AWS services or resources can the developer use to meet these requirements? (Select TWO.)

Options:

A.

Amazon DynamoDB

B.

Amazon Cognito

C.

Amazon ElastiCache

D.

Application Load Balancer

E.

Amazon Simple Queue Service (Amazon SQS)

Buy Now
Questions 51

A developer is creating a photo website. Amazon Route 53 hosts the website's domain. The developer wants to store the application code and images in an Amazon S3 bucket. The developer also wants to jse Amazon CloudFront to deliver the images to users.

the developer has created the S3 bucket and a CloudFront distribution. The developer wants the images to be accessed only through the website's domain. Users must not use the S3 URLs.

Which solution will meet these requirements?

Options:

A.

Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Create an alias in Route 53 that points the website domain to the S3 bucket.

B.

Create a CloudFront origin access identity (OAI). Associate the OAI with the CloudFront distribution. Modify the S3 bucket policy to allow access from only the OAI. Update the Route 53 records to point the website domain to the CloudFront domain name.

C.

Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the S3 bucket.

D.

Block public access in the S3 bucket policy. Configure CloudFront to use the S3 bucket endpoint. Create an alias in Route 53 that points the website domain to the CloudFront domain name.

Buy Now
Questions 52

A company is running its website on Amazon EC2 instances behind an Application Load Balancer (ALB). The instances run in an Amazon EC2 Auto Scaling group. A developer needs to secure the internet-facing connection with HTTPS. The developer uses AWS Certificate Manager (ACM) to issue an X.509 certificate.

What should the developer do to secure the connection?

Options:

A.

Configure the ALB to use the X.509 certificate by using the AWS Management Console.

B.

Configure each EC2 instance to use the same X.509 certificate by using the AWS Management Console.

C.

Export the root key of the X.509 certificate to an Amazon S3 bucket. Configure each EC2 instance to use the same X.509 certificate from the S3 bucket.

D.

Export the root key of the X.509 certificate to an Amazon S3 bucket. Configure the ALB to use the X.509 certificate from the S3 bucket.

Buy Now
Questions 53

A developer runs an application that uses an Amazon API Gateway REST API. The developer needs to implement a solution to proactively monitor the health of both API responses and latencies in case a deployment causes a service disruption despite passing deployment pipeline tests. The solution also must check for endpoint vulnerability and unauthorized changes to APIs. URLs, and website content.

Which solution will meet these requirements?

Options:

A.

Use the Amazon CloudWatch Synthetics canary functionality to call the API and check the responses and duration of the request.

B.

Use a custom health check in the API that queries hosts to check the duration of the request.

C.

Implement a custom AWS Lambda function with an Amazon EventBridge event to periodically call the API and check the responses and duration of the request.

D.

Use the built-in API Gateway metrics to monitor the average duration of the API response.

Buy Now
Questions 54

A developer created a web API that receives requests by using an internet-facing Application Load Balancer (ALB) with an HTTPS listener. The developer configures an Amazon Cognito user pool and wants to ensure that every request to the API is authenticated through Amazon Cognito.

What should the developer do to meet this requirement?

Options:

A.

Add a listener rule to the listener to return a fixed response if the Authorization header is missing. Set the fixed response to 401 Unauthorized.

B.

Create an authentication action for the listener rules of the ALB. Set the rule action type to authenticate-cognito Set the OnUnauthenticatedRequest field to "deny."

C.

Create an Amazon API Gateway API. Configure all API methods to be forwarded to the ALB endpoint. Create an authorizer of the COGNITO_USER_POOLS type. Configure every API method to use that authorizer.

D.

Create a new target group that includes an AWS Lambda function target that validates the Authorization header by using Amazon Cognito. Associate the target group with the listener.

Buy Now
Questions 55

A developer is monitoring an application that runs on an Amazon EC2 instance. The developer has configured a custom Amazon CloudWatch metric with d#ta granularity of 1 second. If any issues occur, the developer wants to be notified within 30 seconds by Amazon Simple Notification Service (Amazon SNS).

What should the developer do to meet this requirement?

Options:

A.

Configure a high-resolution CloudWatch alarm.

B.

Set up a custom CloudWatch dashboard.

C.

Use Amazon CloudWatch Logs Insights.

D.

Change to a default CloudWatch metric.

Buy Now
Questions 56

A developer is building a three-tier application with an Application Load Balancer (ALB). Amazon EC2 instances, and Amazon RDS. There is an alias record in Amazon Route 53 that points to the ALB. When Ihe developer tries to access the ALB from a laptop, the request times out.

Which logs should the developer investigate to verify that the request is reaching the AWS network?

Options:

A.

VPC Flow Logs

B.

Amazon Route 53 logs

C.

AWS Systems Manager Agent logs

D.

Amazon CloudWatch agent logs

Buy Now
Questions 57

A company hosts a monolithic application on Amazon EC2 instances. The company starts converting some features of the application to a serverless architecture by using Amazon API Gateway and AWS Lambda After the migration, some users report problems with payment processing

Upon inspection, a developer discovers that the Lambda function that calls the external payment API is taking longer than expected Therefore, the API Gateway requests are timing out

What should the developer do to resolve this issue in the serverless architecture?

Options:

A.

Use the EC2 instances to make the API calls to the payment API

B.

Use Amazon Simple Queue Service (Amazon SQS) with API Gateway and the Lambda function to asynchronously call the payment API

C.

Increase the API Gateway timeout duration to match the payment API time

D.

Increase the Lambda function's memory to increase the network bandwidth and increase the speed of the payment API calls

Buy Now
Questions 58

A developer has written an AWS Lambda function using Java as the runtime environment. The developer wants to isolate a performance bottleneck in the code.

Which steps should be taken to reveal the bottleneck?

Options:

A.

Use the Amazon CloudWatch API to write timestamps to a custom CloudWatch metric Use the CloudWatch console to analyze the resulting data

B.

Use the AWS X-Ray API to write trace data into X-Ray from strategic places within the code Use the Amazon CloudWatch console to analyze the resulting data

C.

Use the AWS X-Ray API to write trace data into X-Ray from strategic places within the code. Use the X-Ray console to analyze the resulting data

D.

Use the Amazon CloudWatch API to write timestamps to a custom CloudWatch metric Use the AWS X-Ray console to analyze the resulting data

Buy Now
Questions 59

A developer is working on an ecommerce website. The developer wants to review server logs without logging in to each of the application servers individually. The website runs on multiple Amazon EC2 instances, is written in Python, and needs to be highly available.

How can the developer update the application to meet these requirements with MINIMUM changes?

Options:

A.

Rewrite the application to be cloud native and to run on AWS Lambda where the logs can be reviewed in Amazon CloudWatch.

B.

Set up centralized logging by using Amazon Elasticsearch Service (Amazon ES), Logstash, and Kibana

C.

Scale down the application to one larger EC2 instance where only one instance is recording logs.

D.

Install the unified Amazon CloudWatch agent on the EC2 instances. Configure the agent to push the application logs to CloudWatch.

Buy Now
Questions 60

A developer has code stored in an Amazon S3 bucket The code must be deployed as an AWS Lambda function across multiple accounts in the same Region as the S3 bucket The Lambda function will be deployed using an AWS CloudFormation template that is run for each account

What is the MOST secure approach to allow access to the Lambda code in the S3 bucket?

Options:

A.

Grant the CloudFormation execution role S3 list and get permissions Add a bucket policy to Amazon S3 with the Pnncipal of "AWS": [account numbers].

B.

Grant the CloudFormation execution role S3 get permissions Add a bucket policy to Amazon S3 with the Principal of "".

C.

Use a service-based link to grant the Lambda function S3 list and get permissions by explicitly adding the S3 bucket's account number in the resource

D.

Use a service-based link to grant the Lambda function S3 get permissions and add a Resource of "*" to allow access to the S3 bucket.

Buy Now
Questions 61

An application contains two components one component to handle HI IP requests, and another component to handle background processing tasks Bach component must scale independently The developer wants to deploy this application using AWS Elastic Beanstalk.

How should this application be deployed, based on these requirements?

Options:

A.

Deploy the application in a single Elastic Beanstalk environment

B.

Deploy each component in a separate Elastic Beanstalk environment

C.

Use multiple Elastic Beanstalk environments for the HTTP component but one environment for the background task component

D.

Use multiple Elastic Beanstalk environments for the background task component but one environment tor the HTTP component

Buy Now
Questions 62

A developer is working on a serverless application. The application uses Amazon API Gateway. AWS Lambda functions that are written in Python, and Amazon DynamoDB.

Which combination of steps should the developer take so that the Lambda functions can be debugged in the event of application failures? (Select TWO )

Options:

A.

Configure an AWS CloudTrail trail to deliver log files to an Amazon S3 bucket

B.

Ensure that the Lambda functions write log messages to stdout and stderr

C.

Enable an AWS CloudTrail trail for the Lambda function

D.

Ensure that the execution role for the Lambda function has access to write to Amazon CloudWatch Logs.

E.

Use the Amazon CloudWatch metric for Lambda errors to create a CloudWatch alarm.

Buy Now
Questions 63

A developer is changing the configuration for a CPU-intensive AWS Lambda function that runs once an hour. The function usually takes 45 seconds to run, but sometimes the run time is up to 1 minute. The timeout parameter is set to 3 minutes, and all other parameters are set to default.

The developer needs to optimize the run time of this function.

Which solution will meet this requirement?

Options:

A.

Redeploy the function within the default VPC

B.

Increase the function's memory.

C.

Redeploy the function by using Lambda layers

D.

Increase the function's reserved concurrency

Buy Now
Questions 64

An Amazon S3 bucket, "myawsbucket” is configured with website hosting in Tokyo region, what is the region-specific website endpoint?

Options:

A.

www.myawsbucket.ap-northeast-1.amazonaws.com

B.

myawsbucket.s3-website-ap-northeast-1.amazonawscom

C.

myawsbucket.amazonaws.com

D.

myawsbucket.tokyo.amazonaws.com

Buy Now
Questions 65

A customer wants to deploy its source code on an AWS Elastic Beanstalk environment. The customer needs to perform deployment with minimal outage and should only use existing instances to retain application access log.

What deployment policy would satisfy these requirements?

Options:

A.

Rolling

B.

All at once

C.

Rolling with an additional batch

D.

Immutable

Buy Now
Questions 66

During non-peak hours, a Developer wants to minimize the execution time of a full Amazon DynamoDB table scan without affecting normal workloads. The workloads average half of the strongly consistent read capacity units during non-peak hours.

How would the Developer optimize this scan?

Options:

A.

Use parallel scans while limiting the rate

B.

Use sequential scans

C.

Increase read capacity units during the scan operation

D.

Change consistency to eventually consistent during the scan operation

Buy Now
Questions 67

Games-R-Us is launching a new game app for mobile devices. Users will log into the game using their existing Facebook account and the game will record player data and scoring information directly to a DynamoDB table.

What is the most secure approach for signing requests to the DynamoDB API?

Options:

A.

Create an IAM user with access credentials that are distributed with the mobile app to sign the requests

B.

Distribute the AWS root account access credentials with the mobile app to sign the requests

C.

Request temporary security credentials using web identity federation to sign the requests

D.

Establish cross account access between the mobile app and the DynamoDB table to sign the requests

Buy Now
Questions 68

A company is migrating its on-premises database to Amazon RDS for MySQL. The company has read-heavy workloads, and wants to make sure it re-factors its code to achieve optimum read performance for its queries.

How can this objective be met?

Options:

A.

Add database retries to effectively use RDS with vertical scaling

B.

Use RDS with multi-AZ deployment

C.

Add a connection string to use an RDS read replica for read queries

D.

Add a connection string to use a read replica on an EC2 instance.

Buy Now
Questions 69

A Developer is building a mobile application and needs any update to user profile data to be pushed to all devices accessing the specific identity. The Developer does not want to manage a back end to maintain the user profile data.

What is the MOST efficient way for the Developer to achieve these requirements using Amazon Cognito?

Options:

A.

Use Cognito federated identities.

B.

Use a Cognito user pool.

C.

Use Cognito Sync.

D.

Use Cognito events.

Buy Now
Questions 70

A Developer is working on an application that tracks hundreds of millions of product reviews in an Amazon DynamoDB table. The records include the data elements shown in the table:

DVA-C01 Question 70

Which field, when used as the partition key, would result in the MOST consistent performance using

DynamoDB?

Options:

A.

starRating

B.

reviewID

C.

comment

D.

productID

Buy Now
Questions 71

A Developer is designing a new application that uses Amazon S3. To satisfy compliance requirements, the Developer must encrypt the data at rest.

How can the Developer accomplish this?

Options:

A.

Use s3:x-amz-acl as a condition in the S3 bucket policy.

B.

Use Amazon RDS with default encryption.

C.

Use aws:SecureTransport as a condition in the S3 bucket policy.

D.

Turn on S3 default encryption for the S3 bucket.

Buy Now
Questions 72

A Developer is creating a mobile application that will not require users to log in.

What is the MOST efficient method to grant users access to AWS resources?

Options:

A.

Use an identity provider to securely authenticate with the application.

B.

Create an AWS Lambda function to create an IAM user when a user accesses the application.

C.

Create credentials using AWS KMS and apply these credentials to users when using the application.

D.

Use Amazon Cognito to associate unauthenticated users with an IAM role that has limited access to resources.

Buy Now
Questions 73

A Developer will be using the AWS CLI on a local development server to manage AWS services.

What can be done to ensure that the CLI uses the Developer’s IAM permissions when making commands?

Options:

A.

Specify the Developer’s IAM access key ID and secret access key as parameters for each CLI command.

B.

Run the aws configure CLI command, and provide the Developer’s IAM access key ID and secret access key.

C.

Specify the Developer’s IAM user name and password as parameters for each CLI command.

D.

Use the Developer’s IAM role when making the CLI command.

Buy Now
Questions 74

Which statements about DynamoDB are true? Choose 2 answers

Options:

A.

DynamoDB uses a pessimistic locking model

B.

DynamoDB uses optimistic concurrency control

C.

DynamoDB uses conditional writes for consistency

D.

DynamoDB restricts item access during reads

E.

DynamoDB restricts item access during writes

Buy Now
Questions 75

A Developer needs to use AWS X-Ray to monitor an application that is deployed on EC2 instances.

What steps have to be executed to perform the monitoring?

Options:

A.

Deploy the X-Ray SDK with the application and use X-Ray annotation.

B.

Install the X-Ray daemon and instrument the application code.

C.

Install the X-Ray daemon and configure it to forward data to Amazon CloudWatch Events.

D.

Deploy the X-Ray SDK with the application and instrument the application code.

Buy Now
Questions 76

A development team is using AWS Elastic Beanstalk to deploy a two-tier application that consists of a load-balanced web tier and an Amazon RDS database tier in production. The team would like to separate the RDS instance from the Elastic Beanstalk.

How can this be accomplished?

Options:

A.

Use the Elastic Beanstalk CLI to disassociate the database.

B.

Use the AWS CLI to disassociate the database.

C.

Change the deployment policy to disassociate the database.

D.

Recreate a new Elastic Beanstalk environment without Amazon RDS.

Buy Now
Questions 77

A company runs continuous integration/continuous delivery (CI/CD) pipeline for its application on AWS CodePipeline. A developer must write unit tests and run them as part of the pipelines before staging the artifacts for testing.

How should the Developer incorporate unit tests as part of CI/CD pipeline?

Options:

A.

Create a separate codePipline pipline to run unit tests.

B.

Update the AWS codeBuild build specification to include a phase for running unit tests.

C.

Install the AWS CodeDeploy agent on an Amazon EC2 instance to run unit tests.

D.

Create a testing branch in AWS CodeCommit to run unit tests.

Buy Now
Questions 78

Queries to an Amazon DynamoDB table are consuming a large amount of read capacity. The table has a significant number of large attributes. The application does not need all of the attribute data.

How can DynamoDB costs be minimized while maximizing application performance?

Options:

A.

Batch all the writes, and perform the write operations when no or few reads are being performed.

B.

Create a global secondary index with a minimum set of projected attributes.

C.

Implement exponential backoffs in the application.

D.

Load balance the reads to the table using an Application Load Balancer.

Buy Now
Questions 79

A Developer is working on an application that handles 10MB documents that contain highly-sensitive data. The application will use AWS KMS to perform client-side encryption.

What steps must be followed?

Options:

A.

Invoke the Encrypt API passing the plaintext data that must be encrypted, then reference the customer managed key ARN in the KeyId parameter

B.

Invoke the GenerateRandom API to get a data encryption key, then use the data encryption key to encrypt the data

C.

Invoke the GenerateDataKey API to retrieve the encrypted version of the data encryption key to encrypt the data

D.

Invoke the GenerateDataKey API to retrieve the plaintext version of the data encryption key to encrypt the data

Buy Now
Questions 80

Where can PortMapping be defined when launching containers in Amazon ECS?

Options:

A.

Security groups

B.

Amazon Elastic Container Registry (Amzon ECR)

C.

Container agent

D.

Task definition

Buy Now
Questions 81

A developer is creating a new application that will be accessed by users through an API created using Amazon API Gateway The users need to be authenticated by a third-party Security Assertion Markup Language (SAML) identity provider Once authenticated, users will need access to other AWS services such as Amazon S3 and Amazon DynamoDB

How can these requirements be met?

Options:

A.

Use an Amazon Cognito user pool with SAML as the resource server

B.

Use Amazon Cognito Identity pools with a SAML identity provider as one of the authentication providers

C.

Use the AWS IAM service to provide the sign-up and sign-in functionality.

D.

Use Amazon CloudFront signed URLs to connect with the SAML identity provider

Buy Now
Questions 82

A developer is migrating code to an AWS Lambda function that will access an Amazon Aurora MySQL database.

What is the MOST secure way to authenticate the function to the database?

Options:

A.

Store the database credentials as encrypted parameters in AWS Systems Manager Parameter Store Obtain the credentials from Systems Manager when the Lambda function needs to connect to the database

B.

Store the database credentials in AWS Secrets Manager Let Secrets Manager handle the rotation of the credentials, as required

C.

Store the database credentials in an Amazon S3 bucket that has a restrictive bucket policy for the Lambda role only when accessing the credentials Use AWS KMS to encrypt the data

D.

Create a policy with rds-db connect access to the database and attach it to the role assigned to the Lambda function

Buy Now
Questions 83

A company caches session information for a web application in an Amazon DynamoDB table. The company wants an automated way to delete old items from the table.

What is the simplest way to do this?

Options:

A.

Write a script that deletes old records; schedule the scripts as a cron job on an Amazon EC2 instance.

B.

Add an attribute with the expiration time; enable the Time To Live feature based on that attribute.

C.

Each day, create a new table to hold session data; delete the previous day’s table.

D.

Add an attribute with the expiration time; name the attribute ItemExpiration.

Buy Now
Questions 84

An Amazon RDS database instance is used by many applications to look up historical data. The query rate is relatively constant. When the historical data is updated each day, the resulting write traffic slows the read query performance and affects all application users.

What can be done to eliminate the performance impact on application users?

Options:

A.

Make sure Amazon RDS is Multi-AZ so it can better absorb increased traffic.

B.

Create an RDS Read Replica and direct all read traffic to the replica.

C.

Implement Amazon ElastiCache in front of Amazon RDS to buffer the write traffic.

D.

Use Amazon DynamoDB instead of Amazon RDS to buffer the read traffic.

Buy Now
Questions 85

A company wants to migrate an imaging service to Amazon EC2 while following security best practices. The images are sourced and read from a non-public Amazon S3 bucket.

What should a developer do to meet these requirements?

Options:

A.

Create an IAM user with read-only permissions for the S3 bucket Temporarily store the user credentials in the Amazon EBS volume of the EC2 instance

B.

Create an IAM user with read-only permissions for the S3 bucket. Temporarily store the user credentials in the user data of the EC2 instance.

C.

Create an EC2 service role with read-only permissions for the S3 bucket Attach the role to the EC2 instance

D.

Create an S3 service role with read-only permissions for the S3 bucket Attach the role to the EC2 instance

Buy Now
Questions 86

A Developer is building a three-tier web application that should be able to handle a minimum of 5000 requests per minute. Requirements state that the web tier should be completely stateless while the application maintains session state for the users.

How can session data be externalized, keeping latency at the LOWEST possible value?

Options:

A.

Create an Amazon RDS instance, then implement session handling at the application level to leverage a database inside the RDS database instance for session data storage

B.

Implement a shared file system solution across the underlying Amazon EC2 instances, then implement session handling at the application level to leverage the shared file system for session data storage

C.

Create an Amazon ElastiCache Memcached cluster, then implement session handling at the application level to leverage the cluster for session data storage

D.

Create an Amazon DynamoDB table, then implement session handling at the application level to leverage the table for session data storage

Buy Now
Questions 87

An application displays a status dashboard. The status is updated by 1 KB messages from an SQS queue. Although the status changes infrequently, the Developer must minimize the time between the message arrival in the queue and the dashboard update.

What technique provides the shortest delay in updating the dashboard?

Options:

A.

Retrieve the messages from the queue using long polling every 20 seconds.

B.

Reduce the size of the messages by compressing them before sending.

C.

Retrieve the messages from the queue using short polling every 10 seconds.

D.

Reduce the size of each message payload by sending it in two parts.

Buy Now
Questions 88

A company is creating a REST service using an Amazon API Gateway with AWS Lambda integration. The service must run different versions for testing purposes.

What would be the BEST way to accomplish this?

Options:

A.

Use an X-Version header to denote which version is being called and pass that header to the Lambda function(s)

B.

Create an API Gateway Lambda authorizer to route API clients to the correct API version

C.

Create an API Gateway resource policy to isolate versions and provide context to the Lambda function(s)

D.

Deploy the API versions as unique stages with unique endpoints and use stage variables to provide further context

Buy Now
Questions 89

An application is expected to process many files. Each file takes four minutes to process each AWS Lambda invocation. The Lambda function does not return any important data.

What is the fastest way to process all the files?

Options:

A.

First split the files to make them smaller, then process with synchronous RequestResponse Lambda invocations.

B.

Make synchronous RequestResponse Lambda invocations and process the files one by one.

C.

Make asynchronous Event Lambda invocations and process the files in parallel.

D.

First join all the files, then process it all at once with an asynchronous Event Lambda invocation.

Buy Now
Questions 90

A company is migrating from a monolithic architecture to a microservices-based architecture. The Developers need to refactor the application so that the many microservices can asynchronously communicate with each other without impacting performance.

Use of which managed AWS services will enable asynchronous message passing? (Choose two.)

Options:

A.

Amazon SQS

B.

Amazon Cognito

C.

Amazon Kinesis

D.

Amazon SNS

E.

Amazon ElastiCache

Buy Now
Questions 91

A Developer needs to deploy an application running on AWS Fargate using Amazon ECS. The application has environment variables that must be passed to a container tor the application to initialize

How should the environment variables be passed to the container?

Options:

A.

Define an array that includes the environment variables under the environment parameter within the service definition

B.

Define an array that includes the environment variables under the environment parameter within the task definition

C.

Define an array that includes the environment variables under the entrypoint parameter within the task definition

D.

Define in array that includes the environment variables under the entryPoint parameter within the service definition

Buy Now
Exam Code: DVA-C01
Exam Name: AWS Certified Developer Associate Exam
Last Update: Nov 29, 2023
Questions: 608
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 Jul 2025