A company is migrating a legacy application to Amazon EC2 instances. Application uses a user name and password that are stored in the source code to connect to a MySQL database. The company will migrate the database to an Amazon RDS. As part of the migration, the company needs to implement a secure way to store and automatically rotate the database credentials.

AWS Certified Developer - Associate (DVA-C02) - Sample Questions

Quiz
•
Computers
•
University
•
Hard

Bob Dank
Used 3+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Store the database credentials in environment variables in an Amazon Machine Image (AMI). Rotate the
credentials by replacing the AMI
Store the database credentials in AWS Systems Manager Parameter Store. Configure Parameter Store to
automatically rotate the credentials.
Store the database credentials in environment variables on the EC2 instances. Rotate the credentials by
relaunching the EC2 instances.
Store the database credentials in AWS Secrets Manager. Configure Secrets Manager to automatically
rotate the credentials.
Answer explanation
AWS Secrets Manager helps protect the credentials that are needed to access databases, applications, services, and other IT resources. With Secrets Manager, you can rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets by making a Secrets Manager API call, eliminating the need to hardcode sensitive information in plaintext. Secrets Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon DocumentDB (with MongoDB compatibility)
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A developer is creating a web application that must give users the ability to post comments and
receive feedback in near real time. (Select 2)
Create an AWS AppSync schema and corresponding APIs. Use an Amazon DynamoDB table as the data
store.
Create a WebSocket API in Amazon API Gateway. Use an AWS Lambda function as the backend. Use
an Amazon DynamoDB table as the data store.
Create an AWS Elastic Beanstalk application that is backed by an Amazon RDS database. Configure the
application to allow long-lived TCP/IP sockets.
Create a GraphQL endpoint in Amazon API Gateway. Use an Amazon DynamoDB table as the data
store.
Establish WebSocket connections to Amazon CloudFront. Use an AWS Lambda function as the
CloudFront distribution’s origin. Use an Amazon Aurora DB cluster as the data store.
Answer explanation
(A) AWS AppSync simplifies application development by giving you the ability to create a flexible API to securely access, manipulate, and combine data from one or more data sources. AWS AppSync is a managed service that uses GraphQL to help applications get the exact data that they need. You can use AWS AppSync to build scalable applications that require real-time updates on a range of data sources, including Amazon DynamoDB
(B) In Amazon API Gateway, you can create a WebSocket API as a stateful frontend for an AWS service (such as AWS Lambda or DynamoDB) or for an HTTP endpoint. The WebSocket API invokes the backend based on the content of the messages that the API receives from client applications. Unlike a REST API, which receives and responds to requests, a WebSocket API supports two-way communication between client applications and the backend.
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A developer is adding sign-up and sign-in functionality to an application. The application must make an API call to a custom analytics solution to log user sign-in events.
Which combination of actions should the developer perform to meet these requirements? (Select TWO.)
Use Amazon Cognito to provide the sign-up and sign-in functionality.
Use AWS Identity and Access Management (IAM) to provide the sign-up and sign-in functionality.
Configure an AWS Config rule to make the API call when a user is authenticated.
Invoke an Amazon API Gateway method to make the API call when a user is authenticated
Invoke an AWS Lambda function to make the API call when a user is authenticated.
Answer explanation
Amazon Cognito adds user sign-up, sign-in, and access control to web and mobile applications. You can also create an AWS Lambda function to make an API call to a custom analytics solution and then invoke that function by using an Amazon Cognito post authentication trigger
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A company is using Amazon API Gateway for its REST APIs in an AWS account. A developer wants to allow only IAM users from another AWS account to access the APIs.
Which combination of steps should the developer take to meet these requirements? (Select TWO.)
Create an IAM permission policy. Attach the policy to each IAM user. Set the method authorization type
for the APIs to AWS_IAM. Use Signature Version 4 to sign the API requests
Create an Amazon Cognito user pool. Add each IAM user to the user pool. Set the method authorization
type for the APIs to COGNITO_USER_POOLS. Authenticate by using the IAM credentials in Amazon
Cognito. Add the ID token to the request headers.
Create an Amazon Cognito identity pool. Add each IAM user to the identity pool. Set the method
authorization type for the APIs to COGNITO_USER_POOLS. Authenticate by using the IAM credentials
in Amazon Cognito. Add the access token to the request headers.
Create a resource policy for the APIs to allow access for each IAM user only.
Create an Amazon Cognito authorizer for the APIs to allow access for each IAM user only. Set the
method authorization type for the APIs to COGNITO_USER_POOLS.
Answer explanation
A resource policy can grant API access in one AWS account to users in a different AWS account by using Signature Version 4 (SigV4) protocols
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A developer is building a new application that transforms text files to .pdf files. A separate application
writes the text files to a source Amazon S3 bucket. The new application must read the files as they arrive
in Amazon S3 and must convert the files to .pdf files by using an AWS Lambda function. The developer
has written an IAM policy to allow access to Amazon S3 and Amazon CloudWatch Logs.
What should the developer do to ensure that the Lambda function has the correct permissions?
Create a Lambda execution role by using AWS Identity and Access Management (IAM). Attach the IAM
policy to the role. Assign the Lambda execution role to the Lambda function.
Create a Lambda execution user by using AWS Identity and Access Management (IAM). Attach the IAM
policy to the user. Assign the Lambda execution user to the Lambda function.
Create a Lambda execution role by using AWS Identity and Access Management (IAM). Attach the IAM
policy to the role. Store the IAM role as an environment variable in the Lambda function
Create a Lambda execution user by using AWS Identity and Access Management (IAM). Attach the IAM
policy to the user. Store the IAM user credentials as environment variables in the Lambda function.
Answer explanation
An AWS Lambda function's execution role grants the Lambda function permission to access AWS services and resources. You provide this role when you create a function, and Lambda assumes the role when a function is invoked.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A developer is working on an application that stores highly confidential data in a database. The developer must use AWS Key Management Service (AWS KMS) with envelope encryption to protect the
data.
How should the developer configure the data encryption to meet these requirements?
Encrypt the data by using a KMS key. Store the encrypted data in the database.
Encrypt the data by using a generated data key. Store the encrypted data in the database.
Encrypt the data by using a generated data key. Store the encrypted data and the data key ID in the
database.
Encrypt the data by using a generated data key. Store the encrypted data and the encrypted data key in
the database.
Answer explanation
Envelope encryption is the practice of encrypting plaintext data with a data key and then encrypting the data key under another key. You must store the encrypted form of the data key so that you can use the data key to decrypt the encrypted data in the database.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
A developer is adding Amazon ElastiCache for Memcached to a company's existing record storage application. The developer has decided to use lazy loading based on an analysis of common record handling patterns.
Which pseudocode example will correctly implement lazy loading?
Answer explanation
Lazy loading is a caching strategy in which a record does not load until the record is needed. When you implement lazy loading, the application first checks the cache for a record. If the record is not present, the application retrieves the record from the database and stores the record in the cache.
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
AWS EC2

Quiz
•
University
9 questions
CBD2234 Week 1

Quiz
•
12th Grade - University
11 questions
AWS ANALISIS DE DATOS

Quiz
•
University
15 questions
Arquitectura en la Nube AWS

Quiz
•
University
10 questions
Tes Awal Modul 6 CC

Quiz
•
University
10 questions
Preparatorio AWS Certified Solutions Unidad2

Quiz
•
University
15 questions
AWS ACF Módulo 2 - Economia e Faturamento na Nuvem

Quiz
•
University
14 questions
Preparatorio AWS Certified Solutions Unidad2

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade