AWS Certified Developer - Associate (DVA-C02) - Sample Questions

AWS Certified Developer - Associate (DVA-C02) - Sample Questions

University

10 Qs

quiz-placeholder

Similar activities

雲端從業人員Module 2 知識點檢查

雲端從業人員Module 2 知識點檢查

9th Grade - University

10 Qs

Cloud Architecture

Cloud Architecture

University

10 Qs

Cloud QUIZ

Cloud QUIZ

University - Professional Development

12 Qs

Prueba de salida - Proyecto Serverless

Prueba de salida - Proyecto Serverless

University

12 Qs

Tes Awal Modul 3 CC

Tes Awal Modul 3 CC

University

10 Qs

AWS Restart CCP

AWS Restart CCP

University

11 Qs

Thunder

Thunder

KG - University

10 Qs

|| Serverless Workshop ||

|| Serverless Workshop ||

University

15 Qs

AWS Certified Developer - Associate (DVA-C02) - Sample Questions

AWS Certified Developer - Associate (DVA-C02) - Sample Questions

Assessment

Quiz

Computers

University

Hard

Created by

Bob Dank

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A company is migrating a legacy application to Amazon EC2 instances. Application uses a user name and password that are stored in the source code to connect to a MySQL database. The company will migrate the database to an Amazon RDS. As part of the migration, the company needs to implement a secure way to store and automatically rotate the database credentials.

Store the database credentials in environment variables in an Amazon Machine Image (AMI). Rotate the

credentials by replacing the AMI

Store the database credentials in AWS Systems Manager Parameter Store. Configure Parameter Store to

automatically rotate the credentials.

Store the database credentials in environment variables on the EC2 instances. Rotate the credentials by

relaunching the EC2 instances.

Store the database credentials in AWS Secrets Manager. Configure Secrets Manager to automatically

rotate the credentials.

Answer explanation

AWS Secrets Manager helps protect the credentials that are needed to access databases, applications, services, and other IT resources. With Secrets Manager, you can rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets by making a Secrets Manager API call, eliminating the need to hardcode sensitive information in plaintext. Secrets Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon DocumentDB (with MongoDB compatibility)

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A developer is creating a web application that must give users the ability to post comments and

receive feedback in near real time. (Select 2)

Create an AWS AppSync schema and corresponding APIs. Use an Amazon DynamoDB table as the data

store.

Create a WebSocket API in Amazon API Gateway. Use an AWS Lambda function as the backend. Use

an Amazon DynamoDB table as the data store.

Create an AWS Elastic Beanstalk application that is backed by an Amazon RDS database. Configure the

application to allow long-lived TCP/IP sockets.

Create a GraphQL endpoint in Amazon API Gateway. Use an Amazon DynamoDB table as the data

store.

Establish WebSocket connections to Amazon CloudFront. Use an AWS Lambda function as the

CloudFront distribution’s origin. Use an Amazon Aurora DB cluster as the data store.

Answer explanation

(A) AWS AppSync simplifies application development by giving you the ability to create a flexible API to securely access, manipulate, and combine data from one or more data sources. AWS AppSync is a managed service that uses GraphQL to help applications get the exact data that they need. You can use AWS AppSync to build scalable applications that require real-time updates on a range of data sources, including Amazon DynamoDB

(B) In Amazon API Gateway, you can create a WebSocket API as a stateful frontend for an AWS service (such as AWS Lambda or DynamoDB) or for an HTTP endpoint. The WebSocket API invokes the backend based on the content of the messages that the API receives from client applications. Unlike a REST API, which receives and responds to requests, a WebSocket API supports two-way communication between client applications and the backend.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A developer is adding sign-up and sign-in functionality to an application. The application must make an API call to a custom analytics solution to log user sign-in events.

Which combination of actions should the developer perform to meet these requirements? (Select TWO.)

Use Amazon Cognito to provide the sign-up and sign-in functionality.

Use AWS Identity and Access Management (IAM) to provide the sign-up and sign-in functionality.

Configure an AWS Config rule to make the API call when a user is authenticated.

Invoke an Amazon API Gateway method to make the API call when a user is authenticated

Invoke an AWS Lambda function to make the API call when a user is authenticated.

Answer explanation

Amazon Cognito adds user sign-up, sign-in, and access control to web and mobile applications. You can also create an AWS Lambda function to make an API call to a custom analytics solution and then invoke that function by using an Amazon Cognito post authentication trigger

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A company is using Amazon API Gateway for its REST APIs in an AWS account. A developer wants to allow only IAM users from another AWS account to access the APIs.


Which combination of steps should the developer take to meet these requirements? (Select TWO.)

Create an IAM permission policy. Attach the policy to each IAM user. Set the method authorization type

for the APIs to AWS_IAM. Use Signature Version 4 to sign the API requests

Create an Amazon Cognito user pool. Add each IAM user to the user pool. Set the method authorization

type for the APIs to COGNITO_USER_POOLS. Authenticate by using the IAM credentials in Amazon

Cognito. Add the ID token to the request headers.

Create an Amazon Cognito identity pool. Add each IAM user to the identity pool. Set the method

authorization type for the APIs to COGNITO_USER_POOLS. Authenticate by using the IAM credentials

in Amazon Cognito. Add the access token to the request headers.

Create a resource policy for the APIs to allow access for each IAM user only.

Create an Amazon Cognito authorizer for the APIs to allow access for each IAM user only. Set the

method authorization type for the APIs to COGNITO_USER_POOLS.

Answer explanation

A resource policy can grant API access in one AWS account to users in a different AWS account by using Signature Version 4 (SigV4) protocols

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A developer is building a new application that transforms text files to .pdf files. A separate application

writes the text files to a source Amazon S3 bucket. The new application must read the files as they arrive

in Amazon S3 and must convert the files to .pdf files by using an AWS Lambda function. The developer

has written an IAM policy to allow access to Amazon S3 and Amazon CloudWatch Logs.

What should the developer do to ensure that the Lambda function has the correct permissions?

Create a Lambda execution role by using AWS Identity and Access Management (IAM). Attach the IAM

policy to the role. Assign the Lambda execution role to the Lambda function.

Create a Lambda execution user by using AWS Identity and Access Management (IAM). Attach the IAM

policy to the user. Assign the Lambda execution user to the Lambda function.

Create a Lambda execution role by using AWS Identity and Access Management (IAM). Attach the IAM

policy to the role. Store the IAM role as an environment variable in the Lambda function

Create a Lambda execution user by using AWS Identity and Access Management (IAM). Attach the IAM

policy to the user. Store the IAM user credentials as environment variables in the Lambda function.

Answer explanation

An AWS Lambda function's execution role grants the Lambda function permission to access AWS services and resources. You provide this role when you create a function, and Lambda assumes the role when a function is invoked.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A developer is working on an application that stores highly confidential data in a database. The developer must use AWS Key Management Service (AWS KMS) with envelope encryption to protect the

data.

How should the developer configure the data encryption to meet these requirements?

Encrypt the data by using a KMS key. Store the encrypted data in the database.

Encrypt the data by using a generated data key. Store the encrypted data in the database.

Encrypt the data by using a generated data key. Store the encrypted data and the data key ID in the

database.

Encrypt the data by using a generated data key. Store the encrypted data and the encrypted data key in

the database.

Answer explanation

Envelope encryption is the practice of encrypting plaintext data with a data key and then encrypting the data key under another key. You must store the encrypted form of the data key so that you can use the data key to decrypt the encrypted data in the database.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A developer is adding Amazon ElastiCache for Memcached to a company's existing record storage application. The developer has decided to use lazy loading based on an analysis of common record handling patterns.

Which pseudocode example will correctly implement lazy loading?

Media Image
Media Image
Media Image
Media Image

Answer explanation

Lazy loading is a caching strategy in which a record does not load until the record is needed. When you implement lazy loading, the application first checks the cache for a record. If the record is not present, the application retrieves the record from the database and stores the record in the cache.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?