Pass the Amazon Web Services AWS Certified Associate DVA-C02 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

A developer is troubleshooting an application mat uses Amazon DynamoDB in the uswest-2 Region. The application is deployed to an Amazon EC2 instance. The application requires read-only permissions to a table that is named Cars The EC2 instance has an attached IAM role that contains the following IAM policy.

Question # 41

When the application tries to read from the Cars table, an Access Denied error occurs.

How can the developer resolve this error?

Options:

A.

Modify the IAM policy resource to be "arn aws dynamo* us-west-2 account-id table/*"


B.

Modify the IAM policy to include the dynamodb * action


C.

Create a trust policy that specifies the EC2 service principal. Associate the role with the policy.


D.

Create a trust relationship between the role and dynamodb Amazonas com.


Expert Solution
Questions # 42:

A company caches session information for a web application in an Amazon DynamoDB table. The company wants an automated way to delete old items from the table.

What is the simplest way to do this?

Options:

A.

Write a script that deletes old records; schedule the script as a cron job on an Amazon EC2 instance.


B.

Add an attribute with the expiration time; enable the Time To Live feature based on that attribute.


C.

Each day, create a new table to hold session data; delete the previous day's table.


D.

Add an attribute with the expiration time; name the attribute ItemExpiration.


Expert Solution
Questions # 43:

An application ingests data from an Amazon Kinesis data stream. The shards in the data stream are set for normal traffic.

During tests for peak traffic, the application ingests data slowly. A developer needs to adjust the data stream to handle the peak traffic.

What should the developer do to meet this requirement MOST cost-effectively?

Options:

A.

Install the Kinesis Producer Library {KPL) to ingest data into the data stream.


B.

Switch to on-demand capacity mode for the data stream. Specify a partition key when writing data to the data stream.


C.

Decrease the amount of time that data is kept in the data stream by using the DecreaseStreamRetention Period API operation.


D.

Increase the shard count in the data stream by using the UpdateShardCount API operation.


Expert Solution
Questions # 44:

A developer created an AWS Lambda function that accesses resources in a VPC. The Lambda function polls an Amazon Simple Queue Service (Amazon SOS) queue for new messages through a VPC endpoint. Then the function calculates a rolling average of the numeric values that are contained in the messages. After initial tests of the Lambda function, the developer found that the value of the rolling average that the function returned was not accurate.

How can the developer ensure that the function calculates an accurate rolling average?

Options:

A.

Set the function's reserved concurrency to 1. Calculate the rolling average in the function. Store the calculated rolling average in Amazon ElastiCache.


B.

Modify the function to store the values in Amazon ElastiCache. When the function initializes, use the previous values from the cache to calculate the rolling average.


C.

Set the function's provisioned concurrency to 1. Calculate the rolling average in the function. Store the calculated rolling average in Amazon ElastiCache.


D.

Modify the function to store the values in the function's layers. When the function initializes, use the previously stored values to calculate the rolling average.


Expert Solution
Questions # 45:

A developer created an AWS Lambda function to process data in an application. The function pulls large objects from an Amazon S3 bucket, processes the data, and loads the processed data into a second S3 bucket. Application users have reported slow response times. The developer checks the logs and finds that Lambda function invocations run much slower than expected. The function itself is simple and has a small deployment package. The function initializes quickly. The developer needs to improve the performance of the application. Which solution will meet this requirement with the LEAST operational overhead?

Options:

A.

Store the data in an Amazon EFS file system. Mount the file system to a local directory in the function.


B.

Create an Amazon EventBridge rule to schedule invocations of the function every minute.


C.

Configure the function to use ephemeral storage. Upload the objects and process data in the /tmp directory.


D.

Create a Lambda layer to package the function dependencies. Add the layer to the function.


Expert Solution
Questions # 46:

A developer is writing an application that will retrieve sensitive data from a third-party system. The application will format the data into a PDF file. The PDF file could be more than 1 MB. The application will encrypt the data to disk by using AWS Key Management Service (AWS KMS). The application will decrypt the file when a user requests to download it. The retrieval and formatting portions of the application are complete.

The developer needs to use the GenerateDataKey API to encrypt the PDF file so that the PDF file can be decrypted later. The developer needs to use an AWS KMS symmetric customer managed key for encryption.

Which solutions will meet these requirements?

Options:

A.

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API and a symmetric encryptionalgorithm to encrypt the file.


B.

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API and a symmetric encryptionalgorithm to encrypt the file.


C.

Write the encrypted key from the GenerateDataKey API to disk for later use. Use the plaintext key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API


D.

Write the plain text key from the GenerateDataKey API to disk for later use. Use the encrypted key from the GenerateDataKey API to encrypt the file by using the KMS Encrypt API


Expert Solution
Questions # 47:

A company has an application that consists of different microservices that run inside an AWS account. The microservices are running in containers inside a single VPC. The number of microservices is constantly increasing. A developer must create a central logging solution for application logs.

Options:

A.

Create a different Amazon CloudWatch Logs stream for each microservice.


B.

Create an AWS CloudTrail trail to log all the API calls.


C.

Configure VPC Flow Logs to track the communications between the microservices.


D.

Use AWS Cloud Map to map the interactions of the microservices.


Expert Solution
Questions # 48:

A developer is creating a serverless application that uses an AWS Lambda function The developer will use AWS CloudFormation to deploy the application The application will write logs to Amazon CloudWatch Logs The developer has created a log group in a CloudFormation template for the application to use The developer needs to modify the CloudFormation template to make the name of the log group available to the application at runtime

Which solution will meet this requirement?

Options:

A.

Use the AWS:lnclude transform in CloudFormation to provide the log group's name to the application


B.

Pass the log group's name to the application in the user data section of the CloudFormation template.


C.

Use the CloudFormation template's Mappings section to specify the log group's name for the application.


D.

Pass the log group's Amazon Resource Name (ARN) as an environment variable to the Lambda function


Expert Solution
Questions # 49:

A company has an AWS Step Functions state machine named myStateMachine. The company configured a service role for Step Functions. The developer must ensure that only the myStateMachine state machine can assume the service role.

Options:

A.

"Condition": { "ArnLike": { "aws

":"arn:aws:states:ap-south-1:111111111111:stateMachine

" } }


B.

"Condition": { "ArnLike": { "aws

":"arn:aws:states:ap-south-1:*:stateMachine

" } }


Expert Solution
Questions # 50:

When using the AWS Encryption SDK how does the developer keep track of the data encryption keys used to encrypt data?

Options:

A.

The developer must manually keep Hack of the data encryption keys used for each data object.


B.

The SDK encrypts the data encryption key and stores it (encrypted) as part of the resumed ophertext.


C.

The SDK stores the data encryption keys automaticity in Amazon S3.


D.

The data encryption key is stored m the user data for the EC2 instance.


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions