Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Amazon Web Services AWS Certified Associate DVA-C02 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

A company is developing a weather forecast application that displays forecasts for cities within a single country. Weather data is stored in an Amazon DynamoDB table named Forecasts with attributes CityId, Temperature, and ForecastDate.

The application is read heavy . Most read requests target the current day’s forecast for a small number of very large cities . The company must design a partition key strategy that ensures the most even distribution of read traffic .

Which solution will meet these requirements?

Options:

A.

Use CityId with a calculated suffix as the partition key and ForecastDate as the sort key.


B.

Use a numeric index as the partition key and ForecastDate as the sort key.


C.

Use ForecastDate as the partition key and CityId as the sort key.


D.

Use ForecastDate with a calculated suffix as the partition key and CityId as the sort key.


Expert Solution
Questions # 77:

A developer is preparing to deploy an AWS CloudFormation stack for an application from a template that includes an IAM user.

The developer needs to configure the application ' s resources to retain the IAM user after successful creation. However, the developer also needs to configure the application to delete the IAM user if the stack rolls back.

Options:

A.

Update CloudFormation template with the following deletion policy:AWSTemplateFormatVersion: ' 2010-05-09 ' Resources: appUser: Type: AWS::IAM::User DeletionPolicy: Retain


B.

Update CloudFormation template with the following deletion policy:AWSTemplateFormatVersion: ' 2010-09-09 ' Resources: appUser: Type: AWS::IAM::User DeletionPolicy: RetainExceptOnCreate


C.

Update the CloudFormation service role to include the following policy:{ " Version " : " 2012-10-17 " , " Statement " : [{ " Effect " : " Allow " , " Action " : [ " cloudformation:UpdateTerminationProtection " ], " Resource " : " * " }]}


D.

Update the stack policy to include the following statements:{ " Statement " : [{ " Effect " : " Deny " , " Action " : " Update:* " , " Principal " : " * " , " Resource " : " * " , " Condition " : { " StringEquals " : { " ResourceType " : " AWS::IAM::User " }}}]}


Expert Solution
Questions # 78:

A company had an Amazon RDS for MySQL DB instance that was named mysql-db. The DB instance was deleted within the past 90 days. A developer needs to find which 1AM user or role deleted the DB instance in the AWS environment. Which solution will provide this information?

Options:

A.

Retrieve the AWS CloudTrail events for the resource mysql-db where the event name is DeleteDBInstance. Inspect each event.


B.

Retrieve the Amazon CloudWatch log events from the most recent log stream within the rds/mysql-db log group. Inspect the log events.


C.

Retrieve the AWS X-Ray trace summaries. Filter by services with the name mysql-db. Inspect the ErrorRootCauses values within each summary.


D.

Retrieve the AWS Systems Manager deletions inventory Filter the inventory by deletions that have a TypeName value of RDS. Inspect the deletion details.


Expert Solution
Questions # 79:

A developer accesses AWS CodeCommit over SSH. The SSH keys configured to access AWS CodeCommit are tied to a user with the following permissions:

The developer needs to create/delete branches

Which specific IAM permissions need to be added based on the principle of least privilege?

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 80:

A developer is building a microservices-based application by using Python on AWS and several AWS services The developer must use AWS X-Ray The developer views the service map by using the console to view the service dependencies. During testing, the developer notices that some services are missing from the service map

What can the developer do to ensure that all services appear in the X-Ray service map?

Options:

A.

Modify the X-Ray Python agent configuration in each service to increase the sampling rate


B.

Instrument the application by using the X-Ray SDK for Python. Install the X-Ray SDK for all the services that the application uses


C.

Enable X-Ray data aggregation in Amazon CloudWatch Logs for all the services that the application uses


D.

Increase the X-Ray service map timeout value in the X-Ray console


Expert Solution
Questions # 81:

A developer needs to give a new application the ability to retrieve configuration data.

The application must be able to retrieve new configuration data values without the need to redeploy the application code. If the application becomes unhealthy because of a bad configuration change, the developer must be able to automatically revert the configuration change to the previous value.

Options:

A.

Use AWS Secrets Manager to manage and store the configuration data. Integrate Secrets Manager with a custom AWS Config rule that has remediation actions to track changes in the application and to roll back any bad configuration changes.


B.

Use AWS Secrets Manager to manage and store the configuration data. Integrate Secrets Manager with a custom AWS Config rule. Attach a custom AWS Systems Manager document to the rule that automatically rolls back any bad configuration changes.


C.

Use AWS AppConfig to manage and store the configuration data. Integrate AWS AppConfig with Amazon CloudWatch to monitor changes to the application. Set up an alarm to automatically roll back any bad configuration changes.


D.

Use AWS AppConfig to manage and store the configuration data. Integrate AWS AppConfig with Amazon CloudWatch to monitor changes to the application. Set up CloudWatch Application Signals to roll back any bad configuration changes.


Expert Solution
Questions # 82:

A company has an existing application that has hardcoded database credentials A developer needs to modify the existing application The application is deployed in two AWS Regions with an active-passive failover configuration to meet company’s disaster recovery strategy

The developer needs a solution to store the credentials outside the code. The solution must comply With the company ' s disaster recovery strategy

Which solution Will meet these requirements in the MOST secure way?

Options:

A.

Store the credentials in AWS Secrets Manager in the primary Region. Enable secret replication to the secondary Region Update the application to use the Amazon Resource Name (ARN) based on the Region.


B.

Store credentials in AWS Systems Manager Parameter Store in the primary Region. Enable parameter replication to the secondary Region. Update the application to use the Amazon Resource Name (ARN) based on the Region.


C.

Store credentials in a config file. Upload the config file to an S3 bucket in me primary Region. Enable Cross-Region Replication (CRR) to an S3 bucket in the secondary region. Update the application to access the config file from the S3 bucket based on the Region.


D.

Store credentials in a config file. Upload the config file to an Amazon Elastic File System (Amazon EFS) file system. Update the application to use the Amazon EFS file system Regional endpoints to access the config file in the primary and secondary Regions.


Expert Solution
Questions # 83:

A developer is building two microservices that use an Amazon SQS queue to communicate. The messages that the microservices send to one another contain sensitive information. The developer must ensure the messages are stored and are encrypted at rest.

Which solution will meet these requirements?

Options:

A.

Add a policy to the SQS queue that sets the aws:SecureTransport condition.


B.

Configure the microservices to use the server-side encryption (SSE) option within the messages to send messages to the SQS queue.


C.

Enable the server-side encryption (SSE) option on the SQS queue. Ensure the microservices contain the sensitive information within the body of the messages.


D.

Transmit sensitive information as part of the attributes of the messages that the microservices send.


Expert Solution
Questions # 84:

A developer is creating an application that will give users the ability to store photos from their cellphones in the cloud. The application needs to support tens of thousands of users. The application uses an Amazon API Gateway REST API that is integrated with AWS Lambda functions to process the photos. The application stores details about the photos in Amazon DynamoDB.

Users need to create an account to access the application. In the application, users must be able to upload photos and retrieve previously uploaded photos. The photos will range in size from 300 KB to 5 MB.

Which solution will meet these requirements with the LEAST operational overhead?

Options:

A.

Use Amazon Cognito user pools to manage user accounts. Create an Amazon Cognito user pool authorizer in API Gateway to control access to the API. Use the Lambda function to store the photos and details in the DynamoDB table. Retrieve previously uploaded photos directly from the DynamoDB table.


B.

Use Amazon Cognito user pools to manage user accounts. Create an Amazon Cognito user pool authorizer in API Gateway to control access to the API. Use the Lambda function to store the photos in Amazon S3. Store the object ' s S3 key as part of the photo details in the DynamoDB table. Retrieve previously uploaded photos by querying DynamoDB for the S3 key.


C.

Create an IAM user for each user of the application during the sign-up process. Use IAM authentication to access the API Gateway API. Use the Lambda function to store the photos in Amazon S3. Store the object ' s S3 key as part of the photo details in the DynamoDB table. Retrieve previously uploaded photos by querying DynamoDB for the S3 key.


D.

Create a users table in DynamoDB. Use the table to manage user accounts. Create a Lambda authorizer that validates user credentials against the users table. Integrate the Lambda authorizer with API Gateway to control access to the API. Use the Lambda function to store the photos in Amazon S3. Store the object ' s S3 key as par of the photo details in the DynamoDB table. Retrieve previously uploaded photos by querying DynamoDB for the S3 ke


Expert Solution
Questions # 85:

A developer has created an AWS Lambda function that makes queries to an Amazon Aurora MySQL DB instance. When the developer performs a test the OB instance shows an error for too many connections.

Which solution will meet these requirements with the LEAST operational effort?

Options:

A.

Create a read replica for the DB instance Query the replica DB instance instead of the primary DB instance.


B.

Migrate the data lo an Amazon DynamoDB database.


C.

Configure the Amazon Aurora MySQL DB instance tor Multi-AZ deployment.


D.

Create a proxy in Amazon RDS Proxy Query the proxy instead of the DB instance.


Expert Solution
Questions # 86:

A developer is creating an AWS Lambda function in VPC mode An Amazon S3 event will invoke the Lambda function when an object is uploaded into an S3 bucket The Lambda function will process the object and produce some analytic results that will be recorded into a file Each processed object will also generate a log entry that will be recorded into a file.

Other Lambda functions. AWS services, and on-premises resources must have access to the result files and log file. Each log entry must also be appended to the same shared log file. The developer needs a solution that can share files and append results into an existing file.

Which solution should the developer use to meet these requirements?

Options:

A.

Create an Amazon Elastic File System (Amazon EFS) file system. Mount the EFS file system in Lambda. Store the result files and log file in the mount point. Append the log entries to the log file.


B.

Create an Amazon Elastic Block Store (Amazon EBS) Multi-Attach enabled volume Attach the EBS volume to all Lambda functions. Update the Lambda function code to download the log file, append the log entries, and upload the modified log file to Amazon EBS


C.

Create a reference to the /tmp local directory. Store the result files and log file by using the directory reference. Append the log entry to the log file.


D.

Create a reference to the /opt storage directory Store the result files and log file by using the directory reference Append the log entry to the log file


Expert Solution
Questions # 87:

An application uses AWS X-Ray to generate a large amount of trace data on an hourly basis. A developer wants to use filter expressions to limit the returned results through user-specified custom attributes.

How should the developer use filter expressions to filter the results in X-Ray?

Options:

A.

Add custom attributes as annotations in the segment document.


B.

Add custom attributes as metadata in the segment document.


C.

Add custom attributes as new segment fields in the segment document.


D.

Create new sampling rules that are based on custom attributes.


Expert Solution
Questions # 88:

A company runs an application in a third-party cloud. The company wants to use the application to update data in AWS by using API calls to AWS services. The API calls require credentials.

The company ' s security policy requires the company to limit the scope and duration of any credentials used to make API calls to AWS services.

Which solution will meet these requirements in the MOST secure way?

Options:

A.

Create an IAM user for the application. Configure the application to load the IAM user ' s credentials as environment variables. Use the IAM user ' s credentials to interact with AWS services.


B.

Create an IAM user for the application. Populate an AWS Secrets Manager secret with the IAM user ' s AWS credentials. Use the secret to interact with AWS services.


C.

Create an IAM role for the application. Configure the application to call the AWS STS GetFederationToken API. Use the STS credentials to interact with AWS services.


D.

Create an IAM role for the application. Configure the application to call the AWS STS AssumeRole API. Use the STS credentials to interact with AWS services.


Expert Solution
Questions # 89:

A company has a serverless application that uses Amazon API Gateway and AWS Lambda functions to expose a RESTful API. The company uses a continuous integration and continuous delivery (CI/CD) workflow to deploy the application to multiple environments. The company wants to implement automated integration tests after deployment.

A developer needs to set up the necessary infrastructure and processes to automate the deployment and integration tests for the serverless application.

Options:

A.

Configure API Gateway stages to represent each application environment. Use AWS SAM templates to manage the infrastructure for the Lambda functions and API resources. Use AWS CodeBuild to implement automated deployment tests to validate the deployments in each stage.


B.

Configure API Gateway stages to represent each application environment. Use AWS CloudFormation to manage the infrastructure for the Lambda functions and API resources. Use AWS CodeBuild to implement automated deployment tests to validate the deployments in each stage.


C.

Use AWS CodePipeline to create a CI/CD pipeline. Configure API Gateway stages to represent each application environment. Use AWS CloudFormation templates to manage the infrastructure for the Lambda functions and API resources. Use AWS CodeBuild to implement automated deployment tests to validate the deployments in each stage.


D.

Use AWS CloudFormation to create and deploy the application infrastructure in each application environment. Use the AWS CLI to invoke Lambda functions to perform deployment tests after each deployment.


Expert Solution
Questions # 90:

A developer is building an application that stores user activity data in an Amazon DynamoDB table. The developer is writing a new AWS Lambda function to process the activity data. The developer grants the IAM role that the function assumes permission to query the table. The developer must ensure that the function does not have access to personally identifiable information (PII) that is stored in some of the table item attributes.

Which solutions will meet these requirements? (Select TWO.)

Options:

A.

Create a resource-based policy for the DynamoDB table to deny access based on attributes.


B.

Create an AWS KMS customer managed key and use it to encrypt the table.


C.

Create an AWS KMS customer managed key and use envelope encryption to encrypt PII attributes in the table.


D.

Enable attribute-based access control (ABAC) for the DynamoDB table by using resource tags.


E.

Update the function to use a projection expression when querying the table to control which attributes are returned.


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions