Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Amazon Web Services AWS Certified Associate DVA-C02 Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions
Questions # 91:

A developer is implementing a serverless application by using AWS CloudFormation to provision Amazon S3 web hosting. Amazon API Gateway, and AWS Lambda functions. The Lambda function source code is zipped and uploaded to an S3 bucket. The S3 object key of the zipped source code is specified in the Lambda resource in the CloudFormation template.

The developer notices that there are no changes in the Lambda function every time the CloudFormation stack is updated.

How can the developer resolve this issue?

Options:

A.

Create a new Lambda function alias before updating the CloudFormation stack.


B.

Change the S3 object key or the S3 version in the CloudFormation template before updating the CloudFormation stack.


C.

Upload the zipped source code to another S3 bucket before updating the CloudFormation stack.


D.

Associate a code signing configuration with the Lambda function before updating the CloudFormation stack.


Expert Solution
Questions # 92:

A developer has created a new IAM user that has the s3:PutObject permission to write to a specific Amazon S3 bucket. The S3 bucket uses server-side encryption with AWS KMS–managed keys (SSE-KMS) as the default encryption. When an application uses the access key and secret key of the IAM user to call the PutObject API operation, the application receives an Access Denied error.

What should the developer do to resolve this error?

Options:

A.

Update the policy of the IAM user to allow the s3:EncryptionConfiguration action.


B.

Update the bucket policy of the S3 bucket to allow the IAM user to upload objects.


C.

Update the policy of the IAM user to allow the kms:GenerateDataKey action.


D.

Update the ACL of the S3 bucket to allow the IAM user to upload objects.


Expert Solution
Questions # 93:

A developer has built an application that inserts data into an Amazon DynamoDB table. The table is configured to use provisioned capacity. The application is deployed on a burstable nano Amazon EC2 instance. The application logs show that the application has been failing because of a ProvisionedThroughputExceededException error.

Which actions should the developer take to resolve this issue? (Select TWO.)

Options:

A.

Move the application to a larger EC2 instance.


B.

Increase the number of read capacity units (RCUs) that are provisioned for the DynamoDB table.


C.

Reduce the frequency of requests to DynamoDB by implementing exponential backoff.


D.

Increase the frequency of requests to DynamoDB by decreasing the retry delay.


E.

Change the capacity mode of the DynamoDB table from provisioned to on-demand.


Expert Solution
Questions # 94:

A developer is updating an Amazon API Gateway REST API to have a mock endpoint. The developer wants to update the integration request mapping template so the endpoint will respond to mock integration requests with specific HTTP status codes based on various conditions.

Options:

A.

{ if( $input.params(‘integration’) == " mock " ) " statusCode " : 404 else " statusCode " : 500 end }


B.

{ if( $input.params( ' scope ' ) == " internal " ) " statusCode " : 200 else " statusCode " : 500 end }


C.

{ if( $input.path( " integration " ) ) " statusCode " : 200 else " statusCode " :404 end }


D.

{ if( $context.integration.status ) " statusCode " : 200 else " statusCode " : 500 end }


Expert Solution
Questions # 95:

An application uses an Amazon DynamoDB table to manage user profiles. A UserID attribute is the primary key of the table. The table also includes columns named Username, EmailAddress, RegistrationDate, Location, and Status.

The application needs to display a list of users from a specific location who registered after a specific date. Queries on the table must be optimized for efficiency.

Which solution will meet these requirements?

Options:

A.

Create a global secondary index (GSI). Use Location as the partition key and RegistrationDate as the sort key. Use the Query operation to retrieve the specified users.


B.

Use the Scan operation to retrieve the specified users. Use a filter expression for a value in the RegistrationDate column that is greater than the date required by the application.


C.

Create a local secondary index (LSI). Use Location as the partition key and RegistrationDate as the sort key. Use the Query operation to retrieve the specified users.


D.

Use the BatchGetItem operation with a filter on the RegistrationDate column for a value that is greater than the required date to retrieve the specified users.


Expert Solution
Questions # 96:

A developer is building an ecommerce application that uses multiple AWS Lambda functions. Each function performs a specific step in a customer order workflow, such as order processing and inventory management.

The developer must ensure that the Lambda functions run in a specific order.

Which solution will meet this requirement with the LEAST operational overhead?

Options:

A.

Configure an Amazon Simple Queue Service (Amazon SQS) queue to contain messages about each step a function must perform. Configure the Lambda functions to run sequentially based on the order of messages in the SQS queue.


B.

Configure an Amazon Simple Notification Service (Amazon SNS) topic to contain notifications about each step a function must perform. Subscribe the Lambda functions to the SNS topic. Use subscription filters based on the step each function must perform.


C.

Configure an AWS Step Functions state machine to invoke the Lambda functions in a specific order.


D.

Configure Amazon EventBridge Scheduler schedules to invoke the Lambda functions in a specific order.


Expert Solution
Questions # 97:

A developer is building an application that stores sensitive data files in an Amazon S3 bucket. Company security policies require that files be encrypted by using AWS KMS keys . An application in a second AWS account must access the files.

Which combination of solutions will meet these requirements? (Select THREE.)

Options:

A.

Encrypt the files using server-side encryption with AWS KMS (SSE-KMS) and an AWS-managed KMS key.


B.

Create an S3 bucket policy that allows access from the second AWS account.


C.

Update the AWS KMS key policy to allow access from the second AWS account.


D.

Create an IAM role that trusts the Amazon S3 service principal.


E.

Encrypt the files using server-side encryption with AWS KMS and a customer-managed KMS key .


F.

Configure default bucket encryption with SSE-S3.


Expert Solution
Questions # 98:

A company is building a serverless application on AWS. The application uses an AWS Lambda function to process customer orders 24 hours a day, 7 days a week. The Lambda function calls an external vendor ' s HTTP API to process payments.

During load tests, a developer discovers that the external vendor payment processing API occasionally times out and returns errors. The company expects that some payment processing API calls will return errors.

The company wants the support team to receive notifications in near real time only when the payment processing external API error rate exceed 5% of the total number of transactions in an hour. Developers need to use an existing Amazon Simple Notification Service (Amazon SNS) topic that is configured to notify the support team.

Which solution will meet these requirements?

Options:

A.

Write the results of payment processing API calls to Amazon CloudWatch. Use Amazon CloudWatch Logs Insights to query the CloudWatch logs. Schedule the Lambda function to check the CloudWatch logs and notify the existing SNS topic.


B.

Publish custom metrics to CloudWatch that record the failures of the external payment processing API calls. Configure a CloudWatch alarm to notify the existing SNS topic when error rate exceeds the specified rate.


C.

Publish the results of the external payment processing API calls to a new Amazon SNS topic. Subscribe the support team members to the new SNS topic.


D.

Write the results of the external payment processing API calls to Amazon S3. Schedule an Amazon Athena query to run at regular intervals. Configure Athena to send notifications to the existing SNS topic when the error rate exceeds the specified rate.


Expert Solution
Questions # 99:

A company has an ecommerce application. To track product reviews, the company ' s development team uses an Amazon DynamoDB table.

Every record includes the following

• A Review ID a 16-digrt universally unique identifier (UUID)

• A Product ID and User ID 16 digit UUlDs that reference other tables

• A Product Rating on a scale of 1-5

• An optional comment from the user

The table partition key is the Review ID. The most performed query against the table is to find the 10 reviews with the highest rating for a given product.

Which index will provide the FASTEST response for this query " ?

Options:

A.

A global secondary index (GSl) with Product ID as the partition key and Product Rating as the sort key


B.

A global secondary index (GSl) with Product ID as the partition key and Review ID as the sort key


C.

A local secondary index (LSI) with Product ID as the partition key and Product Rating as the sort key


D.

A local secondary index (LSI) with Review ID as the partition key and Product ID as the sort key


Expert Solution
Questions # 100:

A developer supports an application that accesses data in an Amazon DynamoDB table. One of the item attributes is expirationDate in the timestamp format. The application uses this attribute to find items, archive them, and remove them from the table based on the timestamp value

The application will be decommissioned soon, and the developer must find another way to implement this functionality. The developer needs a solution that will require the least amount of code to write.

Which solution will meet these requirements?

Options:

A.

Enable TTL on the expirationDate attribute in the table. Create a DynamoDB stream. Create an AWS Lambda function to process the deleted items. Create a DynamoDB trigger for the Lambda function.


B.

Create two AWS Lambda functions one to delete the items and one to process the items Create a DynamoDB stream Use the Deleteltem API operation to delete the items based on the expirationDate attribute Use the GetRecords API operation to get the items from the DynamoDB stream and process them


C.

Create two AWS Lambda functions, one to delete the items and one to process the items. Create an Amazon EventBndge scheduled rule to invoke the Lambda Functions Use the Deleteltem API operation to delete the items based on the expirationDate attribute. Use the GetRecords API operation to get the items from the DynamoDB table and process them.


D.

Enable TTL on the expirationDate attribute in the table Specify an Amazon Simple Queue Service (Amazon SQS > dead-letter queue as the target to delete the items Create an AWS Lambda function to process the items


Expert Solution
Questions # 101:

A company stores customer credit reports in an Amazon S3 bucket. An analytics service uses standard Amazon S3 GET requests to access the reports. A developer must implement a solution to redact personally identifiable information (PII) from the reports before the reports reach the analytics service.

Options:

A.

Load the S3 objects into Amazon Redshift by using a COPY command. Implement dynamic data masking. Refactor the analytics service to read from Amazon Redshift.


B.

Set up an S3 Object Lambda function. Attach the function to an S3 Object Lambda Access Point. Program the function to call a PII redaction API.


C.

Use AWS Key Management Service (AWS KMS) to implement encryption in the S3 bucket. Re-upload all the existing S3 objects. Give the kmspermission to the analytics service.


D.

Create an Amazon Simple Notification Service (Amazon SNS) topic. Implement message data protection. Refactor the analytics service to publish data access requests to the SNS topic.


Expert Solution
Questions # 102:

A company regularly receives route status updates from its delivery trucks as events in Amazon EventBridge. The company is building an API-based application in a VPC that will consume and process the events to create a delivery status dashboard. The API application must not be available by using public IP addresses because of security and compliance requirements.

How should the company send events from EventBridge to the API application?

Options:

A.

Create an AWS Lambda function that runs in the same VPC as the API application. Configure the function as an EventBridge target. Use the function to send events to the API.


B.

Create an internet-facing Application Load Balancer (ALB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the ALB as an EventBridge target.


C.

Create an internet-facing Network Load Balancer (NLB) in front of the API application. Associate a security group with rules that block access from all external sources except for EventBridge. Configure the NLB as an EventBridge target.


D.

Use the application API endpoint in the VPC as a target for EventBridge. Send events directly to the application API endpoint from EventBridge.


Expert Solution
Questions # 103:

An ecommerce company is using an AWS Lambda function behind Amazon API Gateway as its application tier. To process orders during checkout, the application calls a POST API from the frontend. The POST API invokes the Lambda function asynchronously. In rare situations, the application has not processed orders. The Lambda application logs show no errors or failures.

What should a developer do to solve this problem?

Options:

A.

Inspect the frontend logs for API failures. Call the POST API manually by using the requests from the log file.


B.

Create and inspect the Lambda dead-letter queue. Troubleshoot the failed functions. Reprocess the events.


C.

Inspect the Lambda logs in Amazon CloudWatch for possible errors. Fix the errors.


D.

Make sure that caching is disabled for the POST API in API Gateway.


Expert Solution
Questions # 104:

A company is building a content authoring application. The application has multiple user groups, such as content creator, reviewer, approver, and administrator. The company needs to assign users fine-grained permissions for specific parts of the application.

The company needs a solution to configure, maintain, and analyze user permissions. The company wants a solution that can be easily adapted to work with newer applications in the future. The company must use a third-party OpenID Connect (OIDC) identity provider (IdP) to authenticate users.

Options:

A.

Configure an Amazon Cognito identity pool for the application. Use the identity pool identities within the application to manage user permissions.


B.

Configure the application to check user permissions upon request. Configure the application logic to manage user permissions.


C.

Use Amazon Verified Permissions to set up user permissions. Integrate Verified Permissions with a third-party IdP. Configure the application to request authorization decisions from Verified Permissions.


D.

Set up an IAM role for each user group. Assign users appropriate IAM roles. Configure the application to determine appropriate permissions for each user based on the user ' s IAM role.


Expert Solution
Questions # 105:

A company is launching a photo sharing application on AWS. Users use the application to upload images to an Amazon S3 bucket. When users upload images, an AWS Lambda function creates thumbnail versions of the images and stores the thumbnail versions in another S3 bucket.

During development, a developer notices that the Lambda function takes more than 2 minutes to complete the thumbnail process. The company needs all images to be processed in less than 30 seconds.

What should the developer do to meet these requirements?

Options:

A.

Increase the virtual CPUs (vCPUs) for the Lambda function to use 10 vCPUs.


B.

Change the Lambda function instance type to use m6a.4xlarge.


C.

Configure the Lambda function to increase the amount of memory.


D.

Configure burstable performance for the Lambda function.


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions