Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Amazon Web Services AWS Certified Associate DVA-C02 Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions
Questions # 91:

A developer has written the following IAM policy to provide access to an Amazon S3 bucket:

Question # 91

Which access does the policy allow regarding the s3:GetObject and s3:PutObject actions?

Options:

A.

Access on all buckets except the “DOC-EXAMPLE-BUCKET” bucket


B.

Access on all buckets that start with “DOC-EXAMPLE-BUCKET” except the “DOC-EXAMPLE-BUCKET/secrets” bucket


C.

Access on all objects in the “DOC-EXAMPLE-BUCKET” bucket along with access to all S3 actions for objects in the “DOC-EXAMPLE-BUCKET” bucket that start with “secrets”


D.

Access on all objects in the “DOC-EXAMPLE-BUCKET” bucket except on objects that start with “secrets”


Expert Solution
Questions # 92:

A developer is running an application on an Amazon EC2 instance. When the application attempts to read from an Amazon S3 bucket, the request fails. The developer determines that the IAM role associated with the EC2 instance is missing the required Amazon S3 read permissions.

The developer must grant the application access to read from the S3 bucket with the LEAST application disruption .

Which solution will meet this requirement?

Options:

A.

Add the permission to the IAM role. Terminate the EC2 instance and launch a new instance.


B.

Add the permission to the IAM role so that the change takes effect automatically.


C.

Add the permission to the IAM role. Hibernate and restart the EC2 instance.


D.

Add the permission to the S3 bucket and restart the EC2 instance.


Expert Solution
Questions # 93:

A developer is preparing to deploy an AWS CloudFormation stack for an application from a template that includes an IAM user.

The developer needs to configure the application ' s resources to retain the IAM user after successful creation. However, the developer also needs to configure the application to delete the IAM user if the stack rolls back.

Options:

A.

Update CloudFormation template with the following deletion policy:AWSTemplateFormatVersion: ' 2010-05-09 ' Resources: appUser: Type: AWS::IAM::User DeletionPolicy: Retain


B.

Update CloudFormation template with the following deletion policy:AWSTemplateFormatVersion: ' 2010-09-09 ' Resources: appUser: Type: AWS::IAM::User DeletionPolicy: RetainExceptOnCreate


C.

Update the CloudFormation service role to include the following policy:{ " Version " : " 2012-10-17 " , " Statement " : [{ " Effect " : " Allow " , " Action " : [ " cloudformation:UpdateTerminationProtection " ], " Resource " : " * " }]}


D.

Update the stack policy to include the following statements:{ " Statement " : [{ " Effect " : " Deny " , " Action " : " Update:* " , " Principal " : " * " , " Resource " : " * " , " Condition " : { " StringEquals " : { " ResourceType " : " AWS::IAM::User " }}}]}


Expert Solution
Questions # 94:

A developer needs to deploy an application running on AWS Fargate using Amazon ECS The application has environment variables that must be passed to a container for the application to initialize.

How should the environment variables be passed to the container?

Options:

A.

Define an array that includes the environment variables under the environment parameter within the service definition.


B.

Define an array that includes the environment variables under the environment parameter within the task definition.


C.

Define an array that includes the environment variables under the entryPoint parameter within the task definition.


D.

Define an array that includes the environment variables under the entryPoint parameter within the service definition.


Expert Solution
Questions # 95:

A developer is integrating Amazon ElastiCache in an application. The cache will store data from a database. The cached data must populate real-time dashboards. Which caching strategy will meet these requirements?

Options:

A.

A read-through cache


B.

A write-behind cache


C.

A lazy-loading cache


D.

A write-through cache


Expert Solution
Questions # 96:

A developer is running an application on an Amazon EC2 instance. When the application tries to read an Amazon S3 bucket, the application fails. The developer notices that the associated IAM role is missing the S3 read permission. The developer needs to give the application the ability to read the S3 bucket. Which solution will meet this requirement with the LEAST application disruption?

Options:

A.

Add the permission to the role. Terminate the existing EC2 instance. Launch a new EC2 instance.


B.

Add the permission to the role so that the change will take effect automatically.


C.

Add the permission to the role. Hibernate and restart the existing EC2 instance.


D.

Add the permission to the S3 bucket. Restart the EC2 instance.


Expert Solution
Questions # 97:

A developer maintains a serverless application that uses AWS Lambda to process financial transaction files uploaded to an Amazon S3 bucket. A Lambda function is scheduled to run once per hour to process the files.

As file uploads increase, the Lambda function occasionally exceeds the 15-minute execution limit . The developer must handle higher file volumes, reduce processing time, and prevent duplicate file processing .

Which solution will meet these requirements?

Options:

A.

Configure Amazon S3 event notifications to invoke the Lambda function for each uploaded file. Track processed file identifiers in Amazon DynamoDB.


B.

Move the application logic to a single Amazon EC2 instance to process files more efficiently.


C.

Use Amazon EventBridge Scheduler to run the Lambda function every 5 minutes to scan the S3 bucket.


D.

Continuously poll the S3 bucket from Lambda and rely on each object’s LastModified timestamp.


Expert Solution
Questions # 98:

A developer is using an AWS account to build an application that stores files in an Amazon S3 bucket. Files must be encrypted at rest by AWS KMS keys. A second AWS account must have access to read files from the bucket.

The developer wants to minimize operational overhead for the application.

Which combination of solutions will meet these requirements? (Select TWO.)

Options:

A.

Use a customer managed key to encrypt the files. Create a key policy that grants kms: Decrypt permissions to the second AWS account.


B.

Use an AWS managed key to encrypt the files. Create a key policy that grants kms:Decrypt permissions to the second AWS account.


C.

Create a service control policy (SCP) that grants s3:GetObject permissions to the second AWS account.


D.

Create a bucket policy for the S3 bucket that grants s3:GetObject permissions to the second AWS account.


E.

Create a gateway endpoint for the S3 bucket. Modify the endpoint policy to grant s3:GetObject permissions to the second AWS account.


Expert Solution
Questions # 99:

A developer is writing an application for a company. The application will be deployed on Amazon EC2 and will use an Amazon RDS for Microsoft SQL Server database. The company ' s security team requires that database credentials are rotated at least weekly.

How should the developer configure the database credentials for this application?

Options:

A.

Create a database user. Store the username and password in an AWS Systems Manager Parameter Store secure string parameter. Enable rotation of the AWS KMS key that is used to encrypt the parameter.


B.

Enable IAM authentication for the database. Create a database user for use with IAM authentication. Enable password rotation.


C.

Create a database user. Store the username and password in an AWS Secrets Manager secret that has daily rotation enabled.


D.

Use the EC2 user data to create a database user. Provide the username and password in environment variables to the application.


Expert Solution
Questions # 100:

A developer is creating a new batch application that will run on an Amazon EC2 instance. The application requires read access to an Amazon S3 bucket. The developer needs to follow security best practices to grant S3 read access to the application.

Which solution meets these requirements?

Options:

A.

Add the permissions to an 1AM policy. Attach the policy to a role. Attach the role to the EC2 instance profile.


B.

Add the permissions inline to an 1AM group. Attach the group to the EC2 instance profile.


C.

Add the permissions to an 1AM policy. Attach the policy to a user. Attach the user to the EC2 instance profile.


D.

Add the permissions to an 1AM policy. Use 1AM web identity federation to access the S3 bucket with the policy.


Expert Solution
Questions # 101:

A company runs a critical application on AWS. The application uses credentials to access an Amazon RDS database.

As part of a risk assessment to analyze security vulnerabilities, the company found that database credentials are not frequently rotated. A developer needs to implement a solution that securely stores and rotates the credentials. The solution must not expose the credentials to anyone who should not have access to the credentials.

Which solution will meet these requirements?

Options:

A.

Configure AWS Secrets Manager to store the database credentials. Schedule managed rotation for Secrets Manager secrets.


B.

Configure the Systems Manager parameters with an AWS KMS AWS managed key to encrypt the database credentials at rest. Create an AWS Lambda function to rotate the KMS key. Set up an Amazon EventBridge rule to invoke the Lambda function on a schedule.


C.

Configure an Amazon S3 bucket with S3 Bucket Keys for server-side encryption with AWS KMS keys (SSE-KMS) to store the database credentials.


D.

Configure the Systems Manager parameters with an AWS KMS customer managed key to encrypt the database credentials at rest. Create an AWS Lambda function to periodically rotate the KMS key. Use a cron expression to invoke the Lambda function on a schedule.


Expert Solution
Questions # 102:

An application reads data from an Amazon Aurora global database with clusters in two AWS Regions. Database credentials are stored in AWS Secrets Manager in the primary Region and are rotated regularly.

The application must be able to run in both Regions and remain highly available .

Which combination of actions will meet these requirements? (Select TWO.)

Options:

A.

Configure the application to retrieve database credentials from the secret in the primary Region.


B.

Replicate the secret to the secondary Region and configure the application to retrieve credentials from the replica secret.


C.

Replicate the secret and promote the replica to a standalone secret.


D.

Store the database endpoint and credentials as a secret and connect to the secret.


E.

Store credentials in environment variables in the secondary Region.


Expert Solution
Questions # 103:

A company has a web application that is hosted on Amazon EC2 instances The EC2 instances are configured to stream logs to Amazon CloudWatch Logs The company needs to receive an Amazon Simple Notification Service (Amazon SNS) notification when the number of application error messages exceeds a defined threshold within a 5-minute period

Which solution will meet these requirements?

Options:

A.

Rewrite the application code to stream application logs to Amazon SNS Configure an SNS topic to send a notification when the number of errors exceeds the defined threshold within a 5-minute period


B.

Configure a subscription filter on the CloudWatch Logs log group. Configure the filter to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period.


C.

Install and configure the Amazon Inspector agent on the EC2 instances to monitor for errors Configure Amazon Inspector to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period


D.

Create a CloudWatch metric filter to match the application error pattern in the log data. Set up a CloudWatch alarm based on the new custom metric. Configure the alarm to send an SNS notification when the number of errors exceeds the defined threshold within a 5-minute period.


Expert Solution
Questions # 104:

A company has an application that runs on Amazon EC2 instances. The application needs to use dynamic feature flags that will be shared with other applications. The application must poll on an interval for new feature flag values. The values must be cached when they are retrieved.

Which solution will meet these requirements in the MOST operationally efficient way?

Options:

A.

Store the feature flag values in AWS Secrets Manager. Configure an Amazon ElastiCache node to cache the values by using a lazy loading strategy in the application. Update the application to poll for the values on an interval from ElastiCache.


B.

Store the feature flag values in an Amazon DynamoDB table. Configure DynamoDB Accelerator (DAX) to cache the values by using a lazy loading strategy in the application. Update the application to poll for the values on an interval from DynamoDB.


C.

Store the feature flag values in AWS AppConfig. Configure AWS AppConfig Agent on the EC2 instances to poll for the values on an interval. Update the application to retrieve the values from the AppConfig Agent localhost endpoint.


D.

Store the feature flag values in AWS Systems Manager Parameter Store. Configure the application to poll on an interval. Configure the application to use the AWS SDK to retrieve the values from Parameter Store and to store the values in memory.


Expert Solution
Questions # 105:

A developer is receiving HTTP 400: ThrottlingException errors intermittently when calling the Amazon CloudWatch API. When a call fails, no data is retrieved.

What best practice should first be applied to address this issue?

Options:

A.

Contact AWS Support for a limit increase.


B.

Use the AWS CLI to get the metrics.


C.

Analyze the applications and remove the API call.


D.

Retry the call with exponential backoff.


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 91-105 out of questions