New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Amazon Web Services AWS Certified Associate DVA-C02 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

A company launched an online portal to announce a new product that the company will release in 6 months. The portal requests that users enter an email address to receive communications about the product. The company needs to create a REST API that will store the email addresses in Amazon DynamoDB.

A developer has created an AWS Lambda function that can store the email addresses. The developer will deploy the Lambda function by using the AWS Serverless Application Model (AWS SAM). The developer must provide access to the Lambda function over HTTP.

Which solutions will meet these requirements with the LEAST additional configuration? (Select TWO.)

Options:

A.

Expose the Lambda function by using function URLs.


B.

Expose the Lambda function by using a Gateway Load Balancer.


C.

Expose the Lambda function by using a Network Load Balancer.


D.

Expose the Lambda function by using AWS Global Accelerator


E.

Expose the Lambda function by using Amazon API Gateway.


Expert Solution
Questions # 72:

A developer has a legacy application that is hosted on-premises. Other applications hosted on AWS depend on the on-premises application for proper functioning. In case of any application errors, the developer wants to be able to use Amazon CloudWatch to monitor and troubleshoot all applications from one place.

How can the developer accomplish this?

Options:

A.

Install an AWS SDK on the on-premises server to automatically send logs to CloudWatch.


B.

Download the CloudWatch agent to the on-premises server. Configure the agent to use IAM user credentials with permissions for CloudWatch.


C.

Upload log files from the on-premises server to Amazon S3 and have CloudWatch read the files.


D.

Upload log files from the on-premises server to an Amazon EC2 instance and have the instance forward the logs to CloudWatch.


Expert Solution
Questions # 73:

A company is building an application to accept data from customers. The data must be encrypted at rest and in transit.

The application uses an Amazon API Gateway API that resolves to AWS Lambda functions. The Lambda functions store the data in an Amazon Aurora MySQL DB cluster. The application worked properly during testing.

A developer configured an Amazon CloudFront distribution with field-level encryption that uses an AWS Key Management Service (AWS KMS) key. After the configuration of the distribution, the application behaved unexpectedly. All the data in the database changed from plaintext to ciphertext.

The developer must ensure that the data is not stored in the database as the ciphertext from the CloudFront field-level encryption.

Which solution will meet this requirement?

Options:

A.

Change the CloudFront Viewer protocol policy from "HTTP and HTTPS" to "HTTPS only."


B.

Add a Lambda function that uses the KMS key to decrypt the data fields before saving the data to the database.


C.

Enable encryption on the DB cluster by using the same KMS key that is used in CloudFront.


D.

Request and deploy a new SSL certificate to use with the CloudFront distribution.


Expert Solution
Questions # 74:

A company notices that credentials that the company uses to connect to an external software as a service (SaaS) vendor are stored in a configuration file as plaintext.

The developer needs to secure the API credentials and enforce automatic credentials rotation on a quarterly basis.

Which solution will meet these requirements MOST securely?

Options:

A.

Use AWS Key Management Service (AWS KMS) to encrypt the configuration file. Decrypt the configuration file when users make API calls to the SaaS vendor. Enable rotation.


B.

Retrieve temporary credentials from AWS Security Token Service (AWS STS) every 15 minutes. Use the temporary credentials when users make API calls to the SaaS vendor.


C.

Store the credentials in AWS Secrets Manager and enable rotation. Configure the API to have Secrets Manager access.


D.

Store the credentials in AWS Systems Manager Parameter Store and enable rotation. Retrieve the credentials when users make API calls to the SaaS vendor.


Expert Solution
Questions # 75:

A company’s website runs on an Amazon EC2 instance and uses Auto Scaling to scale the environment during peak times. Website users across the world ate experiencing high latency flue lo sialic content on theEC2 instance. even during non-peak hours.

When companion of steps mill resolves the latency issue? (Select TWO)

Options:

A.

Double the Auto Scaling group's maximum number of servers


B.

Host the application code on AWS lambda


C.

Scale vertically by resizing the EC2 instances


D.

Create an Amazon Cloudfront distribution to cache the static content


E.

Store the application’s sialic content in Amazon S3


Expert Solution
Questions # 76:

A company needs to develop a proof of concept for a web service application. The application will show the weather forecast for one of the company's office locations. The application will provide a REST endpoint that clients can call. Where possible, the application should use caching features provided by AWS to limit the number of requests to the backend service. The application backend will receive a small amount of traffic only during testing.

Which approach should the developer take to provide the REST endpoint MOST cost-effectively?

Options:

A.

Create a container image. Deploy the container image by using Amazon EKS. Expose the functionality by using Amazon API Gateway.


B.

Create an AWS Lambda function by using AWS SAM. Expose the Lambda functionality by using Amazon API Gateway.


C.

Create a container image. Deploy the container image by using Amazon ECS. Expose the functionality by using Amazon API Gateway.


D.

Create a microservices application. Deploy the application to AWS Elastic Beanstalk. Expose the AWS Lambda functionality by using an Application Load Balancer.


Expert Solution
Questions # 77:

A developer at a company needs to create a small application that makes the same API call once each day at a designated time. The company does not have infrastructure in the AWS Cloud yet, but the company wants to implement this functionality on AWS.

Which solution meets these requirements in the MOST operationally efficient manner?

Options:

A.

Use a Kubernetes cron job that runs on Amazon Elastic Kubernetes Service (Amazon EKS).


B.

Use an Amazon Linux crontab scheduled job that runs on Amazon EC2.


C.

Use an AWS Lambda function that is invoked by an Amazon EventBridge scheduled event.


D.

Use an AWS Batch job that is submitted to an AWS Batch job queue.


Expert Solution
Questions # 78:

In a move toward using microservices, a company's management team has asked all development teams to build their services so that API requests depend only on that service's data store. One team is building a Payments service which has its own database; the service needs data that originates in the Accounts database. Both are using Amazon DynamoDB.

What approach will result in the simplest, decoupled, and reliable method to get near-real time updates from the Accounts database?

Options:

A.

Use AWS Glue to perform frequent ETL updates from the Accounts database to the Payments database.


B.

Use Amazon ElastiCache in Payments, with the cache updated by triggers in the Accounts database.


C.

Use Amazon Data Firehose to deliver all changes from the Accounts database to the Payments database.


D.

Use Amazon DynamoDB Streams to deliver all changes from the Accounts database to the Payments database.


Expert Solution
Questions # 79:

A company stores customer credit reports in an Amazon S3 bucket. An analytics service uses standard Amazon S3 GET requests to access the reports. A developer must implement a solution to redact personally identifiable information (PII) from the reports before the reports reach the analytics service.

Options:

A.

Load the S3 objects into Amazon Redshift by using a COPY command. Implement dynamic data masking. Refactor the analytics service to read from Amazon Redshift.


B.

Set up an S3 Object Lambda function. Attach the function to an S3 Object Lambda Access Point. Program the function to call a PII redaction API.


C.

Use AWS Key Management Service (AWS KMS) to implement encryption in the S3 bucket. Re-upload all the existing S3 objects. Give the kms

permission to the analytics service.


D.

Create an Amazon Simple Notification Service (Amazon SNS) topic. Implement message data protection. Refactor the analytics service to publish data access requests to the SNS topic.


Expert Solution
Questions # 80:

A developer is building a highly secure healthcare application using serverless components. This application requires writing temporary data to /Imp storage on an AWS Lambda function.

How should the developer encrypt this data?

Options:

A.

Enable Amazon EBS volume encryption with an AWS KMS key in the Lambda function configuration so that all storage attached to the Lambda function is encrypted.


B.

Set up the Lambda function with a role and key policy to access an AWS KMS key. Use the key to generate a data key used to encrypt all data prior to writing to Amp storage.


C.

Use OpenSSL to generate a symmetric encryption key on Lambda startup. Use this key to encrypt the data prior to writing to /tmp.


D.

Use an on-premises hardware security module (HSM) to generate keys, where the Lambda function requests a data key from the HSM and uses that to encrypt data on all requests to the function.


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions